repo
string
pull_number
string
instance_id
string
language
string
issue_numbers
list
base_commit
string
patch
string
test_patch
string
problem_statement
string
hints_text
string
all_hints_text
string
commit_urls
list
created_at
string
commit_url
string
rebuild_cmds
list
test_cmds
list
print_cmds
list
log_parser
string
FAIL_TO_PASS
list
PASS_TO_PASS
list
docker_image
string
libsdl-org/SDL
11761
libsdl-org__SDL-11761
C
[ "8963" ]
028107124358a3d256c8c3acf4e4db6f20e4c348
diff --git a/.github/workflows/generic.yml b/.github/workflows/generic.yml index 1398bca8381d5..84e1d97fe7a2f 100644 --- a/.github/workflows/generic.yml +++ b/.github/workflows/generic.yml @@ -207,7 +207,7 @@ jobs: ctest -VV --test-dir build/ -j2 - name: "Build test apk's (CMake)" id: apks - if: ${{ steps.build.outcome == 'success' && matrix.platform.android-apks != '' }} + if: ${{ always() && steps.build.outcome == 'success' && matrix.platform.android-apks != '' }} # shell: ${{ matrix.platform.shell }} run: | ${{ matrix.platform.source-cmd }} @@ -218,7 +218,7 @@ jobs: -- ${{ matrix.platform.cmake-build-arguments }} - name: 'Install (CMake)' id: install - if: ${{ steps.build.outcome == 'success' }} + if: ${{ always() && steps.build.outcome == 'success' }} # shell: ${{ matrix.platform.shell }} run: | ${{ matrix.platform.source-cmd }} @@ -227,7 +227,7 @@ jobs: ( cd prefix; find . ) | LC_ALL=C sort -u - name: 'Package (CPack)' id: package - if: ${{ steps.build.outcome == 'success' }} + if: ${{ always() && steps.build.outcome == 'success' }} # shell: ${{ matrix.platform.shell }} run: | # DMG creation on macOS occasionally fails, so try multiple times diff --git a/CMakeLists.txt b/CMakeLists.txt index 94b1c9bfe0531..5c4f9cbd412f9 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -498,16 +498,21 @@ else() sdl_include_directories(NO_EXPORT SYSTEM PRIVATE "$<BUILD_INTERFACE:${SDL3_SOURCE_DIR}/src/video/khronos>") endif() -if(MSVC AND TARGET SDL3-shared) +if(MSVC AND TARGET SDL3-shared AND NOT SDL_LIBC) if(SDL_CPU_X64) enable_language(ASM_MASM) set(asm_src "${SDL3_SOURCE_DIR}/src/stdlib/SDL_mslibc_x64.masm") target_compile_options(SDL3-shared PRIVATE "$<$<COMPILE_LANGUAGE:ASM_MASM>:/nologo>") set_property(SOURCE "${asm_src}" PROPERTY LANGUAGE "ASM_MASM") target_sources(SDL3-shared PRIVATE "${asm_src}") - elseif(SDL_CPU_ARM32 OR SDL_CPU_ARM64) - # FIXME: ARM assembler (armasm.exe/armasm64.exe) is NOT ASM_MASM, and does currently not work with CMake - # (https://gitlab.kitware.com/cmake/cmake/-/issues/18912) + elseif(SDL_CPU_ARM64) + enable_language(ASM_MARMASM) + set(asm_src "${SDL3_SOURCE_DIR}/src/stdlib/SDL_mslibc_arm64.masm") + target_compile_options(SDL3-shared PRIVATE "$<$<COMPILE_LANGUAGE:ASM_MARMASM>:/nologo>") + set_property(SOURCE "${asm_src}" PROPERTY LANGUAGE "ASM_MARMASM") + target_sources(SDL3-shared PRIVATE "${asm_src}") + elseif(SDL_CPU_ARM32) + # FIXME endif() endif() @@ -1889,8 +1894,10 @@ elseif(WINDOWS) if(TARGET SDL3-shared AND MSVC AND NOT SDL_LIBC) # Prevent codegen that would use the VC runtime libraries. target_compile_options(SDL3-shared PRIVATE $<$<COMPILE_LANGUAGE:C,CXX>:/GS-> $<$<COMPILE_LANGUAGE:C,CXX>:/Gs1048576>) + target_compile_options(SDL_uclibc PRIVATE $<$<COMPILE_LANGUAGE:C,CXX>:/GS-> $<$<COMPILE_LANGUAGE:C,CXX>:/Gs1048576>) if(SDL_CPU_X86) target_compile_options(SDL3-shared PRIVATE "/arch:SSE") + target_compile_options(SDL3-SDL_uclibc PRIVATE "/arch:SSE") endif() endif() @@ -3388,6 +3395,17 @@ if(SDL_SHARED) # (__rt_sdiv, __rt_udiv, __rt_sdiv64, _rt_udiv64, __dtou64, __u64tod, __i64tos) target_link_libraries(SDL3-shared PRIVATE msvcrt.lib) endif() + find_library(HAVE_ONECORE_LIB NAMES "onecore.lib") + if(HAVE_ONECORE_LIB) + # SDL_malloc.c: __imp_MapViewOfFileNuma2 referenced in function MapViewOfFile2 + target_link_libraries(SDL3-shared PRIVATE onecore.lib) + endif() + find_library(HAVE_VOLATILEACCESSU_LIB NAMES "volatileaccessu.lib") + if(HAVE_VOLATILEACCESSU_LIB) + # SDL_malloc.c : RtlSetVolatileMemory referenced in function RtlFillVolatileMemory + # SDL_malloc.c : RtlFillDeviceMemory referenced in function RtlZeroDeviceMemory + target_link_libraries(SDL3-shared PRIVATE volatileaccessu.lib) + endif() endif() if(HAS_Q_NO_USE_LIBIRC) target_compile_options(SDL3-shared PRIVATE /Q_no-use-libirc) diff --git a/VisualC/SDL/SDL.vcxproj b/VisualC/SDL/SDL.vcxproj index e860035ae625a..ada62e856d8c7 100644 --- a/VisualC/SDL/SDL.vcxproj +++ b/VisualC/SDL/SDL.vcxproj @@ -43,7 +43,6 @@ </PropertyGroup> <Import Project="$(VCTargetsPath)\Microsoft.Cpp.props" /> <ImportGroup Label="ExtensionSettings"> - <Import Project="$(VCTargetsPath)\BuildCustomizations\masm.props" /> </ImportGroup> <ImportGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'" Label="PropertySheets"> <Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" /> @@ -647,9 +646,6 @@ <ClCompile Include="..\..\src\stdlib\SDL_memmove.c" /> <ClCompile Include="..\..\src\stdlib\SDL_memset.c" /> <ClCompile Include="..\..\src\stdlib\SDL_mslibc.c" /> - <MASM Condition="'$(Platform)'=='x64'" Include="..\..\src\stdlib\SDL_mslibc_x64.masm"> - <PrecompiledHeader>NotUsing</PrecompiledHeader> - </MASM> <ClCompile Include="..\..\src\stdlib\SDL_murmur3.c" /> <ClCompile Include="..\..\src\stdlib\SDL_qsort.c" /> <ClCompile Include="..\..\src\stdlib\SDL_random.c" /> @@ -729,6 +725,5 @@ </ItemGroup> <Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" /> <ImportGroup Label="ExtensionTargets"> - <Import Project="$(VCTargetsPath)\BuildCustomizations\masm.targets" /> </ImportGroup> </Project> diff --git a/cmake/sdlcompilers.cmake b/cmake/sdlcompilers.cmake index ec3b6124cade0..c3d8c4702e6ad 100644 --- a/cmake/sdlcompilers.cmake +++ b/cmake/sdlcompilers.cmake @@ -34,7 +34,7 @@ function(SDL_AddCommonCompilerFlags TARGET) cmake_push_check_state() check_c_compiler_flag("/W3" COMPILER_SUPPORTS_W3) if(COMPILER_SUPPORTS_W3) - target_compile_options(${TARGET} PRIVATE "/W3") + target_compile_options(${TARGET} PRIVATE "$<$<COMPILE_LANGUAGE:C,CXX>:/W3>") endif() cmake_pop_check_state() endif() @@ -131,7 +131,7 @@ function(SDL_AddCommonCompilerFlags TARGET) if(MSVC) check_c_compiler_flag(/WX HAVE_WX) if(HAVE_WX) - target_compile_options(${TARGET} PRIVATE "/WX") + target_compile_options(${TARGET} PRIVATE "$<$<COMPILE_LANGUAGE:C,CXX>:/WX>") endif() elseif(USE_GCC OR USE_CLANG OR USE_INTELCC OR USE_QNX) check_c_compiler_flag(-Werror HAVE_WERROR) diff --git a/src/SDL_hashtable.c b/src/SDL_hashtable.c index a3f6613cd0096..571e376974177 100644 --- a/src/SDL_hashtable.c +++ b/src/SDL_hashtable.c @@ -22,8 +22,31 @@ #include "SDL_hashtable.h" // XXX: We can't use SDL_assert here because it's going to call into hashtable code -#include <assert.h> -#define HT_ASSERT(x) assert(x) +#ifdef NDEBUG +#define HT_ASSERT(x) (void)(0) +#else +#if (defined(_WIN32) || defined(SDL_PLATFORM_CYGWIN)) && !defined(SDL_PLATFORM_XBOXONE) && !defined(SDL_PLATFORM_XBOXSERIES) +#include <windows.h> +#endif +/* This is not declared in any header, although it is shared between some + parts of SDL, because we don't want anything calling it without an + extremely good reason. */ +extern SDL_NORETURN void SDL_ExitProcess(int exitcode); +static void HT_ASSERT_FAIL(const char *msg) +{ + const char *caption = "SDL_HashTable Assertion Failure!"; + (void)caption; +#if (defined(_WIN32) || defined(SDL_PLATFORM_CYGWIN)) && !defined(SDL_PLATFORM_XBOXONE) && !defined(SDL_PLATFORM_XBOXSERIES) + MessageBoxA(NULL, msg, caption, MB_OK | MB_ICONERROR); +#elif defined(HAVE_STDIO_H) + fprintf(stderr, "\n\n%s\n%s\n\n", caption, msg); + fflush(stderr); +#endif + SDL_TriggerBreakpoint(); + SDL_ExitProcess(-1); +} +#define HT_ASSERT(x) if (!(x)) HT_ASSERT_FAIL("SDL_HashTable Assertion Failure: " #x) +#endif typedef struct SDL_HashItem { diff --git a/src/dynapi/SDL_dynapi.c b/src/dynapi/SDL_dynapi.c index 2fa85ec5f9920..f35f3e8bcb564 100644 --- a/src/dynapi/SDL_dynapi.c +++ b/src/dynapi/SDL_dynapi.c @@ -520,6 +520,9 @@ static void SDL_InitDynamicAPILocked(void) if (initialize_jumptable(SDL_DYNAPI_VERSION, &jump_table, sizeof(jump_table)) < 0) { // Now we're screwed. Should definitely abort now. dynapi_warn("Failed to initialize internal SDL dynapi. As this would otherwise crash, we have to abort now."); +#ifndef NDEBUG + SDL_TriggerBreakpoint(); +#endif SDL_ExitProcess(86); } } diff --git a/src/stdlib/SDL_malloc.c b/src/stdlib/SDL_malloc.c index a4de7d24ac545..ea09d1e5cbf77 100644 --- a/src/stdlib/SDL_malloc.c +++ b/src/stdlib/SDL_malloc.c @@ -28,8 +28,8 @@ #define LACKS_STRINGS_H #define LACKS_STRING_H #define LACKS_STDLIB_H -#define FORCEINLINE #define ABORT +#define NO_MALLOC_STATS 1 #define USE_LOCKS 1 #define USE_DL_PREFIX @@ -816,6 +816,7 @@ struct mallinfo { inlining are defined as macros, so these aren't used for them. */ +#if 0 /* SDL */ #ifndef FORCEINLINE #if defined(__GNUC__) #define FORCEINLINE __inline __attribute__ ((always_inline)) @@ -823,6 +824,7 @@ struct mallinfo { #define FORCEINLINE __forceinline #endif #endif +#endif /* SDL */ #ifndef NOINLINE #if defined(__GNUC__) #define NOINLINE __attribute__ ((noinline)) @@ -835,13 +837,17 @@ struct mallinfo { #ifdef __cplusplus extern "C" { +#if 0 /* SDL */ #ifndef FORCEINLINE #define FORCEINLINE inline #endif +#endif /* SDL */ #endif /* __cplusplus */ +#if 0 /* SDL */ #ifndef FORCEINLINE #define FORCEINLINE #endif +#endif /* SDL_FORCE_INLINE */ #if !ONLY_MSPACES @@ -1697,20 +1703,20 @@ static int dev_zero_fd = -1; /* Cached file descriptor for /dev/zero. */ #else /* WIN32 */ /* Win32 MMAP via VirtualAlloc */ -static FORCEINLINE void* win32mmap(size_t size) { +SDL_FORCE_INLINE void* win32mmap(size_t size) { void* ptr = VirtualAlloc(0, size, MEM_RESERVE|MEM_COMMIT, PAGE_READWRITE); return (ptr != 0)? ptr: MFAIL; } /* For direct MMAP, use MEM_TOP_DOWN to minimize interference */ -static FORCEINLINE void* win32direct_mmap(size_t size) { +SDL_FORCE_INLINE void* win32direct_mmap(size_t size) { void* ptr = VirtualAlloc(0, size, MEM_RESERVE|MEM_COMMIT|MEM_TOP_DOWN, PAGE_READWRITE); return (ptr != 0)? ptr: MFAIL; } /* This function supports releasing coalesed segments */ -static FORCEINLINE int win32munmap(void* ptr, size_t size) { +SDL_FORCE_INLINE int win32munmap(void* ptr, size_t size) { MEMORY_BASIC_INFORMATION minfo; char* cptr = (char*)ptr; while (size) { @@ -1863,7 +1869,7 @@ static FORCEINLINE int win32munmap(void* ptr, size_t size) { #elif (defined(__GNUC__) && (defined(__i386__) || defined(__x86_64__))) /* Custom spin locks for older gcc on x86 */ -static FORCEINLINE int x86_cas_lock(int *sl) { +SDL_FORCE_INLINE int x86_cas_lock(int *sl) { int ret; int val = 1; int cmp = 0; @@ -1874,7 +1880,7 @@ static FORCEINLINE int x86_cas_lock(int *sl) { return ret; } -static FORCEINLINE void x86_clear_lock(int* sl) { +SDL_FORCE_INLINE void x86_clear_lock(int* sl) { assert(*sl != 0); int prev = 0; int ret; @@ -1952,14 +1958,14 @@ struct malloc_recursive_lock { #define MLOCK_T struct malloc_recursive_lock static MLOCK_T malloc_global_mutex = { 0, 0, (THREAD_ID_T)0}; -static FORCEINLINE void recursive_release_lock(MLOCK_T *lk) { +SDL_FORCE_INLINE void recursive_release_lock(MLOCK_T *lk) { assert(lk->sl != 0); if (--lk->c == 0) { CLEAR_LOCK(&lk->sl); } } -static FORCEINLINE int recursive_acquire_lock(MLOCK_T *lk) { +SDL_FORCE_INLINE int recursive_acquire_lock(MLOCK_T *lk) { THREAD_ID_T mythreadid = CURRENT_THREAD; int spins = 0; for (;;) { @@ -1980,7 +1986,7 @@ static FORCEINLINE int recursive_acquire_lock(MLOCK_T *lk) { } } -static FORCEINLINE int recursive_try_lock(MLOCK_T *lk) { +SDL_FORCE_INLINE int recursive_try_lock(MLOCK_T *lk) { THREAD_ID_T mythreadid = CURRENT_THREAD; if (*((volatile int *)(&lk->sl)) == 0) { if (!CAS_LOCK(&lk->sl)) { diff --git a/src/stdlib/SDL_mslibc.c b/src/stdlib/SDL_mslibc.c index a527bf75d6bdf..6698403fe8904 100644 --- a/src/stdlib/SDL_mslibc.c +++ b/src/stdlib/SDL_mslibc.c @@ -728,14 +728,6 @@ void __declspec(naked) _alloca_probe_16(void) #endif // _M_IX86 -#ifdef _M_ARM64 - -void __chkstk(void); -void __chkstk() { -} - -#endif - #endif // MSC_VER #ifdef __ICL diff --git a/src/stdlib/SDL_mslibc_arm64.masm b/src/stdlib/SDL_mslibc_arm64.masm new file mode 100644 index 0000000000000..a769cc106f5ff --- /dev/null +++ b/src/stdlib/SDL_mslibc_arm64.masm @@ -0,0 +1,26 @@ +TeStackLimit EQU 0x00010 +PAGE_SIZE equ 0x1000 + + AREA CODE, READONLY + + EXPORT __chkstk + +__chkstk PROC + ldr x17,[x18, #TeStackLimit] + subs x16,sp,x15, LSL #0x4 + csel x16,xzr,x16,cc + cmp x16,x17 + b.cc chkstk_start_loop + ret +chkstk_start_loop + and x16,x16,#-PAGE_SIZE +chkstk_loop + sub x17,x17,#0x1, LSL #12 + ldr xzr,[x17] + cmp x17,x16 + b.ne chkstk_loop + ret + + ENDP + + END diff --git a/src/stdlib/SDL_string.c b/src/stdlib/SDL_string.c index ab43c13d3a850..50da685f7eb57 100644 --- a/src/stdlib/SDL_string.c +++ b/src/stdlib/SDL_string.c @@ -368,7 +368,7 @@ static size_t SDL_ScanUnsignedLongLongInternal(const char *text, int count, int negative = *text == '-'; ++text; } - if ((radix == 0 || radix == 16) && *text == '0') { + if ((radix == 0 || radix == 16) && *text == '0' && text[1] != '\0') { ++text; if (*text == 'x' || *text == 'X') { radix = 16;
diff --git a/test/testautomation_stdlib.c b/test/testautomation_stdlib.c index a2ac6719884b7..26317584f19bc 100644 --- a/test/testautomation_stdlib.c +++ b/test/testautomation_stdlib.c @@ -1324,6 +1324,9 @@ static int SDLCALL stdlib_strtox(void *arg) STRTOX_TEST_CASE(SDL_strtoull, unsigned long long, FMT_PRILLu, "-uvwxyz", 32, -991, 3); STRTOX_TEST_CASE(SDL_strtoull, unsigned long long, FMT_PRILLu, "ZzZzZzZzZzZzZzZzZzZzZzZzZ", 36, ullong_max, 25); + STRTOX_TEST_CASE(SDL_strtoull, unsigned long long, FMT_PRILLu, "0", 0, 0, 1); + STRTOX_TEST_CASE(SDL_strtoull, unsigned long long, FMT_PRILLu, "0", 10, 0, 1); + STRTOX_TEST_CASE(SDL_strtoull, unsigned long long, FMT_PRILLu, "-0", 0, 0, 2); STRTOX_TEST_CASE(SDL_strtoull, unsigned long long, FMT_PRILLu, "-0", 10, 0, 2); STRTOX_TEST_CASE(SDL_strtoull, unsigned long long, FMT_PRILLu, " - 1", 0, 0, 0); // invalid input @@ -1335,6 +1338,10 @@ static int SDLCALL stdlib_strtox(void *arg) // Since the CI runs the tests against a variety of targets, this should be fine in practice. if (sizeof(long) == 4) { + STRTOX_TEST_CASE(SDL_strtol, long, "%ld", "0", 0, 0, 1); + STRTOX_TEST_CASE(SDL_strtol, long, "%ld", "0", 10, 0, 1); + STRTOX_TEST_CASE(SDL_strtol, long, "%ld", "-0", 0, 0, 2); + STRTOX_TEST_CASE(SDL_strtol, long, "%ld", "-0", 10, 0, 2); STRTOX_TEST_CASE(SDL_strtol, long, "%ld", "2147483647", 10, 2147483647, 10); STRTOX_TEST_CASE(SDL_strtol, long, "%ld", "2147483648", 10, 2147483647, 10); STRTOX_TEST_CASE(SDL_strtol, long, "%ld", "-2147483648", 10, -2147483647L - 1, 11); @@ -1347,6 +1354,10 @@ static int SDLCALL stdlib_strtox(void *arg) } if (sizeof(long long) == 8) { + STRTOX_TEST_CASE(SDL_strtoll, long long, FMT_PRILLd, "0", 0, 0LL, 1); + STRTOX_TEST_CASE(SDL_strtoll, long long, FMT_PRILLd, "0", 10, 0LL, 1); + STRTOX_TEST_CASE(SDL_strtoll, long long, FMT_PRILLd, "-0", 0, 0LL, 2); + STRTOX_TEST_CASE(SDL_strtoll, long long, FMT_PRILLd, "-0", 10, 0LL, 2); STRTOX_TEST_CASE(SDL_strtoll, long long, FMT_PRILLd, "9223372036854775807", 10, 9223372036854775807LL, 19); STRTOX_TEST_CASE(SDL_strtoll, long long, FMT_PRILLd, "9223372036854775808", 10, 9223372036854775807LL, 19); STRTOX_TEST_CASE(SDL_strtoll, long long, FMT_PRILLd, "-9223372036854775808", 10, -9223372036854775807LL - 1, 20);
arm64 asm, __chkstk, and cmake Our current MSVC code is missing `__chkstk` for arm64 and we are blaming cmake for it referencing cmake issue reported at https://gitlab.kitware.com/cmake/cmake/-/issues/18912 Any progress on this? I found armasm support merges among cmake gitlab PRs. along with some open issues - other and newer than the one above: https://gitlab.kitware.com/cmake/cmake/-/merge_requests/7793 https://gitlab.kitware.com/cmake/cmake/-/issues/24317 @madebr ?
Any progress on this? We are scoping work for the SDL 3.2.0 release, so please let us know if this is a showstopper for you. Well, it _can_ be a showstopper. I don't have anything to test with, though. Me either... let's leave this open until someone has a repro environment. #11761 addresses this. I copied `__chkstk` from a arm64 SDL3.dll. But it's 100% not tested.
Any progress on this? We are scoping work for the SDL 3.2.0 release, so please let us know if this is a showstopper for you. Well, it _can_ be a showstopper. I don't have anything to test with, though. Me either... let's leave this open until someone has a repro environment. #11761 addresses this. I copied `__chkstk` from a arm64 SDL3.dll. But it's 100% not tested.
[ "https://github.com/libsdl-org/SDL/commit/ae6c9370c1fca3db47ed089049c84e9c0c0c7133", "https://github.com/libsdl-org/SDL/commit/4d8946171bf7189afa3317ffdc59a956bdcf1d29", "https://github.com/libsdl-org/SDL/commit/4613773fc1ab19cdf2c8ecfcba6c1557be53e328", "https://github.com/libsdl-org/SDL/commit/ad5b75f503f6bf8740c1321f78f276f21901e1d6", "https://github.com/libsdl-org/SDL/commit/c501023cb08c8262e0a070ce760858c4e68fb29c", "https://github.com/libsdl-org/SDL/commit/91d50dc0824c43c9dc9b0b2170b200791766cdb7", "https://github.com/libsdl-org/SDL/commit/77b9d3bf62e825229bf971bd8aaad75302b51f5b", "https://github.com/libsdl-org/SDL/commit/2d4a4becd0edd10e82ddedad7659615f69d89ac1", "https://github.com/libsdl-org/SDL/commit/182057b34e259872c7b9f5cc0946d8c1c49f9d1a", "https://github.com/libsdl-org/SDL/commit/8d6459a2ed6b7398068fc7f3bbe3a4bc4898fc7b" ]
2024-12-28T14:28:37Z
https://github.com/libsdl-org/SDL/tree/028107124358a3d256c8c3acf4e4db6f20e4c348
[ "$vs=\"${env:ProgramFiles(x86)}\\Microsoft Visual Studio\\2022\\BuildTools\\Common7\\Tools\\VsDevCmd.bat\"; cmd.exe /c \"call `\"$vs`\" -arch=x64 && cmake --build build --parallel && cmake --install build\"" ]
[ "$env:SDL_AUDIODRIVER=\"\"dummy\"\"; $env:SDL_VIDEODRIVER=\"\"offscreen\"\"; ctest --test-dir build --no-tests=error --output-on-failure -VV -C Release 2>&1 | Tee-Object -FilePath test-output.log" ]
[ "cat test-output.log" ]
def parser(log: str) -> dict[str, str]: # Improved parser for CTest and internal testautomation output with wrapped lines import re results: dict[str, str] = {} def set_status(name: str, status: str): status = (status or "").strip().lower() if status in ("passed", "pass", "success", "ok"): new = "pass" elif status in ("skipped", "skip", "not run", "notrun", "disabled", "ignored"): new = "skip" else: # Treat anything else, including 'failed', 'error', 'timeout', etc., as fail new = "fail" prev = results.get(name) if prev == "fail": return if (prev is None) or (new == "fail") or (prev == "skip" and new == "pass"): results[name] = new # Regex to capture CTest per-test summary lines # Example: " 1/23 Test #1: testaudioinfo .................... Passed 0.02 sec" ctest_line_re = re.compile( r"\bTest\s+#\s*\d+:\s+(\S+).*?\b(Passed|Failed|Skipped|Not Run|Disabled|Timeout)\b", re.IGNORECASE, ) # "The following tests FAILED:" block entries: # e.g. " 2 - testautomation (Failed)" or "(Timeout)" failed_entry_re = re.compile( r"^\s*\d+\s*-\s*([^\s]+)\s+\(([^)]+)\)", re.IGNORECASE, ) # Internal testautomation granular results can be wrapped across lines. # We'll parse from a normalized buffer without CTest/timestamp prefixes. internal_test_re = re.compile( r">>>\s*Test\s*'([^']+)'\s*:\s*(Passed|Failed|Skipped|Not Run|Disabled|Timeout)\b", re.IGNORECASE, ) # Helper to strip CTest channel prefix and optional timestamp prefix chan_prefix_re = re.compile(r"^\s*\d+:\s+") ts_prefix_re = re.compile(r"^\d{2}/\d{2}/\d{2}\s+\d{2}:\d{2}:\d{2}:\s+") def strip_prefixes(s: str) -> str: s2 = chan_prefix_re.sub("", s, count=1) s2 = ts_prefix_re.sub("", s2, count=1) return s2 # Buffer to accumulate possibly wrapped internal test lines buf = "" buf_lines = 0 max_buf_lines = 4 # safety cap # Process the log line-by-line for raw_line in log.splitlines(): line = raw_line.rstrip("\r\n") # 1) CTest per-test summary lines on raw content m = ctest_line_re.search(line) if m: name, status = m.groups() set_status(name, status) # don't "continue" because same line might also contain something else (unlikely). # 2) Failed block entries on raw content f = failed_entry_re.search(line) if f: name = f.group(1) # Treat anything in parentheses here as failure (Failed, Timeout, etc.) set_status(name, "fail") # 3) Internal ">>> Test '...': Status" parsing with wrapping norm = strip_prefixes(line) # If a new internal test marker appears, (re)start the buffer from that marker idx = norm.find(">>> Test") if idx >= 0: buf = norm[idx:].strip() buf_lines = 1 elif buf: # Continue accumulating if buffer is active # Append stripped current line content (without prefixes) seg = norm.strip() if seg: # Deduplicate a single overlapping character at the boundary when the next # segment begins with the same char followed by a closing quote (e.g., "s':") if buf and len(seg) >= 2 and seg[0] == buf[-1] and seg[1] == "'": seg = seg[1:] # Concatenate directly to avoid inserting spaces inside quoted names buf += seg buf_lines += 1 # Try to match the internal test result in the buffer (if any) if buf: it = internal_test_re.search(buf) if it: name, status = it.groups() set_status(name, status) buf = "" buf_lines = 0 elif buf_lines >= max_buf_lines: # Give up on this buffer if it doesn't resolve in N lines buf = "" buf_lines = 0 return results
[ "video_getClosestDisplayModeRandomResolution" ]
[ "video_getFullscreenDisplayModes", "round_roundNumberCases", "stdlib_strnlen", "testqsort", "hints_getHint", "pixels_saveLoadBMP", "log10_baseCases", "exp_infCases", "pow_baseNZeroExpOddCases", "asin_outOfDomainCases", "audio_buildAudioStream", "pixels_getPixelFormatDetails", "rect_testEnclosePointsRepeatedInput", "time_dateTimeConversion", "platform_testEndianessAndSwap", "cos_nanCase", "mouse_getMouseState", "process_testInheritedEnv", "iostrm_testMem", "rect_testIntersectRectParam", "audio_buildAudioStreamNegative", "surface_testBlitZeroSource", "stdlib_sscanf", "TestVirtualJoystick", "sdltest_randomIntegerInRange", "stdlib_strtod", "intrinsics_testSSE4.1", "atan2_nanCases", "testprocess", "floor_roundNumberCases", "video_getWindowDisplayModeNegative", "scalbn_regularCases", "keyboard_getScancodeFromName", "surface_testBlit9Grid", "audio_enumerateAndNameAudioDevicesNegativeTestts", "cos_precisionTest", "rect_testEnclosePointsWithClipping", "audio_lockUnlockOpenAudioDevice", "subsystems_dependRefCountWithExtraInit", "testbounds", "rect_testFRectEquals", "process_testNewEnv", "atan2_xInfCases", "copysign_rangeTest", "mouse_getGlobalMouseState", "rect_testEnclosePoints", "keyboard_getKeyNameNegative", "mouse_createFreeCursor", "rect_testHasIntersectionEmpty", "video_getSetWindowData", "keyboard_getKeyboardState", "sdltest_getFuzzerInvocationCount", "keyboard_getScancodeFromNameNegative", "events_addDelEventWatchWithUserdata", "rect_testUnionRectInside", "fmod_regularCases", "rect_testIntersectRectAndLineOutside", "surface_testLoadFailure", "testpower", "timer_addRemoveTimer", "render_testUVWrapping", "process_testArguments", "surface_testPalette", "testplatform", "surface_testCompleteSurfaceConversion", "copysign_infCases", "trunc_nanCase", "fmod_divByZeroCases", "render_testBlitTiled", "ceil_rangeTest", "rect_testHasIntersectionInside", "audio_printAudioDrivers", "exp_baseCase", "sin_nanCase", "sdltest_randomBoundaryNumberSint8", "pow_regularCases", "surface_testFlip", "process_testWriteToFinishedProcess", "intrinsics_testSSE4.2", "sqrt_regularCases", "fabs_infCases", "iostrm_testAllocFree", "video_getSetWindowMinimumSize", "log_testHint", "sqrt_baseCases", "pow_basePInfCases", "scalbn_nanCase", "testsem", "properties_testBasic", "mouse_setCursor", "scalbn_infCases", "video_getWindowDisplayMode", "exp_zeroCases", "fmod_divByInfCases", "trunc_roundNumberCases", "sin_precisionTest", "subsystems_dependRefCountInitByOneQuitAll", "video_createWindowVariousFlags", "render_testPrimitivesWithViewport", "time_dateTimeUtilities", "log_baseCases", "pow_rangeTest", "render_testPrimitives", "audio_openCloseAndGetAudioStatus", "sdltest_randomBoundaryNumberSint32", "rect_testFRectEqualsParam", "process_testSimpleStdinToStdout", "atan_zeroCases", "copysign_zeroCases", "sdltest_randomBoundaryNumberUint8", "process_testKill", "rect_testIntersectRectAndLine", "fabs_zeroCases", "rect_testHasIntersectionOutside", "keyboard_getKeyName", "audio_enumerateAndNameAudioDevices", "stdlib_snprintf", "floor_nanCase", "testtimer", "surface_testBlitTiled", "tan_nanCase", "log10_regularCases", "floor_fractionCases", "audio_resampleLoss", "sdltest_randomNumber", "round_fractionCases", "intrinsics_testAVX2", "fmod_nanCases", "platform_testGetVersion", "sdltest_randomAsciiString", "testatomic", "tan_zeroCases", "rect_testHasIntersectionParam", "cos_infCases", "timer_getPerformanceCounter", "keyboard_setTextInputArea", "pow_basePZeroCases", "pow_baseZeroExpNInfCases", "audio_getAudioStatus", "tan_precisionTest", "video_createWindowVariousSizes", "rect_testRectEmptyParam", "blit_testExampleApplicationRender", "scalbn_baseZeroCases", "platform_testSetErrorEmptyInput", "rect_testHasIntersectionPoint", "acos_nanCase", "process_testFileRedirection", "iostrm_testParamNegative", "cos_regularCases", "stdlib_strlcpy", "modf_baseCases", "surface_testClearSurface", "timer_getPerformanceFrequency", "exp_overflowCase", "intrinsics_testSSE2", "surface_testSurfaceConversion", "rect_testHasIntersectionPartial", "TestGUIDToString", "scalbn_expZeroCase", "pow_baseNanExp0Cases", "atan2_topLeftQuadrantTest", "torturethread", "events_addDelEventWatch", "render_testClipRect", "fabs_nanCase", "pixels_allocFreePalette", "rect_testIntersectRectOutside", "mouse_getMouseFocus", "iostrm_testFileWrite", "time_getRealtimeClock", "stdlib_swprintf", "rect_testIntersectRectPartial", "clipboard_testPrimarySelectionTextFunctions", "hints_setHint", "ceil_roundNumberCases", "sqrt_nanCase", "rect_testEnclosePointsParam", "atan2_bothInfCases", "stdlib_strtox", "iostrm_testDynamicMem", "round_zeroCases", "audio_initQuitAudio", "rect_testIntersectRectAndLineParam", "intrinsics_testSSE3", "asin_nanCase", "process_testMultiprocessStdinToStdout", "surface_testBlitBlendMod", "sqrt_infCase", "clipboard_testClipboardTextFunctions", "pow_nanArgsCases", "atan2_xZeroCases", "process_testStdinToStdout", "iostrm_testConstMem", "fmod_divOfZeroCases", "pow_base1ExpNanCase", "iostrm_testFileRead", "platform_testSetErrorInvalidInput", "video_createMaximized", "audio_getAudioFormatName", "main_testImpliedJoystickInit", "cos_rangeTest", "platform_testTypes", "keyboard_getKeyFromScancode", "pow_baseNInfCases", "render_testBlit", "testfile", "surface_testBlitMultiple", "keyboard_startStopTextInput", "clipboard_testClipboardDataFunctions", "pow_basePZeroExpOddCases", "surface_testBlit", "rect_testIntersectRectAndLineEmpty", "properties_testCopy", "asin_limitCases", "fmod_divOfInfCases", "sdltest_generateRunSeed", "sqrt_outOfDomainCases", "blit_testRandomToRandomSVGA", "trunc_fractionCases", "surface_testBlitBlendAddPremultiplied", "stdlib_aligned_alloc", "sdltest_randomBoundaryNumberUint16", "audio_printCurrentAudioDriver", "ceil_infCases", "surface_testBlitBlendAdd", "audio_enumerateAndNameAudioDevicesNegativeTests", "atan2_bottomRightQuadrantTest", "process_testNonExistingExecutable", "mouse_warpMouseInWindow", "tan_infCases", "rect_testIntersectRectInside", "render_testGetNumRenderDrivers", "platform_testGetFunctions", "ceil_zeroCases", "testver", "testthread", "platform_testHasFunctions", "acos_precisionTest", "video_getClosestDisplayModeCurrentResolution", "render_testLogicalSize", "video_createMinimized", "mouse_getCursor", "render_testBlit9Grid", "atan2_yZeroCases", "round_nanCase", "atan_limitCases", "testkeys", "audio_quitInitAudioSubSystem", "fmod_rangeTest", "platform_testDefaultInit", "video_getWindowFlags", "testerror", "stdlib_strpbrk", "mouse_getSetRelativeMouseMode", "audio_pauseUnpauseAudio", "render_testViewport", "atan_precisionTest", "main_testImpliedJoystickQuit", "video_getWindowPixelFormat", "timer_delayAndGetTicks", "events_mainThreadCallbacks", "surface_testOverflow", "atan_nanCase", "stdlib_iconv", "floor_infCases", "pow_powerOfTwo", "testdisplayinfo", "subsystems_dependRefCountInitAllQuitByOne", "subsystems_referenceCount", "surface_testBlitBlendMul", "rect_testIntersectRectFloat", "pow_baseNOneExpInfCases", "keyboard_setTextInputAreaNegative", "testlocale", "surface_testBlitAlphaMod", "keyboard_getScancodeNameNegative", "stdlib_overflow", "video_getWindowSurface", "keyboard_getSetModState", "properties_testLocking", "audio_convertAccuracy", "sdltest_randomBoundaryNumberSint64", "render_testBlitColor", "rect_testRectEmptyFloat", "sin_infCases", "mouse_getRelativeMouseState", "video_getSetWindowGrab", "video_getSetWindowSize", "pow_expInfCases", "surface_testBlitBlendPremultiplied", "atan2_bothZeroCases", "keyboard_getKeyboardFocus", "pixels_getPixelFormatName", "rect_testIntersectRectAndLineInside", "acos_limitCases", "rect_testRectEqualsParam", "intrinsics_testSSE", "sdltest_randomBoundaryNumberSint16", "video_enableDisableScreensaver", "video_getSetWindowPosition", "rect_testIntersectRectAndLineFloat", "rect_testIntersectRectPoint", "rect_testRectEmpty", "sin_rangeTest", "testyuv", "process_testStdinToStderr", "mouse_getDefaultCursor", "process_testExitCode", "log_regularCases", "rect_testEnclosePointsFloat", "testevdev", "surface_testScale", "mouse_createFreeColorCursor", "log_limitCases", "platform_testGetPowerInfo", "audio_convertAudio", "surface_testPalettization", "acos_outOfDomainCases", "surface_testPremultiplyAlpha", "audio_initOpenCloseQuitAudio", "asin_precisionTest", "render_testBlendModes", "intrinsics_selftest", "rect_testUnionRectParam", "rect_testUnionRectOutside", "video_getWindowId", "platform_testGetSetClearError", "sin_regularCases", "atan2_topRightQuadrantTest", "atan2_yInfCases", "trunc_zeroCases", "trunc_rangeTest", "process_testBatBadButVulnerability", "video_getSetWindowMaximumSize", "copysign_nanCases", "log10_nanCases", "log10_limitCases", "ceil_fractionCases", "properties_testCleanup", "testaudioinfo", "atan2_bottomLeftQuadrantTest", "stdlib_getsetenv", "sdltest_randomBoundaryNumberUint32", "surface_testBlitColorMod", "floor_zeroCases", "surface_testBlitBlendBlend", "round_rangeTest", "log_nanCases", "intrinsics_testAVX", "pow_badOperationCase", "rect_testUnionRectEmpty", "events_pushPumpAndPollUserevent", "pow_baseNZeroCases", "rect_testRectEquals", "audio_formatChange", "video_setWindowCenteredOnDisplay", "trunc_infCases", "round_infCases", "ceil_nanCase", "surface_testSaveLoadBitmap", "TestStringToGUID", "iostrm_testCompareRWFromMemWithRWFromFile", "keyboard_getKeyFromName", "main_testSetError", "stdlib_strstr", "rect_testIntersectRectEmpty", "sdltest_randomAsciiStringOfSize", "testfilesystem", "floor_rangeTest", "stdlib_wcstol", "exp_regularCases", "iostrm_testFileWriteReadEndian", "mouse_showCursor", "sdltest_randomBoundaryNumberUint64", "fabs_rangeTest" ]
starryzhang/sweb.eval.win.libsdl-org_1776_sdl-11761
libsdl-org/SDL
12806
libsdl-org__SDL-12806
C
[ "12802" ]
f35a2736b708408bd5e6273255c03513cf60605a
diff --git a/CMakeLists.txt b/CMakeLists.txt index 364cb5c0fd359..0db59b3eec21c 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -1893,11 +1893,13 @@ elseif(UNIX AND NOT APPLE AND NOT RISCOS AND NOT HAIKU) set (USE_POSIX_SPAWN 1) endif() elseif(WINDOWS) + enable_language(CXX) check_c_source_compiles(" #include <windows.h> int main(int argc, char **argv) { return 0; }" HAVE_WIN32_CC) sdl_glob_sources("${SDL3_SOURCE_DIR}/src/core/windows/*.c") + sdl_glob_sources("${SDL3_SOURCE_DIR}/src/core/windows/*.cpp") sdl_glob_sources("${SDL3_SOURCE_DIR}/src/main/windows/*.c") sdl_glob_sources("${SDL3_SOURCE_DIR}/src/io/windows/*.c") @@ -2008,6 +2010,7 @@ elseif(WINDOWS) if(SDL_VIDEO) set(SDL_VIDEO_DRIVER_WINDOWS 1) sdl_glob_sources("${SDL3_SOURCE_DIR}/src/video/windows/*.c") + sdl_glob_sources("${SDL3_SOURCE_DIR}/src/video/windows/*.cpp") CheckOpenVR() @@ -2135,7 +2138,7 @@ elseif(WINDOWS) set(SDL_JOYSTICK_WGI 1) endif() if(HAVE_GAMEINPUT_H) - sdl_glob_sources("${SDL3_SOURCE_DIR}/src/joystick/gdk/*.c") + sdl_glob_sources("${SDL3_SOURCE_DIR}/src/joystick/gdk/*.cpp") set(SDL_JOYSTICK_GAMEINPUT 1) endif() set(HAVE_SDL_JOYSTICK TRUE) diff --git a/VisualC-GDK/SDL/SDL.vcxproj b/VisualC-GDK/SDL/SDL.vcxproj index d15619c802ee2..baa2fffe2c2af 100644 --- a/VisualC-GDK/SDL/SDL.vcxproj +++ b/VisualC-GDK/SDL/SDL.vcxproj @@ -645,7 +645,7 @@ <ClCompile Include="..\..\src\audio\SDL_wave.c" /> <ClCompile Include="..\..\src\audio\wasapi\SDL_wasapi.c" /> <ClCompile Include="..\..\src\core\SDL_core_unsupported.c" /> - <ClCompile Include="..\..\src\core\windows\SDL_gameinput.c"/> + <ClCompile Include="..\..\src\core\windows\SDL_gameinput.cpp"/> <ClCompile Include="..\..\src\core\windows\SDL_hid.c" /> <ClCompile Include="..\..\src\core\windows\SDL_immdevice.c" /> <ClCompile Include="..\..\src\core\windows\SDL_windows.c" /> @@ -710,7 +710,7 @@ <ClCompile Include="..\..\src\hidapi\SDL_hidapi.c" /> <ClCompile Include="..\..\src\joystick\controller_type.c" /> <ClCompile Include="..\..\src\joystick\dummy\SDL_sysjoystick.c" /> - <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.c" /> + <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.cpp" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapijoystick.c" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapi_8bitdo.c" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapi_combined.c" /> @@ -891,7 +891,7 @@ <ClCompile Include="..\..\src\video\windows\SDL_windowsevents.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsframebuffer.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowskeyboard.c" /> - <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.c" /> + <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.cpp" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmessagebox.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmodes.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmouse.c" /> diff --git a/VisualC-GDK/SDL/SDL.vcxproj.filters b/VisualC-GDK/SDL/SDL.vcxproj.filters index 03b5a6a8f817d..26f228826c966 100644 --- a/VisualC-GDK/SDL/SDL.vcxproj.filters +++ b/VisualC-GDK/SDL/SDL.vcxproj.filters @@ -27,7 +27,7 @@ <ClCompile Include="..\..\src\audio\SDL_wave.c" /> <ClCompile Include="..\..\src\audio\wasapi\SDL_wasapi.c" /> <ClCompile Include="..\..\src\core\SDL_core_unsupported.c" /> - <ClCompile Include="..\..\src\core\windows\SDL_gameinput.c" /> + <ClCompile Include="..\..\src\core\windows\SDL_gameinput.cpp" /> <ClCompile Include="..\..\src\core\windows\SDL_hid.c" /> <ClCompile Include="..\..\src\core\windows\SDL_immdevice.c" /> <ClCompile Include="..\..\src\core\windows\SDL_windows.c" /> @@ -61,7 +61,7 @@ <ClCompile Include="..\..\src\hidapi\SDL_hidapi.c" /> <ClCompile Include="..\..\src\joystick\controller_type.c" /> <ClCompile Include="..\..\src\joystick\dummy\SDL_sysjoystick.c" /> - <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.c" /> + <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.cpp" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapijoystick.c" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapi_8bitdo.c" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapi_combined.c" /> @@ -193,7 +193,7 @@ <ClCompile Include="..\..\src\video\windows\SDL_windowsevents.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsframebuffer.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowskeyboard.c" /> - <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.c" /> + <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.cpp" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmessagebox.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmodes.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmouse.c" /> diff --git a/VisualC/SDL/SDL.vcxproj b/VisualC/SDL/SDL.vcxproj index 738a4110fbc8f..c0a4d8643665d 100644 --- a/VisualC/SDL/SDL.vcxproj +++ b/VisualC/SDL/SDL.vcxproj @@ -424,6 +424,16 @@ <ClCompile Include="..\..\src\camera\dummy\SDL_camera_dummy.c" /> <ClCompile Include="..\..\src\camera\mediafoundation\SDL_camera_mediafoundation.c" /> <ClCompile Include="..\..\src\camera\SDL_camera.c" /> + <ClCompile Include="..\..\src\core\windows\pch_cpp.cpp"> + <PrecompiledHeader Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">Create</PrecompiledHeader> + <PrecompiledHeader Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">Create</PrecompiledHeader> + <PrecompiledHeader Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">Create</PrecompiledHeader> + <PrecompiledHeader Condition="'$(Configuration)|$(Platform)'=='Release|x64'">Create</PrecompiledHeader> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + </ClCompile> <ClCompile Include="..\..\src\dialog\SDL_dialog.c" /> <ClCompile Include="..\..\src\dialog\SDL_dialog_utils.c" /> <ClCompile Include="..\..\src\filesystem\SDL_filesystem.c" /> @@ -543,7 +553,12 @@ <ClCompile Include="..\..\src\audio\SDL_wave.c" /> <ClCompile Include="..\..\src\audio\wasapi\SDL_wasapi.c" /> <ClCompile Include="..\..\src\core\SDL_core_unsupported.c" /> - <ClCompile Include="..\..\src\core\windows\SDL_gameinput.c" /> + <ClCompile Include="..\..\src\core\windows\SDL_gameinput.cpp"> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + </ClCompile> <ClCompile Include="..\..\src\core\windows\SDL_hid.c" /> <ClCompile Include="..\..\src\core\windows\SDL_immdevice.c" /> <ClCompile Include="..\..\src\core\windows\SDL_windows.c" /> @@ -580,7 +595,12 @@ <ClCompile Include="..\..\src\hidapi\SDL_hidapi.c" /> <ClCompile Include="..\..\src\joystick\controller_type.c" /> <ClCompile Include="..\..\src\joystick\dummy\SDL_sysjoystick.c" /> - <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.c" /> + <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.cpp"> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + </ClCompile> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapijoystick.c" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapi_8bitdo.c" /> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapi_combined.c" /> @@ -726,7 +746,12 @@ <ClCompile Include="..\..\src\video\windows\SDL_windowsevents.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsframebuffer.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowskeyboard.c" /> - <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.c" /> + <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.cpp"> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + <PrecompiledHeaderOutputFile Condition="'$(Configuration)|$(Platform)'=='Release|x64'">$(IntDir)$(TargetName)_cpp.pch</PrecompiledHeaderOutputFile> + </ClCompile> <ClCompile Include="..\..\src\video\windows\SDL_windowsmessagebox.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmodes.c" /> <ClCompile Include="..\..\src\video\windows\SDL_windowsmouse.c" /> diff --git a/VisualC/SDL/SDL.vcxproj.filters b/VisualC/SDL/SDL.vcxproj.filters index a5b201ed6d5e2..2583c9f3791ea 100644 --- a/VisualC/SDL/SDL.vcxproj.filters +++ b/VisualC/SDL/SDL.vcxproj.filters @@ -537,9 +537,6 @@ <ClInclude Include="..\..\src\events\SDL_events_c.h"> <Filter>events</Filter> </ClInclude> - <ClInclude Include="..\..\src\events\SDL_eventfilter_c.h"> - <Filter>events</Filter> - </ClInclude> <ClInclude Include="..\..\src\events\SDL_keyboard_c.h"> <Filter>events</Filter> </ClInclude> @@ -962,6 +959,7 @@ <ClInclude Include="..\..\include\SDL3\SDL_storage.h" /> <ClInclude Include="..\..\include\SDL3\SDL_time.h" /> <ClInclude Include="..\..\src\events\SDL_categories_c.h" /> + <ClInclude Include="..\..\src\events\SDL_eventwatch_c.h" /> </ItemGroup> <ItemGroup> <ClCompile Include="..\..\src\audio\wasapi\SDL_wasapi.c" /> @@ -1049,7 +1047,7 @@ <ClCompile Include="..\..\src\core\SDL_core_unsupported.c"> <Filter>core</Filter> </ClCompile> - <ClCompile Include="..\..\src\core\windows\SDL_gameinput.c"> + <ClCompile Include="..\..\src\core\windows\SDL_gameinput.cpp"> <Filter>core\windows</Filter> </ClCompile> <ClCompile Include="..\..\src\core\windows\SDL_hid.c"> @@ -1088,9 +1086,6 @@ <ClCompile Include="..\..\src\events\SDL_events.c"> <Filter>events</Filter> </ClCompile> - <ClCompile Include="..\..\src\events\SDL_eventfilter.c"> - <Filter>events</Filter> - </ClCompile> <ClCompile Include="..\..\src\events\SDL_keyboard.c"> <Filter>events</Filter> </ClCompile> @@ -1184,7 +1179,7 @@ <ClCompile Include="..\..\src\joystick\dummy\SDL_sysjoystick.c"> <Filter>joystick\dummy</Filter> </ClCompile> - <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.c"> + <ClCompile Include="..\..\src\joystick\gdk\SDL_gameinputjoystick.cpp"> <Filter>joystick\gdk</Filter> </ClCompile> <ClCompile Include="..\..\src\joystick\hidapi\SDL_hidapi_8bitdo.c"> @@ -1367,7 +1362,7 @@ <ClCompile Include="..\..\src\video\windows\SDL_windowskeyboard.c"> <Filter>video\windows</Filter> </ClCompile> - <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.c"> + <ClCompile Include="..\..\src\video\windows\SDL_windowsgameinput.cpp"> <Filter>video\windows</Filter> </ClCompile> <ClCompile Include="..\..\src\video\windows\SDL_windowsmessagebox.c"> @@ -1606,11 +1601,12 @@ <ClCompile Include="..\..\src\storage\generic\SDL_genericstorage.c" /> <ClCompile Include="..\..\src\storage\steam\SDL_steamstorage.c" /> <ClCompile Include="..\..\src\storage\SDL_storage.c" /> + <ClCompile Include="..\..\src\events\SDL_eventwatch.c" /> + <ClCompile Include="..\..\src\core\windows\pch_cpp.cpp"> + <Filter>core\windows</Filter> + </ClCompile> </ItemGroup> <ItemGroup> <ResourceCompile Include="..\..\src\core\windows\version.rc" /> </ItemGroup> - <ItemGroup> - <MASM Include="..\..\src\stdlib\SDL_mslibc_x64.masm" /> - </ItemGroup> </Project> diff --git a/src/core/windows/SDL_gameinput.c b/src/core/windows/SDL_gameinput.cpp similarity index 85% rename from src/core/windows/SDL_gameinput.c rename to src/core/windows/SDL_gameinput.cpp index 9ac5912db9d06..e2ea3fb4ab285 100644 --- a/src/core/windows/SDL_gameinput.c +++ b/src/core/windows/SDL_gameinput.cpp @@ -25,16 +25,11 @@ #include "SDL_windows.h" #include "SDL_gameinput.h" -#ifdef SDL_PLATFORM_WIN32 -#include <initguid.h> -// {11BE2A7E-4254-445A-9C09-FFC40F006918} -DEFINE_GUID(SDL_IID_GameInput, 0x11BE2A7E, 0x4254, 0x445A, 0x9C, 0x09, 0xFF, 0xC4, 0x0F, 0x00, 0x69, 0x18); -#endif - static SDL_SharedObject *g_hGameInputDLL; static IGameInput *g_pGameInput; static int g_nGameInputRefCount; + bool SDL_InitGameInput(IGameInput **ppGameInput) { if (g_nGameInputRefCount == 0) { @@ -43,7 +38,7 @@ bool SDL_InitGameInput(IGameInput **ppGameInput) return false; } - typedef HRESULT (WINAPI *GameInputCreate_t)(IGameInput * *gameInput); + typedef HRESULT (WINAPI *GameInputCreate_t)(IGameInput **gameInput); GameInputCreate_t GameInputCreateFunc = (GameInputCreate_t)SDL_LoadFunction(g_hGameInputDLL, "GameInputCreate"); if (!GameInputCreateFunc) { SDL_UnloadObject(g_hGameInputDLL); @@ -58,15 +53,19 @@ bool SDL_InitGameInput(IGameInput **ppGameInput) } #ifdef SDL_PLATFORM_WIN32 - hr = IGameInput_QueryInterface(pGameInput, &SDL_IID_GameInput, (void **)&g_pGameInput); - IGameInput_Release(pGameInput); +#if GAMEINPUT_API_VERSION >= 1 + hr = pGameInput->QueryInterface(IID_IGameInput, (void **)&g_pGameInput); +#else + // We require GameInput v1.1 or newer + hr = E_NOINTERFACE; +#endif + pGameInput->Release(); if (FAILED(hr)) { SDL_UnloadObject(g_hGameInputDLL); return WIN_SetErrorFromHRESULT("GameInput QueryInterface failed", hr); } #else // Assume that the version we get is compatible with the current SDK - // If that isn't the case, define the correct GUID for SDL_IID_GameInput above g_pGameInput = pGameInput; #endif } @@ -85,7 +84,7 @@ void SDL_QuitGameInput(void) --g_nGameInputRefCount; if (g_nGameInputRefCount == 0) { if (g_pGameInput) { - IGameInput_Release(g_pGameInput); + g_pGameInput->Release(); g_pGameInput = NULL; } if (g_hGameInputDLL) { diff --git a/src/core/windows/SDL_gameinput.h b/src/core/windows/SDL_gameinput.h index 0022c0bdde163..4d2beb5647005 100644 --- a/src/core/windows/SDL_gameinput.h +++ b/src/core/windows/SDL_gameinput.h @@ -25,9 +25,16 @@ #ifdef HAVE_GAMEINPUT_H -#define COBJMACROS #include <gameinput.h> +#ifndef GAMEINPUT_API_VERSION +#define GAMEINPUT_API_VERSION 0 +#endif + +#if GAMEINPUT_API_VERSION == 1 +using namespace GameInput::v1; +#endif + extern bool SDL_InitGameInput(IGameInput **ppGameInput); extern void SDL_QuitGameInput(void); diff --git a/src/joystick/gdk/SDL_gameinputjoystick.c b/src/joystick/gdk/SDL_gameinputjoystick.cpp similarity index 89% rename from src/joystick/gdk/SDL_gameinputjoystick.c rename to src/joystick/gdk/SDL_gameinputjoystick.cpp index 6cf0a902b7f17..46d4ecc5f117a 100644 --- a/src/joystick/gdk/SDL_gameinputjoystick.c +++ b/src/joystick/gdk/SDL_gameinputjoystick.cpp @@ -24,6 +24,7 @@ #include "../SDL_sysjoystick.h" #include "../usb_ids.h" +#include "../../core/windows/SDL_windows.h" #include "../../core/windows/SDL_gameinput.h" // Default value for SDL_HINT_JOYSTICK_GAMEINPUT @@ -66,7 +67,7 @@ typedef struct joystick_hwdata static GAMEINPUT_InternalList g_GameInputList = { NULL }; static IGameInput *g_pGameInput = NULL; -static GameInputCallbackToken g_GameInputCallbackToken = GAMEINPUT_INVALID_CALLBACK_TOKEN_VALUE; +static GameInputCallbackToken g_GameInputCallbackToken = 0; static Uint64 g_GameInputTimestampOffset; static bool GAMEINPUT_InternalIsGamepad(const GameInputDeviceInfo *info) @@ -93,15 +94,22 @@ static bool GAMEINPUT_InternalAddOrFind(IGameInputDevice *pDevice) SDL_AssertJoysticksLocked(); - info = IGameInputDevice_GetDeviceInfo(pDevice); - if (info->capabilities & GameInputDeviceCapabilityWireless) { +#if GAMEINPUT_API_VERSION >= 1 + HRESULT hr = pDevice->GetDeviceInfo(&info); + if (FAILED(hr)) { + return WIN_SetErrorFromHRESULT("IGameInputDevice::GetDeviceInfo", hr); + } +#else + info = pDevice->GetDeviceInfo(); +#endif + if (false /*info->capabilities & GameInputDeviceCapabilityWireless*/) { bus = SDL_HARDWARE_BUS_BLUETOOTH; } else { bus = SDL_HARDWARE_BUS_USB; } vendor = info->vendorId; product = info->productId; - version = (info->firmwareVersion.major << 8) | info->firmwareVersion.minor; + //version = (info->firmwareVersion.major << 8) | info->firmwareVersion.minor; if (SDL_JoystickHandledByAnotherDriver(&SDL_GAMEINPUT_JoystickDriver, vendor, product, version, "")) { return true; @@ -130,18 +138,20 @@ static bool GAMEINPUT_InternalAddOrFind(IGameInputDevice *pDevice) // Generate a device path for (idx = 0; idx < APP_LOCAL_DEVICE_ID_SIZE; ++idx) { SDL_snprintf(tmp, SDL_arraysize(tmp), "%02hhX", info->deviceId.value[idx]); - SDL_strlcat(elem->path, tmp, SDL_arraysize(tmp)); + SDL_strlcat(elem->path, tmp, SDL_arraysize(elem->path)); } - if (info->deviceStrings) { - // In theory we could get the manufacturer and product strings here, but they're NULL for all the controllers I've tested +#if GAMEINPUT_API_VERSION >= 1 + if (info->displayName) { + product_string = info->displayName; } - +#else if (info->displayName) { - // This could give us a product string, but it's NULL for all the controllers I've tested + product_string = info->displayName->data; } +#endif - IGameInputDevice_AddRef(pDevice); + pDevice->AddRef(); elem->device = pDevice; elem->name = SDL_CreateJoystickName(vendor, product, manufacturer_string, product_string); elem->guid = SDL_CreateJoystickGUID(bus, vendor, product, version, manufacturer_string, product_string, 'g', 0); @@ -168,7 +178,7 @@ static bool GAMEINPUT_InternalRemoveByIndex(int idx) elem = g_GameInputList.devices[idx]; if (elem) { - IGameInputDevice_Release(elem->device); + elem->device->Release(); SDL_free(elem->name); SDL_free(elem); } @@ -232,10 +242,11 @@ static void CALLBACK GAMEINPUT_InternalJoystickDeviceCallback( } static void GAMEINPUT_JoystickDetect(void); +static void GAMEINPUT_JoystickQuit(void); static bool GAMEINPUT_JoystickInit(void) { - HRESULT hR; + HRESULT hr; if (!SDL_GetHintBoolean(SDL_HINT_JOYSTICK_GAMEINPUT, SDL_GAMEINPUT_DEFAULT)) { return true; @@ -245,21 +256,21 @@ static bool GAMEINPUT_JoystickInit(void) return false; } - hR = IGameInput_RegisterDeviceCallback(g_pGameInput, - NULL, + hr = g_pGameInput->RegisterDeviceCallback(NULL, GameInputKindController, GameInputDeviceConnected, GameInputBlockingEnumeration, NULL, GAMEINPUT_InternalJoystickDeviceCallback, &g_GameInputCallbackToken); - if (FAILED(hR)) { - return SDL_SetError("IGameInput::RegisterDeviceCallback failure with HRESULT of %08lX", hR); + if (FAILED(hr)) { + GAMEINPUT_JoystickQuit(); + return WIN_SetErrorFromHRESULT("IGameInput::RegisterDeviceCallback", hr); } // Calculate the relative offset between SDL timestamps and GameInput timestamps Uint64 now = SDL_GetTicksNS(); - uint64_t timestampUS = IGameInput_GetCurrentTimestamp(g_pGameInput); + uint64_t timestampUS = g_pGameInput->GetCurrentTimestamp(); g_GameInputTimestampOffset = (SDL_NS_TO_US(now) - timestampUS); GAMEINPUT_JoystickDetect(); @@ -292,7 +303,7 @@ static void GAMEINPUT_JoystickDetect(void) elem->isAdded = true; } - if (elem->isDeleteRequested || !(IGameInputDevice_GetDeviceStatus(elem->device) & GameInputDeviceConnected)) { + if (elem->isDeleteRequested || !(elem->device->GetDeviceStatus() & GameInputDeviceConnected)) { SDL_PrivateJoystickRemoved(elem->device_instance); GAMEINPUT_InternalRemoveByIndex(idx--); } @@ -357,6 +368,7 @@ static SDL_JoystickID GAMEINPUT_JoystickGetDeviceInstanceID(int device_index) static void GAMEINPUT_UpdatePowerInfo(SDL_Joystick *joystick, IGameInputDevice *device) { +#if 0 GameInputBatteryState battery_state; SDL_PowerState state; int percent = 0; @@ -385,10 +397,10 @@ static void GAMEINPUT_UpdatePowerInfo(SDL_Joystick *joystick, IGameInputDevice * percent = (int)SDL_roundf((battery_state.remainingCapacity / battery_state.fullChargeCapacity) * 100.0f); } SDL_SendJoystickPowerInfo(joystick, state, percent); +#endif } -#ifdef IGameInput_RegisterSystemButtonCallback - +#if GAMEINPUT_API_VERSION >= 1 static void CALLBACK GAMEINPUT_InternalSystemButtonCallback( _In_ GameInputCallbackToken callbackToken, _In_ void * context, @@ -415,8 +427,7 @@ static void CALLBACK GAMEINPUT_InternalSystemButtonCallback( SDL_UnlockJoysticks(); } } - -#endif // IGameInput_RegisterSystemButtonCallback +#endif // GAMEINPUT_API_VERSION >= 1 static bool GAMEINPUT_JoystickOpen(SDL_Joystick *joystick, int device_index) { @@ -441,19 +452,15 @@ static bool GAMEINPUT_JoystickOpen(SDL_Joystick *joystick, int device_index) joystick->nbuttons = 11; joystick->nhats = 1; -#ifdef IGameInput_RegisterSystemButtonCallback +#if GAMEINPUT_API_VERSION >= 1 if (info->supportedSystemButtons != GameInputSystemButtonNone) { if (info->supportedSystemButtons & GameInputSystemButtonShare) { ++joystick->nbuttons; } -#if 1 // The C macro in GameInput.h version 10.0.26100 refers to a focus policy which I guess has been removed from the final API? -#undef IGameInput_RegisterSystemButtonCallback -#define IGameInput_RegisterSystemButtonCallback(This, device, buttonFilter, context, callbackFunc, callbackToken) ((This)->lpVtbl->RegisterSystemButtonCallback(This, device, buttonFilter, context, callbackFunc, callbackToken)) -#endif - IGameInput_RegisterSystemButtonCallback(g_pGameInput, elem->device, (GameInputSystemButtonGuide | GameInputSystemButtonShare), joystick, GAMEINPUT_InternalSystemButtonCallback, &hwdata->system_button_callback_token); + g_pGameInput->RegisterSystemButtonCallback(elem->device, (GameInputSystemButtonGuide | GameInputSystemButtonShare), joystick, GAMEINPUT_InternalSystemButtonCallback, &hwdata->system_button_callback_token); } -#endif // IGameInput_RegisterSystemButtonCallback +#endif // GAMEINPUT_API_VERSION >= 1 } else { joystick->naxes = info->controllerAxisCount; joystick->nbuttons = info->controllerButtonCount; @@ -467,6 +474,7 @@ static bool GAMEINPUT_JoystickOpen(SDL_Joystick *joystick, int device_index) SDL_SetBooleanProperty(SDL_GetJoystickProperties(joystick), SDL_PROP_JOYSTICK_CAP_TRIGGER_RUMBLE_BOOLEAN, true); } +#if 0 if (info->supportedInput & GameInputKindTouch) { SDL_PrivateJoystickAddTouchpad(joystick, info->touchPointCount); } @@ -482,6 +490,7 @@ static bool GAMEINPUT_JoystickOpen(SDL_Joystick *joystick, int device_index) } else { joystick->connection_state = SDL_JOYSTICK_CONNECTION_WIRED; } +#endif return true; } @@ -492,7 +501,7 @@ static bool GAMEINPUT_JoystickRumble(SDL_Joystick *joystick, Uint16 low_frequenc GameInputRumbleParams *params = &hwdata->rumbleParams; params->lowFrequency = (float)low_frequency_rumble / (float)SDL_MAX_UINT16; params->highFrequency = (float)high_frequency_rumble / (float)SDL_MAX_UINT16; - IGameInputDevice_SetRumbleState(hwdata->devref->device, params); + hwdata->devref->device->SetRumbleState(params); return true; } @@ -503,7 +512,7 @@ static bool GAMEINPUT_JoystickRumbleTriggers(SDL_Joystick *joystick, Uint16 left GameInputRumbleParams *params = &hwdata->rumbleParams; params->leftTrigger = (float)left_rumble / (float)SDL_MAX_UINT16; params->rightTrigger = (float)right_rumble / (float)SDL_MAX_UINT16; - IGameInputDevice_SetRumbleState(hwdata->devref->device, params); + hwdata->devref->device->SetRumbleState(params); return true; } @@ -531,15 +540,15 @@ static void GAMEINPUT_JoystickUpdate(SDL_Joystick *joystick) IGameInputReading *reading = NULL; Uint64 timestamp; GameInputGamepadState state; - HRESULT hR; + HRESULT hr; - hR = IGameInput_GetCurrentReading(g_pGameInput, info->supportedInput, device, &reading); - if (FAILED(hR)) { + hr = g_pGameInput->GetCurrentReading(info->supportedInput, device, &reading); + if (FAILED(hr)) { // don't SetError here since there can be a legitimate case when there's no reading avail return; } - timestamp = SDL_US_TO_NS(IGameInputReading_GetTimestamp(reading) + g_GameInputTimestampOffset); + timestamp = SDL_US_TO_NS(reading->GetTimestamp() + g_GameInputTimestampOffset); if (GAMEINPUT_InternalIsGamepad(info)) { static WORD s_XInputButtons[] = { @@ -557,7 +566,7 @@ static void GAMEINPUT_JoystickUpdate(SDL_Joystick *joystick) }; Uint8 btnidx = 0, hat = 0; - if (IGameInputReading_GetGamepadState(reading, &state)) { + if (reading->GetGamepadState(&state)) { for (btnidx = 0; btnidx < SDL_arraysize(s_XInputButtons); ++btnidx) { WORD button_mask = s_XInputButtons[btnidx]; if (!button_mask) { @@ -599,7 +608,7 @@ static void GAMEINPUT_JoystickUpdate(SDL_Joystick *joystick) if (button_state) { uint32_t i; - uint32_t button_count = IGameInputReading_GetControllerButtonState(reading, info->controllerButtonCount, button_state); + uint32_t button_count = reading->GetControllerButtonState(info->controllerButtonCount, button_state); for (i = 0; i < button_count; ++i) { SDL_SendJoystickButton(timestamp, joystick, (Uint8)i, button_state[i]); } @@ -609,7 +618,7 @@ static void GAMEINPUT_JoystickUpdate(SDL_Joystick *joystick) #define CONVERT_AXIS(v) (Sint16)((v)*65535.0f - 32768.0f) if (axis_state) { uint32_t i; - uint32_t axis_count = IGameInputReading_GetControllerAxisState(reading, info->controllerAxisCount, axis_state); + uint32_t axis_count = reading->GetControllerAxisState(info->controllerAxisCount, axis_state); for (i = 0; i < axis_count; ++i) { SDL_SendJoystickAxis(timestamp, joystick, (Uint8)i, CONVERT_AXIS(axis_state[i])); } @@ -619,7 +628,7 @@ static void GAMEINPUT_JoystickUpdate(SDL_Joystick *joystick) if (switch_state) { uint32_t i; - uint32_t switch_count = IGameInputReading_GetControllerSwitchState(reading, info->controllerSwitchCount, switch_state); + uint32_t switch_count = reading->GetControllerSwitchState(info->controllerSwitchCount, switch_state); for (i = 0; i < switch_count; ++i) { Uint8 hat; switch (switch_state[i]) { @@ -658,6 +667,7 @@ static void GAMEINPUT_JoystickUpdate(SDL_Joystick *joystick) } } +#if 0 if (info->supportedInput & GameInputKindTouch) { GameInputTouchState *touch_state = SDL_stack_alloc(GameInputTouchState, info->touchPointCount); if (touch_state) { @@ -679,8 +689,9 @@ static void GAMEINPUT_JoystickUpdate(SDL_Joystick *joystick) // FIXME: How do we interpret the motion data? } } +#endif - IGameInputReading_Release(reading); + reading->Release(); // FIXME: We can poll this at a much lower rate GAMEINPUT_UpdatePowerInfo(joystick, device); @@ -691,7 +702,11 @@ static void GAMEINPUT_JoystickClose(SDL_Joystick* joystick) GAMEINPUT_InternalJoystickHwdata *hwdata = joystick->hwdata; if (hwdata->system_button_callback_token) { - IGameInput_UnregisterCallback(g_pGameInput, hwdata->system_button_callback_token, 5000); +#if GAMEINPUT_API_VERSION >= 1 + g_pGameInput->UnregisterCallback(hwdata->system_button_callback_token); +#else + g_pGameInput->UnregisterCallback(hwdata->system_button_callback_token, 10000); +#endif } SDL_free(hwdata); @@ -702,8 +717,14 @@ static void GAMEINPUT_JoystickQuit(void) { if (g_pGameInput) { // free the callback - IGameInput_UnregisterCallback(g_pGameInput, g_GameInputCallbackToken, /*timeoutInUs:*/ 10000); - g_GameInputCallbackToken = GAMEINPUT_INVALID_CALLBACK_TOKEN_VALUE; + if (g_GameInputCallbackToken) { +#if GAMEINPUT_API_VERSION >= 1 + g_pGameInput->UnregisterCallback(g_GameInputCallbackToken); +#else + g_pGameInput->UnregisterCallback(g_GameInputCallbackToken, 10000); +#endif + g_GameInputCallbackToken = 0; + } // free the list while (g_GameInputList.count > 0) { @@ -738,7 +759,7 @@ static bool GAMEINPUT_JoystickGetGamepadMapping(int device_index, SDL_GamepadMap out->back.kind = EMappingKind_Button; out->back.target = SDL_GAMEPAD_BUTTON_BACK; -#ifdef IGameInput_RegisterSystemButtonCallback +#if GAMEINPUT_API_VERSION >= 1 if (elem->info->supportedSystemButtons & GameInputSystemButtonGuide) { out->guide.kind = EMappingKind_Button; out->guide.target = SDL_GAMEPAD_BUTTON_GUIDE; @@ -748,7 +769,7 @@ static bool GAMEINPUT_JoystickGetGamepadMapping(int device_index, SDL_GamepadMap out->misc1.kind = EMappingKind_Button; out->misc1.target = SDL_GAMEPAD_BUTTON_GAMEINPUT_SHARE; } -#endif +#endif // GAMEINPUT_API_VERSION >= 1 out->start.kind = EMappingKind_Button; out->start.target = SDL_GAMEPAD_BUTTON_START; diff --git a/src/video/windows/SDL_windowsgameinput.c b/src/video/windows/SDL_windowsgameinput.cpp similarity index 81% rename from src/video/windows/SDL_windowsgameinput.c rename to src/video/windows/SDL_windowsgameinput.cpp index 183733a380470..7ea77ecc558b4 100644 --- a/src/video/windows/SDL_windowsgameinput.c +++ b/src/video/windows/SDL_windowsgameinput.cpp @@ -22,16 +22,14 @@ #include "SDL_windowsvideo.h" -// GameInput currently has a bug with keys stuck on focus change, and crashes on initialization on some systems, so we'll disable it until these issues are fixed. -#undef HAVE_GAMEINPUT_H - #ifdef HAVE_GAMEINPUT_H #include "../../core/windows/SDL_gameinput.h" +extern "C" { #include "../../events/SDL_mouse_c.h" #include "../../events/SDL_keyboard_c.h" #include "../../events/scancodes_windows.h" - +} #define MAX_GAMEINPUT_BUTTONS 7 // GameInputMouseWheelTiltRight is the highest button @@ -75,7 +73,14 @@ static bool GAMEINPUT_InternalAddOrFind(WIN_GameInputData *data, IGameInputDevic const GameInputDeviceInfo *info; bool result = false; - info = IGameInputDevice_GetDeviceInfo(pDevice); +#if GAMEINPUT_API_VERSION >= 1 + HRESULT hr = pDevice->GetDeviceInfo(&info); + if (FAILED(hr)) { + return WIN_SetErrorFromHRESULT("IGameInputDevice_GetDeviceInfo", hr); + } +#else + info = pDevice->GetDeviceInfo(); +#endif SDL_LockMutex(data->lock); { @@ -100,15 +105,11 @@ static bool GAMEINPUT_InternalAddOrFind(WIN_GameInputData *data, IGameInputDevic goto done; } - if (info->deviceStrings) { - // In theory we could get the manufacturer and product strings here, but they're NULL for all the devices I've tested - } - if (info->displayName) { // This could give us a product string, but it's NULL for all the devices I've tested } - IGameInputDevice_AddRef(pDevice); + pDevice->AddRef(); device->pDevice = pDevice; device->instance_id = SDL_GetNextObjectID(); device->info = info; @@ -147,15 +148,15 @@ static bool GAMEINPUT_InternalRemoveByIndex(WIN_GameInputData *data, int idx) SDL_RemoveKeyboard(device->instance_id, true); } if (device->last_mouse_reading) { - IGameInputReading_Release(device->last_mouse_reading); + device->last_mouse_reading->Release(); device->last_mouse_reading = NULL; } if (device->last_keyboard_reading) { - IGameInputReading_Release(device->last_keyboard_reading); + device->last_keyboard_reading->Release(); device->last_keyboard_reading = NULL; } } - IGameInputDevice_Release(device->pDevice); + device->pDevice->Release(); SDL_free(device->name); SDL_free(device); } @@ -217,6 +218,8 @@ bool WIN_InitGameInput(SDL_VideoDevice *_this) { WIN_GameInputData *data; HRESULT hr; + Uint64 now; + uint64_t timestampUS; bool result = false; if (_this->internal->gameinput_context) { @@ -238,22 +241,21 @@ bool WIN_InitGameInput(SDL_VideoDevice *_this) goto done; } - hr = IGameInput_RegisterDeviceCallback(data->pGameInput, - NULL, - (GameInputKindMouse | GameInputKindKeyboard), - GameInputDeviceConnected, - GameInputBlockingEnumeration, - data, - GAMEINPUT_InternalDeviceCallback, - &data->gameinput_callback_token); + hr = data->pGameInput->RegisterDeviceCallback(NULL, + (GameInputKindMouse | GameInputKindKeyboard), + GameInputDeviceConnected, + GameInputBlockingEnumeration, + data, + GAMEINPUT_InternalDeviceCallback, + &data->gameinput_callback_token); if (FAILED(hr)) { - SDL_SetError("IGameInput::RegisterDeviceCallback failure with HRESULT of %08X", hr); + WIN_SetErrorFromHRESULT("IGameInput::RegisterDeviceCallback", hr); goto done; } // Calculate the relative offset between SDL timestamps and GameInput timestamps - Uint64 now = SDL_GetTicksNS(); - uint64_t timestampUS = IGameInput_GetCurrentTimestamp(data->pGameInput); + now = SDL_GetTicksNS(); + timestampUS = data->pGameInput->GetCurrentTimestamp(); data->timestamp_offset = (SDL_NS_TO_US(now) - timestampUS); result = true; @@ -268,12 +270,12 @@ bool WIN_InitGameInput(SDL_VideoDevice *_this) static void GAMEINPUT_InitialMouseReading(WIN_GameInputData *data, SDL_Window *window, GAMEINPUT_Device *device, IGameInputReading *reading) { GameInputMouseState state; - if (SUCCEEDED(IGameInputReading_GetMouseState(reading, &state))) { - Uint64 timestamp = SDL_US_TO_NS(IGameInputReading_GetTimestamp(reading) + data->timestamp_offset); + if (reading->GetMouseState(&state)) { + Uint64 timestamp = SDL_US_TO_NS(reading->GetTimestamp() + data->timestamp_offset); SDL_MouseID mouseID = device->instance_id; for (int i = 0; i < MAX_GAMEINPUT_BUTTONS; ++i) { - const GameInputMouseButtons mask = (1 << i); + const GameInputMouseButtons mask = GameInputMouseButtons(1 << i); bool down = ((state.buttons & mask) != 0); SDL_SendMouseButton(timestamp, window, mouseID, GAMEINPUT_button_map[i], down); } @@ -284,9 +286,8 @@ static void GAMEINPUT_HandleMouseDelta(WIN_GameInputData *data, SDL_Window *wind { GameInputMouseState last; GameInputMouseState state; - if (SUCCEEDED(IGameInputReading_GetMouseState(last_reading, &last)) && - SUCCEEDED(IGameInputReading_GetMouseState(reading, &state))) { - Uint64 timestamp = SDL_US_TO_NS(IGameInputReading_GetTimestamp(reading) + data->timestamp_offset); + if (last_reading->GetMouseState(&last) && reading->GetMouseState(&state)) { + Uint64 timestamp = SDL_US_TO_NS(reading->GetTimestamp() + data->timestamp_offset); SDL_MouseID mouseID = device->instance_id; GameInputMouseState delta; @@ -301,7 +302,7 @@ static void GAMEINPUT_HandleMouseDelta(WIN_GameInputData *data, SDL_Window *wind } if (delta.buttons) { for (int i = 0; i < MAX_GAMEINPUT_BUTTONS; ++i) { - const GameInputMouseButtons mask = (1 << i); + const GameInputMouseButtons mask = GameInputMouseButtons(1 << i); if (delta.buttons & mask) { bool down = ((state.buttons & mask) != 0); SDL_SendMouseButton(timestamp, window, mouseID, GAMEINPUT_button_map[i], down); @@ -337,7 +338,7 @@ static bool KeysHaveScancode(const GameInputKeyState *keys, uint32_t count, SDL_ static void GAMEINPUT_InitialKeyboardReading(WIN_GameInputData *data, SDL_Window *window, GAMEINPUT_Device *device, IGameInputReading *reading) { - Uint64 timestamp = SDL_US_TO_NS(IGameInputReading_GetTimestamp(reading) + data->timestamp_offset); + Uint64 timestamp = SDL_US_TO_NS(reading->GetTimestamp() + data->timestamp_offset); SDL_KeyboardID keyboardID = device->instance_id; uint32_t max_keys = device->info->keyboardInfo->maxSimultaneousKeys; @@ -346,7 +347,7 @@ static void GAMEINPUT_InitialKeyboardReading(WIN_GameInputData *data, SDL_Window return; } - uint32_t num_keys = IGameInputReading_GetKeyState(reading, max_keys, keys); + uint32_t num_keys = reading->GetKeyState(max_keys, keys); if (!num_keys) { // FIXME: We probably need to track key state by keyboardID SDL_ResetKeyboard(); @@ -382,7 +383,7 @@ static void DumpKeys(const char *prefix, GameInputKeyState *keys, uint32_t count static void GAMEINPUT_HandleKeyboardDelta(WIN_GameInputData *data, SDL_Window *window, GAMEINPUT_Device *device, IGameInputReading *last_reading, IGameInputReading *reading) { - Uint64 timestamp = SDL_US_TO_NS(IGameInputReading_GetTimestamp(reading) + data->timestamp_offset); + Uint64 timestamp = SDL_US_TO_NS(reading->GetTimestamp() + data->timestamp_offset); SDL_KeyboardID keyboardID = device->instance_id; uint32_t max_keys = device->info->keyboardInfo->maxSimultaneousKeys; @@ -394,8 +395,8 @@ static void GAMEINPUT_HandleKeyboardDelta(WIN_GameInputData *data, SDL_Window *w uint32_t index_last = 0; uint32_t index_keys = 0; - uint32_t num_last = IGameInputReading_GetKeyState(last_reading, max_keys, last); - uint32_t num_keys = IGameInputReading_GetKeyState(reading, max_keys, keys); + uint32_t num_last = last_reading->GetKeyState(max_keys, last); + uint32_t num_keys = reading->GetKeyState(max_keys, keys); #ifdef DEBUG_KEYS SDL_Log("Timestamp: %llu", timestamp); DumpKeys("Last keys:", last, num_last); @@ -463,20 +464,20 @@ void WIN_UpdateGameInput(SDL_VideoDevice *_this) if (data->enabled_input & GameInputKindMouse) { if (device->last_mouse_reading) { HRESULT hr; - while (SUCCEEDED(hr = IGameInput_GetNextReading(data->pGameInput, device->last_mouse_reading, GameInputKindMouse, device->pDevice, &reading))) { + while (SUCCEEDED(hr = data->pGameInput->GetNextReading(device->last_mouse_reading, GameInputKindMouse, device->pDevice, &reading))) { GAMEINPUT_HandleMouseDelta(data, window, device, device->last_mouse_reading, reading); - IGameInputReading_Release(device->last_mouse_reading); + device->last_mouse_reading->Release(); device->last_mouse_reading = reading; } if (hr != GAMEINPUT_E_READING_NOT_FOUND) { - if (SUCCEEDED(IGameInput_GetCurrentReading(data->pGameInput, GameInputKindMouse, device->pDevice, &reading))) { + if (SUCCEEDED(data->pGameInput->GetCurrentReading(GameInputKindMouse, device->pDevice, &reading))) { GAMEINPUT_HandleMouseDelta(data, window, device, device->last_mouse_reading, reading); - IGameInputReading_Release(device->last_mouse_reading); + device->last_mouse_reading->Release(); device->last_mouse_reading = reading; } } } else { - if (SUCCEEDED(IGameInput_GetCurrentReading(data->pGameInput, GameInputKindMouse, device->pDevice, &reading))) { + if (SUCCEEDED(data->pGameInput->GetCurrentReading(GameInputKindMouse, device->pDevice, &reading))) { GAMEINPUT_InitialMouseReading(data, window, device, reading); device->last_mouse_reading = reading; } @@ -487,26 +488,26 @@ void WIN_UpdateGameInput(SDL_VideoDevice *_this) if (window->text_input_active) { // Reset raw input while text input is active if (device->last_keyboard_reading) { - IGameInputReading_Release(device->last_keyboard_reading); + device->last_keyboard_reading->Release(); device->last_keyboard_reading = NULL; } } else { if (device->last_keyboard_reading) { HRESULT hr; - while (SUCCEEDED(hr = IGameInput_GetNextReading(data->pGameInput, device->last_keyboard_reading, GameInputKindKeyboard, device->pDevice, &reading))) { + while (SUCCEEDED(hr = data->pGameInput->GetNextReading(device->last_keyboard_reading, GameInputKindKeyboard, device->pDevice, &reading))) { GAMEINPUT_HandleKeyboardDelta(data, window, device, device->last_keyboard_reading, reading); - IGameInputReading_Release(device->last_keyboard_reading); + device->last_keyboard_reading->Release(); device->last_keyboard_reading = reading; } if (hr != GAMEINPUT_E_READING_NOT_FOUND) { - if (SUCCEEDED(IGameInput_GetCurrentReading(data->pGameInput, GameInputKindKeyboard, device->pDevice, &reading))) { + if (SUCCEEDED(data->pGameInput->GetCurrentReading(GameInputKindKeyboard, device->pDevice, &reading))) { GAMEINPUT_HandleKeyboardDelta(data, window, device, device->last_keyboard_reading, reading); - IGameInputReading_Release(device->last_keyboard_reading); + device->last_keyboard_reading->Release(); device->last_keyboard_reading = reading; } } } else { - if (SUCCEEDED(IGameInput_GetCurrentReading(data->pGameInput, GameInputKindKeyboard, device->pDevice, &reading))) { + if (SUCCEEDED(data->pGameInput->GetCurrentReading(GameInputKindKeyboard, device->pDevice, &reading))) { GAMEINPUT_InitialKeyboardReading(data, window, device, reading); device->last_keyboard_reading = reading; } @@ -534,12 +535,12 @@ bool WIN_UpdateGameInputEnabled(SDL_VideoDevice *_this) GAMEINPUT_Device *device = data->devices[i]; if (device->last_mouse_reading && !raw_mouse_enabled) { - IGameInputReading_Release(device->last_mouse_reading); + device->last_mouse_reading->Release(); device->last_mouse_reading = NULL; } if (device->last_keyboard_reading && !raw_keyboard_enabled) { - IGameInputReading_Release(device->last_keyboard_reading); + device->last_keyboard_reading->Release(); device->last_keyboard_reading = NULL; } } @@ -559,9 +560,13 @@ void WIN_QuitGameInput(SDL_VideoDevice *_this) if (data->pGameInput) { // free the callback - if (data->gameinput_callback_token != GAMEINPUT_INVALID_CALLBACK_TOKEN_VALUE) { - IGameInput_UnregisterCallback(data->pGameInput, data->gameinput_callback_token, /*timeoutInUs:*/ 10000); - data->gameinput_callback_token = GAMEINPUT_INVALID_CALLBACK_TOKEN_VALUE; + if (data->gameinput_callback_token) { +#if GAMEINPUT_API_VERSION >= 1 + data->pGameInput->UnregisterCallback(data->gameinput_callback_token); +#else + data->pGameInput->UnregisterCallback(data->gameinput_callback_token, 10000); +#endif + data->gameinput_callback_token = 0; } // free the list @@ -569,7 +574,7 @@ void WIN_QuitGameInput(SDL_VideoDevice *_this) GAMEINPUT_InternalRemoveByIndex(data, 0); } - IGameInput_Release(data->pGameInput); + data->pGameInput->Release(); data->pGameInput = NULL; } diff --git a/src/video/windows/SDL_windowsgameinput.h b/src/video/windows/SDL_windowsgameinput.h index 561de9c4e0c89..e6f1afa2d62ff 100644 --- a/src/video/windows/SDL_windowsgameinput.h +++ b/src/video/windows/SDL_windowsgameinput.h @@ -22,8 +22,17 @@ typedef struct WIN_GameInputData WIN_GameInputData; +// Set up for C function definitions, even when using C++ +#ifdef __cplusplus +extern "C" { +#endif + extern bool WIN_InitGameInput(SDL_VideoDevice *_this); extern bool WIN_UpdateGameInputEnabled(SDL_VideoDevice *_this); extern void WIN_UpdateGameInput(SDL_VideoDevice *_this); extern void WIN_QuitGameInput(SDL_VideoDevice *_this); +// Ends C function definitions when using C++ +#ifdef __cplusplus +} +#endif diff --git a/src/video/windows/SDL_windowsvideo.h b/src/video/windows/SDL_windowsvideo.h index 8a0edf5ae0243..0e9c50eb86932 100644 --- a/src/video/windows/SDL_windowsvideo.h +++ b/src/video/windows/SDL_windowsvideo.h @@ -28,8 +28,10 @@ #include "../SDL_sysvideo.h" #ifdef HAVE_DXGI_H +#ifndef __cplusplus #define CINTERFACE #define COBJMACROS +#endif #include <dxgi.h> #endif
diff --git a/.github/workflows/create-test-plan.py b/.github/workflows/create-test-plan.py index a137889c81a7d..8048e2bc3229f 100755 --- a/.github/workflows/create-test-plan.py +++ b/.github/workflows/create-test-plan.py @@ -381,9 +381,11 @@ def spec_to_job(spec: JobSpec, key: str, trackmem_symbol_names: bool) -> JobDeta match spec.msvc_arch: case MsvcArch.X86: job.cflags.append("/clang:-m32") + job.cxxflags.append("/clang:-m32") job.ldflags.append("/MACHINE:X86") case MsvcArch.X64: job.cflags.append("/clang:-m64") + job.cxxflags.append("/clang:-m64") job.ldflags.append("/MACHINE:X64") case _: raise ValueError(f"Unsupported clang-cl architecture (arch={spec.msvc_arch})")
GameInput v1 header changes On Windows, the `gameinput.h` file (taken from [NuGet](https://www.nuget.org/packages/Microsoft.GameInput)) is C++ instead of C. Since the source files that include it are C, the compiler tries to interpret the header file as C and errors. Also, there are other differences that make it incompatible with the v0 API on console
[ "https://github.com/libsdl-org/SDL/commit/53a4365c12dfbc6189e0e684d17f726300ae2621" ]
2025-04-11T19:03:32Z
https://github.com/libsdl-org/SDL/tree/f35a2736b708408bd5e6273255c03513cf60605a
[ "cmd /c '\"C:\\Program Files (x86)\\Microsoft Visual Studio\\2022\\BuildTools\\Common7\\Tools\\VsDevCmd.bat\" -arch=x64 && cmake --build build --parallel && cmake --install build --prefix prefix'" ]
[ "$env:SDL_TESTS_QUICK=\"1\"; ctest --test-dir build --output-on-failure -VV 2>&1 | Tee-Object -FilePath build\\test-output.log" ]
[ "type build\\test-output.log" ]
def parser(log: str) -> dict[str, str]: import re # Strip common ANSI escape sequences to avoid breaking regexes def strip_ansi(s: str) -> str: # CSI sequences, OSC sequences, simple ESC codes s = re.sub(r"\x1B\[[0-9;?]*[ -/]*[@-~]", "", s) s = re.sub(r"\x1B\][^\x07]*(\x07|\x1B\\)", "", s) # OSC ... BEL or ST s = re.sub(r"\x1B[@-Z\\-_]", "", s) # 2-char sequences return s log = strip_ansi(log).replace("\r", "") # precedence for merging statuses rank = {"pass": 1, "skip": 2, "fail": 3} def set_status(d: dict, name: str, status: str): if not name: return status = status.lower() if status not in rank: return prev = d.get(name) if prev is None or rank[status] > rank[prev]: d[name] = status def norm_status(s: str) -> str: s = s.strip().lower() # Normalize a variety of framework outputs if s in ("passed", "ok", "success", "succeeded", "pass"): return "pass" if s in ("skipped", "skip", "ignored", "xfail", "not run", "not-run"): return "skip" # Everything else counts as fail: failed, error, timeout, xpass (unexpected pass), etc. return "fail" results: dict[str, str] = {} # ------------------------- # 1) CTest per-test result lines (with fraction prefix) # Examples: # 1/10 Test #1: testname .................... Passed 0.01 sec # 2/10 Test #2: long name ................... ***Failed 0.02 sec # ... Timeout ctest_frac_re = re.compile( r"^\s*\d+/\d+\s+Test\s+#\d+:\s+([^\n]+?)\s+(?:\.*\s*)?(?:\*{0,3}\s*)?\b(Passed|Failed|Not Run|Skipped|Timeout)\b", re.IGNORECASE | re.MULTILINE, ) for m in ctest_frac_re.finditer(log): name = m.group(1).strip() status = norm_status(m.group(2)) set_status(results, name, status) # 2) CTest per-test result lines (without fraction prefix) ctest_simple_re = re.compile( r"^\s*Test\s+#\d+:\s+([^\n]+?)\s+(?:\.*\s*)?(?:\*{0,3}\s*)?\b(Passed|Failed|Not Run|Skipped|Timeout)\b", re.IGNORECASE | re.MULTILINE, ) for m in ctest_simple_re.finditer(log): name = m.group(1).strip() status = norm_status(m.group(2)) set_status(results, name, status) # 3) CTest: "The following tests FAILED:" block # Accept various failure reasons in parentheses. # N - name (Failed|Timeout|SEGFAULT|ChildKilled|OTHER_FAULT|Not Run|...) failed_block_re = re.compile( r"^\s*\d+\s*-\s*(.+?)\s*\(([^)]+)\)", re.IGNORECASE | re.MULTILINE, ) if re.search(r"The following tests\s+FAILED", log, re.IGNORECASE): for m in failed_block_re.finditer(log): name = m.group(1).strip() reason = m.group(2).strip().lower() status = "skip" if "not run" in reason else "fail" set_status(results, name, status) # 4) CTest: "The following tests did not run:" block (skips) did_not_run_header = re.search(r"The following tests\s+did\s+not\s+run\s*:", log, re.IGNORECASE) if did_not_run_header: # Collect subsequent lines of form " N - name" start = did_not_run_header.end() tail = log[start:].splitlines() for line in tail: if not line.strip(): break m = re.match(r"^\s*\d+\s*-\s*(.+?)\s*$", line) if m: name = m.group(1).strip() set_status(results, name, "skip") else: # Stop if pattern breaks (end of block) if re.match(r"^\S", line): break # 5) Inner unit tests from an automation harness inner_test_re = re.compile( r">>>\s*Test\s+'((?:[^']|\n)+?)'\s*:\s*(Passed|Failed|Skipped|Timeout|Error)", re.IGNORECASE, ) for m in inner_test_re.finditer(log): name = re.sub(r"\s+", " ", m.group(1)).strip() status = norm_status(m.group(2)) set_status(results, name, status) # 6) Pytest item lines: "file.py::test_name STATUS" pytest_item_re = re.compile( r"^\s*([^\s][^\n]*?::[^\s]+)\s+(PASSED|FAILED|ERROR|SKIPPED|XFAIL|XPASS)", re.IGNORECASE | re.MULTILINE, ) for m in pytest_item_re.finditer(log): name = m.group(1).strip() status_word = m.group(2).upper() if status_word == "XPASS": status = "fail" else: status = norm_status(status_word) set_status(results, name, status) # Pytest summary-style failures: "FAILED file::test - ..." or "ERROR file::test - ..." pytest_sum_fail_re = re.compile(r"^\s*(FAILED|ERROR)\s+([^\s].*?::[^\s]+)\b", re.MULTILINE) for m in pytest_sum_fail_re.finditer(log): name = m.group(2).strip() set_status(results, name, "fail") # 7) unittest patterns: # a) "test_method (package.ClassName) ... ok/FAIL/ERROR/skipped" unittest_paren_re = re.compile( r"^\s*(\S+)\s*\(([^)]+)\)\s+\.\.\.\s+(ok|FAIL|ERROR|skipped|SKIPPED)", re.IGNORECASE | re.MULTILINE, ) for m in unittest_paren_re.finditer(log): method = m.group(1).strip() cls = m.group(2).strip() name = f"{cls}.{method}" status = norm_status(m.group(3)) set_status(results, name, status) # b) "ClassName.test_method ... ok/FAIL/ERROR/skipped" unittest_dots_re = re.compile( r"^\s*([A-Za-z_]\w+(?:\.[A-Za-z_]\w+)+)\s+\.\.\.\s+(ok|FAIL|ERROR|skipped|SKIPPED)", re.IGNORECASE | re.MULTILINE, ) for m in unittest_dots_re.finditer(log): name = m.group(1).strip() status = norm_status(m.group(2)) set_status(results, name, status) # 8) Go test: "--- PASS: TestName", etc. go_test_re = re.compile(r"^\s*---\s+(PASS|FAIL|SKIP):\s+([^\s(]+)", re.MULTILINE) for m in go_test_re.finditer(log): status = norm_status(m.group(1)) name = m.group(2).strip() set_status(results, name, status) # 9) GoogleTest: "[ OK ] Suite.Test" / "[ FAILED ] Suite.Test" / "[ SKIPPED ] Suite.Test" gtest_re = re.compile( r"^\s*\[\s*(OK|PASSED|FAILED|SKIPPED)\s*\]\s+([^\n]+)", re.IGNORECASE | re.MULTILINE, ) for m in gtest_re.finditer(log): status = norm_status(m.group(1)) # strip trailing time "(xx ms)" if present name = re.sub(r"\s+\([^)]*\)\s*$", "", m.group(2)).strip() set_status(results, name, status) # 10) TAP: "ok 1 - name", "not ok 2 - name", with optional "# SKIP" tap_re = re.compile( r"^\s*(ok|not ok)\s+\d+\s*(?:-\s*)?(.+?)(?:\s+#\s*(SKIP|TODO).*)?$", re.IGNORECASE | re.MULTILINE, ) for m in tap_re.finditer(log): oknot = m.group(1).lower() name = m.group(2).strip() directive = (m.group(3) or "").lower() if oknot == "ok": status = "skip" if directive in ("skip", "todo") else "pass" else: status = "fail" set_status(results, name, status) # 11) Jest symbol-style per-test assertions: "✓ name", "✕ name", "○ name" # Avoid matching file-level "PASS path/file" lines. jest_sym_re = re.compile(r"^\s*([✓✔✕×○])\s+(.+)$", re.MULTILINE) for m in jest_sym_re.finditer(log): sym = m.group(1) name = m.group(2).strip() if sym in ("✓", "✔"): status = "pass" elif sym in ("✕", "×"): status = "fail" else: status = "skip" set_status(results, name, status) # 12) Rust cargo test: "test path::name ... ok/FAILED/ignored" rust_re = re.compile(r"^\s*test\s+([^\s]+)\s+\.\.\.\s+(ok|FAILED|ignored)", re.IGNORECASE | re.MULTILINE) for m in rust_re.finditer(log): name = m.group(1).strip() status = norm_status(m.group(2)) set_status(results, name, status) # 13) Repro filter hints; treat as failed tests if shown # Broaden to allow dots, dashes, colons, and underscores. repro_filter_re = re.compile(r"--filter\s+([^\s]+)") for m in repro_filter_re.finditer(log): name = m.group(1).strip() set_status(results, name, "fail") return results
[ "testplatform-no-simd" ]
[ "video_getFullscreenDisplayModes", "round_roundNumberCases", "audio_enumerateAndNameAudioDevicesNegativeTest ts", "stdlib_strnlen", "testqsort", "hints_getHint", "pixels_saveLoadBMP", "log10_baseCases", "exp_infCases", "pow_baseNZeroExpOddCases", "asin_outOfDomainCases", "audio_buildAudioStream", "pixels_getPixelFormatDetails", "rect_testEnclosePointsRepeatedInput", "time_dateTimeConversion", "platform_testEndianessAndSwap", "cos_nanCase", "mouse_getMouseState", "process_testInheritedEnv", "iostrm_testMem", "rect_testIntersectRectParam", "audio_buildAudioStreamNegative", "surface_testBlitZeroSource", "stdlib_sscanf", "TestVirtualJoystick", "sdltest_randomIntegerInRange", "stdlib_strtod", "atan2_nanCases", "testprocess", "floor_roundNumberCases", "video_getWindowDisplayModeNegative", "scalbn_regularCases", "keyboard_getScancodeFromName", "surface_testBlit9Grid", "cos_precisionTest", "rect_testEnclosePointsWithClipping", "audio_lockUnlockOpenAudioDevice", "subsystems_dependRefCountWithExtraInit", "testbounds", "rect_testFRectEquals", "process_testNewEnv", "atan2_xInfCases", "copysign_rangeTest", "mouse_getGlobalMouseState", "rect_testEnclosePoints", "keyboard_getKeyNameNegative", "mouse_createFreeCursor", "rect_testHasIntersectionEmpty", "video_getSetWindowData", "sdltest_getFuzzerInvocationCount", "keyboard_getKeyboardState", "keyboard_getScancodeFromNameNegative", "events_addDelEventWatchWithUserdata", "rect_testUnionRectInside", "surface_testInvalidFormat", "fmod_regularCases", "rect_testIntersectRectAndLineOutside", "surface_testLoadFailure", "testpower", "timer_addRemoveTimer", "render_testUVWrapping", "process_testArguments", "surface_testPalette", "render_testTextureState", "testplatform", "surface_testCompleteSurfaceConversion", "copysign_infCases", "trunc_nanCase", "fmod_divByZeroCases", "render_testBlitTiled", "ceil_rangeTest", "rect_testHasIntersectionInside", "audio_printAudioDrivers", "exp_baseCase", "sin_nanCase", "sdltest_randomBoundaryNumberSint8", "pow_regularCases", "surface_testFlip", "process_testWriteToFinishedProcess", "sqrt_regularCases", "fabs_infCases", "iostrm_testAllocFree", "video_getSetWindowMinimumSize", "log_testHint", "sqrt_baseCases", "pow_basePInfCases", "testsem", "scalbn_nanCase", "properties_testBasic", "mouse_setCursor", "scalbn_infCases", "video_getWindowDisplayMode", "exp_zeroCases", "fmod_divByInfCases", "trunc_roundNumberCases", "sin_precisionTest", "subsystems_dependRefCountInitByOneQuitAll", "video_createWindowVariousFlags", "render_testPrimitivesWithViewport", "time_dateTimeUtilities", "log_baseCases", "pow_rangeTest", "render_testPrimitives", "audio_openCloseAndGetAudioStatus", "sdltest_randomBoundaryNumberSint32", "rect_testFRectEqualsParam", "process_testSimpleStdinToStdout", "atan_zeroCases", "copysign_zeroCases", "sdltest_randomBoundaryNumberUint8", "render_testRGBSurfaceNoAlpha", "process_testKill", "rect_testIntersectRectAndLine", "fabs_zeroCases", "rect_testHasIntersectionOutside", "keyboard_getKeyName", "audio_enumerateAndNameAudioDevices", "stdlib_snprintf", "testtimer", "floor_nanCase", "surface_testBlitTiled", "tan_nanCase", "log10_regularCases", "floor_fractionCases", "audio_resampleLoss", "sdltest_randomNumber", "round_fractionCases", "fmod_nanCases", "platform_testGetVersion", "sdltest_randomAsciiString", "testatomic", "tan_zeroCases", "rect_testHasIntersectionParam", "cos_infCases", "timer_getPerformanceCounter", "keyboard_setTextInputArea", "pow_basePZeroCases", "pow_baseZeroExpNInfCases", "audio_getAudioStatus", "tan_precisionTest", "video_createWindowVariousSizes", "rect_testRectEmptyParam", "blit_testExampleApplicationRender", "scalbn_baseZeroCases", "platform_testSetErrorEmptyInput", "rect_testHasIntersectionPoint", "acos_nanCase", "process_testFileRedirection", "iostrm_testParamNegative", "cos_regularCases", "stdlib_strlcpy", "modf_baseCases", "surface_testClearSurface", "timer_getPerformanceFrequency", "exp_overflowCase", "surface_testSurfaceConversion", "rect_testHasIntersectionPartial", "TestGUIDToString", "scalbn_expZeroCase", "pow_baseNanExp0Cases", "atan2_topLeftQuadrantTest", "torturethread", "events_addDelEventWatch", "render_testClipRect", "fabs_nanCase", "pixels_allocFreePalette", "rect_testIntersectRectOutside", "mouse_getMouseFocus", "iostrm_testFileWrite", "time_getRealtimeClock", "stdlib_swprintf", "rect_testIntersectRectPartial", "clipboard_testPrimarySelectionTextFunctions", "hints_setHint", "ceil_roundNumberCases", "sqrt_nanCase", "rect_testEnclosePointsParam", "atan2_bothInfCases", "stdlib_strtox", "iostrm_testDynamicMem", "round_zeroCases", "audio_initQuitAudio", "rect_testIntersectRectAndLineParam", "asin_nanCase", "process_testMultiprocessStdinToStdout", "surface_testBlitBlendMod", "sqrt_infCase", "clipboard_testClipboardTextFunctions", "rect_testGetRectIntersectionFloat", "pow_nanArgsCases", "atan2_xZeroCases", "process_testStdinToStdout", "iostrm_testConstMem", "fmod_divOfZeroCases", "pow_base1ExpNanCase", "iostrm_testFileRead", "render_testGetSetTextureScaleMode", "platform_testSetErrorInvalidInput", "video_createMaximized", "audio_getAudioFormatName", "main_testImpliedJoystickInit", "cos_rangeTest", "platform_testTypes", "keyboard_getKeyFromScancode", "pow_baseNInfCases", "testfile", "render_testBlit", "surface_testBlitMultiple", "keyboard_startStopTextInput", "clipboard_testClipboardDataFunctions", "pow_basePZeroExpOddCases", "surface_testBlit", "rect_testIntersectRectAndLineEmpty", "properties_testCopy", "asin_limitCases", "fmod_divOfInfCases", "sdltest_generateRunSeed", "sqrt_outOfDomainCases", "blit_testRandomToRandomSVGA", "trunc_fractionCases", "surface_testBlitBlendAddPremultiplied", "stdlib_aligned_alloc", "sdltest_randomBoundaryNumberUint16", "audio_printCurrentAudioDriver", "ceil_infCases", "surface_testBlitBlendAdd", "audio_enumerateAndNameAudioDevicesNegativeTests", "atan2_bottomRightQuadrantTest", "process_testNonExistingExecutable", "mouse_warpMouseInWindow", "tan_infCases", "rect_testIntersectRectInside", "render_testGetNumRenderDrivers", "platform_testGetFunctions", "ceil_zeroCases", "testver", "testthread", "platform_testHasFunctions", "acos_precisionTest", "video_getClosestDisplayModeCurrentResolution", "render_testLogicalSize", "video_createMinimized", "mouse_getCursor", "render_testBlit9Grid", "atan2_yZeroCases", "round_nanCase", "atan_limitCases", "testkeys", "audio_quitInitAudioSubSystem", "fmod_rangeTest", "platform_testDefaultInit", "video_getWindowFlags", "testerror", "stdlib_strpbrk", "mouse_getSetRelativeMouseMode", "audio_pauseUnpauseAudio", "render_testViewport", "atan_precisionTest", "main_testImpliedJoystickQuit", "video_getWindowPixelFormat", "timer_delayAndGetTicks", "events_mainThreadCallbacks", "audio_enumerateAndNameAudioDevicesNegativeTests s", "surface_testOverflow", "atan_nanCase", "stdlib_iconv", "floor_infCases", "testdisplayinfo", "pow_powerOfTwo", "subsystems_dependRefCountInitAllQuitByOne", "subsystems_referenceCount", "surface_testBlitBlendMul", "rect_testIntersectRectFloat", "pow_baseNOneExpInfCases", "keyboard_setTextInputAreaNegative", "testlocale", "surface_testBlitAlphaMod", "rect_testHasIntersectionFloat", "keyboard_getScancodeNameNegative", "stdlib_overflow", "video_getWindowSurface", "keyboard_getSetModState", "properties_testLocking", "audio_convertAccuracy", "sdltest_randomBoundaryNumberSint64", "render_testBlitColor", "rect_testRectEmptyFloat", "sin_infCases", "rect_testGetRectUntionFloat", "mouse_getRelativeMouseState", "video_getSetWindowGrab", "video_getSetWindowSize", "pow_expInfCases", "surface_testBlitBlendPremultiplied", "atan2_bothZeroCases", "video_getClosestDisplayModeRandomResolution", "keyboard_getKeyboardFocus", "pixels_getPixelFormatName", "rect_testIntersectRectAndLineInside", "acos_limitCases", "rect_testRectEqualsParam", "video_enableDisableScreensaver", "sdltest_randomBoundaryNumberSint16", "video_getSetWindowPosition", "rect_testIntersectRectAndLineFloat", "rect_testIntersectRectPoint", "rect_testRectEmpty", "sin_rangeTest", "testyuv", "process_testStdinToStderr", "mouse_getDefaultCursor", "process_testExitCode", "log_regularCases", "rect_testEnclosePointsFloat", "testevdev", "surface_testScale", "mouse_createFreeColorCursor", "log_limitCases", "platform_testGetPowerInfo", "audio_convertAudio", "surface_testPalettization", "acos_outOfDomainCases", "surface_testPremultiplyAlpha", "audio_initOpenCloseQuitAudio", "asin_precisionTest", "render_testBlendModes", "intrinsics_selftest", "rect_testUnionRectParam", "rect_testUnionRectOutside", "video_getWindowId", "platform_testGetSetClearError", "sin_regularCases", "atan2_topRightQuadrantTest", "rect_testGetRectEnclosingPointsFloat", "atan2_yInfCases", "trunc_zeroCases", "trunc_rangeTest", "process_testBatBadButVulnerability", "video_getSetWindowMaximumSize", "copysign_nanCases", "log10_nanCases", "log10_limitCases", "ceil_fractionCases", "properties_testCleanup", "testaudioinfo", "atan2_bottomLeftQuadrantTest", "stdlib_getsetenv", "render_testBlit9GridTiled", "sdltest_randomBoundaryNumberUint32", "surface_testBlitColorMod", "floor_zeroCases", "surface_testBlitBlendBlend", "round_rangeTest", "log_nanCases", "pow_badOperationCase", "rect_testUnionRectEmpty", "events_pushPumpAndPollUserevent", "pow_baseNZeroCases", "rect_testRectEquals", "audio_formatChange", "video_setWindowCenteredOnDisplay", "trunc_infCases", "round_infCases", "ceil_nanCase", "surface_testSaveLoadBitmap", "TestStringToGUID", "iostrm_testCompareRWFromMemWithRWFromFile", "keyboard_getKeyFromName", "main_testSetError", "stdlib_strstr", "rect_testIntersectRectEmpty", "sdltest_randomAsciiStringOfSize", "testfilesystem", "floor_rangeTest", "stdlib_wcstol", "exp_regularCases", "iostrm_testFileWriteReadEndian", "mouse_showCursor", "rect_testGetRectAndLineIntersectionFloat", "sdltest_randomBoundaryNumberUint64", "fabs_rangeTest" ]
starryzhang/sweb.eval.win.libsdl-org_1776_sdl-12806
microsoft/STL
5444
microsoft__STL-5444
C++
[ "5291", "5435" ]
1e0317478eddc973e801bdacc10cee2df9943b82
diff --git a/stl/CMakeLists.txt b/stl/CMakeLists.txt index ac17fb0a55f..10d21b3173c 100644 --- a/stl/CMakeLists.txt +++ b/stl/CMakeLists.txt @@ -213,6 +213,7 @@ set(IMPLIB_SOURCES ${CMAKE_CURRENT_LIST_DIR}/src/locale0_implib.cpp ${CMAKE_CURRENT_LIST_DIR}/src/nothrow.cpp ${CMAKE_CURRENT_LIST_DIR}/src/print.cpp + ${CMAKE_CURRENT_LIST_DIR}/src/regex.cpp ${CMAKE_CURRENT_LIST_DIR}/src/sharedmutex.cpp ${CMAKE_CURRENT_LIST_DIR}/src/stacktrace.cpp ${CMAKE_CURRENT_LIST_DIR}/src/syserror_import_lib.cpp diff --git a/stl/inc/locale b/stl/inc/locale index cc08f4d4eee..7e75f4d7634 100644 --- a/stl/inc/locale +++ b/stl/inc/locale @@ -94,6 +94,9 @@ inline size_t __CRTDECL _LStrxfrm(_Out_writes_(_Last1 - _First1) _Post_readable_ } #endif // defined(_CRTBLD) +template <class _Elem> +class _Regex_traits; + _EXPORT_STD template <class _Elem> class collate : public locale::facet { // facet for ordering sequences of elements public: @@ -189,6 +192,8 @@ protected: private: _Locinfo::_Collvec _Coll; // used by _LStrcoll and _XStrxfrm + + friend _Regex_traits<_Elem>; }; #ifdef __clang__ diff --git a/stl/inc/regex b/stl/inc/regex index b63f7e83066..cdfefd0cddf 100644 --- a/stl/inc/regex +++ b/stl/inc/regex @@ -53,6 +53,17 @@ _STL_DISABLE_CLANG_WARNINGS #endif // ^^^ !defined(_DEBUG) ^^^ #endif // !defined(_ENHANCED_REGEX_VISUALIZER) +#if defined(_CPPRTTI) && !defined(_M_CEE_PURE) +extern "C" { +_STD size_t __stdcall __std_regex_transform_primary_char( + _Out_writes_(_Last1 - _First1) _Post_readable_size_(return) char* _First1, char* _Last1, + _In_reads_(_Last2 - _First2) const char* _First2, const char* _Last2, _In_opt_ const _Collvec*) noexcept; +_STD size_t __stdcall __std_regex_transform_primary_wchar_t( + _Out_writes_(_Last1 - _First1) _Post_readable_size_(return) wchar_t* _First1, wchar_t* _Last1, + _In_reads_(_Last2 - _First2) const wchar_t* _First2, const wchar_t* _Last2, _In_opt_ const _Collvec*) noexcept; +} // extern "C" +#endif // ^^^ defined(_CPPRTTI) && !defined(_M_CEE_PURE) ^^^ + _STD_BEGIN enum _Meta_type : int { // meta character representations for parser @@ -267,6 +278,20 @@ struct _Regex_traits_base { // base of all regular expression traits using char_class_type = ctype_base::mask; }; +#if defined(_CPPRTTI) && !defined(_M_CEE_PURE) +inline size_t _Regex_transform_primary(_Out_writes_(_Last1 - _First1) _Post_readable_size_(return) char* _First1, + char* _Last1, _In_reads_(_Last2 - _First2) const char* _First2, const char* _Last2, + _In_opt_ const _Locinfo::_Collvec* _Vector) noexcept { + return __std_regex_transform_primary_char(_First1, _Last1, _First2, _Last2, _Vector); +} + +inline size_t _Regex_transform_primary(_Out_writes_(_Last1 - _First1) _Post_readable_size_(return) wchar_t* _First1, + wchar_t* _Last1, _In_reads_(_Last2 - _First2) const wchar_t* _First2, const wchar_t* _Last2, + _In_opt_ const _Locinfo::_Collvec* _Vector) noexcept { + return __std_regex_transform_primary_wchar_t(_First1, _Last1, _First2, _Last2, _Vector); +} +#endif // ^^^ defined(_CPPRTTI) && !defined(_M_CEE_PURE) ^^^ + template <class _Elem> class _Regex_traits : public _Regex_traits_base { // base class for regular expression traits public: @@ -312,13 +337,38 @@ public: string_type transform_primary(_FwdIt _First, _FwdIt _Last) const { // apply locale-specific case-insensitive transformation string_type _Res; - - if (_First != _Last) { // non-empty string, transform it - vector<_Elem> _Temp(_First, _Last); - - _Getctype()->tolower(_Temp.data(), _Temp.data() + _Temp.size()); - _Res = _Getcoll()->transform(_Temp.data(), _Temp.data() + _Temp.size()); +#if defined(_CPPRTTI) && !defined(_M_CEE_PURE) + if (_First != _Last) { + const collate<_Elem>* _Coll = _Getcoll(); + const auto& _Coll_type = typeid(*_Coll); + // TRANSITION, ABI: GH-5394: locale creates collate objects of type collate, not collate_byname. + // Depending on the resolution of LWG-2338, comparison to typeid(collate) might also become + // required by the standard. + if (_Coll_type == typeid(collate_byname<_Elem>) || _Coll_type == typeid(collate<_Elem>)) { + // non-empty string with known collate facet, transform it + const string_type _Src(_First, _Last); + const auto _Src_first = _Src.data(); + const auto _Src_last = _Src_first + _Src.size(); + + size_t _Count = _Src.size(); + while (_Res.size() < _Count) { + _Res.resize(_Count); + _Count = _STD _Regex_transform_primary( + &_Res[0], &_Res[0] + _Count, _Src_first, _Src_last, &_Coll->_Coll); + + if (_Count == static_cast<size_t>(-1)) { + // return empty string in case of error + _Count = 0; + break; + } + } + _Res.resize(_Count); + } } +#else // ^^^ defined(_CPPRTTI) && !defined(_M_CEE_PURE) / !defined(_CPPRTTI) || defined(_M_CEE_PURE) vvv + (void) _First; + (void) _Last; +#endif // ^^^ !defined(_CPPRTTI) || defined(_M_CEE_PURE) ^^^ return _Res; } @@ -4211,26 +4261,30 @@ _Prs_ret _Parser<_FwdIt, _Elem, _RxTraits>::_Do_ex_class2( _Elem* const _Coll_elem_first = &_Coll_elem.front(); const _Elem* const _Coll_elem_last = _Coll_elem_first + _Size; + + if (_Size == 1 && _End_arg == _Meta_dot) { + // process single-element collating elements like individual characters + _Val = *_Coll_elem_first; + return _Prs_chr; + } + + if (_Flags & regex_constants::icase) { + for (auto _Current = _Coll_elem_first; _Current != _Coll_elem_last; ++_Current) { + *_Current = _Traits.translate_nocase(*_Current); + } + } else if (_Flags & regex_constants::collate) { + for (auto _Current = _Coll_elem_first; _Current != _Coll_elem_last; ++_Current) { + *_Current = _Traits.translate(*_Current); + } + } + if (_End_arg == _Meta_equal) { // process equivalence _Nfa._Add_equiv2(_Coll_elem_first, _Coll_elem_last); return _Prs_set; } else { // process collating element - if (_Size == 1) { - _Val = *_Coll_elem_first; - return _Prs_chr; - } // Character ranges with multi-character bounds cannot be represented in NFA nodes yet (see GH-5391). // Provisionally treat multi-character collating elements as character sets. - if (_Flags & regex_constants::icase) { - for (auto _Current = _Coll_elem_first; _Current != _Coll_elem_last; ++_Current) { - *_Current = _Traits.translate_nocase(*_Current); - } - } else if (_Flags & regex_constants::collate) { - for (auto _Current = _Coll_elem_first; _Current != _Coll_elem_last; ++_Current) { - *_Current = _Traits.translate(*_Current); - } - } _Nfa._Add_coll2(_Coll_elem_first, _Coll_elem_last); return _Prs_set; } diff --git a/stl/inc/yvals.h b/stl/inc/yvals.h index f6c6d4a2288..0ac04d6b4a4 100644 --- a/stl/inc/yvals.h +++ b/stl/inc/yvals.h @@ -3,7 +3,8 @@ // Copyright (c) Microsoft Corporation. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception -// This header is used to compile the import library (via locale0_implib.cpp => locale0.cpp => xfacet => yvals.h). +// This header is used to compile the import library +// (via locale0_implib.cpp => locale0.cpp => xfacet => yvals.h and regex.cpp => awint.hpp => yvals.h). // MAJOR LIMITATIONS apply to what can be included here! // Before editing this file, read: /docs/import_library.md diff --git a/stl/msbuild/stl_base/stl.files.settings.targets b/stl/msbuild/stl_base/stl.files.settings.targets index 9b7db156955..0669a4c0a59 100644 --- a/stl/msbuild/stl_base/stl.files.settings.targets +++ b/stl/msbuild/stl_base/stl.files.settings.targets @@ -158,6 +158,7 @@ SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception $(CrtRoot)\github\stl\src\locale0_implib.cpp; $(CrtRoot)\github\stl\src\nothrow.cpp; $(CrtRoot)\github\stl\src\print.cpp; + $(CrtRoot)\github\stl\src\regex.cpp; $(CrtRoot)\github\stl\src\sharedmutex.cpp; $(CrtRoot)\github\stl\src\stacktrace.cpp; $(CrtRoot)\github\stl\src\syserror_import_lib.cpp; diff --git a/stl/src/awint.hpp b/stl/src/awint.hpp index 797801b7a98..da88c79bc7d 100644 --- a/stl/src/awint.hpp +++ b/stl/src/awint.hpp @@ -2,6 +2,11 @@ // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // Internal definitions for A&W Win32 wrapper routines. + +// This file is compiled into the import library (via regex.cpp => awint.hpp). +// MAJOR LIMITATIONS apply to what can be included here! +// Before editing this file, read: /docs/import_library.md + #pragma once #include <yvals.h> diff --git a/stl/src/regex.cpp b/stl/src/regex.cpp new file mode 100644 index 00000000000..6ecd7744cd7 --- /dev/null +++ b/stl/src/regex.cpp @@ -0,0 +1,128 @@ +// Copyright (c) Microsoft Corporation. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception + +// This file is compiled into the import library. +// MAJOR LIMITATIONS apply to what can be included here! +// Before editing this file, read: /docs/import_library.md + +#include <__msvc_xlocinfo_types.hpp> +#include <clocale> +#include <crtdefs.h> +#include <cstdlib> +#include <cstring> +#include <internal_shared.h> + +#include <Windows.h> + +#undef _ENFORCE_ONLY_CORE_HEADERS +#include "awint.hpp" + +extern "C" { + +// derived from xstrxfrm.cpp +size_t __stdcall __std_regex_transform_primary_char( + _Out_writes_(end1 - string1) _Post_readable_size_(return) char* string1, char* end1, + _In_reads_(end2 - string2) const char* string2, const char* end2, _In_opt_ const _Collvec* ploc) noexcept { + size_t n1 = end1 - string1; + size_t n2 = end2 - string2; + size_t retval = static_cast<size_t>(-1); + UINT codepage; + const wchar_t* locale_name; + + if (ploc == nullptr) { + locale_name = ___lc_locale_name_func()[LC_COLLATE]; + codepage = ___lc_collate_cp_func(); + } else { + locale_name = ploc->_LocaleName; + codepage = ploc->_Page; + } + + if (locale_name == nullptr && codepage == CP_ACP) { + if (n2 <= n1) { + memcpy(string1, string2, n2); + } + retval = n2; + } else { + // Inquire size of dst string in BYTES + const int dstlen = __crtLCMapStringA(locale_name, + LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANATYPE | NORM_IGNOREWIDTH, + string2, static_cast<int>(n2), nullptr, 0, codepage, TRUE); + + if (dstlen != 0) { + retval = dstlen; + + // if not enough room, return amount needed + if (dstlen <= static_cast<int>(n1)) { + // Map src string to dst string + __crtLCMapStringA(locale_name, + LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANATYPE + | NORM_IGNOREWIDTH, + string2, static_cast<int>(n2), string1, static_cast<int>(n1), codepage, TRUE); + } + } + } + + return retval; +} + +// derived from xwcsxfrm.cpp +size_t __stdcall __std_regex_transform_primary_wchar_t( + _Out_writes_(end1 - string1) _Post_readable_size_(return) wchar_t* string1, wchar_t* end1, + _In_reads_(end2 - string2) const wchar_t* string2, const wchar_t* end2, _In_opt_ const _Collvec* ploc) noexcept { + size_t n1 = end1 - string1; + size_t n2 = end2 - string2; + size_t size = static_cast<size_t>(-1); + const wchar_t* locale_name; + + if (ploc == nullptr) { + locale_name = ___lc_locale_name_func()[LC_COLLATE]; + } else { + locale_name = ploc->_LocaleName; + } + + if (locale_name == nullptr) { + if (n2 <= n1) { + memcpy(string1, string2, n2 * sizeof(wchar_t)); + } + size = n2; + } else { + // When using LCMAP_SORTKEY, LCMapStringW handles BYTES not wide + // chars. We use a byte buffer to hold bytes and then convert the + // byte string to a wide char string and return this so it can be + // compared using wcscmp(). User's buffer is n1 wide chars, so + // use an internal buffer of n1 bytes. + + auto bbuffer = _malloc_crt_t(unsigned char, n1); + + if (bbuffer) { +#pragma warning(push) +#pragma warning(disable : 6386) // PREfast doesn't understand LCMAP_SORTKEY + size = __crtLCMapStringW(locale_name, + LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANATYPE + | NORM_IGNOREWIDTH, + string2, static_cast<int>(n2), reinterpret_cast<wchar_t*>(bbuffer.get()), static_cast<int>(n1)); +#pragma warning(pop) + + if (size == 0) { + // buffer not big enough, get size required. + size = __crtLCMapStringW(locale_name, + LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANATYPE + | NORM_IGNOREWIDTH, + string2, static_cast<int>(n2), nullptr, 0); + + if (size == 0) { + size = static_cast<size_t>(-1); // default error + } + } else { + // string successfully mapped, convert to wide char + + for (size_t i = 0; i < size; ++i) { + string1[i] = static_cast<wchar_t>(bbuffer.get()[i]); + } + } + } + } + + return size; +} +} // extern "C"
diff --git a/tests/libcxx/expected_results.txt b/tests/libcxx/expected_results.txt index 64b389eaf67..c0fff7a9161 100644 --- a/tests/libcxx/expected_results.txt +++ b/tests/libcxx/expected_results.txt @@ -830,7 +830,6 @@ std/re/re.alg/re.alg.search/basic.pass.cpp FAIL std/re/re.alg/re.alg.search/ecma.pass.cpp FAIL std/re/re.alg/re.alg.search/extended.pass.cpp FAIL std/re/re.traits/lookup_collatename.pass.cpp FAIL -std/re/re.traits/transform_primary.pass.cpp FAIL # Not analyzed, likely STL bugs. Various assertions. std/numerics/complex.number/complex.ops/complex_divide_complex.pass.cpp FAIL diff --git a/tests/std/tests/GH_005204_regex_collating_ranges/test.cpp b/tests/std/tests/GH_005204_regex_collating_ranges/test.cpp index b24141a9fc3..687812ce480 100644 --- a/tests/std/tests/GH_005204_regex_collating_ranges/test.cpp +++ b/tests/std/tests/GH_005204_regex_collating_ranges/test.cpp @@ -535,31 +535,98 @@ void test_gh_994() { gh_994_should_throw("[a-[.cs.]]", error_range); gh_994_should_throw("[[.cs.]-[.dzs.]]", error_range); -#ifndef SKIP_COLLATE_TESTS +#ifndef _M_CEE_PURE g_regexTester.should_throw("[[=a=]-c]", error_range); g_regexTester.should_throw("[c-[=z=]]", error_range); g_regexTester.should_throw("[[=a=]-[=z=]]", error_range); g_regexTester.should_match("a", "[[=a=]]"); - g_regexTester.should_match("A", "[[=a=]]"); + g_regexTester.should_not_match("A", "[[=a=]]"); g_regexTester.should_not_match("b", "[[=a=]]"); g_regexTester.should_not_match("B", "[[=a=]]"); - g_regexTester.should_match("z", "[[=Z=]]"); + g_regexTester.should_not_match("z", "[[=Z=]]"); g_regexTester.should_match("Z", "[[=Z=]]"); g_regexTester.should_not_match("b", "[[=Z=]]"); g_regexTester.should_not_match("B", "[[=Z=]]"); + g_regexTester.should_match("a", "[[=a=]]", icase); + g_regexTester.should_match("A", "[[=a=]]", icase); + g_regexTester.should_not_match("b", "[[=a=]]", icase); + g_regexTester.should_not_match("B", "[[=a=]]", icase); + g_regexTester.should_match("z", "[[=Z=]]", icase); + g_regexTester.should_match("Z", "[[=Z=]]", icase); + g_regexTester.should_not_match("b", "[[=Z=]]", icase); + g_regexTester.should_not_match("B", "[[=Z=]]", icase); + g_regexTester.should_match("ab", "[[=a=]]b"); - g_regexTester.should_match("Ab", "[[=a=]]b"); + g_regexTester.should_not_match("Ab", "[[=a=]]b"); g_regexTester.should_not_match("Ab", "[[=a=]]B"); g_regexTester.should_not_match("b", "[[=a=]]b"); g_regexTester.should_not_match("aab", "[[=a=]]b"); g_regexTester.should_not_match("B", "[[=a=]]b"); - - g_regexTester.should_match("AaAaaAaab", "[[=a=]]*b"); + g_regexTester.should_not_match("ab", "[[=A=]]b"); + g_regexTester.should_match("Ab", "[[=A=]]b"); + g_regexTester.should_not_match("Ab", "[[=A=]]B"); + g_regexTester.should_not_match("b", "[[=A=]]b"); + g_regexTester.should_not_match("AAb", "[[=A=]]b"); + g_regexTester.should_not_match("B", "[[=A=]]b"); + + g_regexTester.should_match("ab", "[[=a=]]b", icase); + g_regexTester.should_match("Ab", "[[=a=]]b", icase); + g_regexTester.should_match("Ab", "[[=a=]]B", icase); + g_regexTester.should_not_match("b", "[[=a=]]b", icase); + g_regexTester.should_not_match("aab", "[[=a=]]b", icase); + g_regexTester.should_not_match("B", "[[=a=]]b", icase); + g_regexTester.should_match("ab", "[[=A=]]b", icase); + g_regexTester.should_match("Ab", "[[=A=]]b", icase); + g_regexTester.should_match("Ab", "[[=A=]]B", icase); + g_regexTester.should_not_match("b", "[[=A=]]b", icase); + g_regexTester.should_not_match("AAb", "[[=A=]]b", icase); + g_regexTester.should_not_match("B", "[[=A=]]b", icase); + + g_regexTester.should_not_match("AaAaaAaab", "[[=a=]]*b"); g_regexTester.should_not_match("AaAaaAaab", "[[=a=]]*c"); - g_regexTester.should_match("AaAabcaAaad", "[[=a=]bc]*d"); -#endif // !defined(SKIP_COLLATE_TESTS) + g_regexTester.should_not_match("AaAabcaAaad", "[[=a=]bc]*d"); + g_regexTester.should_match("AaAaaAaab", "[[=a=]]*b", icase); + g_regexTester.should_not_match("AaAaaAaab", "[[=a=]]*c", icase); + g_regexTester.should_match("AaAabcaAaad", "[[=a=]bc]*d", icase); +#endif // ^^^ !defined(_M_CEE_PURE) ^^^ +} + +void test_gh_5435() { + // GH-5435: <regex>: Equivalence classes have unexpected behavior with std::wregex +#ifndef _M_CEE_PURE + { + test_wregex_locale eq_a_regex(&g_regexTester, L"^[[=a=]]*b$", "en-US"); + eq_a_regex.should_search_match(L"A\u00c0ab", L"A\u00c0ab"); // U+00C0 LATIN CAPITAL LETTER A WITH GRAVE + eq_a_regex.should_search_fail(L"Ab\u00c0ab"); // U+00C0 LATIN CAPITAL LETTER A WITH GRAVE + eq_a_regex.should_search_match(L"A\u00e0ab", L"A\u00e0ab"); // U+00E0 LATIN SMALL LETTER A WITH GRAVE + eq_a_regex.should_search_match(L"A\u00c1ab", L"A\u00c1ab"); // U+00C1 LATIN CAPITAL LETTER A WITH ACUTE + eq_a_regex.should_search_match(L"A\u00e1ab", L"A\u00e1ab"); // U+00E1 LATIN SMALL LETTER A WITH ACUTE + eq_a_regex.should_search_match(L"A\u00c2ab", L"A\u00c2ab"); // U+00C2 LATIN CAPITAL LETTER A WITH CIRCUMFLEX + eq_a_regex.should_search_match(L"A\u00e2ab", L"A\u00e2ab"); // U+00E2 LATIN SMALL LETTER A WITH CIRCUMFLEX + eq_a_regex.should_search_match(L"A\u00c3ab", L"A\u00c3ab"); // U+00C3 LATIN CAPITAL LETTER A WITH TILDE + eq_a_regex.should_search_match(L"A\u00e3ab", L"A\u00e3ab"); // U+00E3 LATIN SMALL LETTER A WITH TILDE + eq_a_regex.should_search_match(L"A\u00c4ab", L"A\u00c4ab"); // U+00C4 LATIN CAPITAL LETTER A WITH DIAERESIS + eq_a_regex.should_search_match(L"A\u00e4ab", L"A\u00e4ab"); // U+00E4 LATIN SMALL LETTER A WITH DIAERESIS + eq_a_regex.should_search_match(L"A\u00c5ab", L"A\u00c5ab"); // U+00C5 LATIN CAPITAL LETTER A WITH RING ABOVE + eq_a_regex.should_search_match(L"A\u00e5ab", L"A\u00e5ab"); // U+00E5 LATIN SMALL LETTER A WITH RING ABOVE + } + { + test_wregex_locale eq_e_regex(&g_regexTester, L"^[[=e=]]*b$", "en-US"); + eq_e_regex.should_search_match(L"e\u00c8Eb", L"e\u00c8Eb"); // U+00C8 LATIN CAPITAL LETTER E WITH GRAVE + eq_e_regex.should_search_fail(L"eb\u00c8Eb"); // U+00C8 LATIN CAPITAL LETTER E WITH GRAVE + eq_e_regex.should_search_match(L"e\u00e8Eb", L"e\u00e8Eb"); // U+00E8 LATIN SMALL LETTER E WITH GRAVE + eq_e_regex.should_search_match(L"e\u00c9Eb", L"e\u00c9Eb"); // U+00C9 LATIN CAPITAL LETTER E WITH ACUTE + eq_e_regex.should_search_match(L"e\u00e9Eb", L"e\u00e9Eb"); // U+00E9 LATIN SMALL LETTER E WITH ACUTE + eq_e_regex.should_search_match(L"e\u00caEb", L"e\u00caEb"); // U+00CA LATIN CAPITAL LETTER E WITH CIRCUMFLEX + eq_e_regex.should_search_match(L"e\u00eaEb", L"e\u00eaEb"); // U+00EA LATIN SMALL LETTER E WITH CIRCUMFLEX + eq_e_regex.should_search_match(L"e\u00cbEb", L"e\u00cbEb"); // U+00CB LATIN CAPITAL LETTER E WITH DIAERESIS + eq_e_regex.should_search_match(L"e\u00ebEb", L"e\u00ebEb"); // U+00EB LATIN SMALL LETTER E WITH DIAERESIS + eq_e_regex.should_search_fail(L"e\u00ccEb"); // U+00CC LATIN CAPITAL LETTER I WITH GRAVE + eq_e_regex.should_search_fail(L"e\u00ecEb"); // U+00EC LATIN SMALL LETTER I WITH GRAVE + } +#endif // ^^^ !defined(_M_CEE_PURE) ^^^ } void test_gh_5437_ECMAScript_or_collate(syntax_option_type ECMAScript_or_collate) { @@ -592,6 +659,7 @@ void test_gh_5437() { int main() { test_collating_ranges_german(); test_gh_994(); + test_gh_5435(); test_gh_5437(); return g_regexTester.result(); diff --git a/tests/std/tests/VSO_0000000_regex_use/test.cpp b/tests/std/tests/VSO_0000000_regex_use/test.cpp index d7a4dc65f38..3d6fe5380a7 100644 --- a/tests/std/tests/VSO_0000000_regex_use/test.cpp +++ b/tests/std/tests/VSO_0000000_regex_use/test.cpp @@ -764,9 +764,11 @@ void test_gh_4995() { g_regexTester.should_throw("[[:digit:]-e]", error_range); g_regexTester.should_throw("[e-[:digit:]]", error_range); g_regexTester.should_throw("[[:alpha:]-[:digit:]]", error_range); +#ifndef _M_CEE_PURE g_regexTester.should_throw("[[=a=]-e]", error_range, ECMAScript | regex::collate); g_regexTester.should_throw("[e-[=a=]]", error_range, ECMAScript | regex::collate); g_regexTester.should_throw("[[=a=]-[=b=]]", error_range, ECMAScript | regex::collate); +#endif // ^^^ !defined(_M_CEE_PURE) ^^^ // Test valid cases: g_regexTester.should_not_match("b", R"([\d-])"); diff --git a/tests/tr1/tests/regex1/test.cpp b/tests/tr1/tests/regex1/test.cpp index a9f4689b176..2aaf0ea2e7e 100644 --- a/tests/tr1/tests/regex1/test.cpp +++ b/tests/tr1/tests/regex1/test.cpp @@ -173,9 +173,11 @@ static void test_traits() { // test template regex_traits CHECKSTRING(v0.transform(carr, carr + xlen(carr)), v0.transform(carr, carr + xlen(carr))); CHECK(v0.transform(carr, carr + xlen(carr)) != v0.transform(carr0, carr0 + xlen(carr0))); CHECK(v0.transform(carr, carr + xlen(carr)) < v0.transform(carr1, carr1 + xlen(carr1))); +#ifndef _M_CEE_PURE CHECK(v0.transform_primary(carr, carr + xlen(carr)) == v0.transform_primary(carr, carr + xlen(carr))); - CHECK(v0.transform_primary(carr, carr + xlen(carr)) == v0.transform_primary(carr0, carr0 + xlen(carr0))); + CHECK(v0.transform_primary(carr, carr + xlen(carr)) != v0.transform_primary(carr0, carr0 + xlen(carr0))); CHECK(v0.transform_primary(carr0, carr0 + xlen(carr0)) < v0.transform_primary(carr1, carr1 + xlen(carr1))); +#endif // ^^^ !defined(_M_CEE_PURE) ^^^ for (size_t i = 0; i < sizeof(class_names) / sizeof(*class_names); ++i) { CHECK(v0.lookup_classname(class_names[i], class_names[i] + xlen(class_names[i])) != 0); diff --git a/tests/tr1/tests/regex2/test.cpp b/tests/tr1/tests/regex2/test.cpp index 44cb5632126..d52371192de 100644 --- a/tests/tr1/tests/regex2/test.cpp +++ b/tests/tr1/tests/regex2/test.cpp @@ -588,8 +588,10 @@ static const regex_test tests[] = { {__LINE__, T("[[:xdigit:]]"), T("g"), "0", ALL}, {__LINE__, T("[[:xdigit:]]"), T("1"), "1 0 1", ALL}, {__LINE__, T("[[:xdigit:]]"), T(" "), "0", ALL}, - {__LINE__, T("[[=x=]]"), T("X"), "1 0 1", ALL}, +#ifndef _M_CEE_PURE + {__LINE__, T("[[=x=]]"), T("X"), "0", ALL}, {__LINE__, T("[[=x=]]"), T("x"), "1 0 1", ALL}, +#endif // ^^^ !defined(_M_CEE_PURE) ^^^ // character class ranges {__LINE__, T("[-]"), T("-"), "1 0 1", ALL},
LWG-4186 `regex_traits::transform_primary` mistakenly detects `typeid` of a function LWG-4186 `regex_traits::transform_primary` mistakenly detects `typeid` of a function `<regex>`: Equivalence classes have unexpected behavior with `std::wregex` Repros with VS 2022 17.14 Preview 4 with microsoft/STL `main`, including #5392. Tracked by internal VSO-127463 / AB#127463 , originally reported by an external user through the defunct Microsoft Connect site on 2015-06-02. ``` C:\Temp>type meow.cpp ``` ```cpp #include <locale> #include <print> #include <regex> #include <string> using namespace std; [[nodiscard]] string escape_wide(const wstring& wstr) { string ret{R"(L")"}; for (const auto& wch : wstr) { ret += format(R"(\x{:x})", static_cast<unsigned short>(wch)); } ret += R"(")"; return ret; } void display_result(const wstring& wstr, const wstring& pattern) { const locale loc{"fr-FR"}; wregex rgx; rgx.imbue(loc); rgx.assign(pattern, regex_constants::icase | regex_constants::collate); const bool result = regex_match(wstr, rgx); regex_traits<wchar_t> tr; tr.imbue(loc); const wstring primary_sort_key = tr.transform_primary(wstr.begin(), wstr.end()); println("wstr: {}; result: {:>5}; primary_sort_key: {}", escape_wide(wstr), result, escape_wide(primary_sort_key)); } int main() { display_result(L"E", L"[[=e=]]"); display_result(L"\u00C8", L"[[=e=]]"); // LATIN CAPITAL LETTER E WITH GRAVE display_result(L"\u00C9", L"[[=e=]]"); // LATIN CAPITAL LETTER E WITH ACUTE display_result(L"\u00CA", L"[[=e=]]"); // LATIN CAPITAL LETTER E WITH CIRCUMFLEX display_result(L"e", L"[[=e=]]"); display_result(L"\u00E8", L"[[=e=]]"); // LATIN SMALL LETTER E WITH GRAVE display_result(L"\u00E9", L"[[=e=]]"); // LATIN SMALL LETTER E WITH ACUTE display_result(L"\u00EA", L"[[=e=]]"); // LATIN SMALL LETTER E WITH CIRCUMFLEX } ``` ``` C:\Temp>cl /EHsc /nologo /W4 /std:c++latest /MTd /Od meow.cpp && meow meow.cpp wstr: L"\x45"; result: true; primary_sort_key: L"\xe\x21\x1\x1\x1\x1\x0" wstr: L"\xc8"; result: false; primary_sort_key: L"\xe\x21\x1\xf\x1\x1\x1\x0" wstr: L"\xc9"; result: false; primary_sort_key: L"\xe\x21\x1\xe\x1\x1\x1\x0" wstr: L"\xca"; result: false; primary_sort_key: L"\xe\x21\x1\x12\x1\x1\x1\x0" wstr: L"\x65"; result: true; primary_sort_key: L"\xe\x21\x1\x1\x1\x1\x0" wstr: L"\xe8"; result: false; primary_sort_key: L"\xe\x21\x1\xf\x1\x1\x1\x0" wstr: L"\xe9"; result: false; primary_sort_key: L"\xe\x21\x1\xe\x1\x1\x1\x0" wstr: L"\xea"; result: false; primary_sort_key: L"\xe\x21\x1\x12\x1\x1\x1\x0" ``` The user expects `regex_match` to always return `true` here. I don't understand why [`LCMapStringEx`](https://learn.microsoft.com/en-us/windows/win32/api/winnls/nf-winnls-lcmapstringex) with `LCMAP_SORTKEY` is producing these primary sort keys. Are we supposed to be passing extra flags to ignore diacritics?
More generally, `regex_traits::transform_primary()` currently implements the general traits requirement in [\[re.req\]/20](https://eel.is/c++draft/re.req#20) and not the specified implementation in [\[re.traits\]/7](https://eel.is/c++draft/re.traits#7). Besides the missing comparison with `typeid`, this also means that diacritics are not properly handled in (most?) non-C locales. If we want to implement the specification, we should probably add variants of `_Strxfrm()` and `_Wcsxfrm()` to the import library that call `__crtLCMapStringA/W` with appropriate flags for non-C locales (maybe `LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANA | NORM_IGNOREWIDTH` or something similar). If we add these new variants of `_Strxfrm()` and `_Wcsxfrm()`, we should make sure that their return values are consistent unlike the current implementations of`_Strxfrm()` and `_Wcxsfrm()` (https://github.com/microsoft/STL/issues/5210). `std::locale` doesn't actually construct any facets of type `std::collate_byname<charT>`. It constructs facets of type `std::collate<charT>` instead. See: https://godbolt.org/z/Te4rcM173 So comparing with `typeid(std::collate_byname<charT>)` only doesn't make sense. We either have to correct the facets constructed by `std::locale` (would this break ABI?) or compare with `typeid(std::collate<charT>)` as well. > We either have to correct the facets constructed by `std::locale` (would this break ABI?) I don't understand `std::locale` well enough to say whether it would be binary-compatible. All I know is that `std::locale` is the most fragile part of the library and changes have had a high risk of damaging it, even back when we could break ABI every major version. > Are we supposed to be passing extra flags to ignore diacritics? Yes. For purposes of collation order, a character is assigned a number of sorting weights. Some of these underlying sorting weights also leak into the description of `LCMapStringEx`. For example, the description for the `NORM_IGNORENONSPACE` flag states: > NORM_IGNORENONSPACE ignores any secondary distinction, whether it is a diacritic or not. [...] LINGUISTIC_IGNOREDIACRITIC causes the function to ignore only actual diacritics, instead of ignoring the *second sorting weight*. `transform()` is supposed to produce a sort key that considers all of these sorting weights. `transform_primary()`, however, is supposed to return a primary sort key. A primary sort key is derived from the primary (first) sorting weight only while ignoring all the others. That said, we probably want to choose linguistically more accurate options for a particular locale than to just neglect all the non-primary weights. I already wrote in https://github.com/microsoft/STL/issues/5291#issuecomment-2745283769: > If we want to implement the specification, we should probably add variants of `_Strxfrm()` and `_Wcsxfrm()` to the import library that call __crtLCMapStringA/W with appropriate flags for non-C locales (maybe `LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANA | NORM_IGNOREWIDTH` or something similar). For the "C" locale, the best we can probably do is to convert all characters to lower or upper case and return that as the sort key. Since equivalence classes are inherited from POSIX, I checked what the POSIX standard says about the sorting weights in the C locale (or, more accurately, the POSIX locale). My reading is that all characters should be assigned a unique primary weight. This would mean that even "a" and "A" do not have the same primary sort key. A quick test with grep seems to confirm that. However, this is somewhat inconsistent with the general traits requirements of `transform_primary()` in [\[re.req\]/20](https://eel.is/c++draft/re.req#20) that require that `transform_primary()` must not consider character case. I assumed these general traits requirements when I implemented #5392. If these are actually not true, then the implementation has to be fixed in `icase` mode. I think the traits requirement in [\[re.req\]/20](https://eel.is/c++draft/re.req#20) is wrong for the C locale and the primary sort key according to POSIX is correct. In the C locale, this is the collation order for alphabetic characters: ``` A <= B <= ... <= Z <= ... <= a <= b <= ... <= z ``` This collation order based on all sorting weights should be consistent with the order that is based on the primary weight only. This means that all these relations should also hold when we compare primary sort keys. If we also impose that primary sort keys compare equal for lower and upper case versions of the same character, we get ``` A = B = ... = Z = ... = a = b = ... = z ``` So all alphabetic characters would be assigned the same primary sort key. This is clearly not what we want. This means that we also have to fix the processing of equivalences in the parser by adding a character translation phase before calling `transform_primary()`.
More generally, `regex_traits::transform_primary()` currently implements the general traits requirement in [\[re.req\]/20](https://eel.is/c++draft/re.req#20) and not the specified implementation in [\[re.traits\]/7](https://eel.is/c++draft/re.traits#7). Besides the missing comparison with `typeid`, this also means that diacritics are not properly handled in (most?) non-C locales. If we want to implement the specification, we should probably add variants of `_Strxfrm()` and `_Wcsxfrm()` to the import library that call `__crtLCMapStringA/W` with appropriate flags for non-C locales (maybe `LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANA | NORM_IGNOREWIDTH` or something similar). If we add these new variants of `_Strxfrm()` and `_Wcsxfrm()`, we should make sure that their return values are consistent unlike the current implementations of`_Strxfrm()` and `_Wcxsfrm()` (https://github.com/microsoft/STL/issues/5210). `std::locale` doesn't actually construct any facets of type `std::collate_byname<charT>`. It constructs facets of type `std::collate<charT>` instead. See: https://godbolt.org/z/Te4rcM173 So comparing with `typeid(std::collate_byname<charT>)` only doesn't make sense. We either have to correct the facets constructed by `std::locale` (would this break ABI?) or compare with `typeid(std::collate<charT>)` as well. > We either have to correct the facets constructed by `std::locale` (would this break ABI?) I don't understand `std::locale` well enough to say whether it would be binary-compatible. All I know is that `std::locale` is the most fragile part of the library and changes have had a high risk of damaging it, even back when we could break ABI every major version. > Are we supposed to be passing extra flags to ignore diacritics? Yes. For purposes of collation order, a character is assigned a number of sorting weights. Some of these underlying sorting weights also leak into the description of `LCMapStringEx`. For example, the description for the `NORM_IGNORENONSPACE` flag states: > NORM_IGNORENONSPACE ignores any secondary distinction, whether it is a diacritic or not. [...] LINGUISTIC_IGNOREDIACRITIC causes the function to ignore only actual diacritics, instead of ignoring the *second sorting weight*. `transform()` is supposed to produce a sort key that considers all of these sorting weights. `transform_primary()`, however, is supposed to return a primary sort key. A primary sort key is derived from the primary (first) sorting weight only while ignoring all the others. That said, we probably want to choose linguistically more accurate options for a particular locale than to just neglect all the non-primary weights. I already wrote in https://github.com/microsoft/STL/issues/5291#issuecomment-2745283769: > If we want to implement the specification, we should probably add variants of `_Strxfrm()` and `_Wcsxfrm()` to the import library that call __crtLCMapStringA/W with appropriate flags for non-C locales (maybe `LCMAP_SORTKEY | LINGUISTIC_IGNORECASE | LINGUISTIC_IGNOREDIACRITIC | NORM_IGNOREKANA | NORM_IGNOREWIDTH` or something similar). For the "C" locale, the best we can probably do is to convert all characters to lower or upper case and return that as the sort key. Since equivalence classes are inherited from POSIX, I checked what the POSIX standard says about the sorting weights in the C locale (or, more accurately, the POSIX locale). My reading is that all characters should be assigned a unique primary weight. This would mean that even "a" and "A" do not have the same primary sort key. A quick test with grep seems to confirm that. However, this is somewhat inconsistent with the general traits requirements of `transform_primary()` in [\[re.req\]/20](https://eel.is/c++draft/re.req#20) that require that `transform_primary()` must not consider character case. I assumed these general traits requirements when I implemented #5392. If these are actually not true, then the implementation has to be fixed in `icase` mode. I think the traits requirement in [\[re.req\]/20](https://eel.is/c++draft/re.req#20) is wrong for the C locale and the primary sort key according to POSIX is correct. In the C locale, this is the collation order for alphabetic characters: ``` A <= B <= ... <= Z <= ... <= a <= b <= ... <= z ``` This collation order based on all sorting weights should be consistent with the order that is based on the primary weight only. This means that all these relations should also hold when we compare primary sort keys. If we also impose that primary sort keys compare equal for lower and upper case versions of the same character, we get ``` A = B = ... = Z = ... = a = b = ... = z ``` So all alphabetic characters would be assigned the same primary sort key. This is clearly not what we want. This means that we also have to fix the processing of equivalences in the parser by adding a character translation phase before calling `transform_primary()`.
[ "https://github.com/microsoft/STL/commit/898777a69c30cbc8d564b92262db306f51c2dd8f", "https://github.com/microsoft/STL/commit/c74e118efb2302ffd9813db8a33c58db428476d2", "https://github.com/microsoft/STL/commit/413b3060909a62ee47d5a78df032ca4861d10a77", "https://github.com/microsoft/STL/commit/4697464b23d873c8d4b2d82eaf43605e6556aabf", "https://github.com/microsoft/STL/commit/dd16d0fea5eb17f2cd7ff51104d545a148936807", "https://github.com/microsoft/STL/commit/4549c6bdbe8eb69bc3b62e50f6e75d7a68cf8946", "https://github.com/microsoft/STL/commit/5c750f1c867d68309c0e41c9dcbc935fad3cb23c", "https://github.com/microsoft/STL/commit/e5d9137788c368b887f9642353752d169c7b37ab", "https://github.com/microsoft/STL/commit/cf5cbec9eae32c35784cfd1b54d5b5fb86aaa288", "https://github.com/microsoft/STL/commit/a303ef261291fa261d9c6cf1c969422a237d7b8d", "https://github.com/microsoft/STL/commit/510562e9a65c90a2ffba867a305e4bf9c984349c", "https://github.com/microsoft/STL/commit/2d4d244bcbf946e6daed1bbfe1619301b2503ceb", "https://github.com/microsoft/STL/commit/a66c773137aef6c4a522a0a5ca9db877fadb3ba3", "https://github.com/microsoft/STL/commit/7b0ceedfc3249cfc25d8cd0e7d6f82e4d35d5456", "https://github.com/microsoft/STL/commit/15d0965d3d5f4fe1d3edcf9230a588b2913e11d3" ]
2025-04-26T18:40:04Z
https://github.com/microsoft/STL/tree/1e0317478eddc973e801bdacc10cee2df9943b82
[ "git config --global --add safe.directory C:/testbed ; git submodule update --init --progress ; cmd /c '\"C:\\Program Files (x86)\\Microsoft Visual Studio\\2022\\BuildTools\\Common7\\Tools\\VsDevCmd.bat\" -host_arch=x64 -arch=x64 -no_logo && cmake --build out\\x64 --parallel'" ]
[ "cmd /c '\"C:\\Program Files (x86)\\Microsoft Visual Studio\\2022\\BuildTools\\Common7\\Tools\\VsDevCmd.bat\" -host_arch=x64 -arch=x64 -no_logo && set \"PATH=C:\\Python314;C:\\Program Files\\LLVM\\bin;C:\\Program Files (x86)\\Windows Kits\\10\\bin\\10.0.22621.0\\x64;%PATH%\" && cd /d out\\x64 && python tests\\utils\\stl-lit\\stl-lit.py -Dnotags=ASAN ..\\..\\llvm-project\\libcxx\\test ..\\..\\tests\\std ..\\..\\tests\\tr1 --xunit-xml-output test-results.xml -v'" ]
[ "cmd /c '\"C:\\Program Files (x86)\\Microsoft Visual Studio\\2022\\BuildTools\\Common7\\Tools\\VsDevCmd.bat\" -host_arch=x64 -arch=x64 -no_logo && set \"PATH=C:\\Python314;C:\\Program Files\\LLVM\\bin;C:\\Program Files (x86)\\Windows Kits\\10\\bin\\10.0.22621.0\\x64;%PATH%\" && cd /d out\\x64 && python tests\\utils\\stl-lit\\stl-lit.py -Dnotags=ASAN ..\\..\\llvm-project\\libcxx\\test ..\\..\\tests\\std ..\\..\\tests\\tr1 --xunit-xml-output test-results.xml -v'" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} def set_status(name: str, status: str): if not name: return n = name.strip() # normalize suite/name separator and spaces n = re.sub(r"\s*::\s*", "::", n) n = re.sub(r"[ \t]+", " ", n) severity = {"fail": 2, "pass": 1, "skip": 0} old = results.get(n) if old is None or severity.get(status, -1) > severity.get(old, -1): results[n] = status # Helper to join with duplicate-boundary suppression def join_suppress(prev: str, nxt: str) -> str: if not prev: return nxt if not nxt: return prev if prev[-1] == nxt[0]: nxt = nxt[1:] return prev + nxt # 1) Parse any JUnit XML if present open_close_re = re.compile(r"<testcase\b([^>]*)>(.*?)</testcase>", re.DOTALL | re.IGNORECASE) attrs_re = re.compile(r'(\w+)\s*=\s*"([^"]*)"', re.IGNORECASE) for m in open_close_re.finditer(log): attrs = m.group(1) or "" body = m.group(2) or "" classname = None name = None for k, v in attrs_re.findall(attrs): kl = k.lower() if kl == "classname": classname = v.strip() elif kl == "name": name = v.strip() testname = None if classname and name: testname = f"{classname}::{name}" elif name: testname = name elif classname: testname = classname if testname: bl = body.lower() if "<skipped" in bl: set_status(testname, "skip") elif "<failure" in bl or "<error" in bl: set_status(testname, "fail") else: set_status(testname, "pass") self_closing_re = re.compile(r"<testcase\b([^>]*)\s*/>", re.IGNORECASE) for m in self_closing_re.finditer(log): attrs = m.group(1) or "" classname = None name = None for k, v in attrs_re.findall(attrs): kl = k.lower() if kl == "classname": classname = v.strip() elif kl == "name": name = v.strip() testname = None if classname and name: testname = f"{classname}::{name}" elif name: testname = name elif classname: testname = classname if testname: set_status(testname, "pass") # 2) Parse failure block headers for full names, reconstruct with suppression across newlines # Pattern: **** TEST 'suite :: name:cfg' FAILED **** fail_block_re = re.compile(r"\*+\s*TEST\s+'(.+?)'\s+FAILED\s*\*+", re.DOTALL | re.IGNORECASE) for m in fail_block_re.finditer(log): raw = m.group(1) # Reconstruct across newlines while suppressing duplicated boundary chars parts = raw.replace("\r", "").split("\n") if parts: name_joined = parts[0] for part in parts[1:]: name_joined = join_suppress(name_joined, part) set_status(name_joined, "fail") # 3) Parse LIT lines with robust reconstruction status_prefix_re = re.compile(r"^\s*(PASS|FAIL|XFAIL|XPASS|UNSUPPORTED|SKIPPED):", re.IGNORECASE) # Accept duplicated letters in 'of' due to wrapping/duplication trailer_re = re.compile(r"\(\s*\d+\s+o+f+\s+\d+\s*\)\s*$", re.IGNORECASE) # Lines that indicate we should stop accumulating this logical line header_break_re = re.compile( r"^\*{5,}|^Exit Code:|^Standard Error:|^Build setup steps:|^Build steps:|^Command:|^--\s*$|^In file included|^-- Testing:|^Testing Time:", re.IGNORECASE, ) lines = log.splitlines() logical_lines: list[str] = [] buf = None def flush_buf(): nonlocal buf if buf is not None: # Ensure no stray CRs and collapse any remaining newlines (shouldn't be any) s = buf.replace("\r", "").replace("\n", "") logical_lines.append(s) buf = None i = 0 while i < len(lines): line = lines[i] if status_prefix_re.match(line): flush_buf() buf = line j = i + 1 while j < len(lines): nxt = lines[j] if status_prefix_re.match(nxt) or header_break_re.match(nxt): break buf = join_suppress(buf, nxt) if trailer_re.search(nxt) or trailer_re.search(buf): j += 1 break j += 1 i = j flush_buf() continue else: i += 1 lit_re = re.compile( r"^\s*(PASS|FAIL|XFAIL|XPASS|UNSUPPORTED|SKIPPED):\s+(.+?)\s+::\s+(.+?)(?:\s+\(\d+\s+o+f+\s+\d+\)\s*)?$", re.IGNORECASE, ) def map_status(s: str) -> str: s = s.upper() if s == "PASS": return "pass" if s in ("FAIL", "XPASS"): return "fail" if s == "XFAIL": return "pass" if s in ("UNSUPPORTED", "SKIPPED"): return "skip" return "fail" for ll in logical_lines: m = lit_re.match(ll) if not m: continue status_raw, suite, name = m.groups() testname = f"{suite}::{name}" set_status(testname, map_status(status_raw)) return results
[ "libc++::std/containers/associative/multimap/multimap.erasure/erase_if.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.erasure/erase_if.pass.cpp:2" ]
[ "libc++::std/algorithms/alg.nonmodifying/alg.find.end/find_end.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/sort/sort.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/sort/sort_constexpr.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/push.heap/push_heap.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find/find_if.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_move.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/upper.bound/upper_bound_comp.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.special/copy_backward.pass.cpp:2", "libc++::std/containers/associative/set/set.cons/from_range.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/operator.plus_equals.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.first.of/find_first_of.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/erase_iter.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/assign_move.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.equal/pstl.equal.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_comp_rcont_alloc.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_iter_iter_alloc.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/is_sorted_until_comp.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.search/search.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/ranges.prev_permutation.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/pop.heap/ranges_pop_heap.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_partition_copy.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find/find.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/iter_iter_alloc.pass.cpp:0", "libc++::std/containers/sequences/list/list.modifiers/insert_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.transform/ranges.transform.unary.pass.cpp:0", "libc++::std/concepts/concepts.lang/concept.swappable/swappable.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.symmetric.difference/set_symmetric_difference_comp.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/pop_front.invalidation.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/binary.search/binary_search.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.search/ranges.search_n.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.generate/ranges_generate_n.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/lower.bound/lower_bound.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/push_front.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.move/move.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.search/search.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/ranges_replace_copy.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/ranges_unique.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.intersection/set_intersection.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_copy_alloc.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_backward.segmented.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.special/copy.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.all_of/pstl.all_of.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/push_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/pstl.replace_copy_if.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_if.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/from_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.fill/fill_n.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.erasure/erase_if.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.replace/replace_copy_if.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/remove_copy_if.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.end/find_end.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.any_of/ranges.any_of.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/mismatch/ranges_mismatch.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/ranges.is_sorted.pass.cpp:0", "libc++::std/containers/container.requirements/container.requirements.general/allocator_move.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/min_element.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/merge_comp.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/is_partitioned.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.swap/swap_ranges.pass.cpp:2", "libc++::std/containers/container.adaptors/container.adaptors.format/parse.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique_copy.pass.cpp:0", "libc++::std/containers/associative/multiset/insert_range.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.none_of/ranges.none_of.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.minmax.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/push_rvalue.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_n.segmented.pass.cpp:2", "libc++::std/containers/sequences/list/list.cons/input_iterator.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.min_element.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/types.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons.alloc/ctor_rqueue_alloc.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.minmax.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_if.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.max.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/sort.heap/sort_heap.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges.remove.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/remove.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.last/ranges.find_last_if_not.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.count/count_if.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy_if.pass.cpp:2", "libc++::std/containers/sequences/forwardlist/forwardlist.cons/from_range.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/ranges.is_sorted_until.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_n.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.ops/compare.three_way.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.modifiers/insert_range.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/erase_iter.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.nth.element/nth_element.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.is_permutation/is_permutation_pred.pass.cpp:0", "libc++::std/containers/associative/set/set.cons/from_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.transform/binary_transform.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/ranges_is_heap.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/make.heap/make_heap.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.move/ranges.move_backward.segmented.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.first.of/find_first_of.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.transform/pstl.transform.binary.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/ctor_move.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/ranges.replace.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.fill/fill.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.capacity/resize_size.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/swap.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/compare_exchange_strong.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.nth.element/nth_element_comp.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.generate/pstl.generate_n.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find/ranges.find_if_not.pass.cpp:2", "libc++::std/containers/sequences/forwardlist/forwardlist.cons/deduct.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.symmetric.difference/set_symmetric_difference.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.minmax_element.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/store.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/deduct.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/fetch_add.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_comp_rcontainer.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_n.segmented.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/deduct.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/sort.heap/sort_heap_comp.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort.copy/partial_sort_copy_comp.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/notify_all.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.search/ranges.search_n.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort/ranges_partial_sort.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.difference/set_difference_comp.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/binary.search/ranges.binary_search.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.transform/binary_transform.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.transform/ranges.transform.binary.iterator.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/rotate.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.move/move.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.generate/ranges_generate.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.contains/ranges.contains.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.reverse/ranges.reverse.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.replace/ranges_replace_copy.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.cons/iter_iter.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/fetch_add.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find.last/ranges.find_last.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/binary.search/binary_search_comp.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.special/swap.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/is_heap_until_comp.pass.cpp:2", "libc++::std/containers/associative/map/map.cons/from_range.pass.cpp:0", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/prepend_range.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.merge/inplace_merge_comp.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/is_sorted_comp.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/includes/includes_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons.alloc/ctor_container_alloc.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.none_of/pstl.none_of.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/upper.bound/upper_bound.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.special/swap.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.ops/lt.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.three.way/lexicographical_compare_three_way.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.search/search_pred.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.intersection/set_intersection_comp.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.lex.comparison/lexicographical_compare.pass.cpp:2", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_wait_explicit.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find.first.of/find_first_of_pred.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/upper.bound/ranges.upper_bound.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.cons/ctor_copy.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.move/pstl.move.pass.cpp:0", "libc++::std/concepts/concepts.compare/concept.equalitycomparable/equality_comparable_with.compile.pass.cpp:2", "libc++::std/containers/associative/set/set.cons/iter_iter.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/is_heap_until_comp.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/exchange.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/move_noexcept.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/assign_move.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.shift/shift_left.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.cons/deduct.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.fill/pstl.fill.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.union/set_union.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.count/count.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.count/ranges.count.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.end/find_end_pred.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.intersection/set_intersection_complexity.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.cons/default_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_backward.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/upper.bound/ranges.upper_bound.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/operator.minus_equals.pass.cpp:0", "libc++::std/containers/associative/set/set.cons/deduct.pass.cpp:0", "libc++::std/containers/sequences/list/list.modifiers/assign_range.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.ops/lt.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/equal.range/ranges_equal_range.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/move_assign_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_n.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.special/swap_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.union/set_union_comp.pass.cpp:0", "libc++::std/algorithms/ranges_robust_against_omitting_invoke.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy_if.pass.cpp:0", "libc++::std/containers/sequences/list/list.modifiers/insert_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.reverse/ranges.reverse_copy.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/stable.sort/ranges.stable.sort.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/sort/pstl.sort.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.modifiers/emplace.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/insert_size_value.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/stable_partition.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/append_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.reverse/reverse_copy.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.move/ranges.move_backward.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.defn/assign_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_iter_iter_comp_alloc.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.swap/ranges.swap_ranges.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/sort/ranges.sort.pass.cpp:2", "libc++::std/concepts/concepts.compare/concepts.totallyordered/totally_ordered_with.compile.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/for_each.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/ctor_iterators.pass.cpp:0", "libc++::std/atomics/types.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.generate/generate_n.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.intersection/set_intersection.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.minmax_element.pass.cpp:0", "libc++::std/containers/sequences/list/list.cons/deduct.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.modifiers/insert_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.random.sample/ranges_sample.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/empty.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find.first.of/find_first_of_pred.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.lex.comparison/lexicographical_compare.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_backward.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/ranges.for_each.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.modifiers/emplace.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/sort/ranges.sort.pass.cpp:0", "libc++::std/containers/container.adaptors/container.adaptors.format/format.functions.format.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/operator.float.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_default.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_iter_comp_rcont.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.adjacent.find/ranges.adjacent_find.pass.cpp:2", "libc++::std/containers/sequences/list/list.modifiers/prepend_range.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find/ranges.find_if.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.partitions/pstl.is_partitioned.pass.cpp:0", "libc++::std/containers/associative/multiset/multiset.cons/move_assign.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.capacity/resize_size_value.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/ranges.rotate_copy.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/ranges_rotate.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/max_element.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/binary.search/binary_search.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/for_each_n.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/pop.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort/partial_sort.pass.cpp:2", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/prepend_range.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.union/set_union_comp.pass.cpp:2", "libc++::std/containers/sequences/list/list.ops/sort_comp.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique_pred.pass.cpp:2", "libc++::std/containers/sequences/forwardlist/forwardlist.ops/sort.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.special/swap.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/ranges.replace.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/ranges_replace_copy_if.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/equal.range/equal_range_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/top.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/pop_back.invalidation.pass.cpp:2", "libc++::std/containers/associative/multiset/multiset.cons/deduct.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/includes/ranges_includes.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/lower.bound/ranges.lower_bound.pass.cpp:0", "libc++::std/algorithms/ranges_robust_against_dangling.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/sort/sort_constexpr_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_iter.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/includes/includes.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/lower.bound/lower_bound_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.cons/ctor_default.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/types.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/inplace_merge.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.all_of/ranges.all_of.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.cons.alloc/ctor_rcontainer_alloc.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find/pstl.find_if_not.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/ranges.replace_if.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/next_permutation.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/store.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.transform/ranges.transform.unary.pass.cpp:2", "libc++::std/containers/sequences/forwardlist/forwardlist.cons/from_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.remove/remove_copy_if.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_iter_comp_cont.pass.cpp:0", "libc++::std/algorithms/ranges_robust_against_nonbool.compile.pass.cpp:2", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_wait_explicit.pass.cpp:2", "libc++::std/containers/sequences/list/list.cons/from_range.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort.copy/partial_sort_copy_comp.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.fill/fill.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.min.max/minmax_element_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/ctor_rcontainer.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/ranges_unique_copy.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy_backward.segmented.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.remove/remove_if.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort.copy/ranges_partial_sort_copy.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.defn/back.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_comp_cont_alloc.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/prepend_range.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.contains/ranges.contains.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.merge/ranges_merge.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/make.heap/make_heap.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/push_back_rvalue.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/ranges_is_heap_until.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/move_assign_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.symmetric.difference/set_symmetric_difference_comp.pass.cpp:0", "libc++::std/containers/associative/multiset/insert_iter_iter.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.any_of/pstl.any_of.pass.cpp:0", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_notify_all.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/front.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/prev_permutation.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find/pstl.find_if.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.cons.alloc/ctor_rcontainer_alloc.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/assign_size_value.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique_pred.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find/pstl.find.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.erasure/erase.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/deduct.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/lower.bound/lower_bound_comp.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/pstl.rotate_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/ctor_iterators.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/deduct.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/emplace.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/pstl.replace_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/ctor_container.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.difference/set_difference.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/pop_back.invalidation.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_partition_copy.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.reverse/reverse_copy.pass.cpp:0", "libc++::std/concepts/concepts.lang/concept.swappable/swappable_with.compile.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_comp_alloc.pass.cpp:0", "libc++::std/concepts/concepts.compare/concept.equalitycomparable/equality_comparable_with.compile.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy_backward.pass.cpp:2", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_wait.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.union/set_union.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort/partial_sort_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/move_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/sort/sort_constexpr.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/partition_point.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.special/swap_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/make.heap/ranges_make_heap.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/stable.sort/stable_sort_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/emplace.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/pstl.for_each_n.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find.end/ranges.find_end.pass.cpp:2", "libc++::std/containers/associative/multiset/insert_iter_iter.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/size.pass.cpp:0", "libc++::std/containers/sequences/list/list.modifiers/prepend_range.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/compare_exchange_weak.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/ranges.for_each.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/notify_one.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.cons/from_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.fill/pstl.fill_n.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/iter_iter.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/equal.range/equal_range.pass.cpp:2", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/assign_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.reverse/ranges.reverse.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges_remove_copy_if.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/is_partitioned.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.nth.element/ranges_nth_element.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/inplace_merge.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_iter_comp.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/ranges.for_each_n.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.merge/ranges_inplace_merge.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.intersection/ranges_set_intersection.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.last/ranges.find_last_if.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/ctor_rcontainer.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/binary.search/binary_search_comp.pass.cpp:0", "libc++::std/algorithms/robust_against_proxy_iterators_lifetime_bugs.pass.cpp:0", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_notify_one.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges.remove_if.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/partition_point.pass.cpp:2", "libc++::std/algorithms/robust_against_proxy_iterators_lifetime_bugs.pass.cpp:2", "libc++::std/containers/sequences/list/list.cons/deduct.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_iter_iter_comp_cont_alloc.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.count/count.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.cons.alloc/ctor_queue_alloc.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.move/ranges.move_backward.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.random.sample/sample.stable.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/make.heap/make_heap_comp.pass.cpp:2", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/insert_range_after.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_partition_point.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/assign_iter_iter.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/ranges.is_sorted_until.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_partition_point.pass.cpp:2", "libc++::std/containers/sequences/list/list.modifiers/insert_iter_iter_iter.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/push_rv.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort.copy/ranges_partial_sort_copy.pass.cpp:0", "libc++::std/containers/associative/map/map.cons/copy_assign.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/ranges.replace_if.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/equal.range/equal_range_comp.pass.cpp:2", "libc++::std/concepts/concepts.lang/concept.swappable/swappable.pass.cpp:0", "libc++::std/algorithms/ranges_robust_against_proxy_iterators.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy_backward.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.intersection/set_intersection_complexity.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.lex.comparison/lexicographical_compare_comp.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.cons/ctor_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/empty.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/pstl.replace_if.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/exchange.pass.cpp:2", "libc++::std/containers/associative/multimap/multimap.nonmember/compare.three_way.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/notify_all.pass.cpp:2", "libc++::std/containers/associative/multiset/insert_range.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort/partial_sort_comp.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort/ranges_partial_sort.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find/ranges.find_if_not.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/push.heap/ranges_push_heap.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.fill/ranges.fill_n.pass.cpp:2", "libc++::std/containers/associative/set/set.nonmember/compare.three_way.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/binary.search/ranges.binary_search.pass.cpp:0", "libc++::std/containers/associative/map/map.modifiers/insert_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_stable_partition.pass.cpp:0", "libc++::std/containers/sequences/forwardlist/forwardlist.ops/sort_pred.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.is_permutation/is_permutation_pred.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/from_range.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/append_range.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/top.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/compare.three_way.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/emplace.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.replace/replace_if.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges_remove_copy.pass.cpp:2", "libc++::std/containers/sequences/vector.bool/append_range.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.special/swap.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons.alloc/ctor_container_alloc.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.equal/ranges.equal.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/ranges.prev_permutation.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.nth.element/ranges_nth_element.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/make.heap/ranges_make_heap.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/merge.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/rotate_copy.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.shift/shift_right.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/ranges_rotate.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort.copy/partial_sort_copy.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.defn/push.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.max_element.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/operator.minus_equals.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy.segmented.pass.cpp:0", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/assign_range.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/stable.sort/ranges.stable.sort.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/insert_range.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/is_sorted_until_comp.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.random.sample/sample.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.count/ranges.count_if.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.count/pstl.count.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort/partial_sort.pass.cpp:0", "libc++::std/containers/sequences/list/list.cons/from_range.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.min.max/max_element_comp.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.erasure/erase.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/upper.bound/upper_bound.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/push_range.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.search/search_pred.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.capacity/resize_size.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/fetch_sub.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.difference/set_difference.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.cons/ctor_default.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/sort.heap/sort_heap_comp.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/dtor_noexcept.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_alloc.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_comp_container.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/sort.heap/complexity.pass.cpp:0", "libc++::std/containers/sequences/vector.bool/append_range.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find/ranges.find.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/assign_copy.addressof.compile.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/min_element_comp.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.fill/ranges.fill.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/mismatch/mismatch.pass.cpp:0", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_notify_one.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.equal/equal.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.difference/ranges_set_difference.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.special/move.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.transform/pstl.transform.unary.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/pop.heap/pop_heap.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/prev_permutation_comp.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/insert_value.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/pop.heap/pop_heap_comp.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/insert_value.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/sort.heap/sort_heap.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.search/search_n_pred.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/ranges.for_each_n.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.move/ranges.move.segmented.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges.remove_if.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.swap/swap_ranges.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.intersection/set_intersection_comp.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.nth.element/nth_element.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.search/search_n_pred.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.random.shuffle/random_shuffle_urng.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/prepend_range.pass.cpp:0", "libc++::std/containers/associative/multiset/multiset.cons/move_assign.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.cons/from_range.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/insert_size_value.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/push_range.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/mismatch/mismatch.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.replace/replace.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.count/pstl.count_if.pass.cpp:0", "libc++::std/containers/sequences/list/list.modifiers/append_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique_copy.pass.cpp:2", "libc++::std/containers/associative/multimap/multimap.modifiers/insert_iter_iter.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_partition.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/compare_exchange_strong.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/pstl.merge.pass.cpp:0", "libc++::std/containers/associative/set/insert_range.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/merge.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.set.operations/includes/includes_comp.pass.cpp:2", "libc++::std/containers/sequences/list/list.modifiers/append_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique_copy_pred.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/push_front.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/mismatch/ranges_mismatch.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/erase_iter_iter.pass.cpp:0", "libc++::std/algorithms/ranges_robust_against_differing_projections.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.erasure/erase_if.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/ranges_inplace_merge.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.cons/deduct.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.three.way/lexicographical_compare_three_way.pass.cpp:0", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_notify_all.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.contains/ranges.contains_subrange.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.max.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/insert_rvalue.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/push_back_rvalue.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.symmetric.difference/set_symmetric_difference.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/pop.heap/pop_heap_comp.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/load.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/load.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/is_sorted_comp.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.cons/assign_size_value.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/assign_iter_iter.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.special/move_backward.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.nth.element/nth_element_comp.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.last/ranges.find_last_if.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/fetch_sub.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.move/ranges.move_backward.segmented.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.nonmember/compare.three_way.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges_remove_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons.alloc/ctor_iterators.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.generate/ranges_generate_n.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/dtor_noexcept.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/trivially_copyable.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.move/ranges.move.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/assign_range.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.defn/empty.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.special/move_backward.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_move_alloc.pass.cpp:0", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/insert_range_after.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.equal/ranges.equal.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.generate/generate_n.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/pop.heap/ranges_pop_heap.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.is_permutation/ranges.is_permutation.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.special/copy.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/notify_one.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/stable.sort/pstl.stable_sort.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.count/count_if.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.transform/ranges.transform.binary.range.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/make.heap/make_heap_comp.pass.cpp:0", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/insert_after_range.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.special/swap.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.transform/unary_transform.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/replace_copy_if.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/insert_range.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/ctor_move.pass.cpp:0", "libc++::std/containers/container.adaptors/container.adaptors.format/format.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find.first.of/ranges.find_first_of.pass.cpp:2", "libc++::std/atomics/atomics.types.generic/atomics.types.float/operator.float.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.cons/from_range.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/emplace_front.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/erase_iter_iter.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.end/find_end_pred.pass.cpp:0", "libc++::std/containers/iterator.rel_ops.compile.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/pop.heap/pop_heap.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_iter_constraint.compile.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.special/copy_backward.pass.cpp:0", "libc++::std/containers/container.adaptors/container.adaptors.format/types.compile.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy.segmented.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.replace/replace_if.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.move/ranges.move.segmented.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.merge/inplace_merge_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/front_const.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.ops/eq.pass.cpp:0", "libc++::std/containers/container.requirements/container.requirements.general/allocator_move.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/ranges.copy.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.none_of/ranges.none_of.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.symmetric.difference/ranges_set_symmetric_difference.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.any_of/ranges.any_of.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.cons/dtor_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find/ranges.find_if.pass.cpp:0", "libc++::std/containers/associative/set/set.cons/deduct.pass.cpp:2", "libc++::std/containers/associative/map/map.cons/from_range.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.swap/ranges.swap_ranges.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/move_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.merge/merge_comp.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/sort.heap/ranges_sort_heap.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique_copy_pred.pass.cpp:0", "libc++::std/containers/container.adaptors/container.adaptors.format/format.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.special/move.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.fill/ranges.fill_n.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/default_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/stable_partition.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.move/move_backward.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.remove/remove_if.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons/default_noexcept.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/operator.plus_equals.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/next_permutation_comp.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.fold/left_folds.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.partitions/ranges.is_partitioned.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/emplace.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/push.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/equal.range/ranges_equal_range.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.find.first.of/ranges.find_first_of.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.three.way/lexicographical_compare_three_way_comp.pass.cpp:2", "libc++::std/containers/associative/map/map.nonmember/compare.three_way.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.defn/top_const.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.adjacent.find/ranges.adjacent_find.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons.alloc/ctor_iter_iter_comp_rcont_alloc.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find.last/ranges.find_last_if_not.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/assign_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.generate/ranges_generate.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy_n.pass.cpp:0", "libc++::std/containers/associative/map/map.nonmember/compare.three_way.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.move/move_backward.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.special/swap_noexcept.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.partitions/ranges.is_partitioned.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/includes/includes.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/next_permutation_comp.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.defn/push_rv.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/push.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/deduct.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/partial.sort.copy/partial_sort_copy.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges_remove_copy_if.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/next_permutation.pass.cpp:2", "libc++::std/containers/associative/multiset/multiset.cons/deduct.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/move_assign_noexcept.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.capacity/resize_size_value.pass.cpp:0", "libc++::std/containers/associative/map/map.cons/copy_assign.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.binary.search/lower.bound/lower_bound.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/size.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/is_heap_comp.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons/ctor_container.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/for_each.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.cons.alloc/ctor_rqueue_alloc.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.is_permutation/ranges.is_permutation.pass.cpp:0", "libc++::std/containers/associative/map/map.cons/deduct.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/for_each_n.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/is_heap_comp.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.cons/deduct.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.defn/back_const.pass.cpp:0", "libc++::std/concepts/concepts.lang/concept.default.init/default_initializable.compile.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/insert_rvalue.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.defn/assign_copy.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/rotate.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/size.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/rotate_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/ctor_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/emplace.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.is_permutation/is_permutation.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.min.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/from_range.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/iter_iter_alloc.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/prev_permutation.pass.cpp:2", "libc++::std/atomics/atomics.types.operations/atomics.types.operations.wait/atomic_wait.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/ranges.next_permutation.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/unique.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/prev_permutation_comp.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.shift/shift_left.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.all_of/ranges.all_of.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/upper.bound/upper_bound_comp.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.min.max/minmax_element.pass.cpp:0", "libc++::std/containers/sequences/forwardlist/forwardlist.cons/deduct.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/assign_move.pass.cpp:0", "libc++::std/containers/associative/set/set.nonmember/compare.three_way.pass.cpp:2", "libc++::std/containers/sequences/list/list.modifiers/insert_iter_iter_iter.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.lex.comparison/ranges.lexicographical_compare.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.difference/set_difference_comp.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.cons.alloc/ctor_alloc.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_stable_partition.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.rotate/ranges.rotate_copy.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.remove/remove.pass.cpp:0", "libc++::std/containers/sequences/forwardlist/forwardlist.modifiers/insert_after_range.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/pop.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.shift/shift_right.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.unique/ranges_unique_copy.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.set.operations/set.union/ranges_set_union.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.cons/move_alloc.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.lex.comparison/lexicographical_compare_comp.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/wait.pass.cpp:0", "libc++::std/containers/container.adaptors/priority.queue/priqueue.cons/assign_copy.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.ops/eq.pass.cpp:0", "libc++::std/containers/associative/multimap/multimap.cons/from_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.remove/ranges.remove.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.cons.alloc/ctor_iterators.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.cons.alloc/ctor_alloc.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find/find_if.pass.cpp:0", "libc++::std/containers/associative/multiset/multiset.cons/from_range.pass.cpp:2", "libc++::std/containers/associative/set/set.cons/iter_iter.pass.cpp:0", "libc++::std/containers/container.adaptors/stack/stack.defn/types.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.count/ranges.count.pass.cpp:0", "libc++::std/containers/associative/set/insert_range.pass.cpp:2", "libc++::std/concepts/concepts.callable/concept.invocable/invocable.compile.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/lower.bound/ranges.lower_bound.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.cons.alloc/ctor_copy_alloc.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.find.last/ranges.find_last.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.heap.operations/push.heap/ranges_push_heap.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.replace/replace.pass.cpp:2", "libc++::std/containers/container.adaptors/priority.queue/priqueue.members/pop.pass.cpp:0", "libc++::std/concepts/concepts.compare/concepts.totallyordered/totally_ordered_with.compile.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.transform/unary_transform.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.generate/pstl.generate.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.is_permutation/is_permutation.pass.cpp:2", "libc++::std/containers/container.adaptors/container.adaptors.format/format.functions.vformat.pass.cpp:0", "libc++::std/containers/sequences/list/list.ops/sort.pass.cpp:0", "libc++::std/containers/associative/map/map.modifiers/insert_range.pass.cpp:2", "libc++::std/algorithms/ranges_robust_against_nonbool.compile.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/ranges_is_heap_until.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/push.heap/push_heap.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.three.way/lexicographical_compare_three_way_comp.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.permutation.generators/ranges.next_permutation.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.reverse/ranges.reverse_copy.pass.cpp:2", "libc++::std/algorithms/ranges_robust_against_omitting_invoke.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/assign_copy.addressof.compile.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.heap.operations/is.heap/ranges_is_heap.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.sort/is.sorted/ranges.is_sorted.pass.cpp:2", "libc++::std/algorithms/alg.sorting/alg.sort/sort/sort_constexpr_comp.pass.cpp:2", "libc++::std/containers/sequences/deque/deque.modifiers/pop_front.invalidation.pass.cpp:2", "libc++::std/containers/associative/map/map.cons/deduct.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.cons/move_alloc.pass.cpp:2", "libc++::std/containers/container.adaptors/stack/stack.defn/swap.pass.cpp:0", "libc++::std/containers/sequences/deque/deque.modifiers/emplace_front.pass.cpp:0", "libc++::std/atomics/atomics.types.generic/atomics.types.float/wait.pass.cpp:2", "libc++::std/containers/container.adaptors/queue/queue.defn/push_range.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.fill/ranges.fill.pass.cpp:2", "libc++::std/algorithms/alg.nonmodifying/alg.count/ranges.count_if.pass.cpp:2", "libc++::std/algorithms/ranges_robust_against_differing_projections.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.min.max/ranges.min.pass.cpp:0", "libc++::std/algorithms/alg.sorting/alg.binary.search/equal.range/equal_range.pass.cpp:0", "libc++::std/containers/container.adaptors/queue/queue.defn/swap.pass.cpp:0", "libc++::std/algorithms/alg.modifying.operations/alg.partitions/ranges_partition.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.replace/pstl.replace.pass.cpp:0", "libc++::std/containers/associative/multiset/multiset.cons/from_range.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.foreach/pstl.for_each.pass.cpp:0", "libc++::std/algorithms/alg.nonmodifying/alg.starts_with/ranges.starts_with.pass.cpp:2", "libc++::std/algorithms/alg.modifying.operations/alg.copy/copy_n.pass.cpp:2", "libc++::std/containers/sequences/list/list.modifiers/assign_range.pass.cpp:2" ]
starryzhang/sweb.eval.win.microsoft_1776_stl-5444
microsoft/ebpf-for-windows
4117
microsoft__ebpf-for-windows-4117
C
[ "3602", "4129" ]
30fdb1f81aa7d4eaceb26a72d72920aeac79bebb
diff --git a/netebpfext/net_ebpf_ext.c b/netebpfext/net_ebpf_ext.c index 451fb361b4..05e70e467e 100644 --- a/netebpfext/net_ebpf_ext.c +++ b/netebpfext/net_ebpf_ext.c @@ -34,12 +34,6 @@ static bool _net_ebpf_xdp_providers_registered = false; static bool _net_ebpf_bind_providers_registered = false; static bool _net_ebpf_sock_addr_providers_registered = false; static bool _net_ebpf_sock_ops_providers_registered = false; -#if !defined(NDEBUG) -// Global objects used to store filter contexts that are being cleaned up. This is currently only used in debug -// contexts. -EX_SPIN_LOCK _net_ebpf_filter_zombie_list_lock = {0}; -_Guarded_by_(_net_ebpf_filter_zombie_list_lock) static LIST_ENTRY _net_ebpf_filter_zombie_list = {0}; -#endif static net_ebpf_ext_sublayer_info_t _net_ebpf_ext_sublayers[] = { {&EBPF_DEFAULT_SUBLAYER, L"EBPF Sub-Layer", L"Sub-Layer for use by eBPF callouts", 0, SUBLAYER_WEIGHT_MAXIMUM}, @@ -910,10 +904,6 @@ net_ebpf_ext_register_providers() } _net_ebpf_sock_ops_providers_registered = true; -#if !defined(NDEBUG) - InitializeListHead(&_net_ebpf_filter_zombie_list); -#endif - Exit: if (!NT_SUCCESS(status)) { net_ebpf_ext_unregister_providers(); @@ -1008,24 +998,4 @@ net_ebpf_ext_remove_client_context( } ExReleaseSpinLockExclusive(&filter_context->lock, old_irql); -} - -#if !defined(NDEBUG) -void -net_ebpf_ext_add_filter_context_to_zombie_list(_Inout_ net_ebpf_extension_wfp_filter_context_t* filter_context) -{ - KIRQL old_irql = ExAcquireSpinLockExclusive(&_net_ebpf_filter_zombie_list_lock); - InsertHeadList(&_net_ebpf_filter_zombie_list, &filter_context->link); - ExReleaseSpinLockExclusive(&_net_ebpf_filter_zombie_list_lock, old_irql); -} - -void -net_ebpf_ext_remove_filter_context_from_zombie_list(_Inout_ net_ebpf_extension_wfp_filter_context_t* filter_context) -{ - if (!IsListEmpty(&filter_context->link)) { - KIRQL old_irql = ExAcquireSpinLockExclusive(&_net_ebpf_filter_zombie_list_lock); - RemoveEntryList(&filter_context->link); - ExReleaseSpinLockExclusive(&_net_ebpf_filter_zombie_list_lock, old_irql); - } -} -#endif \ No newline at end of file +} \ No newline at end of file diff --git a/netebpfext/net_ebpf_ext.h b/netebpfext/net_ebpf_ext.h index f2483026c1..7e3c716755 100644 --- a/netebpfext/net_ebpf_ext.h +++ b/netebpfext/net_ebpf_ext.h @@ -150,21 +150,20 @@ typedef struct _net_ebpf_extension_wfp_filter_context #define PRAGMA_WARNING_SUPPRESS_26100 _Pragma("warning(suppress: 26100)") #define PRAGMA_WARNING_POP _Pragma("warning(pop)") -#define CLEAN_UP_FILTER_CONTEXT(filter_context) \ - ASSERT((filter_context) != NULL); \ - net_ebpf_extension_hook_provider_remove_filter_context_from_zombie_list((filter_context)); \ - if ((filter_context)->filter_ids != NULL) { \ - ExFreePool((filter_context)->filter_ids); \ - } \ - PRAGMA_WARNING_PUSH \ - PRAGMA_WARNING_SUPPRESS_26100 \ - if ((filter_context)->client_contexts != NULL) { \ - ExFreePool((filter_context)->client_contexts); \ - } \ - PRAGMA_WARNING_POP \ - if ((filter_context)->wfp_engine_handle != NULL) { \ - FwpmEngineClose((filter_context)->wfp_engine_handle); \ - } \ +#define CLEAN_UP_FILTER_CONTEXT(filter_context) \ + ASSERT((filter_context) != NULL); \ + if ((filter_context)->filter_ids != NULL) { \ + ExFreePool((filter_context)->filter_ids); \ + } \ + PRAGMA_WARNING_PUSH \ + PRAGMA_WARNING_SUPPRESS_26100 \ + if ((filter_context)->client_contexts != NULL) { \ + ExFreePool((filter_context)->client_contexts); \ + } \ + PRAGMA_WARNING_POP \ + if ((filter_context)->wfp_engine_handle != NULL) { \ + FwpmEngineClose((filter_context)->wfp_engine_handle); \ + } \ ExFreePool((filter_context)); #define REFERENCE_FILTER_CONTEXT(filter_context) \ @@ -389,15 +388,4 @@ net_ebpf_ext_remove_client_context( ebpf_result_t net_ebpf_ext_add_client_context( _Inout_ net_ebpf_extension_wfp_filter_context_t* filter_context, - _In_ const struct _net_ebpf_extension_hook_client* hook_client); - -#if !defined(NDEBUG) -/** - * @brief Add the filter context to the zombie list. - * - * @param filter_context Filter context to add to the zombie list. - */ -void -net_ebpf_ext_add_filter_context_to_zombie_list(_Inout_ net_ebpf_extension_wfp_filter_context_t* filter_context); - -#endif + _In_ const struct _net_ebpf_extension_hook_client* hook_client); \ No newline at end of file diff --git a/netebpfext/net_ebpf_ext_hook_provider.c b/netebpfext/net_ebpf_ext_hook_provider.c index fd25bf69d4..24a994ceeb 100644 --- a/netebpfext/net_ebpf_ext_hook_provider.c +++ b/netebpfext/net_ebpf_ext_hook_provider.c @@ -10,6 +10,7 @@ typedef struct _net_ebpf_ext_hook_client_rundown { EX_RUNDOWN_REF protection; bool rundown_occurred; + bool rundown_initialized; } net_ebpf_ext_hook_rundown_t; struct _net_ebpf_extension_hook_provider; @@ -41,9 +42,6 @@ typedef struct _net_ebpf_extension_hook_provider const void* custom_data; ///< Opaque pointer to hook specific data associated for this provider. _Guarded_by_(lock) LIST_ENTRY filter_context_list; ///< Linked list of filter contexts that are attached to this provider. - EX_PUSH_LOCK zombie_list_lock; ///< Lock for zombie filters list. - _Guarded_by_(zombie_list_lock) - LIST_ENTRY zombie_filter_context_list; ///< Linked list of filter contexts that are attached to this provider. } net_ebpf_extension_hook_provider_t; typedef struct _net_ebpf_extension_invoke_programs_parameters @@ -54,6 +52,21 @@ typedef struct _net_ebpf_extension_invoke_programs_parameters ebpf_result_t result; } net_ebpf_extension_invoke_programs_parameters_t; +/** + * @brief Initialize the hook rundown state. + * + * @param[in, out] rundown Pointer to the rundown object to initialize. + */ +static void +_ebpf_ext_init_hook_rundown(_Inout_ net_ebpf_ext_hook_rundown_t* rundown) +{ + ASSERT(rundown->rundown_initialized == FALSE); + + ExInitializeRundownProtection(&rundown->protection); + rundown->rundown_occurred = FALSE; + rundown->rundown_initialized = TRUE; +} + /** * @brief Initialize the hook client rundown state. * @@ -81,8 +94,7 @@ _ebpf_ext_attach_init_rundown(net_ebpf_extension_hook_client_t* hook_client) } // Initialize the rundown and disable new references. - ExInitializeRundownProtection(&rundown->protection); - rundown->rundown_occurred = FALSE; + _ebpf_ext_init_hook_rundown(rundown); Exit: NET_EBPF_EXT_RETURN_NTSTATUS(status); @@ -95,10 +107,11 @@ _ebpf_ext_attach_init_rundown(net_ebpf_extension_hook_client_t* hook_client) * */ static void -_ebpf_ext_attach_wait_for_rundown(_Inout_ net_ebpf_ext_hook_rundown_t* rundown) +_ebpf_ext_wait_for_rundown(_Inout_ net_ebpf_ext_hook_rundown_t* rundown) { NET_EBPF_EXT_LOG_ENTRY(); + ASSERT(rundown->rundown_initialized == TRUE); ExWaitForRundownProtectionRelease(&rundown->protection); rundown->rundown_occurred = TRUE; @@ -138,7 +151,7 @@ _net_ebpf_extension_detach_client_completion(_In_ DEVICE_OBJECT* device_object, // Issue: https://github.com/microsoft/ebpf-for-windows/issues/1854 // Wait for any in progress callbacks to complete. - _ebpf_ext_attach_wait_for_rundown(&hook_client->rundown); + _ebpf_ext_wait_for_rundown(&hook_client->rundown); IoFreeWorkItem(work_item); @@ -148,26 +161,42 @@ _net_ebpf_extension_detach_client_completion(_In_ DEVICE_OBJECT* device_object, NET_EBPF_EXT_LOG_EXIT(); } +_Must_inspect_result_ bool +_net_ebpf_ext_enter_rundown(_Inout_ net_ebpf_ext_hook_rundown_t* rundown) +{ + ASSERT(rundown->rundown_initialized == TRUE); + return ExAcquireRundownProtection(&rundown->protection); +} + +void +_net_ebpf_ext_leave_rundown(_Inout_ net_ebpf_ext_hook_rundown_t* rundown) +{ + ASSERT(rundown->rundown_initialized == TRUE); + ExReleaseRundownProtection(&rundown->protection); +} + _Must_inspect_result_ bool net_ebpf_extension_hook_client_enter_rundown(_Inout_ net_ebpf_extension_hook_client_t* hook_client) { - net_ebpf_ext_hook_rundown_t* rundown = &hook_client->rundown; - bool status = ExAcquireRundownProtection(&rundown->protection); - return status; + return _net_ebpf_ext_enter_rundown(&hook_client->rundown); } void net_ebpf_extension_hook_client_leave_rundown(_Inout_ net_ebpf_extension_hook_client_t* hook_client) { - net_ebpf_ext_hook_rundown_t* rundown = &hook_client->rundown; - ExReleaseRundownProtection(&rundown->protection); + _net_ebpf_ext_leave_rundown(&hook_client->rundown); +} + +_Must_inspect_result_ bool +net_ebpf_extension_hook_provider_enter_rundown(_Inout_ net_ebpf_extension_hook_provider_t* provider_context) +{ + return _net_ebpf_ext_enter_rundown(&provider_context->rundown); } void net_ebpf_extension_hook_provider_leave_rundown(_Inout_ net_ebpf_extension_hook_provider_t* provider_context) { - net_ebpf_ext_hook_rundown_t* rundown = &provider_context->rundown; - ExReleaseRundownProtection(&rundown->protection); + _net_ebpf_ext_leave_rundown(&provider_context->rundown); } const ebpf_extension_data_t* @@ -547,7 +576,7 @@ _net_ebpf_extension_hook_provider_attach_client( // No matching filter context found. Need to create a new filter context. // Acquire rundown reference on provider context. This will be released when the filter context is deleted. - rundown_acquired = ExAcquireRundownProtection(&local_provider_context->rundown.protection); + rundown_acquired = net_ebpf_extension_hook_provider_enter_rundown(local_provider_context); if (!rundown_acquired) { NET_EBPF_EXT_LOG_MESSAGE( NET_EBPF_EXT_TRACELOG_LEVEL_ERROR, @@ -600,7 +629,7 @@ _net_ebpf_extension_hook_provider_attach_client( if (status != STATUS_SUCCESS) { if (rundown_acquired) { - ExReleaseRundownProtection(&local_provider_context->rundown.protection); + net_ebpf_extension_hook_provider_leave_rundown(local_provider_context); } } @@ -615,10 +644,6 @@ _Requires_exclusive_lock_held_(provider_context->lock) static void _net_ebpf_ext // Remove the list entry from the provider's list of filter contexts. RemoveEntryList(&filter_context->link); - // Insert the list entry to the list of zombie filter contexts. - ACQUIRE_PUSH_LOCK_EXCLUSIVE(&provider_context->zombie_list_lock); - InsertTailList(&provider_context->zombie_filter_context_list, &filter_context->link); - RELEASE_PUSH_LOCK_EXCLUSIVE(&provider_context->zombie_list_lock); // Release the filter context. provider_context->dispatch.delete_filter_context(filter_context); @@ -716,7 +741,7 @@ net_ebpf_extension_hook_provider_unregister( } // Wait for rundown reference to become 0. This will ensure all filter contexts, hence all // filter are cleaned up. - _ebpf_ext_attach_wait_for_rundown(&provider_context->rundown); + _ebpf_ext_wait_for_rundown(&provider_context->rundown); ExFreePool(provider_context); } NET_EBPF_EXT_LOG_EXIT(); @@ -735,6 +760,9 @@ net_ebpf_extension_hook_provider_register( NPI_PROVIDER_CHARACTERISTICS* characteristics; NET_EBPF_EXT_LOG_ENTRY(); + + *provider_context = NULL; + local_provider_context = (net_ebpf_extension_hook_provider_t*)ExAllocatePoolUninitialized( NonPagedPoolNx, sizeof(net_ebpf_extension_hook_provider_t), NET_EBPF_EXTENSION_POOL_TAG); NET_EBPF_EXT_BAIL_ON_ALLOC_FAILURE_STATUS( @@ -743,8 +771,7 @@ net_ebpf_extension_hook_provider_register( memset(local_provider_context, 0, sizeof(net_ebpf_extension_hook_provider_t)); ExInitializePushLock(&local_provider_context->lock); InitializeListHead(&local_provider_context->filter_context_list); - ExInitializePushLock(&local_provider_context->zombie_list_lock); - InitializeListHead(&local_provider_context->zombie_filter_context_list); + _ebpf_ext_init_hook_rundown(&local_provider_context->rundown); characteristics = &local_provider_context->characteristics; characteristics->Length = sizeof(NPI_PROVIDER_CHARACTERISTICS); @@ -771,10 +798,6 @@ net_ebpf_extension_hook_provider_register( goto Exit; } - // Initialize rundown protection for the provider context. - ExInitializeRundownProtection(&local_provider_context->rundown.protection); - local_provider_context->rundown.rundown_occurred = FALSE; - *provider_context = local_provider_context; local_provider_context = NULL; @@ -785,15 +808,3 @@ net_ebpf_extension_hook_provider_register( NET_EBPF_EXT_RETURN_NTSTATUS(status); } - -void -net_ebpf_extension_hook_provider_remove_filter_context_from_zombie_list( - _Inout_ net_ebpf_extension_wfp_filter_context_t* filter_context) -{ - net_ebpf_extension_hook_provider_t* local_provider_context = - (net_ebpf_extension_hook_provider_t*)filter_context->provider_context; - ASSERT(local_provider_context != NULL); - ACQUIRE_PUSH_LOCK_EXCLUSIVE(&local_provider_context->zombie_list_lock); - RemoveEntryList(&filter_context->link); - RELEASE_PUSH_LOCK_EXCLUSIVE(&local_provider_context->zombie_list_lock); -} diff --git a/netebpfext/net_ebpf_ext_hook_provider.h b/netebpfext/net_ebpf_ext_hook_provider.h index 9dd6a63dec..2319d51db5 100644 --- a/netebpfext/net_ebpf_ext_hook_provider.h +++ b/netebpfext/net_ebpf_ext_hook_provider.h @@ -208,12 +208,3 @@ net_ebpf_extension_hook_expand_stack_and_invoke_programs( */ net_ebpf_extension_hook_attach_capability_t net_ebpf_extension_hook_provider_get_attach_capability(_In_ const net_ebpf_extension_hook_provider_t* provider_context); - -/** - * @brief Remove the filter context from the zombie list. - * - * @param filter_context Filter context to remove from the zombie list. - */ -void -net_ebpf_extension_hook_provider_remove_filter_context_from_zombie_list( - _Inout_ net_ebpf_extension_wfp_filter_context_t* filter_context);
diff --git a/scripts/execute_ebpf_cicd_tests.ps1 b/scripts/execute_ebpf_cicd_tests.ps1 index 396072e2d2..535a0868c9 100644 --- a/scripts/execute_ebpf_cicd_tests.ps1 +++ b/scripts/execute_ebpf_cicd_tests.ps1 @@ -77,8 +77,10 @@ $Job = Start-Job -ScriptBlock { if ($_.CategoryInfo.Reason -eq "TimeoutException") { Generate-KernelDumpOnVM($TestVMName) } - } + # Throw to ensure the job is marked as failed. + throw $_.Exception.Message + } Pop-Location } -ArgumentList ( diff --git a/scripts/run_driver_tests.psm1 b/scripts/run_driver_tests.psm1 index 6e0ff61e2f..ae5f7c2686 100644 --- a/scripts/run_driver_tests.psm1 +++ b/scripts/run_driver_tests.psm1 @@ -292,6 +292,7 @@ function Invoke-Test Write-Log "Test `"$TestName $TestArgs`" Passed" -ForegroundColor Green Write-Log "`n==============================`n" + } # Function to create a tuple with default values for Arguments and Timeout @@ -451,7 +452,7 @@ function Invoke-ConnectRedirectTest function Invoke-CICDStressTests { param([parameter(Mandatory = $true)][bool] $VerboseLogs, - [parameter(Mandatory = $false)][int] $TestHangTimeout = 3600, + [parameter(Mandatory = $false)][int] $TestHangTimeout = (60*60), [parameter(Mandatory = $false)][string] $UserModeDumpFolder = "C:\Dumps", [parameter(Mandatory = $false)][bool] $NeedKernelDump = $true, [parameter(Mandatory = $false)][bool] $RestartExtension = $false) diff --git a/tests/stress/km/stress_tests_km.cpp b/tests/stress/km/stress_tests_km.cpp index 53a9e00edd..1dcd622670 100644 --- a/tests/stress/km/stress_tests_km.cpp +++ b/tests/stress/km/stress_tests_km.cpp @@ -23,6 +23,69 @@ static const std::map<std::string, test_program_attributes> _test_program_info = BPF_PROG_TYPE_UNSPEC, EBPF_EXECUTION_ANY}}}; +// Structure to store bpf_object_ptr elements. A fixed-size table of these entries is shared between the 'creator', +// 'attacher' and the 'destroyer' threads. +struct object_table_entry +{ + std::unique_ptr<std::mutex> lock{nullptr}; + _Guarded_by_(lock) bool available{true}; + _Guarded_by_(lock) bpf_object_ptr object{nullptr}; + _Guarded_by_(lock) bool loaded{false}; + bool attach{false}; + + // The following fields are for debugging this test itself. + uint32_t index{0}; + uint32_t reuse_count{0}; + uint32_t tag{0}; +}; + +// Possible roles for each thread. A thread is assigned a specific role at creation and it does not change thereafter. +// +// 'Creator' threads create as many ebpf program objects as they can, gated by the size of the object_table array. +// +// The 'Attacher' threads will alternatively 'attach' or 'detach' the program objects created by the 'Creator' threads +// w/o considering if the objects have already been attached or detached. Any errors returned by the ebpfapi are +// ignored. +// +// 'Destroyer' threads close as many 'opened' eBPF program objects as then can. These threads synchronize access to +// the object table entries with the 'Creator' and 'Attacher' threads as the destroyer threads can only destroy program +// objects that were created by the creator threads in the first place. +// +// The intent here is to cause the maximum nondeterministic multi-threaded stress scenarios as possible. Note that we +// do not care about user mode failures in, or errors returned from, ebpfapi and focus only on exercing the in-kernel +// eBPF components' ability to deal with such situations w/o causing a kernel hang or crash. The primary test goal here +// is to ensure that such races do not cause hangs or crashes in the in-kernel eBPF sub-system components +// (ebpfcore, netebpfext drivers). + +enum class thread_role_type : uint32_t +{ + ROLE_NOT_SET = 0, + CREATOR, + ATTACHER, + DESTROYER, + MONITOR_IPV4, + MONITOR_IPV6 +}; + +// Context for each test thread. This is a superset and field usage varies by test. +struct thread_context +{ + std::string program_name{}; + std::string file_name{}; + bool is_native_program{}; + std::string map_name{}; + thread_role_type role{}; + uint32_t thread_index{}; + uint32_t compartment_id{}; + uint32_t duration_minutes{}; + bool extension_restart_enabled{}; + fd_t map_fd; + fd_t program_fd; + std::vector<object_table_entry>& object_table; + std::string extension_name{}; + bool succeeded{true}; +}; + // This call is called by the common test initialization code to get a list of programs supported by the user mode // or kernel mode test suites. (For example, some programs could be meant for kernel mode stress testing only.) const std::vector<std::string> @@ -62,7 +125,7 @@ _km_test_init() _global_test_control_info.programs.begin(), _global_test_control_info.programs.end(), program) == _global_test_control_info.programs.end()) { - LOG_INFO("ERROR: Uexpected program: {}", program); + LOG_ERROR("ERROR: Uexpected program: {}", program); REQUIRE(0); } } @@ -165,7 +228,10 @@ _restart_extension(const std::string& extension_name, uint32_t timeout) SC_HANDLE scm_handle = nullptr; SC_HANDLE service_handle = nullptr; - REQUIRE(extension_name.size() != 0); + if (extension_name.size() == 0) { + LOG_ERROR("FATAL ERROR: Extension name is empty."); + return false; + } // Get a handle to the SCM database. scm_handle = OpenSCManager(nullptr, nullptr, SC_MANAGER_ALL_ACCESS); @@ -211,7 +277,10 @@ _restart_extension(const std::string& extension_name, uint32_t timeout) static std::thread _start_extension_restart_thread( - const std::string& extension_name, uint32_t restart_delay_ms, uint32_t thread_lifetime_minutes) + thread_context& context, + const std::string& extension_name, + uint32_t restart_delay_ms, + uint32_t thread_lifetime_minutes) { return std::thread( [&](uint32_t local_restart_delay_ms, uint32_t local_thread_lifetime_minutes) { @@ -235,7 +304,8 @@ _start_extension_restart_thread( constexpr uint32_t RESTART_TIMEOUT_SECONDS = 10; LOG_VERBOSE("Toggling extension state for {} extension...", extension_name); if (!_restart_extension(extension_name, RESTART_TIMEOUT_SECONDS)) { - exit(-1); + LOG_ERROR("FATAL ERROR: Failed to restart extension: {}", extension_name); + context.succeeded = false; } LOG_VERBOSE( @@ -248,67 +318,6 @@ _start_extension_restart_thread( thread_lifetime_minutes); } -// Structure to store bpf_object_ptr elements. A fixed-size table of these entries is shared between the 'creator', -// 'attacher' and the 'destroyer' threads. -struct object_table_entry -{ - std::unique_ptr<std::mutex> lock{nullptr}; - _Guarded_by_(lock) bool available { true }; - _Guarded_by_(lock) bpf_object_ptr object { nullptr }; - _Guarded_by_(lock) bool loaded { false }; - bool attach{false}; - - // The following fields are for debugging this test itself. - uint32_t index{0}; - uint32_t reuse_count{0}; - uint32_t tag{0}; -}; - -// Possible roles for each thread. A thread is assigned a specific role at creation and it does not change thereafter. -// -// 'Creator' threads create as many ebpf program objects as they can, gated by the size of the object_table array. -// -// The 'Attacher' threads will alternatively 'attach' or 'detach' the program objects created by the 'Creator' threads -// w/o considering if the objects have already been attached or detached. Any errors returned by the ebpfapi are -// ignored. -// -// 'Destroyer' threads close as many 'opened' eBPF program objects as then can. These threads synchronize access to -// the object table entries with the 'Creator' and 'Attacher' threads as the destroyer threads can only destroy program -// objects that were created by the creator threads in the first place. -// -// The intent here is to cause the maximum nondeterministic multi-threaded stress scenarios as possible. Note that we -// do not care about user mode failures in, or errors returned from, ebpfapi and focus only on exercing the in-kernel -// eBPF components' ability to deal with such situations w/o causing a kernel hang or crash. The primary test goal here -// is to ensure that such races do not cause hangs or crashes in the in-kernel eBPF sub-system components -// (ebpfcore, netebpfext drivers). - -enum class thread_role_type : uint32_t -{ - ROLE_NOT_SET = 0, - CREATOR, - ATTACHER, - DESTROYER, - MONITOR_IPV4, - MONITOR_IPV6 -}; - -// Context for each test thread. This is a superset and field usage varies by test. -struct thread_context -{ - std::string program_name{}; - std::string file_name{}; - bool is_native_program{}; - std::string map_name{}; - thread_role_type role{}; - uint32_t thread_index{}; - uint32_t compartment_id{}; - uint32_t duration_minutes{}; - bool extension_restart_enabled{}; - fd_t map_fd; - fd_t program_fd; - std::vector<object_table_entry>& object_table; -}; - static void _do_creator_work(thread_context& context, std::time_t endtime_seconds) { @@ -350,13 +359,13 @@ _do_creator_work(thread_context& context, std::time_t endtime_seconds) } LOG_ERROR( - "(CREATOR)[{}][{}] - FATAL ERROR: bpf_object__open() failed. errno: {}", + "(CREATOR)[{}][{}] - FATAL ERROR: bpf_object__open() failed for {}. errno: {}", context.thread_index, entry.index, + context.file_name.c_str(), errno); - // We can't use a REQUIRE here as it invokes the 'catch' handler below and gives a misleading - // error message. + context.succeeded = false; exit(-1); } @@ -379,10 +388,13 @@ _do_creator_work(thread_context& context, std::time_t endtime_seconds) // program objects if they don't exist in the first place, so there's no point in letting the test // continue execution. LOG_ERROR( - "(CREATOR)[{}][{}] - FATAL ERROR: Unexpected exception caught (bpf_object__open). errno: {}", + "(CREATOR)[{}][{}] - FATAL ERROR: Unexpected exception caught (bpf_object__open). file: {} " + "errno: {}", context.thread_index, entry.index, + context.file_name.c_str(), errno); + context.succeeded = false; exit(-1); } LOG_VERBOSE("(CREATOR)[{}][{}] - Object created.", context.thread_index, entry.index); @@ -418,16 +430,23 @@ _do_creator_work(thread_context& context, std::time_t endtime_seconds) if (!context.is_native_program) { LOG_ERROR( - "(CREATOR)[{}][{}] - FATAL ERROR: bpf_object__load() failed. result: {}, errno: {}", + "(CREATOR)[{}][{}] - FATAL ERROR: bpf_object__load() failed. result: {}, errno: {} " + "progname: {}", context.thread_index, entry.index, result, - errno); + errno, + context.file_name.c_str()); - // We can't use a REQUIRE here as it invokes the 'catch' handler below and gives a - // misleading error message. + context.succeeded = false; exit(-1); } + } else { + LOG_VERBOSE( + "(CREATOR)[{}][{}] - bpf_object__load() succeeded progname: {}", + context.thread_index, + entry.index, + context.file_name.c_str()); } } catch (...) { @@ -442,14 +461,21 @@ _do_creator_work(thread_context& context, std::time_t endtime_seconds) // program objects if they don't exist in the first place, so there's no point in letting the test // continue execution. LOG_ERROR( - "(CREATOR)[{}][{}] - FATAL ERROR: Unexpected exception caught (bpf_object__load). errno: {}", + "(CREATOR)[{}][{}] - FATAL ERROR: Unexpected exception caught (bpf_object__load). errno: {} " + "filename: {}", context.thread_index, entry.index, - errno); + errno, + context.file_name.c_str()); + context.succeeded = false; exit(-1); } entry.loaded = true; - LOG_VERBOSE("(CREATOR)[{}][{}] - Object loaded.", context.thread_index, entry.index); + LOG_VERBOSE( + "(CREATOR)[{}][{}][{}] - Object loaded.", + context.thread_index, + entry.index, + context.file_name.c_str()); } } } @@ -601,9 +627,12 @@ _test_thread_function(thread_context& context) _do_creator_work(context, endtime_seconds); } else if (context.role == thread_role_type::ATTACHER) { _do_attacher_work(context, endtime_seconds); - } else { - REQUIRE(context.role == thread_role_type::DESTROYER); + } else if (context.role == thread_role_type::DESTROYER) { _do_destroyer_work(context, endtime_seconds); + } else { + LOG_ERROR("FATAL ERROR: Unknown thread role: {}", (uint32_t)context.role); + context.succeeded = false; + exit(-1); } timenow = sc::now(); @@ -618,22 +647,124 @@ _test_thread_function(thread_context& context) context.thread_index); } -static _Must_inspect_result_ std::string -_make_unique_file_copy(const std::string& file_name, uint32_t token) +static std::string +_generate_random_string() +{ + size_t string_length = 10; + const std::string characters = "0123456789abcdefghijklmnopqrstuvwxyz"; + + std::string random_string; + random_string.reserve(string_length); + for (size_t i = 0; i < string_length; ++i) { + random_string += characters[rand() % characters.size()]; + } + + return random_string; +} + +static std::string +_get_unique_file_name(const std::string& file_name) { // Generate the new (unique) file name. std::filesystem::path file_spec = file_name; - std::string new_file_name = file_spec.stem().string(); - new_file_name += (std::to_string(token) + file_spec.extension().string()); - REQUIRE(new_file_name.size() != file_name.size()); + return (file_spec.stem().string() + "_" + _generate_random_string() + file_spec.extension().string()); +} + +static _Must_inspect_result_ std::string +_make_unique_file_copy(const std::string& file_name) +{ + uint32_t max_retries = 10; + while (max_retries--) { + try { + std::string new_file_name = _get_unique_file_name(file_name); + bool result = + std::filesystem::copy_file(file_name, new_file_name, std::filesystem::copy_options::overwrite_existing); + if (result) { + LOG_VERBOSE("Copied {} to {}", file_name, new_file_name); + return new_file_name; + } else { + LOG_ERROR("Failed to copy {} to {}", file_name, new_file_name); + if (max_retries == 0) { + LOG_ERROR("Max retries exceeded."); + break; + } + } + } catch (...) { + LOG_ERROR("Exception caught while copying {} to a unique file name.", file_name); + if (max_retries == 0) { + LOG_ERROR("Max retries exceeded."); + break; + } + } + } + + LOG_ERROR("Failed to copy {} to a unique file name.", file_name); + REQUIRE(0); + return ""; +} + +static void +configure_extension_restart( + const test_control_info& test_control_info, + const std::vector<std::string>& extension_names, + std::vector<std::thread>& extension_restart_thread_table, + std::vector<thread_context>& extension_restart_thread_context_table, + std::vector<object_table_entry>& object_table) +{ + for (uint32_t i = 0; i < extension_names.size(); i++) { + thread_context context_entry = { + {}, {}, false, {}, thread_role_type::ROLE_NOT_SET, 0, 0, 0, false, 0, 0, object_table}; + context_entry.extension_name = extension_names[i]; + extension_restart_thread_context_table.emplace_back(std::move(context_entry)); + + extension_restart_thread_table.emplace_back(std::move(_start_extension_restart_thread( + std::ref(extension_restart_thread_context_table.back()), + extension_names[i], + test_control_info.extension_restart_delay_ms, + test_control_info.duration_minutes))); + } +} + +static void +wait_and_verify_test_threads( + const test_control_info& test_control_info, + std::vector<std::thread>& thread_table, + std::vector<thread_context>& thread_context_table, + std::vector<std::thread>& extension_restart_thread_table, + std::vector<thread_context>& extension_restart_thread_context_table) +{ + // Wait for all test threads + LOG_VERBOSE("waiting on {} test threads...", thread_table.size()); + for (auto& t : thread_table) { + t.join(); + } - // Make a copy. - LOG_VERBOSE("Copying {} to {}", file_name, new_file_name); - auto result = - std::filesystem::copy_file(file_name, new_file_name, std::filesystem::copy_options::overwrite_existing); - REQUIRE(result == true); + // Wait for all extension restart threads + if (test_control_info.extension_restart_enabled) { + LOG_VERBOSE("waiting on {} extension restart threads...", extension_restart_thread_table.size()); + for (auto& t : extension_restart_thread_table) { + t.join(); + } + } + + // Check if all test threads succeeded. + for (const auto& context : thread_context_table) { + if (!context.succeeded) { + LOG_ERROR( + "FATAL ERROR: Test thread failed. role: {}, index: {}", (uint32_t)context.role, context.thread_index); + REQUIRE(context.succeeded == true); + } + } - return new_file_name; + // Check if all extension restart threads succeeded. + if (test_control_info.extension_restart_enabled) { + for (const auto& context : extension_restart_thread_context_table) { + if (!context.succeeded) { + LOG_ERROR("FATAL ERROR: Extension restart thread failed. Extension: {},", context.extension_name); + REQUIRE(context.succeeded == true); + } + } + } } static void @@ -658,7 +789,9 @@ _mt_prog_load_stress_test(ebpf_execution_type_t program_type, const test_control std::vector<std::thread> test_thread_table(total_threads); // Another table for the 'extension restart' threads (1 thread per program). - std::vector<std::thread> extension_restart_thread_table{}; + std::vector<std::string> extension_names; + std::vector<std::thread> extension_restart_thread_table; + std::vector<thread_context> extension_restart_thread_context_table; // An incrementing 'compartment Id' to ensure that _each_ 'Attacher' thread gets a unique compartment id. uint32_t compartment_id{1}; @@ -685,8 +818,7 @@ _mt_prog_load_stress_test(ebpf_execution_type_t program_type, const test_control if (test_control_info.use_unique_native_programs && context_entry.role == thread_role_type::CREATOR) { // Create unique native programs for 'creator' threads only. - context_entry.file_name = - _make_unique_file_copy(program_attribs.native_file_name, (compartment_id - 1)); + context_entry.file_name = _make_unique_file_copy(program_attribs.native_file_name); } else { // Use the same file name for all 'creator' threads @@ -708,27 +840,24 @@ _mt_prog_load_stress_test(ebpf_execution_type_t program_type, const test_control } // If requested, start the 'extension stop-and-restart' thread for extension for this program type. - if (test_control_info.extension_restart_enabled) { - auto restart_thread = _start_extension_restart_thread( - std::ref(program_attribs.extension_name), - test_control_info.extension_restart_delay_ms, - test_control_info.duration_minutes); - extension_restart_thread_table.push_back(std::move(restart_thread)); - } - } - - // Wait for threads to terminate. - LOG_INFO("waiting on {} test threads...", test_thread_table.size()); - for (auto& t : test_thread_table) { - t.join(); + extension_names.push_back(program_attribs.extension_name); } if (test_control_info.extension_restart_enabled) { - LOG_INFO("waiting on {} extension restart threads...", extension_restart_thread_table.size()); - for (auto& t : extension_restart_thread_table) { - t.join(); - } + configure_extension_restart( + test_control_info, + extension_names, + extension_restart_thread_table, + extension_restart_thread_context_table, + object_table); } + + wait_and_verify_test_threads( + test_control_info, + test_thread_table, + thread_context_table, + extension_restart_thread_table, + extension_restart_thread_context_table); } enum class program_map_usage : uint32_t @@ -738,10 +867,12 @@ enum class program_map_usage : uint32_t }; static std::pair<bpf_object_ptr, fd_t> -_load_attach_program(const std::string& file_name, enum bpf_attach_type attach_type, uint32_t thread_index) +_load_attach_program(thread_context& context, enum bpf_attach_type attach_type) { bpf_object_ptr object_ptr; bpf_object* object_raw_ptr = nullptr; + const std::string& file_name = context.file_name; + const uint32_t thread_index = context.thread_index; // Get the 'object' ptr for the program associated with this thread. object_raw_ptr = bpf_object__open(file_name.c_str()); @@ -752,7 +883,8 @@ _load_attach_program(const std::string& file_name, enum bpf_attach_type attach_t thread_index, file_name.c_str(), errno); - REQUIRE(object_raw_ptr != nullptr); + context.succeeded = false; + return {}; } LOG_VERBOSE("{}({}) Opened file:{}", __func__, thread_index, file_name.c_str()); @@ -760,12 +892,14 @@ _load_attach_program(const std::string& file_name, enum bpf_attach_type attach_t auto result = bpf_object__load(object_raw_ptr); if (result != 0) { LOG_ERROR( - "{}({}) FATAL ERROR: bpf_object__load({}) failed. errno:{}", + "{}({}) FATAL ERROR: bpf_object__load({}) failed. result:{}, errno:{}", __func__, thread_index, file_name.c_str(), + result, errno); - REQUIRE(result == 0); + context.succeeded = false; + return {}; } object_ptr.reset(object_raw_ptr); LOG_VERBOSE("{}({}) loaded file:{}", __func__, thread_index, file_name.c_str()); @@ -779,7 +913,8 @@ _load_attach_program(const std::string& file_name, enum bpf_attach_type attach_t thread_index, file_name.c_str(), errno); - REQUIRE(program != nullptr); + context.succeeded = false; + return {}; } LOG_VERBOSE( "{}({}) Found program object for program:{}, file_name:{}", @@ -798,7 +933,8 @@ _load_attach_program(const std::string& file_name, enum bpf_attach_type attach_t file_name.c_str(), program->program_name, errno); - REQUIRE(program_fd >= 0); + context.succeeded = false; + return {}; } LOG_VERBOSE( "{}({}) Opened fd:{}, for program:{}, file_name:{}", @@ -819,7 +955,8 @@ _load_attach_program(const std::string& file_name, enum bpf_attach_type attach_t file_name.c_str(), program->program_name, errno); - REQUIRE(result == 0); + context.succeeded = false; + return {}; } LOG_VERBOSE( "{}({}) Attached program:{}, file_name:{}", __func__, thread_index, program->program_name, file_name.c_str()); @@ -832,7 +969,11 @@ _prep_program(thread_context& context, program_map_usage map_usage) { enum bpf_attach_type attach_type = context.role == thread_role_type::MONITOR_IPV4 ? BPF_CGROUP_INET4_CONNECT : BPF_CGROUP_INET6_CONNECT; - auto [program_object, program_fd] = _load_attach_program(context.file_name, attach_type, context.thread_index); + auto [program_object, program_fd] = _load_attach_program(context, attach_type); + if (context.succeeded == false) { + LOG_ERROR("{}({}) - FATAL ERROR: _load_attach_program() failed.", __func__, context.thread_index); + exit(-1); + } // Stash the object pointer as we'll need it at 'close' time. auto& entry = context.object_table[context.thread_index]; @@ -840,10 +981,9 @@ _prep_program(thread_context& context, program_map_usage map_usage) context.program_fd = program_fd; if (map_usage == program_map_usage::USE_MAP) { - // Get the map fd for the map for this program. - auto map_fd = bpf_object__find_map_fd_by_name(entry.object.get(), context.map_name.c_str()); - if (map_fd < 0) { + context.map_fd = bpf_object__find_map_fd_by_name(entry.object.get(), context.map_name.c_str()); + if (context.map_fd < 0) { LOG_ERROR( "{}({}) FATAL ERROR: bpf_object__find_map_fd_by_name({}) failed. file_name:{}, errno:{}", __func__, @@ -851,16 +991,16 @@ _prep_program(thread_context& context, program_map_usage map_usage) context.map_name.c_str(), context.file_name.c_str(), errno); - REQUIRE(map_fd >= 0); + context.succeeded = false; + exit(-1); } LOG_VERBOSE( "{}({}) Opened fd:{} for map:{}, file_name:{}", __func__, context.thread_index, - map_fd, + context.map_fd, context.map_name.c_str(), context.file_name.c_str()); - context.map_fd = map_fd; } } @@ -868,6 +1008,10 @@ void _invoke_test_thread_function(thread_context& context) { _prep_program(context, program_map_usage::USE_MAP); + if (context.succeeded == false) { + LOG_ERROR("{}({}) - FATAL ERROR: _prep_program() failed.", __func__, context.thread_index); + exit(-1); + } SOCKET socket_handle; SOCKADDR_STORAGE remote_endpoint{}; @@ -878,7 +1022,27 @@ _invoke_test_thread_function(thread_context& context) socket_handle = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP); remote_endpoint.ss_family = AF_INET6; } - REQUIRE(socket_handle != INVALID_SOCKET); + if (socket_handle == INVALID_SOCKET) { + LOG_ERROR("{}({}) - FATAL ERROR: socket() failed. errno:{}", __func__, context.thread_index, WSAGetLastError()); + context.succeeded = false; + exit(-1); + } + + // Set the timeout for connect attempts + timeval timeout; + timeout.tv_sec = 5; // 5 seconds + timeout.tv_usec = 0; + if (setsockopt(socket_handle, SOL_SOCKET, SO_RCVTIMEO, (const char*)&timeout, sizeof(timeout)) < 0) { + LOG_ERROR("{}({}) - ERROR: setsockopt() failed. errno:{}", __func__, context.thread_index, WSAGetLastError()); + context.succeeded = false; + exit(-1); + } + if (setsockopt(socket_handle, SOL_SOCKET, SO_SNDTIMEO, (const char*)&timeout, sizeof(timeout)) < 0) { + LOG_ERROR("{}({}) - ERROR: setsockopt() failed. errno:{}", __func__, context.thread_index, WSAGetLastError()); + context.succeeded = false; + exit(-1); + } + INETADDR_SETLOOPBACK(reinterpret_cast<PSOCKADDR>(&remote_endpoint)); constexpr uint16_t remote_port = SOCKET_TEST_PORT; (reinterpret_cast<PSOCKADDR_IN>(&remote_endpoint))->sin_port = htons(remote_port); @@ -892,13 +1056,24 @@ _invoke_test_thread_function(thread_context& context) // attempts as the program will not be invoked for connect attempts made while the extension is restarting. using sc = std::chrono::steady_clock; auto endtime = sc::now() + std::chrono::minutes(context.duration_minutes); + bool first_map_lookup = true; while (sc::now() < endtime) { uint16_t key = remote_port; uint64_t start_count = 0; + // Map lookup before the program invocation may fail if the program has not inserted the map entry yet. auto result = bpf_map_lookup_elem(context.map_fd, &key, &start_count); - if (start_count) { - REQUIRE(result == 0); + if (first_map_lookup) { + first_map_lookup = false; + } else if (result != 0) { + LOG_ERROR( + "{}({}) - FATAL ERROR: bpf_map_lookup_elem() failed for fd {} before connect. errno:{}", + __func__, + context.thread_index, + context.map_fd, + errno); + context.succeeded = false; + exit(-1); } constexpr uint32_t BURST_SIZE = 8192; @@ -909,14 +1084,36 @@ _invoke_test_thread_function(thread_context& context) socket_handle, reinterpret_cast<SOCKADDR*>(&remote_endpoint), static_cast<int>(sizeof(remote_endpoint))); + + if (sc::now() >= endtime) { + break; + } } uint64_t end_count = 0; result = bpf_map_lookup_elem(context.map_fd, &key, &end_count); - REQUIRE(result == 0); + if (result != 0) { + LOG_ERROR( + "{}({}) - FATAL ERROR: bpf_map_lookup_elem() failed for fd {} after connect. errno:{}", + __func__, + context.thread_index, + context.map_fd, + errno); + context.succeeded = false; + exit(-1); + } LOG_VERBOSE( "{}({}) connect start_count:{}, end_count:{}", __func__, context.thread_index, start_count, end_count); - REQUIRE(end_count > start_count); + if (end_count <= start_count) { + LOG_ERROR( + "{}({}) - FATAL ERROR: connect count mismatched. start_count:{}, end_count:{}", + __func__, + context.thread_index, + start_count, + end_count); + context.succeeded = false; + exit(-1); + } start_count = end_count; } } @@ -945,12 +1142,11 @@ _mt_invoke_prog_stress_test(ebpf_execution_type_t program_type, const test_contr std::vector<std::thread> test_thread_table(total_threads); std::vector<std::pair<std::string, std::string>> program_file_map_names = { - {{"cgroup_count_connect4.sys"}, {"connect4_count_map"}}, - {{"cgroup_count_connect6.sys"}, {"connect6_count_map"}}}; + {{_make_unique_file_copy("cgroup_count_connect4.sys")}, {"connect4_count_map"}}, + {{_make_unique_file_copy("cgroup_count_connect6.sys")}, {"connect6_count_map"}}}; ASSERT(program_file_map_names.size() == MAX_TCP_CONNECT_PROGRAMS); for (uint32_t i = 0; i < total_threads; i++) { - // First, prepare the context for this thread. auto& context_entry = thread_context_table[i]; auto& [file_name, map_name] = program_file_map_names[i]; @@ -968,29 +1164,25 @@ _mt_invoke_prog_stress_test(ebpf_execution_type_t program_type, const test_contr thread_entry = std::move(std::thread(_invoke_test_thread_function, std::ref(context_entry))); } - // Another table for the 'extension restart' threads. - std::vector<std::thread> extension_restart_thread_table{}; - // If requested, start the 'extension stop-and-restart' thread for extension for this program type. - std::string extension_name = {"netebpfext"}; + std::vector<std::string> extension_names = {"netebpfext"}; + std::vector<std::thread> extension_restart_thread_table; + std::vector<thread_context> extension_restart_thread_context_table; if (test_control_info.extension_restart_enabled) { - auto restart_thread = _start_extension_restart_thread( - std::ref(extension_name), test_control_info.extension_restart_delay_ms, test_control_info.duration_minutes); - extension_restart_thread_table.push_back(std::move(restart_thread)); + configure_extension_restart( + test_control_info, + extension_names, + extension_restart_thread_table, + extension_restart_thread_context_table, + object_table); } - // Wait for threads to terminate. - LOG_INFO("waiting on {} test threads...", test_thread_table.size()); - for (auto& t : test_thread_table) { - t.join(); - } - - if (test_control_info.extension_restart_enabled) { - LOG_INFO("waiting on {} extension restart threads...", extension_restart_thread_table.size()); - for (auto& t : extension_restart_thread_table) { - t.join(); - } - } + wait_and_verify_test_threads( + test_control_info, + test_thread_table, + thread_context_table, + extension_restart_thread_table, + extension_restart_thread_context_table); } static void @@ -1006,7 +1198,11 @@ _invoke_mt_sockaddr_thread_function(thread_context& context) socket_handle = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP); remote_endpoint.ss_family = AF_INET6; } - REQUIRE(socket_handle != INVALID_SOCKET); + if (socket_handle == INVALID_SOCKET) { + LOG_ERROR("{}({}) - FATAL ERROR: socket() failed. errno:{}", __func__, context.thread_index, WSAGetLastError()); + context.succeeded = false; + exit(-1); + } INETADDR_SETLOOPBACK(reinterpret_cast<PSOCKADDR>(&remote_endpoint)); uint16_t remote_port = SOCKET_TEST_PORT + static_cast<uint16_t>(context.thread_index); (reinterpret_cast<PSOCKADDR_IN>(&remote_endpoint))->sin_port = htons(remote_port); @@ -1042,10 +1238,13 @@ _mt_sockaddr_invoke_program_test(const test_control_info& test_control_info) auto error = WSAStartup(MAKEWORD(2, 2), &data); REQUIRE(error == 0); - auto [program_object, _] = _load_attach_program({"cgroup_mt_connect6.sys"}, BPF_CGROUP_INET6_CONNECT, 0); - - // Not used, needed for thread_context initialization. std::vector<object_table_entry> dummy_table(1); + thread_context program_load_context = { + {}, {}, false, {}, thread_role_type::ROLE_NOT_SET, 0, 0, 0, false, 0, 0, dummy_table}; + program_load_context.file_name = _make_unique_file_copy("cgroup_mt_connect6.sys"); + program_load_context.thread_index = 0; + auto [program_object, _] = _load_attach_program(program_load_context, BPF_CGROUP_INET6_CONNECT); + REQUIRE(program_load_context.succeeded == true); size_t total_threads = test_control_info.threads_count; std::vector<thread_context> thread_context_table( @@ -1067,28 +1266,25 @@ _mt_sockaddr_invoke_program_test(const test_control_info& test_control_info) } // Another table for the 'extension restart' threads. + std::vector<std::string> extension_names = {"netebpfext"}; std::vector<std::thread> extension_restart_thread_table{}; + std::vector<thread_context> extension_restart_thread_context_table{}; - // If requested, start the 'extension stop-and-restart' thread for extension for this program type. - std::string extension_name = {"netebpfext"}; if (test_control_info.extension_restart_enabled) { - auto restart_thread = _start_extension_restart_thread( - std::ref(extension_name), test_control_info.extension_restart_delay_ms, test_control_info.duration_minutes); - extension_restart_thread_table.push_back(std::move(restart_thread)); + configure_extension_restart( + test_control_info, + extension_names, + extension_restart_thread_table, + extension_restart_thread_context_table, + dummy_table); } - // Wait for threads to terminate. - LOG_INFO("waiting on {} test threads...", test_thread_table.size()); - for (auto& t : test_thread_table) { - t.join(); - } - - if (test_control_info.extension_restart_enabled) { - LOG_INFO("waiting on {} extension restart threads...", extension_restart_thread_table.size()); - for (auto& t : extension_restart_thread_table) { - t.join(); - } - } + wait_and_verify_test_threads( + test_control_info, + test_thread_table, + thread_context_table, + extension_restart_thread_table, + extension_restart_thread_context_table); } static void @@ -1187,7 +1383,11 @@ _invoke_mt_bindmonitor_tail_call_thread_function(thread_context& context) for (uint32_t i = 0; i < BURST_SIZE; i++) { // Create a socket. socket_handle = WSASocket(remote_endpoint.ss_family, SOCK_STREAM, IPPROTO_TCP, nullptr, 0, 0); - REQUIRE(socket_handle != INVALID_SOCKET); + if (socket_handle == INVALID_SOCKET) { + LOG_ERROR("Thread[{}] WSASocket() failed. errno:{}", context.thread_index, WSAGetLastError()); + context.succeeded = false; + exit(-1); + } INETADDR_SETANY(reinterpret_cast<PSOCKADDR>(&remote_endpoint)); SS_PORT(&remote_endpoint) = htons(remote_port); @@ -1204,7 +1404,8 @@ _invoke_mt_bindmonitor_tail_call_thread_function(thread_context& context) WSAGetLastError(), remote_port); closesocket(socket_handle); - REQUIRE(result == 0); + context.succeeded = false; + exit(-1); } // Bind the socket. @@ -1218,7 +1419,8 @@ _invoke_mt_bindmonitor_tail_call_thread_function(thread_context& context) WSAGetLastError(), remote_port); closesocket(socket_handle); - REQUIRE(result == 0); + context.succeeded = false; + exit(-1); } LOG_VERBOSE("Thread[{}] bind success to port:{}", context.thread_index, remote_port); @@ -1229,16 +1431,14 @@ _invoke_mt_bindmonitor_tail_call_thread_function(thread_context& context) } static std::pair<bpf_object_ptr, fd_t> -_load_attach_tail_program( - const std::string& file_name, - uint32_t thread_index, - ebpf_attach_type_t attach_type, - const std::string program_name, - bpf_prog_type program_type) +_load_attach_tail_program(thread_context& context, ebpf_attach_type_t attach_type, bpf_prog_type program_type) { bpf_object_ptr object_ptr; bpf_object* object_raw_ptr = nullptr; bpf_link* link = nullptr; + const std::string& file_name = context.file_name; + const std::string& program_name = context.program_name; + const uint32_t thread_index = context.thread_index; // Get the 'object' ptr for the program associated with this thread. object_raw_ptr = bpf_object__open(file_name.c_str()); @@ -1249,7 +1449,8 @@ _load_attach_tail_program( thread_index, file_name.c_str(), errno); - REQUIRE(object_raw_ptr != nullptr); + context.succeeded = false; + exit(-1); } LOG_VERBOSE("{}({}) Opened file:{}", __func__, thread_index, file_name.c_str()); @@ -1262,7 +1463,8 @@ _load_attach_tail_program( thread_index, file_name.c_str(), errno); - REQUIRE(result == 0); + context.succeeded = false; + exit(-1); } object_ptr.reset(object_raw_ptr); LOG_VERBOSE("{}({}) loaded file:{}", __func__, thread_index, file_name.c_str()); @@ -1276,7 +1478,8 @@ _load_attach_tail_program( thread_index, file_name.c_str(), errno); - REQUIRE(program != nullptr); + context.succeeded = false; + exit(-1); } LOG_VERBOSE( "{}({}) Found program object for program:{}, file_name:{}", @@ -1298,7 +1501,8 @@ _load_attach_tail_program( file_name.c_str(), program->program_name, errno); - REQUIRE(program_fd >= 0); + context.succeeded = false; + exit(-1); } LOG_VERBOSE( "{}({}) Opened fd:{}, for program:{}, file_name:{}", @@ -1317,7 +1521,8 @@ _load_attach_tail_program( file_name.c_str(), program->program_name, errno); - REQUIRE(result == ERROR_SUCCESS); + context.succeeded = false; + exit(-1); } LOG_VERBOSE( "{}({}) Attached program:{}, file_name:{}", __func__, thread_index, program->program_name, file_name.c_str()); @@ -1332,17 +1537,20 @@ _mt_bindmonitor_tail_call_invoke_program_test(const test_control_info& test_cont auto error = WSAStartup(MAKEWORD(2, 2), &data); REQUIRE(error == 0); - std::string file_name = "bindmonitor_mt_tailcall.sys"; - std::string map_name = "bind_tail_call_map"; - std::string program_name = "BindMonitor_Caller"; - bpf_prog_type program_type = BPF_PROG_TYPE_BIND; - // Load the program. + std::vector<object_table_entry> dummy_table(1); + thread_context program_load_context = { + {}, {}, false, {}, thread_role_type::ROLE_NOT_SET, 0, 0, 0, false, 0, 0, dummy_table}; + program_load_context.program_name = "BindMonitor_Caller"; + program_load_context.file_name = _make_unique_file_copy("bindmonitor_mt_tailcall.sys"); + program_load_context.map_name = "bind_tail_call_map"; + program_load_context.thread_index = 0; auto [program_object, _] = - _load_attach_tail_program(file_name, 0, EBPF_ATTACH_TYPE_BIND, program_name, program_type); + _load_attach_tail_program(program_load_context, EBPF_ATTACH_TYPE_BIND, BPF_PROG_TYPE_BIND); + REQUIRE(program_load_context.succeeded == true); // Set up the tail call programs. - _set_up_tailcall_program(program_object.get(), map_name); + _set_up_tailcall_program(program_object.get(), program_load_context.map_name); // Needed for thread_context initialization. constexpr uint32_t MAX_BIND_PROGRAM = 1; @@ -1379,34 +1587,30 @@ _mt_bindmonitor_tail_call_invoke_program_test(const test_control_info& test_cont std::move(std::thread(_invoke_mt_bindmonitor_tail_call_thread_function, std::ref(context_entry))); } - // Another table for the 'extension restart' threads. - std::vector<std::thread> extension_restart_thread_table{}; - // If requested, start the 'extension stop-and-restart' thread for extension for this program type. - std::string extension_name = {"netebpfext"}; + std::vector<std::string> extension_names = {"netebpfext"}; + std::vector<std::thread> extension_restart_thread_table; + std::vector<thread_context> extension_restart_thread_context_table; if (test_control_info.extension_restart_enabled) { - auto restart_thread = _start_extension_restart_thread( - std::ref(extension_name), test_control_info.extension_restart_delay_ms, test_control_info.duration_minutes); - extension_restart_thread_table.push_back(std::move(restart_thread)); + configure_extension_restart( + test_control_info, + extension_names, + extension_restart_thread_table, + extension_restart_thread_context_table, + object_table); } - // Wait for threads to terminate. - LOG_INFO("waiting on {} test threads...", test_thread_table.size()); - for (auto& t : test_thread_table) { - t.join(); - } - - if (test_control_info.extension_restart_enabled) { - LOG_INFO("waiting on {} extension restart threads...", extension_restart_thread_table.size()); - for (auto& t : extension_restart_thread_table) { - t.join(); - } - } + wait_and_verify_test_threads( + test_control_info, + test_thread_table, + thread_context_table, + extension_restart_thread_table, + extension_restart_thread_context_table); // Clean up Winsock. WSACleanup(); } -#endif +#endif // ENABLE_TAIL_CALL_STRESS_TEST TEST_CASE("jit_load_attach_detach_unload_random_v4_test", "[jit_mt_stress_test]") { @@ -1494,9 +1698,6 @@ TEST_CASE("native_invoke_v4_v6_programs_restart_extension_test", "[native_mt_str LOG_INFO("\nStarting test *** native_invoke_v4_v6_programs_restart_extension_test ***"); test_control_info local_test_control_info = _global_test_control_info; - // TODO: Bring this test in compliance with GH Issue #3223. Until then, disable extension restart for this test. - local_test_control_info.extension_restart_enabled = false; - // This test needs only 2 threads (one per program). local_test_control_info.threads_count = 2; @@ -1550,4 +1751,4 @@ TEST_CASE("bindmonitor_tail_call_invoke_program_test", "[native_mt_stress_test]" _print_test_control_info(local_test_control_info); _mt_bindmonitor_tail_call_invoke_program_test(local_test_control_info); } -#endif +#endif // ENABLE_TAIL_CALL_STRESS_TEST
Workflow failed - km_mt_stress_tests_restart_extension [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9336770229) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/05a71895566eac26a9032aac6426f58f6fa5b6de) Test name - `km_mt_stress_tests_restart_extension` Workflow failed - km_mt_stress_tests [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12722566338) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d3fd4407675b77993b3e4a2a7c96f983432d532e) Test name - `km_mt_stress_tests`
[Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9234035167) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/10fdbbce29cb3e4d29b264e7cb4813354264de7f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9544157177) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/197910d57b455db8756948f12eb40907b98d8e53) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9624031089) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8440c60ced5349482ab977edbc767722f721c893) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9692957249) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/4667783ba1ac04eec04abc4314490bb221cd3fd8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9730491421) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/4667783ba1ac04eec04abc4314490bb221cd3fd8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9817788110) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c3eac3776f77666c681003eda6a4e3051717f7b6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10004750424) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/f46db2bbc07827b20de8ccba33116600bb03f525) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10026773058) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d7942ba3dca4361da0cf118e3d7657ee8268e22a) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10055160667) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/2448139787f618901fa64b614d30a27aabb06cae) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10158568022) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6af442038c1c84a93068134d9aac39b0d8593518) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10176468941) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6af442038c1c84a93068134d9aac39b0d8593518) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10212213020) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0b4142d9d674c0dc1af214aeac102e2696d8d302) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10522233286) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6d6aad34514218c9d70aac8b4f93edd37c4735d8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10716420571) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c73a0864dd8dde9fdec7eee329ba561fc41f8681) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10734806358) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c73a0864dd8dde9fdec7eee329ba561fc41f8681) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10749865733) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/99c4e48856d53aaee6c10172ca0a5239fb306d7c) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10758271085) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0b23bae35d86c04a28fbb7de159856d7aea768d0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10769153812) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/be1e786c1c1256bfdb62f638cf6e2c074e69bed7) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10788384767) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6e8f47a7c00752470e27921cfb576978b3986de4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10807596842) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6e8f47a7c00752470e27921cfb576978b3986de4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10826764830) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0396def741cbe87a8edbdb14df1c1deb9ac015ed) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10845456054) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0396def741cbe87a8edbdb14df1c1deb9ac015ed) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10860833120) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/a41953dc623dd46d67c5863ea0de447410b35bb6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10869372916) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/a41953dc623dd46d67c5863ea0de447410b35bb6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10879892129) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/a41953dc623dd46d67c5863ea0de447410b35bb6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10899046389) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fda10838a4da5f25daa5b433f8b0dc003cf9a4f8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10918113767) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fda10838a4da5f25daa5b433f8b0dc003cf9a4f8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10936987992) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/edcb28cd62bfee7d78df666bf0af8eb550d301fa) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10955604827) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6ad1063766e58ced089f658f9e150a78e32d9fb1) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10970978957) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/462b8e3cab2390eb55aec81134c13ff87eb54bf0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10979511391) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/462b8e3cab2390eb55aec81134c13ff87eb54bf0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10990179768) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/adb31d9d77b997d98cd7db97c5c3d56ed0764e30) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11009659346) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d712e97fd7baf62b13b6270fbdf3a78c69038d93) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11028940869) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d712e97fd7baf62b13b6270fbdf3a78c69038d93) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11048183320) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d712e97fd7baf62b13b6270fbdf3a78c69038d93) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11066946946) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/292578ef73488c0ddae393bf0e4ae38a63988395) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11082353101) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/bc299ebb07b8fcfd913226873509cc44192bb1a4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11090986777) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/bc299ebb07b8fcfd913226873509cc44192bb1a4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11102026053) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/e1f4ce337c9e9cd0c064b6b84cedeaa623f58089) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11121239251) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/ee6ebaf5768373cf3d27dabb23b602232d5bdfc0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11140136719) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8743c34ab36aba305cd25603a1f3db0e3c65cc6e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11158259405) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/735ec5277f22b6e17613500ee35f5068728df1b8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11176355208) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/735ec5277f22b6e17613500ee35f5068728df1b8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11191674757) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8250e8e88f2ad662471262713d9e8718876be423) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11200202603) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8250e8e88f2ad662471262713d9e8718876be423) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11211304882) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8250e8e88f2ad662471262713d9e8718876be423) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11231241666) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/1c383d41054778a41fb492dd2b89bd8dc7b71502) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11250828887) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/ba3f95a18295f71bc2b512d9df960a4afc580417) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11269991969) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8fb3a7e307519ac172eb2b2ca72e00dfa4593534) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11288708479) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11304062344) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11312703982) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11323478330) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11341903145) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/55b387da55c03ee600fcb8789510df037b413fdd) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11361536266) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/55b387da55c03ee600fcb8789510df037b413fdd) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11380917936) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11399951513) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11415926253) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11424693827) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11435900401) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/14df17e1ce84108560619fdec944fd97c5415342) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11455945515) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/709cc9d8b50b84651776e4ada2c9f64b08e247ec) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11475730017) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/709cc9d8b50b84651776e4ada2c9f64b08e247ec) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11495210870) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/e5b27c3d12cb903607871d221c2c2f30bf59d80f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11514385668) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/e5b27c3d12cb903607871d221c2c2f30bf59d80f) Test name - `km_mt_stress_tests_restart_extension`
[Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9234035167) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/10fdbbce29cb3e4d29b264e7cb4813354264de7f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9544157177) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/197910d57b455db8756948f12eb40907b98d8e53) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9624031089) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8440c60ced5349482ab977edbc767722f721c893) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9692957249) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/4667783ba1ac04eec04abc4314490bb221cd3fd8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9730491421) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/4667783ba1ac04eec04abc4314490bb221cd3fd8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/9817788110) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c3eac3776f77666c681003eda6a4e3051717f7b6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10004750424) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/f46db2bbc07827b20de8ccba33116600bb03f525) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10026773058) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d7942ba3dca4361da0cf118e3d7657ee8268e22a) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10055160667) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/2448139787f618901fa64b614d30a27aabb06cae) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10158568022) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6af442038c1c84a93068134d9aac39b0d8593518) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10176468941) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6af442038c1c84a93068134d9aac39b0d8593518) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10212213020) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0b4142d9d674c0dc1af214aeac102e2696d8d302) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10522233286) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6d6aad34514218c9d70aac8b4f93edd37c4735d8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10716420571) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c73a0864dd8dde9fdec7eee329ba561fc41f8681) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10734806358) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c73a0864dd8dde9fdec7eee329ba561fc41f8681) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10749865733) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/99c4e48856d53aaee6c10172ca0a5239fb306d7c) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10758271085) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0b23bae35d86c04a28fbb7de159856d7aea768d0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10769153812) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/be1e786c1c1256bfdb62f638cf6e2c074e69bed7) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10788384767) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6e8f47a7c00752470e27921cfb576978b3986de4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10807596842) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6e8f47a7c00752470e27921cfb576978b3986de4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10826764830) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0396def741cbe87a8edbdb14df1c1deb9ac015ed) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10845456054) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/0396def741cbe87a8edbdb14df1c1deb9ac015ed) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10860833120) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/a41953dc623dd46d67c5863ea0de447410b35bb6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10869372916) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/a41953dc623dd46d67c5863ea0de447410b35bb6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10879892129) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/a41953dc623dd46d67c5863ea0de447410b35bb6) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10899046389) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fda10838a4da5f25daa5b433f8b0dc003cf9a4f8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10918113767) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fda10838a4da5f25daa5b433f8b0dc003cf9a4f8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10936987992) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/edcb28cd62bfee7d78df666bf0af8eb550d301fa) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10955604827) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/6ad1063766e58ced089f658f9e150a78e32d9fb1) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10970978957) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/462b8e3cab2390eb55aec81134c13ff87eb54bf0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10979511391) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/462b8e3cab2390eb55aec81134c13ff87eb54bf0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/10990179768) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/adb31d9d77b997d98cd7db97c5c3d56ed0764e30) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11009659346) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d712e97fd7baf62b13b6270fbdf3a78c69038d93) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11028940869) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d712e97fd7baf62b13b6270fbdf3a78c69038d93) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11048183320) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d712e97fd7baf62b13b6270fbdf3a78c69038d93) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11066946946) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/292578ef73488c0ddae393bf0e4ae38a63988395) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11082353101) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/bc299ebb07b8fcfd913226873509cc44192bb1a4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11090986777) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/bc299ebb07b8fcfd913226873509cc44192bb1a4) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11102026053) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/e1f4ce337c9e9cd0c064b6b84cedeaa623f58089) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11121239251) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/ee6ebaf5768373cf3d27dabb23b602232d5bdfc0) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11140136719) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8743c34ab36aba305cd25603a1f3db0e3c65cc6e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11158259405) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/735ec5277f22b6e17613500ee35f5068728df1b8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11176355208) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/735ec5277f22b6e17613500ee35f5068728df1b8) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11191674757) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8250e8e88f2ad662471262713d9e8718876be423) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11200202603) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8250e8e88f2ad662471262713d9e8718876be423) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11211304882) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8250e8e88f2ad662471262713d9e8718876be423) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11231241666) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/1c383d41054778a41fb492dd2b89bd8dc7b71502) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11250828887) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/ba3f95a18295f71bc2b512d9df960a4afc580417) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11269991969) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8fb3a7e307519ac172eb2b2ca72e00dfa4593534) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11288708479) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11304062344) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11312703982) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11323478330) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/811c06098341961c594f872c91bf37ef78609f5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11341903145) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/55b387da55c03ee600fcb8789510df037b413fdd) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11361536266) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/55b387da55c03ee600fcb8789510df037b413fdd) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11380917936) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11399951513) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11415926253) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11424693827) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/c7b9f105085841202a28bc191409589b22caf22e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11435900401) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/14df17e1ce84108560619fdec944fd97c5415342) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11455945515) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/709cc9d8b50b84651776e4ada2c9f64b08e247ec) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11475730017) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/709cc9d8b50b84651776e4ada2c9f64b08e247ec) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11495210870) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/e5b27c3d12cb903607871d221c2c2f30bf59d80f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/11514385668) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/e5b27c3d12cb903607871d221c2c2f30bf59d80f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12722566338) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d3fd4407675b77993b3e4a2a7c96f983432d532e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12731758342) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fad16491562d22ec15492f39dedc14dbed17454b) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12743022807) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fad16491562d22ec15492f39dedc14dbed17454b) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12763493002) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9d9003c39c3fd75be5225ac0fce30077d6bf0604) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12784034827) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d3329fd7040ed3b19a1585660ff84fcf35e81d4f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12804602886) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d3329fd7040ed3b19a1585660ff84fcf35e81d4f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12825096479) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/149cba7e873c4e683ae2a6885972a1e917485e6f) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12842294569) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/5f890b19ec605cf0507b19e2de0038e74b7fa463) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12851707536) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/24ec3199cc20e7b84d24a416c6f66cf95103c836) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12863603242) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12882613770) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12903845640) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12924855190) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12945695557) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12963231412) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12972794634) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/95267a53b26c68a94145d1731e2a4c8b546034c3) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12984558378) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/95267a53b26c68a94145d1731e2a4c8b546034c3) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13006101893) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/07beca58c13b056abce9ba0c991f7b5d0d2d0270) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13027025842) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/07beca58c13b056abce9ba0c991f7b5d0d2d0270) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13048070161) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8efc93b9baa0f348f5799b7550bb3f8449e343d2) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13068786740) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13086724202) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13096965669) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13109007739) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13130963506) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9510332b5d2e4f223cf93b1801dcda713954b19b) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13152871988) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/56662dbb2a6151cfd60e1eeafe01d8d4742b957e) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13174419242) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/30fdb1f81aa7d4eaceb26a72d72920aeac79bebb) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13195735600) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/29d9935ebb087bdb71c02ddf3023541d551f439d) Test name - `km_mt_stress_tests_restart_extension` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12731758342) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fad16491562d22ec15492f39dedc14dbed17454b) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12743022807) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/fad16491562d22ec15492f39dedc14dbed17454b) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12763493002) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9d9003c39c3fd75be5225ac0fce30077d6bf0604) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12784034827) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d3329fd7040ed3b19a1585660ff84fcf35e81d4f) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12804602886) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/d3329fd7040ed3b19a1585660ff84fcf35e81d4f) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12825096479) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/149cba7e873c4e683ae2a6885972a1e917485e6f) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12842294569) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/5f890b19ec605cf0507b19e2de0038e74b7fa463) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12851707536) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/24ec3199cc20e7b84d24a416c6f66cf95103c836) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12863603242) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12882613770) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12903845640) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12924855190) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12945695557) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12963231412) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/44f5de09ec0f3f7ad176c00a290c1cb7106cdd5e) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12972794634) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/95267a53b26c68a94145d1731e2a4c8b546034c3) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/12984558378) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/95267a53b26c68a94145d1731e2a4c8b546034c3) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13006101893) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/07beca58c13b056abce9ba0c991f7b5d0d2d0270) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13027025842) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/07beca58c13b056abce9ba0c991f7b5d0d2d0270) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13048070161) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/8efc93b9baa0f348f5799b7550bb3f8449e343d2) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13068786740) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13086724202) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13096965669) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13109007739) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9edeb98a449e7965731f814f23b720da103e7077) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13130963506) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/9510332b5d2e4f223cf93b1801dcda713954b19b) Test name - `km_mt_stress_tests` [Failed Run](https://github.com/microsoft/ebpf-for-windows/actions/runs/13152871988) [Codebase](https://github.com/microsoft/ebpf-for-windows/tree/56662dbb2a6151cfd60e1eeafe01d8d4742b957e) Test name - `km_mt_stress_tests`
[ "https://github.com/microsoft/ebpf-for-windows/commit/af0d832e4c1f4f98bcd9da90990bfa6dc31a83ae", "https://github.com/microsoft/ebpf-for-windows/commit/96433347ca595f762b80e14ec69c568204673d06", "https://github.com/microsoft/ebpf-for-windows/commit/af9445b434f9fed9c5bdda724e220d323361d7e8", "https://github.com/microsoft/ebpf-for-windows/commit/38fc99150ef39bd10c8bcf9394bb7446b08efd2c", "https://github.com/microsoft/ebpf-for-windows/commit/c737cd5d13dc5c921ba9ff9789b6fd103169ba53", "https://github.com/microsoft/ebpf-for-windows/commit/cfa353a6ee5775fcac84214004255f8b39482716", "https://github.com/microsoft/ebpf-for-windows/commit/6fc3a8630fcc1c5537ff6a25096ecd4c003e69ed", "https://github.com/microsoft/ebpf-for-windows/commit/b2066dc0e3f91e84aecf9c443a9b40775f32ebff", "https://github.com/microsoft/ebpf-for-windows/commit/4f09ecac28846914a8cdc53f567383e19d272e53", "https://github.com/microsoft/ebpf-for-windows/commit/9ebeea64aafd39303e8ce8392d5e632e162451da", "https://github.com/microsoft/ebpf-for-windows/commit/95dedbae83b97b451979c06723cbedef6d3a71e1", "https://github.com/microsoft/ebpf-for-windows/commit/ee89648b3d44516433306eeeba03fe5ccdea286a", "https://github.com/microsoft/ebpf-for-windows/commit/978dfcb1288fb739b98b00327adc2cbf27faafd5", "https://github.com/microsoft/ebpf-for-windows/commit/997d7a2df76a90d13cf8127fb5005585a8ef2833", "https://github.com/microsoft/ebpf-for-windows/commit/8ed8149645f28826075b8648af86f3c9e6350492", "https://github.com/microsoft/ebpf-for-windows/commit/0748b212f87dc04e16def427cee422a775f2ada8", "https://github.com/microsoft/ebpf-for-windows/commit/5c4022aae0f1c30b32c0cef5db3db2d3f41d6c3e", "https://github.com/microsoft/ebpf-for-windows/commit/3f32298aa6755d40be4a15037e28dd39ab172fc9", "https://github.com/microsoft/ebpf-for-windows/commit/18b20f78955cca64fe4b8332b4dc0971e94b09b7", "https://github.com/microsoft/ebpf-for-windows/commit/33b157f53d35452c66aad569ef592b9fc76c8cf0", "https://github.com/microsoft/ebpf-for-windows/commit/efda38e787c933068fce7a8210f6b1f404fc3cd4", "https://github.com/microsoft/ebpf-for-windows/commit/7c9621d095d41a8109e4d94091c56c40af273e50", "https://github.com/microsoft/ebpf-for-windows/commit/f125cd242e65383136cb1ccba630c1631fb488ef", "https://github.com/microsoft/ebpf-for-windows/commit/b5a3b9af37d19c545937ea9ccc75e271e505b29e", "https://github.com/microsoft/ebpf-for-windows/commit/e5287cf254805f327cfaa228ea942b4bae69d646", "https://github.com/microsoft/ebpf-for-windows/commit/05766bc1d59a3e73ceff870b3cc08ec1259b0998", "https://github.com/microsoft/ebpf-for-windows/commit/8af45319e4c41158fe7e96ba95d0fe746db96853", "https://github.com/microsoft/ebpf-for-windows/commit/fa4fadfb6438aa50f73fc36621028561c4b7e598", "https://github.com/microsoft/ebpf-for-windows/commit/1a3311f0cfb8a4d6535c64706aeb1a35ef11dfe3", "https://github.com/microsoft/ebpf-for-windows/commit/3d19f51841b8ad88d40704c3bb79fd6058daa1c8", "https://github.com/microsoft/ebpf-for-windows/commit/3aec61f93bfe3c3532b5b253ca940d02e123657b", "https://github.com/microsoft/ebpf-for-windows/commit/494949d68762d74c5f2304d382b6985988b9c3c6", "https://github.com/microsoft/ebpf-for-windows/commit/8015c7f9a27a5775b5e41ee9c65ad8243c531f1e", "https://github.com/microsoft/ebpf-for-windows/commit/6defcab11ce6888fa0eb3d63c462f4ffb3f914da", "https://github.com/microsoft/ebpf-for-windows/commit/600f4819a989794739e6118dd2883c6922bda75e", "https://github.com/microsoft/ebpf-for-windows/commit/094e789c797c103f2f5c9712a639838faf0e5ff3", "https://github.com/microsoft/ebpf-for-windows/commit/74d7c283b19f695f0a7d734679ca728db490e54e", "https://github.com/microsoft/ebpf-for-windows/commit/d9b175751a0fc173c9a7706f4fe8f9a88430d0ae", "https://github.com/microsoft/ebpf-for-windows/commit/720eb6ecf993af71eb1fb29f9316b77229de2543", "https://github.com/microsoft/ebpf-for-windows/commit/7d8ad00643f2d04ee85f0aa9e22f613086767da7", "https://github.com/microsoft/ebpf-for-windows/commit/13095ed09cdfa4da71607d22117c75296fa8a5f4", "https://github.com/microsoft/ebpf-for-windows/commit/f0aa8c54535628d5a748b074cadebdc49aca2b3e", "https://github.com/microsoft/ebpf-for-windows/commit/ca6cd453d2a68ab442c8d7a3709e2ea5d934c301", "https://github.com/microsoft/ebpf-for-windows/commit/887d0174294fca15088103cc89f224b7bf20d282", "https://github.com/microsoft/ebpf-for-windows/commit/fe551ba95650646b98c0bb79e6e49f3f91ed8471", "https://github.com/microsoft/ebpf-for-windows/commit/e0970332a801a1745ac30d3f9f80d56636486415", "https://github.com/microsoft/ebpf-for-windows/commit/5a576e47c10752e258cf73a805230afc439acc98", "https://github.com/microsoft/ebpf-for-windows/commit/6d077a23aca4b8176417eab7d1615bb24b3de7ac", "https://github.com/microsoft/ebpf-for-windows/commit/f12ec465a46e89075d8db4143995a612177c73c7", "https://github.com/microsoft/ebpf-for-windows/commit/9c3e2a90cbd3cb59e9f4cdc58241f97c6a41f11f", "https://github.com/microsoft/ebpf-for-windows/commit/e7660da4e6af0091c3bf019793aa6395fd2aa8e6", "https://github.com/microsoft/ebpf-for-windows/commit/dc47ff3673ef6fa0982be649a55a2d4eef3a7e49", "https://github.com/microsoft/ebpf-for-windows/commit/df63c9f597646ae4356785e402ad691f0bf409d4", "https://github.com/microsoft/ebpf-for-windows/commit/e9e3094822453708a18e951f662b97fba3c52a1f", "https://github.com/microsoft/ebpf-for-windows/commit/6710044d7ee3184714a9ff1c62caeada0eaecce3", "https://github.com/microsoft/ebpf-for-windows/commit/5d091e07282332f36ebc7ab8e3a214804a3cadab", "https://github.com/microsoft/ebpf-for-windows/commit/3f6a6ce75a9a38d16bcfc84a9eb6e31b13679a7b", "https://github.com/microsoft/ebpf-for-windows/commit/70439989879b1ae71d75ba198d94f4cf33035457", "https://github.com/microsoft/ebpf-for-windows/commit/a4bd85714fe79c06af21346b450ae7292bf3fb77", "https://github.com/microsoft/ebpf-for-windows/commit/90c63dee6634fd108afa66e49e3b165a62c65e7a", "https://github.com/microsoft/ebpf-for-windows/commit/d12fed2ae3c3364d83b84690947fe8ceb4607e29", "https://github.com/microsoft/ebpf-for-windows/commit/edec9a649a7e0e18f9b39f83d214caa13e09d746", "https://github.com/microsoft/ebpf-for-windows/commit/ff1d5215d0bdcb103b7ce584eeab2033745dfdd4", "https://github.com/microsoft/ebpf-for-windows/commit/7b306c3d9575acfe529f96ccc8c413cd17aeb432", "https://github.com/microsoft/ebpf-for-windows/commit/6e0b00c17671f7eb075d5fd0ae68e16048a50ec6", "https://github.com/microsoft/ebpf-for-windows/commit/75d4fae618726e4ed9ce1ec28189ebd82e64b238", "https://github.com/microsoft/ebpf-for-windows/commit/1b1d2d8aed94c977a948204df9f90e83f331a5c9", "https://github.com/microsoft/ebpf-for-windows/commit/3e4e1e96548f6d3d56dedd2ee1a81a2bbaafbbec", "https://github.com/microsoft/ebpf-for-windows/commit/fe15b975ff53433c95c70ac3fba1eb485cfd2a85", "https://github.com/microsoft/ebpf-for-windows/commit/a329cbd7d0829fcb6d6bdebf5f32a69d90e0cc97", "https://github.com/microsoft/ebpf-for-windows/commit/9d79315961ab6e9c1ebdb5bb835451b968a8c322", "https://github.com/microsoft/ebpf-for-windows/commit/ad1f3bf1c08a513363e237f6a9cb730697432c45", "https://github.com/microsoft/ebpf-for-windows/commit/e6ccfd3aa68f94b2bee9f4352e174c53e9a9c0d7", "https://github.com/microsoft/ebpf-for-windows/commit/04508129213588c62fb79c592dce93a7a5394d08", "https://github.com/microsoft/ebpf-for-windows/commit/e7a4d93080c739216c451b65cfe3f0e642ec18d9", "https://github.com/microsoft/ebpf-for-windows/commit/9e1b19331aa4c00116c41a2a5866200e453ef09b", "https://github.com/microsoft/ebpf-for-windows/commit/023e4354bbc7c14ba1a8c546cab06062b37deed4", "https://github.com/microsoft/ebpf-for-windows/commit/7b42b41c17926d630cddb24fae11d316b5990d5e", "https://github.com/microsoft/ebpf-for-windows/commit/31470b4d8919f8e1c4b387b4995d047fe152a619", "https://github.com/microsoft/ebpf-for-windows/commit/d835e4e6ac60fac00b738b77bfb91461475a23b1", "https://github.com/microsoft/ebpf-for-windows/commit/5d845185f9f930c0285a577969c1a2ae7ee09f7c", "https://github.com/microsoft/ebpf-for-windows/commit/3f77e68c737eafd450a1596de4f59860859f4d20", "https://github.com/microsoft/ebpf-for-windows/commit/a17159cd6d5e6d268701bc63ffd3afe8be9bee30", "https://github.com/microsoft/ebpf-for-windows/commit/62dd5b4468ad93c2a94562c175770e7d6eac9ab0", "https://github.com/microsoft/ebpf-for-windows/commit/e4724dafa489bf57a334d5970a5b594eaf062fa9", "https://github.com/microsoft/ebpf-for-windows/commit/346e0d3b5d8982fcf4b3799326ef645c4d5a651b", "https://github.com/microsoft/ebpf-for-windows/commit/e6154449e9b36454261041da6e2aee98e68b37b0", "https://github.com/microsoft/ebpf-for-windows/commit/d7a2142d34e5c29a9b1c43f4184a4e84b601178c", "https://github.com/microsoft/ebpf-for-windows/commit/a8f3cdacb6c744ba194ed6e0f8baf4a54ac2049a", "https://github.com/microsoft/ebpf-for-windows/commit/6f5eb28a3c5f2427cdff59c473ad704488139bb2", "https://github.com/microsoft/ebpf-for-windows/commit/181ddba70ebf39b48c7742732ee9740153422781", "https://github.com/microsoft/ebpf-for-windows/commit/4d728415cd3eaa3ce026c6a461d72c9b29918513", "https://github.com/microsoft/ebpf-for-windows/commit/5988fb7117a4bfde34daf63abe99e869a7b4a1b7", "https://github.com/microsoft/ebpf-for-windows/commit/eae48c413cf50671b90749d9adcf86918c8f9f04", "https://github.com/microsoft/ebpf-for-windows/commit/4c3ef58ed800e203fb2cd2f32592be7f8046b369", "https://github.com/microsoft/ebpf-for-windows/commit/aed198643c3ddb1cc051001b3d4c874c8407fe0e", "https://github.com/microsoft/ebpf-for-windows/commit/b7d27b7268fb5760364a56cefd9e996f379d922e", "https://github.com/microsoft/ebpf-for-windows/commit/1a7088c63c3e4be353303fb890c22add1f1cc265", "https://github.com/microsoft/ebpf-for-windows/commit/c08f0b2d0c9cc85664e619907df0bf90ad2f565d", "https://github.com/microsoft/ebpf-for-windows/commit/cf805decffe9f0be30497ad1fcb020082d88b9ae", "https://github.com/microsoft/ebpf-for-windows/commit/788c9d24ffeb3f4303dc1cc4e5fcbd6b78a3a144", "https://github.com/microsoft/ebpf-for-windows/commit/a8ff5bf87ad7c9277efd8aad6bad03ec743dfc16" ]
2025-01-06T19:12:32Z
https://github.com/microsoft/ebpf-for-windows/tree/30fdb1f81aa7d4eaceb26a72d72920aeac79bebb
[ "nuget restore ebpf-for-windows.sln ; msbuild /m /p:Configuration=Debug /p:Platform=x64 /p:SolutionDir=\"C:\\testbed\\\\\" /p:SpectreMitigation=false /p:FuzzerLibs= tests\\unit\\test.vcxproj" ]
[ "Set-Location C:\\testbed\\x64\\Debug; .\\unit_tests.exe --reporter tap --durations yes *> C:\\testbed\\test-results\\catch2-tap.log" ]
[ "Get-Content C:\\testbed\\test-results\\catch2-tap.log -Raw" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} # TAP result lines: allow optional '-' and optional remainder (desc or inline directives) tap_re = re.compile(r'^\s*(ok|not ok)\s+(\d+)(?:\s*(?:-\s*)?(.*))?$', re.IGNORECASE) # TAP context/comment lines context_re = re.compile(r'^\s*#\s*(.+?)\s*$') # Noise contexts to ignore noise_ctx_re = re.compile(r'(?i)^\s*(rng-seed\s*:|time\s*:)\s*') # Skip directive matcher (case-insensitive) skip_dir_re = re.compile(r'(?i)(?:^|\s)#\s*skip\b') lines = log.splitlines() n = len(lines) i = 0 current_context: str | None = None while i < n: raw = lines[i] line = raw.rstrip("\r\n") # Context update mctx = context_re.match(line) if mctx: ctx = mctx.group(1).strip() if not noise_ctx_re.match(ctx): current_context = ctx i += 1 continue mtap = tap_re.match(line) if not mtap: i += 1 continue status_word, num, desc0 = mtap.groups() status_word = status_word.lower() num = (num or "").strip() desc_parts = [] if desc0: desc_parts.append(desc0.strip()) # Accumulate continuation lines that belong to this test description. j = i + 1 while j < n: peek = lines[j].rstrip("\r\n") # Stop on next TAP or context or empty line if tap_re.match(peek) or context_re.match(peek) or not peek.strip(): break # Append continuation text desc_parts.append(peek.strip()) j += 1 # Advance main loop to j i = j full_desc = " ".join([p for p in desc_parts if p]).strip() # Detect skip anywhere in the accumulated description is_skip = bool(skip_dir_re.search(full_desc)) if is_skip: # Remove skip annotation and any trailing text following it full_desc = re.sub(r'(?i)\s*#\s*skip\b.*$', '', full_desc).strip() # Build test name with context and assertion number parts = [] if current_context: parts.append(current_context) parts.append(full_desc if full_desc else "assertion") test_name = " :: ".join(parts) + f" [#{num}]" if is_skip: results[test_name] = "skip" else: results[test_name] = "pass" if status_word == "ok" else "fail" return results
[ "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26585]", "program :: addresses[1].address != 0 for: 140695549139024 (0x7ff63c3a5850) != 0 [#37774]", "program :: addresses[2].address != 0 for: 140695549138928 (0x7ff63c3a57f0) != 0 [#37775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#35274]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#36291]", "INVALID_PROGRAM_DATA :: addresses[0].address != 0 for: 140695544151696 (0x7ff63bee3e90) != 0 [#38394]", "program :: addresses[0].address != 0 for: 140695549138752 (0x7ff63c3a5740) != 0 [#37773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24601]" ]
[ "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219024 ( (0x35790) == 219024 (0x35790) [#13926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#22803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#28758]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34310]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133956 ( (0x20b44) == 133956 (0x20b44) [#32427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#22323]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126736 ( (0x1ef10) == 126736 (0x1ef10) [#13702]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28351]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#527]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31312]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#10250]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#11025]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14418]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12110]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41209 (0x xa0f9) == 41209 (0xa0f9) [#7161]", "map_crud_operations_queue :: return_value == 1 for: 1 == 1 [#37681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18600]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12300]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 644 (0x284) == 644 (0x284) [#40398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#33825]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#11695]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#36804]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#29984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49 == 49 [#19241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#29622]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#11161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 182329 ( (0x2c839) == 182329 (0x2c839) [#20081]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#23424]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25389]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20594]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#28831]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 235225 ( (0x396d9) == 235225 (0x396d9) [#32665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#10632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103041 ( (0x19281) == 103041 (0x19281) [#13632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33124]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48841 (0 0xbec9) == 48841 (0xbec9) [#19669]", "program :: ebpf_program_create(&program_parameters, &local_program) == EBPF_SUCC CESS for: 0 == 0 [#37751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#11002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27981]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27396]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32937]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#10027]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14939]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32946]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 400 (0x190) == 400 (0x190) [#40520]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#22011]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24548]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 11 14921 (0x1c0e9) [#9311]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24025 (0 0x5dd9) == 24025 (0x5dd9) [#13300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#24092]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 400 (0x190 0) == 400 (0x190) [#558]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.15.7/32\"' [#37427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#22507]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16007]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37676]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6814]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39360]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#30130]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31530]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19321 (0 0x4b79) == 19321 (0x4b79) [#13268]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 32 == 32 [#38966]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21007]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#23989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41616 (0 0xa290) == 41616 (0xa290) [#19635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35721 (0 0x8b89) == 35721 (0x8b89) [#13368]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72900 (0 0x11cc4) == 72900 (0x11cc4) [#26000]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12544 (0 0x3100) == 12544 (0x3100) [#25684]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25935]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#10322]", "droppacket-jit :: hook.batch_end(state) == EBPF_SUCCESS for: 0 == 0 [#40904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#10353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#22332]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103041 (0 0x19281) == 103041 (0x19281) [#1160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57600 (0 0xe100) == 57600 (0xe100) [#25940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 247009 ( (0x3c4e1) == 247009 (0x3c4e1) [#13984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15587]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30791]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1600 (0x64 40) == 1600 (0x640) [#598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#23846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#34946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9924]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#27881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14533]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#30206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12979]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"11.0.0.0/8\"' and 'return_value := {null string}' [#37562]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#27599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81796 (0 0x13f84) == 81796 (0x13f84) [#26032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34354]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128164 ( (0x1f4a4) == 128164 (0x1f4a4) [#26176]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"192.169.0.0/24\"' and 'return_value := {null string}' [#37550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31539]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#28593]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6702]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12600]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13195]", "EBPF_OPERATION_LINK_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38216]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3528]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#30125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37146]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2401 (0x x961) == 2401 (0x961) [#25558]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#11921]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28305]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1156 (0x4 484) == 1156 (0x484) [#6823]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#236]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#11238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 241081 ( (0x3adb9) == 241081 (0x3adb9) [#20209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26429]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#835]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3250]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#30342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28375]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28480]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50176 (0 0xc400) == 50176 (0xc400) [#32143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 161604 (0 0x27744) == 161604 (0x27744) [#7559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25352]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7612]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#36287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7850]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#30352]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#150]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26544]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#29931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19069]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#35458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5856]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"DD/120\" == \"DD/120\" wit th 1 message: 'key_string := \"DD/120\"' [#37595]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39444]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8224]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39427]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21965]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#30628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#22917]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28528]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2278]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#28809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13247]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22801 (0x5 5911) == 22801 (0x5911) [#820]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32352]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12302]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26537]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#34011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#28714]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#11244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#10603]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(extra_value), reinterpret_cast< <uint8_t*>(&extra_value), 0x2) == EBPF_SUCCESS for: 0 == 0 [#37679]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18295]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 257049 ( (0x3ec19) == 257049 (0x3ec19) [#26474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26805]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#11389]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#28689]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34672]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#29133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#29613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16 == 16 [#36562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34402]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#10712]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#533]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"192.168.0.0/15\"' [#37568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15851]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#11192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#35561]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#11315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123904 ( (0x1e400) == 123904 (0x1e400) [#13694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22105]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12268]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33947]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 576 (0x2 240) == 576 (0x240) [#13038]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#28016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#22790]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8019]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 132496 ( (0x20590) == 132496 (0x20590) [#26188]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 253009 ( (0x3dc51) == 253009 (0x3dc51) [#26466]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#33474]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32958]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#36461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104976 ( (0x19a10) == 104976 (0x19a10) [#13638]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15868]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#30449]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26860]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24607]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33066]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3367]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#10621]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1666]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 294 (0x126) == 294 (0x126) [#40573]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#28583]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#29467]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30680]", "program :: ebpf_link_attach_program(link.get(), program.get()) == EBPF_EXTENSION N_FAILED_TO_LOAD for: 23 == 23 [#37778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#22200]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 68 == 68 [#40686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#29172]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#24258]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38037]", "serialize_map_test :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38744]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#24324]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45796 (0 0xb2e4) == 45796 (0xb2e4) [#25888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#23713]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6204]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 762 (0x2fa) == = 762 (0x2fa) [#40075]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 234 == 234 [#40603]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#24131]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14428]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#36552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1849 (0x x739) == 1849 (0x739) [#13076]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#29250]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15863]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#23797]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1792]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1 == 1 [#19229]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39601 (0 0x9ab1) == 39601 (0x9ab1) [#19625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67081 (0x x10609) == 67081 (0x10609) [#7273]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24433]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60025 (0 0xea79) == 60025 (0xea79) [#32185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#11621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#34311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76729 (0x x12bb9) == 76729 (0x12bb9) [#7309]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#23309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18352]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12982]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#35945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#27848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#10754]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#28802]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18546]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2203]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#27095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18647]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#28967]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#11451]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#35257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#22684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#10524]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33743]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164025 (0 0x280b9) == 164025 (0x280b9) [#1328]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22199]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20256]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#35372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#24241]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 826 (0x33a) == = 826 (0x33a) [#40107]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#10681]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#10758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24795]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27595]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#561]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 788 (0x314) == 788 (0x314) [#40326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13541]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34249]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 92 == 92 [#39095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#22227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#22023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#22906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18540]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#34644]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39224]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#22324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 223729 ( (0x369f1) == 223729 (0x369f1) [#13936]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75625 (0 0x12769) == 75625 (0x12769) [#26010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#29818]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 161604 (0 0x27744) == 161604 (0x27744) [#1322]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#27404]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21010]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33117]", "ring_buffer_reserve_submit_discard :: producer == consumer for: 0 == 0 [#40773]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#29991]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#35424]", "ring_buffer_output :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#40743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18525]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62500 (0 0xf424) == 62500 (0xf424) [#25960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21904 (0x x5590) == 21904 (0x5590) [#7051]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#10764]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#499]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1551]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#27134]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38131]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91204 (0 0x16444) == 91204 (0x16444) [#19831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#23234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104976 ( (0x19a10) == 104976 (0x19a10) [#19875]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25857]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 126 == 126 [#40657]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24794]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32953]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#28970]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/127\"' [#37584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#28349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#22936]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#29863]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 124609 (0 0x1e6c1) == 124609 (0x1e6c1) [#1224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31608]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144 == 14 44 [#6779]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6069]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#29497]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#29412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#36404]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32719]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#35811]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103041 ( (0x19281) == 103041 (0x19281) [#32337]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#20910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34303]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1149]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#492]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1849]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#48]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 768 (0x300) == = 768 (0x300) [#40078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#36052]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126025 (0 0x1ec49) == 126025 (0x1ec49) [#7465]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31046]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1027]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#29291]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19838]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#36058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#11004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1936 (0x x790) == 1936 (0x790) [#13078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6609]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9594]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1727]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 146 == 146 [#40647]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38582]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30796]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#23705]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108900 (0 0x1a964) == 108900 (0x1a964) [#7415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18682]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#21201]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#36877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19690]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#35875]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 2310 04 (0x5a40) [#8750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20268]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76176 (0x x12990) == 76176 (0x12990) [#1070]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 166464 ( (0x28a40) == 166464 (0x28a40) [#26276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#27542]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18958]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 810 (0x32a) == = 810 (0x32a) [#40099]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5765]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6306]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#11212]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1008 (0x3f0) == 1008 (0x3f0) [#40216]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34250]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21025 (0 0x5221) == 21025 (0x5221) [#31985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8146]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24716]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21652]", "droppacket-interpret :: hook.fire(&ctx4, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40969]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12911]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39405]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#849]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37212]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27528]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69696 (0x x11040) == 69696 (0x11040) [#1046]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13693]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#11496]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#28906]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 906 601 (0x161e9) [#9197]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32041 (0 0x7d29) == 32041 (0x7d29) [#19585]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#28834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#22432]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31235]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37313]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36981]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18673]", "epoch_test_single_epoch_cache_aligned :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38499]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 630 (0x276) == 630 (0x276) [#40405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110889 ( (0x1b129) == 110889 (0x1b129) [#32361]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 428 (0x1ac) == 428 (0x1ac) [#40506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45796 (0x xb2e4) == 45796 (0xb2e4) [#7183]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#34937]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38122]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#29983]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#35429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26517]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#30312]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"CC/97\"' and 'correct_value := \"CC/96\"' [#37610]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6052]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160000 ( (0x27100) == 160000 (0x27100) [#32495]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#23061]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31405]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35168]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#30380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#24340]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#34853]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39527]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#35547]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 918 (0x396) == 918 (0x396) [#40261]", "hash_table_test :: keys_found == 0x7 for: 7 == 7 [#38437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13863]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 192721 ( (0x2f0d1) == 192721 (0x2f0d1) [#13868]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26057]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#36487]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196249 ( (0x2fe99) == 196249 (0x2fe99) [#26346]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26694]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#35236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8281 (0x2 2059) == 8281 (0x2059) [#6937]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 398 (0x18e) == = 398 (0x18e) [#39893]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#22617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9156]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#11791]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75625 (0x x12769) == 75625 (0x12769) [#1068]", "bindmonitor-jit :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34273]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84681 (0 0x14ac9) == 84681 (0x14ac9) [#26042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1865]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#11721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21625]", "pinning_test :: another_object.initialize() == EBPF_SUCCESS for: 0 == 0 [#38479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#30170]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33848]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#30621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19884]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 208 == 208 [#40616]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15193]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#36765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#28805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18751]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2193]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#21606]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#34146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#35795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15016]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 486 (0x1e6) == = 486 (0x1e6) [#39937]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#23390]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(return_value) - 1, reinterpret_ _cast<uint8_t*>(&return_value), 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37706]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 199809 (0 0x30c81) == 199809 (0x30c81) [#1412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#35929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#23591]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32602]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#10183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4096 (0x x1000) == 4096 (0x1000) [#25588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31940]", "pinned_map_enum :: results.find(pin_path) != results.end() for: {?} != {?} [#41493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14211]", "program :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#37749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#10580]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30979]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15949]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#21624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31527]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37316]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19051]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9541]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#29177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#30247]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 149769 ( (0x24909) == 149769 (0x24909) [#26234]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30972]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 3097 76 (0x7900) [#8822]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#23914]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#11950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#17160]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0x x3c1) [#8387]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#35319]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#22645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20742]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15647]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#35338]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 974 (0x3ce) == = 974 (0x3ce) [#40181]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19968]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#29865]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39007]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28900 (0 0x70e4) == 28900 (0x70e4) [#32035]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 610 (0x262) == 610 (0x262) [#40415]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15994]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24025 (0 0x5dd9) == 24025 (0x5dd9) [#32005]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#34981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#23152]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6519]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4225 (0x10 081) == 4225 (0x1081) [#648]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5840]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#28310]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#11026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#29970]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21104]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#21711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 242064 ( (0x3b190) == 242064 (0x3b190) [#26444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#23062]", "program :: ebpf_link_create(EBPF_ATTACH_TYPE_SAMPLE, nullptr, 0, &local_link) == = EBPF_SUCCESS for: 0 == 0 [#37777]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15311]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21904 (0 0x5590) == 21904 (0x5590) [#13286]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#29092]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 222784 (0 0x36640) == 222784 (0x36640) [#7699]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#11500]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14264]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0x02) == EBPF_SUCCESS for: 0 == 0 [#37408]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25348]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#21408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#36734]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#35295]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 165649 (0 0x28711) == 165649 (0x28711) [#7569]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#36316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12011]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39454]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18813]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43264 (0xa a900) == 43264 (0xa900) [#934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#22490]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#23159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#35133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#30383]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14872]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34541]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#36375]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13155]", "ring_buffer_output :: ebpf_ring_buffer_output(ring_buffer, data.data(), data.size()) == EBP PF_SUCCESS for: 0 == 0 [#40752]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38302]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#10243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37258]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#36547]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#11654]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#36145]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#11575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20839]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39025]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#34656]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 852 264 (0x14d10) [#9170]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#36222]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37117]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#36614]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#24422]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24753]", "serialize_program_info_test :: memcmp( in_program_info.program_type_descriptor->context_descriptor, out_program_info->program_type_descriptor->context_descriptor, sizeof(ebpf_conte ext_descriptor_t)) == 0 for: 0 == 0 [#38796]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#35252]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#34434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20525]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13753]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#36887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21478]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145924 ( (0x23a04) == 145924 (0x23a04) [#13754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18742]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#30545]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#35209]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#24229]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22111]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#36418]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9483]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15368]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18228]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#17029]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128881 ( (0x1f771) == 128881 (0x1f771) [#26178]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#11566]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#28973]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40957]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#30072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 13 33956 (0x20b44) [#9392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#23878]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9096]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#11296]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19034]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2967]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#35655]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6400 (0x x1900) == 6400 (0x1900) [#25620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#30032]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#24101]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3935]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#22579]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1173]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7540]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#28815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12518]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#35617]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#27602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#28797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25416]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21637]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#29512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53361 (0 0xd071) == 53361 (0xd071) [#19689]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#10204]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#21414]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112896 (0 0x1b900) == 112896 (0x1b900) [#7427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14656]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61009 (0x xee51) == 61009 (0xee51) [#7249]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38108]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#27893]", "ring_buffer_reserve_submit_discard :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#40766]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#24372]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#24050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#36408]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26375]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#22230]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 676 (0x2 2a4) == 676 (0x2a4) [#19279]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#11023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#23534]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32178]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104976 (0 0x19a10) == 104976 (0x19a10) [#1166]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13613]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#29319]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#23965]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38565]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21980]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62001 (0 0xf231) == 62001 (0xf231) [#19725]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19630]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#9833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25236]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#33300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#34777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#11474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12681]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22028]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#234]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#35820]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38100]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12016]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39187]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#36363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12015]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13655]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#29585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25677]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#11423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#21660]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 514 (0x202) == = 514 (0x202) [#39951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 2464 49 (0x6049) [#8765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#30321]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 132496 (0 0x20590) == 132496 (0x20590) [#7483]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25128]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32204]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#14003]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15301]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4489 (0x11 189) == 4489 (0x1189) [#652]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7014]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#10822]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#10957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20456]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#36339]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37119]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8157]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26556]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#11322]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#24367]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#34973]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8075]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15859]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33102]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#28995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21418]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37114]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#22319]", "divide_by_zero-interpret :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#40986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14575]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#23130]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#36311]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9801 (0x26 649) == 9801 (0x2649) [#716]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19129]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25012]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1355]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26691]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#941]", "access_check :: ebpf_validate_security_descriptor(sd_ptr.get(), sd_size) == EBPF_SUCC CESS for: 0 == 0 [#38739]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 366 (0x16e) == = 366 (0x16e) [#39877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#30599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64 == 64 [#29783]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 296 (0x128) == 296 (0x128) [#40572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21868]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13017]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78400 (0x x13240) == 78400 (0x13240) [#1078]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28126]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#323]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#330]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#27608]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#480]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#29312]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168 8.15.7/32\"' [#37496]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#11661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#24410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19016]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 912 204 (0x16444) [#9200]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33698]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1351]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24930]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#28223]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#11525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56644 (0x xdd44) == 56644 (0xdd44) [#7231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60516 (0 0xec64) == 60516 (0xec64) [#19719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8302]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#30041]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 12 27449 (0x1f1d9) [#9365]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#36832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 17 70569 (0x29a49) [#9533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#34816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 ( (0x5f1) [#9874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#28669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 5336 61 (0xd071) [#8987]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 151321 ( (0x24f19) == 151321 (0x24f19) [#20005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#21825]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85264 (0 0x14d10) == 85264 (0x14d10) [#19811]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 806 (0x326) == 806 (0x326) [#40317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21904 (0 0x5590) == 21904 (0x5590) [#19523]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27841]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#393]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#29129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14031]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26171]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 352 (0x160) == = 352 (0x160) [#39870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27565]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25399]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7991]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 300 (0x12c) == = 300 (0x12c) [#39844]", "error codes :: result2 == result for: 19 == 19 [#40801]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#30605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#33444]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5751]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#34831]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#34128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88209 (0 0x15891) == 88209 (0x15891) [#19821]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21521]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#36660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21805]", "hash_table_test :: ebpf_hash_table_create(&raw_ptr, &options) == EBPF_SUCCESS for: 0 == 0 [#38423]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39222]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27898]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 716 (0x2cc) == 716 (0x2cc) [#40362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21764]", "hash_table_test :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38419]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25374]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36946]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26791]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#29985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#10053]", "droppacket-interpret :: bpf_map_update_elem(interface_index_map_fd, &key, &if_index, EBPF_ANY Y) == EBPF_SUCCESS for: 0 == 0 [#40923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30813]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#24082]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#27908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#11112]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#10909]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#36682]", "get_authentication_id :: ebpf_platform_get_authentication_id(&authentication_id) == EBPF_SUCCE ESS for: 0 == 0 [#40833]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#11371]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24793]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#30620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10305]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30700]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18212]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#11201]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9433]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6508]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#30317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#23730]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27019]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21609 (0 0x5469) == 21609 (0x5469) [#25754]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52441 (0xc ccd9) == 52441 (0xccd9) [#976]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28392]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#23477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#23970]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12051]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26811]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31286]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#29815]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39248]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#29924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 1081 16 (0x2a40) [#9947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12341]", "work_queue :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#40844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20401]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 558 (0x22e) == 558 (0x22e) [#40441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15106]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2107]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#29013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#29027]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#35650]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#22113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7056]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#30044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2616]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#22664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32302]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#36710]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#23545]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#33288]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3600 (0xe1 10) == 3600 (0xe10) [#638]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 50 == 50 [#39154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34514]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144400 ( (0x23410) == 144400 (0x23410) [#32455]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#30037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 (0x1ce4) [#9927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45796 (0 0xb2e4) == 45796 (0xb2e4) [#13418]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25833]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24885]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31259]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 1795 56 (0x4624) [#9979]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8464 (0x x2110) == 8464 (0x2110) [#25644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12616]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27294]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#10911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19718]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#20934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19096]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#35657]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7848]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#28502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13183]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#33240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18366]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27627]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3588]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25408]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39590]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#27506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13999]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 238144 ( (0x3a240) == 238144 (0x3a240) [#20203]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#28883]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14289]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1957]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 192721 ( (0x2f0d1) == 192721 (0x2f0d1) [#32573]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#35785]", "epoch_test_single_epoch :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38496]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27493]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31990]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#11305]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#29435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#36320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#10967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#33846]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9 == 9 [#6761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 4494 44 (0xaf90) [#8930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59536 (0 0xe890) == 59536 (0xe890) [#32183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#23434]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#28709]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20308]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28410]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#30145]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34625]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#28632]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38524]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 986 (0x3da) == = 986 (0x3da) [#40187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14107]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18678]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2499]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#24065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#11150]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#22341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#27659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13199]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31079]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99856 (0 0x18610) == 99856 (0x18610) [#32327]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#11336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#29201]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39290]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35263]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 792 (0x318) == 792 (0x318) [#40324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3025 (0x xbd1) == 3025 (0xbd1) [#19337]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30804]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#24124]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#10816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33514]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18489]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97344 (0x x17c40) == 97344 (0x17c40) [#1142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20335]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#11426]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9574]", "pinning_test :: another_object.object.base.reference_count == 2 for: 2 == 2 [#38484]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5929 (0x1 1729) == 5929 (0x1729) [#6909]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10247]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#29251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51984 (0 0xcb10) == 51984 (0xcb10) [#32151]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100 == 100 [#29910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21800]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#21831]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#10061]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36864 (0x x9000) == 36864 (0x9000) [#7139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15227]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#36869]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39580]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3549]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25499]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6067]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#28049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#35218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#33945]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12175]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#34533]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 702 225 (0x11251) [#9089]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"192.168.0.0/0\"' and 'return_value := {null string}' [#37554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#11802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14426]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#10741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#28542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21052]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#10205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 234256 ( (0x39310) == 234256 (0x39310) [#32663]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#11818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33865]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6986]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 221841 ( (0x36291) == 221841 (0x36291) [#32637]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#29813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#29960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31258]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38885]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22157]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27519]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13507]", "state_test :: ebpf_state_load(allocated_index_1, &retrieved_value) == EBPF_SUCCESS for: 0 == 0 [#38828]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25415]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24604]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#24426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#24086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#33597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#27827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28449]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62500 (0x xf424) == 62500 (0xf424) [#1018]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6685]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15323]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34157]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7646]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104329 (0 0x19789) == 104329 (0x19789) [#1164]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6394]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26939]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#29992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#24174]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 26 == 26 [#39062]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#12]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9241]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#36721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#34899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3969 (0x xf81) == 3969 (0xf81) [#19353]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 80 == 80 [#39734]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#761]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 112 == 112 [#39105]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29499]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14039]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.10.0.0/16\"' [#37430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12254]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#28608]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1499]", "hash_table_test :: ebpf_hash_table_iterate(table.get(), &cookie, &count, keys.data(), va alues.data()) == EBPF_SUCCESS for: 0 == 0 [#38432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#22308]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#28873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25100]", "bindmonitor-tailcall-interpret :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#41050]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81 == 81 [#536]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39021]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#29869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26673]", "bindmonitor-bpf2bpf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41014]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1855]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9288]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#36306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20730]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 ( (0xd24) [#8468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#10795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12487]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#29392]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25167]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19334]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27349]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 318 (0x13e) == 318 (0x13e) [#40561]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9024]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38404]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#35077]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37284]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6140]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19746]", "work_queue :: KeWaitForSingleObject(&work_item_context.completion_event, Executive, , KernelMode, 0, &timeout) == 0 for: 0 == 0 [#40852]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#721]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25657]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31724]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#36091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#10903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12755]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#10393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14686]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#34773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24848]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3483]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#28698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24852]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#35872]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#35018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#22395]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1593]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18982]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8886]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144400 ( (0x23410) == 144400 (0x23410) [#13750]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#22532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#22848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#36443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14482]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#28983]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6454]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9604 (0x x2584) == 9604 (0x2584) [#31891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66564 (0x x10404) == 66564 (0x10404) [#7271]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6479]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#11173]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 23 36196 (0x39aa4) [#9752]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#29237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33395]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39591]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#29224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24861]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1283]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#10749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#34698]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#28457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#28759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#12989]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9004]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30806]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1429]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#24151]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37090]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6555]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27171]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20108]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152100 ( (0x25224) == 152100 (0x25224) [#20007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0x x271) [#8369]", "verify random :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#40837]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1041]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#10522]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#28487]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34616]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1521 (0x5f f1) == 1521 (0x5f1) [#596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#23352]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#22958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#23795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19135]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34669]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 11 14244 (0x1be44) [#9308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#20994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24527]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2106]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#11352]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26503]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30850]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#30262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#21879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#36338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#22825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#20892]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#35890]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168 8.15.0/24\"' [#37491]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#29143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#22907]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39286]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#29197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#28409]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#27497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#11154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32180]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 698 (0x2ba) == = 698 (0x2ba) [#40043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#26995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9801 (0x x2649) == 9801 (0x2649) [#13188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#35815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34175]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34225 (0 0x85b1) == 34225 (0x85b1) [#19597]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 758 (0x2f6) == 758 (0x2f6) [#40341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#21381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#34122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#24412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11881 (0x2 2e69) == 11881 (0x2e69) [#736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20990]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#135]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#36334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69169 (0 0x10e31) == 69169 (0x10e31) [#13516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#24021]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9222]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 342 (0x156) == 342 (0x156) [#40549]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39022]", "EBPF_OPERATION_GET_EC_FUNCTION :: invoke_protocol(EBPF_OPERATION_GET_EC_FUNCTION, request, reply) == EB BPF_INVALID_ARGUMENT for: 6 == 6 [#38262]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#27434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#33351]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#23151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#10015]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#11535]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12100 (0x2 2f44) == 12100 (0x2f44) [#738]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 714 (0x2ca) == 714 (0x2ca) [#40363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#24048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#35258]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7899]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/128\"' and 'correct_value := \"BB/128\"' [#37632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32264]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31372]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 14 == 14 [#39701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17424 (0 0x4410) == 17424 (0x4410) [#19491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31390]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#11129]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#10948]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39520]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5929 (0x17 729) == 5929 (0x1729) [#672]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#10333]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22201 (0 0x56b9) == 22201 (0x56b9) [#25758]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#30047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#24185]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1608]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9402]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25783]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#34876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#21963]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25955]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#23409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#21231]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 52 == 52 [#38942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#35083]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28017]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 324 (0x144 4) == 324 (0x144) [#554]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32975]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1956]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#10625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19922]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7778]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19256]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#11124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#28295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#23037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#36470]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27936]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#74]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 4796 61 (0xbb59) [#8951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#35891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7458]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20920]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110224 ( (0x1ae90) == 110224 (0x1ae90) [#26124]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 736 (0x2e0) == 736 (0x2e0) [#40352]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31376]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9283]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#35087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58081 (0x xe2e1) == 58081 (0xe2e1) [#1000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 122500 ( (0x1de84) == 122500 (0x1de84) [#13690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21224]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8136]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#33303]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 636 (0x27c) == = 636 (0x27c) [#40012]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 964 (0x3c4) == = 964 (0x3c4) [#40176]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 161604 ( (0x27744) == 161604 (0x27744) [#13794]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#36640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7156]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26439]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#10631]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25248]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#28959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25410]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3057]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27049]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 680 (0x2a8) == 680 (0x2a8) [#40380]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21609 (0 0x5469) == 21609 (0x5469) [#13284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 137641 ( (0x219a9) == 137641 (0x219a9) [#19969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#36627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 289 (0x1 121) == 289 (0x121) [#25494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#23679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#23676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#23260]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31360]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39382]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#11328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4356 (0x x1104) == 4356 (0x1104) [#13122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14177]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3280]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9567]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#29907]", "serialize_program_info_test :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5041 (0x x13b1) == 5041 (0x13b1) [#19369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21181]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25629]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"192.168.14.0/31\" == \"192.168.14.0/31 1\" with 2 messages: 'key_string := \"192.168.14.0/31\"' and 'return_value := \"192.1 168.14.0/31\"' [#37532]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12321 (0 0x3021) == 12321 (0x3021) [#31917]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 46 == 46 [#39156]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#170]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26957]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/32\" == \"BB/32\" wi ith 2 messages: 'key_string := \"BB/33\"' and 'correct_value := \"BB/32\"' [#37645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#35375]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169744 (0 0x29710) == 169744 (0x29710) [#7579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21892]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#29095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#33894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 197136 ( (0x30210) == 197136 (0x30210) [#20115]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#28916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#23420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#23548]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8701]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32914]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#10793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20978]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37367]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32722]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 598 (0x256) == = 598 (0x256) [#39993]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#11765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#36686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#10731]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 209764 ( (0x33364) == 209764 (0x33364) [#20143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12114]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#10369]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5859]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#36162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#23427]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#33744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0x x211) [#8363]", "verify random :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#40835]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6021]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#34191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#24420]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#29582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#21219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32368]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#36110]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9349]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#23887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13519]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#29658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#30215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8779]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7006]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 12 == 12 [#39700]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#33501]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19203]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#10480]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12895]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#29542]", "verify random :: passes_chi_squared_test(1024 * 128, ebpf_random_uint32) for: true ebpf_random_uint32 Average frequency: 321.358 Std dev frequency: 166.736 Max frequency: 1203.21 Ratio of (max-average) to std:dev: 5.28889:1 [#40840]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#35299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31770]", "pinning_test :: an_object.object.base.reference_count == 2 for: 2 == 2 [#38482]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7718]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2922]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#36128]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 253009 (0 0x3dc51) == 253009 (0x3dc51) [#7761]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#881]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34247]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#35085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#30319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#10564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#36368]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#23453]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2187]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#249]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 110 == 110 [#39104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#28699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19646]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#36161]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22112]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15418]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37829]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#20766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25365]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#34988]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12186]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26528]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33952]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"10.0.0.0/8\"' and 'correct_value := \"10.0. .0.0/8\"' [#37451]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#11573]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8394]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225625 (0 0x37159) == 225625 (0x37159) [#7705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#35693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13011]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 172 == 172 [#40634]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#27797]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3496]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#29414]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#36265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#23696]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40945]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32092]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#29854]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27316]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39433]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 187489 (0 0x2dc61) == 187489 (0x2dc61) [#1384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 202500 ( (0x31704) == 202500 (0x31704) [#20127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#10607]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#277]", "error codes :: result2 == result for: 4 == 4 [#40786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#29449]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#28662]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27418]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 248 == 248 [#39818]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24515]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37364]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39494]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4297]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#34185]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20709]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38603]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6521]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 730 (0x2da) == = 730 (0x2da) [#40059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25112]", "droppacket-interpret :: value == 10 for: 10 == 10 [#40967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#11492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 150544 ( (0x24c10) == 150544 (0x24c10) [#13766]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18548]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35150]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28338]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8092]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5776 (0x1 1690) == 5776 (0x1690) [#6907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16129 (0x x3f01) == 16129 (0x3f01) [#7009]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#27947]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#34866]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12465]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#28046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#35516]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145924 ( (0x23a04) == 145924 (0x23a04) [#26224]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32835]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25439]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 362 (0x16a) == = 362 (0x16a) [#39875]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#10370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24883]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27853]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 62 == 62 [#40689]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#11291]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1932]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33458]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26626]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34546]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#10278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24490]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#36442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18329]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32420]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#11858]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#24421]", "hash_table_stress_test :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38470]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33159]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26819]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#23997]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38045]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19068]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59536 (0x xe890) == 59536 (0xe890) [#1006]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5824]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27409]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37199]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#23482]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 36 == 36 [#39161]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#36322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18549]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26954]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31319]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12512]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 56 == 56 [#38954]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#791]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25785]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38657]", "trampoline_test :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33056]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8737]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9460]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#37]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18618]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 784 (0x310) == 784 (0x310) [#40328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#27398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#36092]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 192721 (0 0x2f0d1) == 192721 (0x2f0d1) [#1396]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22201 (0 0x56b9) == 22201 (0x56b9) [#31993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32560]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22075]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#28235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#22170]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 146689 (0 0x23d01) == 146689 (0x23d01) [#1284]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15347]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#24254]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31700]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225 == 2 225 [#25490]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#36448]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7510]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#10379]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 48 == 48 [#39718]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 104 == 104 [#40668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#21525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7100]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18433]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9001]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3565]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18522]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19368]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#34761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18544]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#10528]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#27977]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8102]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#23724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#11846]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8533]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12749]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6101]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21496]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76176 (0 0x12990) == 76176 (0x12990) [#19779]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#36098]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38128]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#11286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#36251]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164836 (0 0x283e4) == 164836 (0x283e4) [#1330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16641 (0 0x4101) == 16641 (0x4101) [#31953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 17 76400 (0x2b110) [#9554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28934]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#10991]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#28034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#10195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8186]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#35238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#22583]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31834]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 724 (0x2d4) == = 724 (0x2d4) [#40056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32924]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20636]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#11883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12907]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136900 ( (0x216c4) == 136900 (0x216c4) [#32435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12156]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9454]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 (0x2400) [#9937]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#30652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#22537]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#30109]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31447]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19986]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1680]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2430]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.14.0/31\" == \"192.168.14.0 0/31\" with 2 messages: 'key_string := \"192.168.14.1/32\"' and 'correct_value := \"1 192.168.14.0/31\"' [#37462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#22920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60516 (0 0xec64) == 60516 (0xec64) [#13482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#22769]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#29386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7110]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 (0x21c9) [#9934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20607]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#22678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 170569 (0 0x29a49) == 170569 (0x29a49) [#7581]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 204 == 204 [#39796]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6502]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#29761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#29901]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 248 == 248 [#40596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12516]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18395]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6483]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#36021]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#34908]", "serialize_program_info_test :: in_prototype->helper_id == out_prototype->helper_id for: 1000 (0x3e8) ) == 1000 (0x3e8) [#38800]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93636 (0x x16dc4) == 93636 (0x16dc4) [#1130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#28145]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31520]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 302 (0x12e) == 302 (0x12e) [#40569]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#29556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77841 (0 0x13011) == 77841 (0x13011) [#26018]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#11038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#23016]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 ( (0x900) [#9883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#22596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 172225 ( (0x2a0c1) == 172225 (0x2a0c1) [#26290]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6606]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31375]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21427]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25600 (0 0x6400) == 25600 (0x6400) [#32015]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38533]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33431]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#35120]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44100 (0x xac44) == 44100 (0xac44) [#7175]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"DD/120\" == \"DD/120\" with 2 messages: 'key_string := \"DD/123\"' and 'correct_value := \"DD/120\"' [#37619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15571]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31930]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#29965]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 954 (0x3ba) == 954 (0x3ba) [#40243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#34892]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14884 (0x3 3a24) == 14884 (0x3a24) [#762]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28218]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38576]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 948 (0x3b4) == = 948 (0x3b4) [#40168]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#24184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9207]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9220]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#10477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27859]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33872]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#22502]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1423]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#33570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42025 (0x xa429) == 42025 (0xa429) [#7165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#36242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15577]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9562]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1748]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28003]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37178]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#33678]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#35566]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37335]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#10497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 14 48996 (0x24604) [#9452]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#28325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#21996]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12913]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33643]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#35724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#22707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20738]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25837]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21869]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 72 == 72 [#40684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#35806]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#35216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15298]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3421]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 956 (0x3bc) == = 956 (0x3bc) [#40172]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#30487]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8649 (0x21 1c9) == 8649 (0x21c9) [#704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44521 (0 0xade9) == 44521 (0xade9) [#19649]", "EBPF_OPERATION_GET_EC_FUNCTION :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38243]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27363]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#11479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49284 (0 0xc084) == 49284 (0xc084) [#25904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15734]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47524 (0 0xb9a4) == 47524 (0xb9a4) [#13426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23104 (0 0x5a40) == 23104 (0x5a40) [#19531]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#24348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25084]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#11490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21871]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#35407]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8944]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27925]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27874]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#230]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#35180]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#11763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#24075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#36611]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#11814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#10464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#29223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13361]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#10880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#22303]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2745]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4761 (0x x1299) == 4761 (0x1299) [#25598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#22595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#23126]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13453]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#11186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87025 (0 0x153f1) == 87025 (0x153f1) [#13580]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#35011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21629]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38201]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38837]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24550]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18593]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#10756]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#28727]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85264 (0 0x14d10) == 85264 (0x14d10) [#13574]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33686]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36896]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26259]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7919]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#36664]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12618]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#35704]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256036 ( (0x3e824) == 256036 (0x3e824) [#32707]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#10011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30914]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34553]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178084 ( (0x2b7a4) == 178084 (0x2b7a4) [#13834]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 920 (0x398) == 920 (0x398) [#40260]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#27482]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#10857]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2356]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12210]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30674]", "pinned_map_enum :: results.find(pin_path) != results.end() for: {?} != {?} [#41494]", "ring_buffer_output :: consumer == producer for: 18 == 18 [#40760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27040]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#28640]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169 == 169 [#29593]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 634 (0x27a) == 634 (0x27a) [#40403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#29533]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96721 (0 0x179d1) == 96721 (0x179d1) [#26082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26588]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56644 (0xd dd44) == 56644 (0xdd44) [#994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31496]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#11378]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 262 (0x106) == = 262 (0x106) [#39825]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#29555]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#10040]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2923]", "async :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#40727]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7770]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37352]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6150]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 374 (0x176) == 374 (0x176) [#40533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#36553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#23524]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25354]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20491]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26297]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 898 (0x382) == 898 (0x382) [#40271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26947]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 758 (0x2f6) == = 758 (0x2f6) [#40073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6354]", "ring_buffer_async_query :: ebpf_map_update_entry(map.get(), 0, nullptr, 0, nullptr, EBPF_ANY, 0) ) == EBPF_OPERATION_NOT_SUPPORTED for: 18 == 18 [#37801]", "bindmonitor-bpf2bpf-jit :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#41006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24695]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#34635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21692]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18893]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#35877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#29553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21352]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38334]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#35297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#30346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 14 46689 (0x23d01) [#9443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22280]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 86 == 86 [#39136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19460]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#35250]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 744 (0x2e8) == 744 (0x2e8) [#40348]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 0 == 0 [#38805]", "bindmonitor-tailcall-interpret :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41051]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5837]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#30097]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#29218]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22853]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 580 (0x244) == 580 (0x244) [#40430]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66049 (0 0x10201) == 66049 (0x10201) [#19741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#22797]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2116 (0x x844) == 2116 (0x844) [#25552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12406]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#29122]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18805]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#36116]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26789]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31526]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 460 (0x1cc) == 460 (0x1cc) [#40490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15115]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33614]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#24945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27973]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#10619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#28980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18305]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#30331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25375]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8691]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#23258]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28074]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30679]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32328]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#33747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#35439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24634]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#27011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8836 (0x x2284) == 8836 (0x2284) [#19415]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7056 (0x1 1b90) == 7056 (0x1b90) [#6923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15283]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2466]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#553]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#28]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#35403]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#35625]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6313]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8292]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7730]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#28190]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 400 (0x1 190) == 400 (0x190) [#19267]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9070]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3707]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3102]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34421]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 199809 ( (0x30c81) == 199809 (0x30c81) [#20121]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#30587]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2344]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#23709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34997]", "bindmonitor-bpf2bpf-jit :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#41007]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#36002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#36074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#23092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13429]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#36119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49 == 49 [#36264]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6976]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94249 (0 0x17029) == 94249 (0x17029) [#32309]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 792 (0x318) == = 792 (0x318) [#40090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21466]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33856 (0 0x8440) == 33856 (0x8440) [#19595]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27907]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9519]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 120409 ( (0x1d659) == 120409 (0x1d659) [#32389]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#30197]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#34686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 228484 ( (0x37c84) == 228484 (0x37c84) [#26416]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121801 ( (0x1dbc9) == 121801 (0x1dbc9) [#13688]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#35115]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34105]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#36332]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34717]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 1537 76 (0x3c10) [#9969]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42436 (0 0xa5c4) == 42436 (0xa5c4) [#25872]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27613]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#33366]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8126]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 172 == 172 [#39780]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27226]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 ( (0x790) [#8426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28105]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 344 (0x158) == = 344 (0x158) [#39866]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82369 (0x x141c1) == 82369 (0x141c1) [#7329]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#54]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14067]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#23369]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 8 == 8 [#38978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8919]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18753]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10609 (0x x2971) == 10609 (0x2971) [#6961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30744]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30978]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 16 == 16 [#39057]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225 == 225 [#30240]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#28391]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1974]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 202500 ( (0x31704) == 202500 (0x31704) [#13890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 676 600 (0x10810) [#9074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37254]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#10593]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33716]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101124 ( (0x18b04) == 101124 (0x18b04) [#26096]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3286]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9640]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26606]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 494 (0x1ee) == = 494 (0x1ee) [#39941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0x02) == EBPF_SUCCESS for: 0 == 0 [#18703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 707 756 (0x11464) [#9092]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32853]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 400 (0x190) == = 400 (0x190) [#39894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18389]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25749]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#29128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20747]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#11889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14582]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 240100 ( (0x3a9e4) == 240100 (0x3a9e4) [#13970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56644 (0 0xdd44) == 56644 (0xdd44) [#19703]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1601]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 181476 (0 0x2c4e4) == 181476 (0x2c4e4) [#1370]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#30160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24881]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#10105]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26818]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38756]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#29187]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#36596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 113569 (0 0x1bba1) == 113569 (0x1bba1) [#1192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32530]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#22666]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#10135]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#265]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#22523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26759]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169 == 1 169 [#25486]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12586]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31116]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25611]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 848 (0x350) == = 848 (0x350) [#40118]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27711]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18842]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32969]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#10628]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25185]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 686 644 (0x10c24) [#9080]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 186624 ( (0x2d900) == 186624 (0x2d900) [#32559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#30038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#24025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#22535]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#34787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9736]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#10358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#24136]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15902]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37390]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#36347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25316]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.16.25/32\"' and 'correct_value := \"192.168.16.0/24\"' [#37459]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9438]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25921 (0 0x6541) == 25921 (0x6541) [#13312]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8754]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#29839]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#10308]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169744 (0 0x29710) == 169744 (0x29710) [#1342]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#10891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#22334]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#29760]", "EBPF_OPERATION_RESOLVE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37843]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#23112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#36279]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#30349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28111]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#10547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20008]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#27779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20420]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 (0x1299) [#9908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#29415]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110889 (0 0x1b129) == 110889 (0x1b129) [#7421]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34208]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63001 (0 0xf619) == 63001 (0xf619) [#32197]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#24315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15610]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4106]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13311]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37314]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14201]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26905]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9700]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20692]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#10578]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 192.168.15.0/24\"' and 'return_value := \"192.168.15.0/24\"' [#37524]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33397]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33126]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39437]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34733]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46656 (0 0xb640) == 46656 (0xb640) [#25892]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#10508]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8841]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8062]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 22 21841 (0x36291) [#9707]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 326 (0x146) == = 326 (0x146) [#39857]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#11162]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8076]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#34296]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#29569]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: memcmp(&retrieved_map_definition, &map_definition, sizeof(map_definit tion)) == 0 for: 0 == 0 [#31175]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30862]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31452]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22454]", "access_check :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104976 ( (0x19a10) == 104976 (0x19a10) [#26108]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34301]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26904]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32997]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37243]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 688 (0x2b0) == 688 (0x2b0) [#40376]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#35906]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#35255]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26115]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32750]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26948]", "hash_table_test :: ebpf_hash_table_find(table.get(), key_1.data(), &returned_value) == E EBPF_SUCCESS for: 0 == 0 [#38438]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#21009]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8232]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22106]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13919]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8844]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25111]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156816 ( (0x26490) == 156816 (0x26490) [#26252]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96721 (0x x179d1) == 96721 (0x179d1) [#1140]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 28 == 28 [#38861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184900 ( (0x2d244) == 184900 (0x2d244) [#13850]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#30508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12503]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14283]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2868]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 132496 ( (0x20590) == 132496 (0x20590) [#19955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20254]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19944]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 712 (0x2c8) == = 712 (0x2c8) [#40050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#11178]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#28897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15484]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12694]", "epoch_test_single_epoch_cache_aligned :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38498]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#30553]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#30431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#22749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 155236 (0 0x25e64) == 155236 (0x25e64) [#7543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 823 369 (0x141c1) [#9155]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#28772]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33796]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#10953]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6138]", "trampoline_test :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30936]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26754]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34061]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#491]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#10916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21635]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#30584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31511]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1935]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#34793]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#29851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25769]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#28612]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27414]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25743]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1755]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#36701]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21716]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14875]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22211]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#36391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19165]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 16 67281 (0x28d71) [#9521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#22932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20673]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#29604]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184041 ( (0x2cee9) == 184041 (0x2cee9) [#26318]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72361 (0x x11aa9) == 72361 (0x11aa9) [#7293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7225 (0x x1c39) == 7225 (0x1c39) [#13160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#35230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128881 ( (0x1f771) == 128881 (0x1f771) [#19945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15452]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#34815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6643]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12118]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#17]", "work_queue :: KeWaitForSingleObject(&work_item_context.completion_event, Executive, , KernelMode, 0, &timeout) == ((DWORD )0x00000102L) for: 258 (0x102) == 258 (0x10 02) [#40850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136161 ( (0x213e1) == 136161 (0x213e1) [#26198]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5875]", "EBPF_OPERATION_RESOLVE_MAP :: invoke_protocol(EBPF_OPERATION_RESOLVE_MAP, request, reply) == EBPF_I INVALID_OBJECT for: 5 == 5 [#37863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#11519]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#33357]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37394]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#418]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142129 (0 0x22b31) == 142129 (0x22b31) [#7509]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 1276 69 (0x31e1) [#9956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19942]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30922]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#30491]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38356]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#30114]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12536]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13691]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 236196 (0 0x39aa4) == 236196 (0x39aa4) [#7727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#29656]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#537]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#30107]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5740]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25250]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6704]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21950]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2377]", "map_crud_operations_stack :: return_value == value for: 9 == 9 [#37732]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#29314]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32893]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31149]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 0 == 0 [#38804]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14842]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19044 (0 0x4a64) == 19044 (0x4a64) [#25736]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13927]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164025 ( (0x280b9) == 164025 (0x280b9) [#20037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#29949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27052]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#30521]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6188]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136900 ( (0x216c4) == 136900 (0x216c4) [#13730]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5735]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#35139]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37186]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19378]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7248]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#168]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7888]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 120409 (0 0x1d659) == 120409 (0x1d659) [#7449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 11 12896 (0x1b900) [#9302]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#10338]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38251]", "EBPF_OPERATION_UPDATE_PINNING :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38167]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#11653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#35094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#36340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#23985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6826]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24575]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#23620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 244036 ( (0x3b944) == 244036 (0x3b944) [#13978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18655]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38087]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#30259]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#24110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12496]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21670]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19530]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#22029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#22658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27514]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26570]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#46]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#29345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#28539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#11599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29584 (0x x7390) == 29584 (0x7390) [#7099]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40000 (0x9 9c40) == 40000 (0x9c40) [#918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32865]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#10635]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#21921]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#23535]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32979]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#33822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16769]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 261121 (0 0x3fc01) == 261121 (0x3fc01) [#1540]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37231]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#24196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59049 (0 0xe6a9) == 59049 (0xe6a9) [#13476]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39478]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#36335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60516 (0 0xec64) == 60516 (0xec64) [#25952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#33723]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#11760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#35952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#36703]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#34920]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10534]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20307]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12337]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#10067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19102]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 540 (0x21c) == 540 (0x21c) [#40450]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#29633]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54756 (0 0xd5e4) == 54756 (0xd5e4) [#32163]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8200]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38638]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#30181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15095]", "EBPF_OPERATION_RESOLVE_MAP :: invoke_protocol(EBPF_OPERATION_RESOLVE_MAP, request, reply) == EBPF_I INVALID_OBJECT for: 5 == 5 [#37865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8174]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#11755]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#30367]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#34692]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19264]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#30061]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/119\"' and 'correct_value := \"DD/116\"' [#37624]", "map_crud_operations_queue :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37665]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#114]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40939]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3783]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33976]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 836 (0x344) == 836 (0x344) [#40302]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#29921]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 244036 ( (0x3b944) == 244036 (0x3b944) [#20215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#28761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33533]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 192.168.14.0/31\"' and 'return_value := \"192.168.14.0/31\"' [#37530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#36644]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37947]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#579]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#10960]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25401]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6332]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 127449 (0 0x1f1d9) == 127449 (0x1f1d9) [#1232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#35893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27949]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34201]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39432]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#29084]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32152]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1905]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20768]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 249001 ( (0x3cca9) == 249001 (0x3cca9) [#26458]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#11094]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3271]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38900]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 200 == 200 [#39794]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7022]", "EBPF_OPERATION_RESOLVE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37844]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18768]", "serialize_program_info_test :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38786]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38232]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2227]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#11815]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9142]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#34233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33724]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 13 35424 (0x21100) [#9398]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25326]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#29951]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35302]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33436]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21436]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#35032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126736 ( (0x1ef10) == 126736 (0x1ef10) [#32407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#35873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14726]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3429]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 2722 25 (0x6a59) [#8789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19480]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#34915]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#29595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#24029]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20164 (0 0x4ec4) == 20164 (0x4ec4) [#25744]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20739]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207025 ( (0x328b1) == 207025 (0x328b1) [#20137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#22731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 221841 (0 0x36291) == 221841 (0x36291) [#1460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14312]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#23656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#30236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#22732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6400 (0x1 1900) == 6400 (0x1900) [#6915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#24064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#20973]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 (0x1324) [#9909]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#30267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#29881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#30613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19444]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33889]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18265]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13219]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1289]", "EBPF_OPERATION_RESOLVE_HELPER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 5664 44 (0xdd44) [#9008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#23711]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#34116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18853]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51529 (0 0xc949) == 51529 (0xc949) [#32149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20394]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26244 (0 0x6684) == 26244 (0x6684) [#32019]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 187489 (0 0x2dc61) == 187489 (0x2dc61) [#7621]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12318]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 790 (0x316) == = 790 (0x316) [#40089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81 == 81 [#36407]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#24038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24722]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38134]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#335]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#21489]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#36690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28173]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"19 92.168.0.0/16\"' [#37521]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#35761]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#35088]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1000 (0x3e8) = == 1000 (0x3e8) [#40194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24636]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144400 (0 0x23410) == 144400 (0x23410) [#1278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13441]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#35645]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81796 (0x x13f84) == 81796 (0x13f84) [#7327]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3025 (0x xbd1) == 3025 (0xbd1) [#31805]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#33372]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27900]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#36411]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3252]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6717]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28216]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 245025 ( (0x3bd21) == 245025 (0x3bd21) [#32685]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 218089 ( (0x353e9) == 218089 (0x353e9) [#32629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27888]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#24141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#23702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20581]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 892 (0x37c) == 892 (0x37c) [#40274]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2009]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11989]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#23953]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81 == 81 [#29158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#23655]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225 == 225 [#27278]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 220900 ( (0x35ee4) == 220900 (0x35ee4) [#26400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#22221]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6176]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18209]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18953]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#34674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#35706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#21594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#22518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#33621]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8938]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2719]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#34368]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39263]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32041 (0 0x7d29) == 32041 (0x7d29) [#13348]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 2250 00 (0x57e4) [#9997]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3099]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 2 for: 2 == 2 [#38459]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37342]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34018]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8400]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#35495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#35072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#23727]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#22293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#10683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 74529 (0 0x12321) == 74529 (0x12321) [#26006]", "map_crud_operations:BPF_MAP_TYPE_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#4687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3567]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27276]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.14.0/29\"' [#37426]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#11055]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#22074]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18496 (0 0x4840) == 18496 (0x4840) [#19499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20887]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#10866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35344 (0 0x8a10) == 35344 (0x8a10) [#32071]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39467]", "error codes :: result2 == result for: 7 == 7 [#40789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37225]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6179]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31003]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#36823]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3132]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#10815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#10510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19306]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27433]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53361 (0x xd071) == 53361 (0xd071) [#7217]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5952]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7576]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 739 984 (0x12100) [#9110]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 504 (0x1f8) == = 504 (0x1f8) [#39946]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40901]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139129 (0 0x21f79) == 139129 (0x21f79) [#1264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13537]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#27605]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8559]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#859]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8676]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35344 (0 0x8a10) == 35344 (0x8a10) [#19603]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#35343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20558]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#11934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33725]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12087]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106276 (0 0x19f24) == 106276 (0x19f24) [#7407]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#38]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#28864]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9564]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6451]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#681]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#288]", "map_crud_operations_queue :: return_value == value for: 9 == 9 [#37699]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#29669]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#23428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#27194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25997]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38261]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14361]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#22630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19112]", "show verification xdp_datasize_unsafe.o :: output_line == expected_output_line for: \"\" == \"\" [#42399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#34599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#23014]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12065]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#11524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12539]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33455]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#35738]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1681 (0x69 91) == 1681 (0x691) [#600]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1793]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#23871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20437]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(previous_key), reinterpret_cast< <const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key)) == EBPF_N NO_MORE_KEYS for: 25 == 25 [#33231]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#23386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6727]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22288]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27012]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37827]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38908]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#35322]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1833]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30711]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#21840]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34093]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#29785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#23710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19881 (0 0x4da9) == 19881 (0x4da9) [#31977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#30365]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 223729 ( (0x369f1) == 223729 (0x369f1) [#32641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20397]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#35574]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#10799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#21741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#23405]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#28653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#10503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32446]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#24236]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#30132]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 ( (0x441) [#8393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15197]", "droppacket-jit :: hook_result == XDP_PASS for: 1 == 1 [#40873]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219024 (0 0x35790) == 219024 (0x35790) [#7691]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"192.168.14.0/29\" == \"192.168.14.0/29 9\" with 2 messages: 'key_string := \"192.168.14.0/29\"' and 'return_value := \"192.1 168.14.0/29\"' [#37538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119025 ( (0x1d0f1) == 119025 (0x1d0f1) [#13680]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#24043]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#36179]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#11460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20604]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20026]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#10372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#21123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13563]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#28621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 248004 ( (0x3c8c4) == 248004 (0x3c8c4) [#13986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19738]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#36685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26343]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 358 (0x166) == 358 (0x166) [#40541]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 242064 ( (0x3b190) == 242064 (0x3b190) [#20211]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"DD/124\"' [#37579]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#28754]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 126 == 126 [#39116]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: invoke_protocol(EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER, request, , reply) == EBPF_INVALID_OBJECT for: 5 == 5 [#38360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10404 (0 0x28a4) == 10404 (0x28a4) [#13194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12900]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 1638 84 (0x4000) [#9973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#34962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#24128]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#10672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20909]", "bindmonitor-bpf2bpf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41035]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#27233]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#10273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21172]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15040]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 150544 (0 0x24c10) == 150544 (0x24c10) [#1294]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#11799]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 ( (0xcb1) [#9894]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25364]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#11853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28075]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44100 (0 0xac44) == 44100 (0xac44) [#32115]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#30420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 182329 ( (0x2c839) == 182329 (0x2c839) [#13844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#29222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6431]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2137]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 4972 29 (0xc241) [#8963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1359]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#23886]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#11372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#21978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#23493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#29270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#36125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#29466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#28891]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#11954]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#29627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#24072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21646]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20351]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 606 (0x25e) == 606 (0x25e) [#40417]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 22 == 22 [#40709]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17956 (0 0x4624) == 17956 (0x4624) [#25728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18714]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#35852]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#30381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16015]", "EBPF_OPERATION_CREATE_MAP :: invoke_protocol(EBPF_OPERATION_CREATE_MAP, request, reply) == EBPF_IN NVALID_ARGUMENT for: 6 == 6 [#37926]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#35090]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 2528 81 (0x62c1) [#8771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#23250]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3969 (0x xf81) == 3969 (0xf81) [#31821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#10231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#10952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#21309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#30246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#35117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 1254 44 (0x3100) [#8630]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 500 (0x1f4) == 500 (0x1f4) [#40470]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#23993]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#34850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19954]", "access_check :: ConvertStringSecurityDescriptorToSecurityDescriptorW( deny_sddl, 1, ( (PSECURITY_DESCRIPTOR*)&sd, &sd_size) for: 1 [#38738]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2304 (0x x900) == 2304 (0x900) [#19323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9522]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 496 (0x1f0) == 496 (0x1f0) [#40472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#30188]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#29209]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12960]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34379]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25369]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#33645]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 176400 (0 0x2b110) == 176400 (0x2b110) [#7595]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 292 (0x124) == 292 (0x124) [#40574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20373]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9459]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#72]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#22489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18234]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#35414]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20600]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4 == 4 [#28804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14275]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#10182]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38333]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#29821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26573]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#10968]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#987]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20591]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7903]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 564 (0x234) == = 564 (0x234) [#39976]", "epoch_test_two_threads :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#24319]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.14.0/31\"' and 'correct_value := \" \"192.168.14.0/31\"' [#37437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21589]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 (0x1104) [#8492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 180625 ( (0x2c191) == 180625 (0x2c191) [#20077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24749]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#28658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13163]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25256]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#22436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#28124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8100 (0x x1fa4) == 8100 (0x1fa4) [#19407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16641 (0 0x4101) == 16641 (0x4101) [#19485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#29946]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32772]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7164]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 292 (0x124) == = 292 (0x124) [#39840]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#36083]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#29426]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22396]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32498]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21184]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#10401]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#24240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20563]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#24189]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27865]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14308]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3934]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20736 (0 0x5100) == 20736 (0x5100) [#25748]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39592]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#11312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#23452]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#36038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49729 (0 0xc241) == 49729 (0xc241) [#13436]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19330]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#11357]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15005]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40804 (0 0x9f64) == 40804 (0x9f64) [#25864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#22352]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30738]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25060]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6400 (0x19 900) == 6400 (0x1900) [#678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169744 ( (0x29710) == 169744 (0x29710) [#13814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142884 (0 0x22e24) == 142884 (0x22e24) [#7511]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21545]", "hash_table_stress_test :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38469]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#33]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: invoke_protocol(EBPF_OPERATION_LOAD_NATIVE_MODULE, request, reply) == = EBPF_INVALID_ARGUMENT for: 6 == 6 [#38003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#23127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#35123]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 30 == 30 [#38866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 83521 (0 0x14641) == 83521 (0x14641) [#13568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25 == 25 [#31705]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 226576 ( (0x37510) == 226576 (0x37510) [#26412]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8553]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#35697]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33599]", "EBPF_OPERATION_CREATE_MAP :: invoke_protocol(EBPF_OPERATION_CREATE_MAP, request, reply) == EBPF_IN NVALID_FD for: 4 == 4 [#37923]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#35527]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#28847]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#30659]", "hash_table_test :: ebpf_hash_table_update(table.get(), key_3.data(), data_3.data(), EBPF F_HASH_TABLE_OPERATION_ANY) == EBPF_SUCCESS for: 0 == 0 [#38428]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72900 (0x x11cc4) == 72900 (0x11cc4) [#1058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21731]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7885]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#11085]", "epoch_test_single_epoch :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#24265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14915]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2932]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34004]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12211]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#10297]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18769 (0 0x4951) == 18769 (0x4951) [#31969]", "hash_table_stress_test :: ebpf_hash_table_create(&table, &options) == EBPF_SUCCESS for: 0 == 0 [#38471]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25081]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#33837]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#36714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#29321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7225 (0x x1c39) == 7225 (0x1c39) [#31865]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#24309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16578]", "map_crud_operations_stack :: return_value == value for: 10 == 10 [#37730]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9081]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8649 (0x x21c9) == 8649 (0x21c9) [#25646]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18748]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"CD/96\"' [#37590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#36140]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#29727]", "EBPF_OPERATION_RESOLVE_HELPER :: invoke_protocol(EBPF_OPERATION_RESOLVE_HELPER, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37836]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#29954]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#21486]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#10901]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5788]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112225 (0 0x1b661) == 112225 (0x1b661) [#1188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32987]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#29635]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(bad_key), reinterpret_cast<co onst uint8_t*>(&bad_key), 0) == expected_result for: 6 == 6 [#19225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19372]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26053]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#22806]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34534]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38628]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31087]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8818]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18386]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#28920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#24268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26680]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31021]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_DELETE_ELEMENT, request) == EBPF_I INVALID_ARGUMENT for: 6 == 6 [#38111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#21993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33110]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#23041]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13073]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24949]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2674]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90601 (0 0x161e9) == 90601 (0x161e9) [#26062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#34823]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#24066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13723]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 257049 (0 0x3ec19) == 257049 (0x3ec19) [#1532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31260]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#823]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#433]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#10993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#23683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25382]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33039]", "program :: ebpf_allocate_trampoline_table(1, &local_table) == EBPF_SUCCESS for: 0 == 0 [#37759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13223]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7780]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21229]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5892]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#35137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31552]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33656]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12799]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32789]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#24213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7584]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 233289 ( (0x38f49) == 233289 (0x38f49) [#32661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34607]", "map_crud_operations_stack :: return_value == value for: 8 == 8 [#37734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#22855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21263]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#10761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#23031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19716]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38693]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39241]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28561 (0 0x6f91) == 28561 (0x6f91) [#32033]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5995]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8289]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#10830]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30861]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38154]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25074]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30852]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14324]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14884 (0 0x3a24) == 14884 (0x3a24) [#25704]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2202]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4 == 4 [#25464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6889 (0x x1ae9) == 6889 (0x1ae9) [#13156]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 598 (0x256) == 598 (0x256) [#40421]", "interlocked operations :: value32 == 0xffff for: 65535 (0xffff) == 65535 (0xffff) [#40817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#29231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20894]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9565]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7350]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#34194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#29634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 665 564 (0x10404) [#9068]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31165]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 804 (0x324) == = 804 (0x324) [#40096]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#22677]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 354 (0x162) == 354 (0x162) [#40543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#29661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#24380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32912]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#27737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#24123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24877]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#35025]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2045]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 260100 ( (0x3f804) == 260100 (0x3f804) [#32715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#10760]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#11598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58564 (0 0xe4c4) == 58564 (0xe4c4) [#32179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28362]", "ring_buffer_async_query :: ebpf_map_find_entry(map.get(), 0, nullptr, 0, nullptr, 0) == EBPF_OPE ERATION_NOT_SUPPORTED for: 18 == 18 [#37806]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#35084]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4225 (0x x1081) == 4225 (0x1081) [#19357]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#11169]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#35726]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22048]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#29119]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#22086]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6520]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 961 (0x3 3c1) == 961 (0x3c1) [#19289]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#23120]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12883]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7196]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22682]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25049]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#27866]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 984 (0x3d8) == = 984 (0x3d8) [#40186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#773]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16900 (0x4 4204) == 16900 (0x4204) [#778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24672]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112896 ( (0x1b900) == 112896 (0x1b900) [#26132]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#24302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14672]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 12 == 12 [#38976]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12859]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5754]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.16.0/24\" == \"192.168.16.0 0/24\" with 2 messages: 'key_string := \"192.168.16.25/32\"' and 'correct_value := \" \"192.168.16.0/24\"' [#37460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173889 ( (0x2a741) == 173889 (0x2a741) [#13824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31734]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#28031]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#34949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19678]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#34828]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 878 (0x36e) == = 878 (0x36e) [#40133]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 968 (0x3c8) == = 968 (0x3c8) [#40178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37053]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#23304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 1345 56 (0x3490) [#8642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14938]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9396]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7921 (0x x1ef1) == 7921 (0x1ef1) [#19405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#21942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31290]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24569]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"CC/96\" == \"CC/96\" with 1 message: 'key_string := \"CC/96\"' [#37589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10000 (0 0x2710) == 10000 (0x2710) [#19427]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 400 (0x19 90) == 400 (0x190) [#6795]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 870 025 (0x153f1) [#9179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#21120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#29594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7056 (0x x1b90) == 7056 (0x1b90) [#19395]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#10460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#22601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#23988]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#24283]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 880 (0x370) == 880 (0x370) [#40280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34436]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#11318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19704]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9757]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#10750]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#30031]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 106 == 106 [#39747]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 958 (0x3be) == = 958 (0x3be) [#40173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20188]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18384]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9313]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9397]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#22405]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2419]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40804 (0x9 9f64) == 40804 (0x9f64) [#922]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 1932 21 (0x4b79) [#8711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#29645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33368]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123904 (0 0x1e400) == 123904 (0x1e400) [#7459]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207936 ( (0x32c40) == 207936 (0x32c40) [#32607]", "bindmonitor-bpf2bpf-interpret :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#41028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#24210]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2781]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#11473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#35963]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#10864]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#28844]", "error codes :: result2 == result for: 28 == 28 [#40810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#23947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12303]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30811]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38303]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#36215]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2353]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#11860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#22838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#29697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14896]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18586]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25215]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#22722]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34366]", "invalid_bpf_get_socket_cookie :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#42120]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5822]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3207]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1911]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26965]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37916]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#33432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18745]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10404 (0 0x28a4) == 10404 (0x28a4) [#19431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#30233]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16 == 16 [#6763]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#10656]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#10543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8279]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#29544]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 835 521 (0x14641) [#9161]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18719]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#270]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 2 == 2 [#38880]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26083]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#24204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7890]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32044]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#36450]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36100 (0 0x8d04) == 36100 (0x8d04) [#32075]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#11789]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 352 (0x160) == 352 (0x160) [#40544]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#6238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15541]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 928 (0x3a0) == = 928 (0x3a0) [#40158]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#11919]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32282]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#35033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15107]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22606]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26253]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2068]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 254016 (0 0x3e040) == 254016 (0x3e040) [#1526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#23799]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#29041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11025 (0 0x2b11) == 11025 (0x2b11) [#25670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#11420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#21540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#24316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#30393]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2529]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1892]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18666]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14894]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#11917]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27075]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18952]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33746]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#36607]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26111]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#10730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#29282]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#11097]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#23894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 217156 ( (0x35044) == 217156 (0x35044) [#13922]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148225 (0 0x24301) == 148225 (0x24301) [#7525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#23459]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#10699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33856 (0 0x8440) == 33856 (0x8440) [#13358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15721]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28344]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#10751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#22545]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#34224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#34891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32828]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12837]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#28605]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#35328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27921]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#30315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#22598]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 58 == 58 [#39723]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#24165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#34299]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7776]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22253]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#28644]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#11909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20204]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24962]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37670]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#10003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19778]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207025 (0 0x328b1) == 207025 (0x328b1) [#7665]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#34863]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#35385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#36075]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26225]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7608]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39182]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3481 (0x xd99) == 3481 (0xd99) [#19345]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21530]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#28334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19014]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#11416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 213444 ( (0x341c4) == 213444 (0x341c4) [#13914]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34361]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#36737]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39258]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 205209 ( (0x32199) == 205209 (0x32199) [#32601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14785]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27315]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33394]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#36798]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#10705]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#11175]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21631]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27609]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2184]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7486]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33782]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 454 (0x1c6) == = 454 (0x1c6) [#39921]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33262]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99225 (0x x18399) == 99225 (0x18399) [#1148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#11543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1681 (0x x691) == 1681 (0x691) [#19309]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 548 (0x224) == 548 (0x224) [#40446]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25258]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32929]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#10682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#33741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22148]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 86436 (0 0x151a4) == 86436 (0x151a4) [#26048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#35858]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35226]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14268]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31481]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#30438]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8943]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#36693]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#29188]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#21228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22235]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#21495]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#541]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 836 (0x344) == = 836 (0x344) [#40112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#36141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#11280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#36796]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12717]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#11036]", "pinning_test :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42849 (0x xa761) == 42849 (0xa761) [#7169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#22982]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#22522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19009]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7392]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#34943]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 12 23201 (0x1e141) [#9347]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6742]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82369 (0x x141c1) == 82369 (0x141c1) [#1092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18486]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32188]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#29808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#29401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#22927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#27854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#10956]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#36783]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 175561 ( (0x2adc9) == 175561 (0x2adc9) [#13828]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3082]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#33831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12100 (0 0x2f44) == 12100 (0x2f44) [#19447]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1161]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13071]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#30470]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#29171]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#23012]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6696]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#242]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1546]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24632]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 24 == 24 [#40708]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#29173]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25925]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#34737]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#10548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#28355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3612]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#28988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#29509]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#29531]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 166 == 166 [#40637]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6258]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#35843]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 5017 76 (0xc400) [#8966]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12814]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25775]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#10506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18799]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#22480]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#23789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119716 ( (0x1d3a4) == 119716 (0x1d3a4) [#13682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#34882]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#30614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31226]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27691]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19592]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81 == 81 [#19245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#34914]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#29355]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 190 == 190 [#40625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#22531]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28137]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 979 969 (0x17eb1) [#9233]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#29417]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#185]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7884]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#23239]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12321 (0x x3021) == 12321 (0x3021) [#6977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#11239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28900 (0 0x70e4) == 28900 (0x70e4) [#13330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13265]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9112]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#11701]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1887]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#22646]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 253009 ( (0x3dc51) == 253009 (0x3dc51) [#13996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#24033]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#29134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#22886]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#36402]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#11429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20251]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 914 (0x392) == = 914 (0x392) [#40151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14723]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9790]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26697]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 227529 ( (0x378c9) == 227529 (0x378c9) [#13944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#35651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20380]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15940]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47524 (0 0xb9a4) == 47524 (0xb9a4) [#32131]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#28682]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#29732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#34125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34451]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38299]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196 == 196 [#33867]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25038]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#29557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81 == 81 [#35371]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#11877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30775]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#20811]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10201 (0x2 27d9) == 10201 (0x27d9) [#720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2500 (0x x9c4) == 2500 (0x9c4) [#31795]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 650 (0x28a) == 650 (0x28a) [#40395]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#28256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#30606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#35024]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9435]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27999]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7225 (0x x1c39) == 7225 (0x1c39) [#19397]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18907]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 246016 ( (0x3c100) == 246016 (0x3c100) [#20219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20572]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#9835]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9727]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#24360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#23488]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6166]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 802 (0x322) == = 802 (0x322) [#40095]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#623]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#11348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#29612]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31687]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#11658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#10844]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20654]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1225]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#11013]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12623]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22500 (0x5 57e4) == 22500 (0x57e4) [#818]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6914]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#27986]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19167]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 122500 (0 0x1de84) == 122500 (0x1de84) [#7455]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94249 (0x x17029) == 94249 (0x17029) [#7369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30974]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20655]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 108 == 108 [#40666]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#35654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31656]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#35409]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#35563]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8304]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14221]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25133]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#35205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#29927]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#35221]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#30534]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 248004 ( (0x3c8c4) == 248004 (0x3c8c4) [#26456]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#10463]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37636 (0 0x9304) == 37636 (0x9304) [#32083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#11088]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#243]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38777]", "epoch_test_single_epoch :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12010]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9 == 9 [#34911]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116964 (0 0x1c8e4) == 116964 (0x1c8e4) [#7439]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19274]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26766]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32761 (0x x7ff9) == 32761 (0x7ff9) [#7117]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#35641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#23446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20038]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 107584 (0 0x1a440) == 107584 (0x1a440) [#1174]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#11620]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22250]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#23857]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#30430]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#22611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#21045]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#23202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#23196]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#11841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14164]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5184 (0x x1440) == 5184 (0x1440) [#25604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106929 ( (0x1a1b1) == 106929 (0x1a1b1) [#19881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#21618]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#29611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14144]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38338]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#29164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#24100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#23149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#21738]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#33843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#36478]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#36297]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1542]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37134]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19420]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#28313]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 158404 (0 0x26ac4) == 158404 (0x26ac4) [#1314]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32758]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25029]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32989]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3669]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16024]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#21015]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32424]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8689]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39226]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37937]", "bindmonitor-bpf2bpf-native :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#41020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20969]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 592 (0x250) == 592 (0x250) [#40424]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 990 (0x3de) == 990 (0x3de) [#40225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#33249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#21804]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2064]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12075]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 172225 (0 0x2a0c1) == 172225 (0x2a0c1) [#7585]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#23634]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#35326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#35938]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#24264]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8842]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#11622]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14153]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12304]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27006]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28800]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#539]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 376 (0x178) == 376 (0x178) [#40532]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 120 == 120 [#39109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#36518]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2599]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31431]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36 == 36 [#30406]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#36289]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 175561 ( (0x2adc9) == 175561 (0x2adc9) [#26298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#27875]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#36550]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1740]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 147456 (0 0x24000) == 147456 (0x24000) [#7523]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 8 == 8 [#39053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#23590]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#29966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#29890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#22788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key) - 1, reinterpret_cast<uint8 8_t*>(&key), reinterpret_cast<uint8_t*>(&key)) == EBPF_INVALID_ARGUMENT for: 6 == = 6 [#31176]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44944 (0xa af90) == 44944 (0xaf90) [#942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#22370]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33616]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19796]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#24394]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 18 86624 (0x2d900) [#9590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20164 (0 0x4ec4) == 20164 (0x4ec4) [#19511]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#34953]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#22999]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73984 (0 0x12100) == 73984 (0x12100) [#26004]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#36263]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#10435]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#28151]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21134]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#28673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100 == 100 [#28846]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#35578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34181]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101761 ( (0x18d81) == 101761 (0x18d81) [#13628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68121 (0x x10a19) == 68121 (0x10a19) [#7277]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28372]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#29310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#23783]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 258064 ( (0x3f010) == 258064 (0x3f010) [#32711]", "get_authentication_id :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#40831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#22431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#29795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#35896]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#10485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#35967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31143]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#29616]", "ring_buffer_output :: ebpf_ring_buffer_return(ring_buffer, (producer - consumer) % size) == = EBPF_SUCCESS for: 0 == 0 [#40763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13705]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2628]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#29283]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#30237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31091]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#33981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32084]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#28996]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#28721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20941]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7386]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25773]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#35857]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19916]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#29674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#36389]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#10236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19316]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39331]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24832]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34747]", "program :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#37782]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#10817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#22309]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#21615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12944]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14839]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#10818]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37857]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12402]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19032]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9232]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#23183]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31162]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#30585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#24171]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131769 ( (0x202b9) == 131769 (0x202b9) [#32421]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#34140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50625 (0 0xc5c1) == 50625 (0xc5c1) [#13440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37249 (0 0x9181) == 37249 (0x9181) [#19613]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47961 (0x xbb59) == 47961 (0xbb59) [#7193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#10320]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2341]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 676 (0x2 2a4) == 676 (0x2a4) [#31747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#35351]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#35889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37312]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#29548]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 786 (0x312) == = 786 (0x312) [#40087]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#29022]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24964]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#28388]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#29407]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#29378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#28663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15767]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(bad_key), reinterpret_cast<cons st uint8_t*>(&bad_key), 0) == expected_result for: 0 == 0 [#516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#10240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#35747]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25921 (0x6 6541) == 25921 (0x6541) [#840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160801 ( (0x27421) == 160801 (0x27421) [#13792]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#10725]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20510]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3969 (0xf f81) == 3969 (0xf81) [#6881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 149769 ( (0x24909) == 149769 (0x24909) [#20001]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#191]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#22573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19708]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184900 ( (0x2d244) == 184900 (0x2d244) [#32555]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77841 (0 0x13011) == 77841 (0x13011) [#13548]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2021]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12191]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#28262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19424]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 22 == 22 [#38858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 18 87489 (0x2dc61) [#9593]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#10837]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#35175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34384]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38591]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#11854]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#29267]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 38 == 38 [#39068]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#30433]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#30578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14959]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20914]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#27458]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36 == 36 [#27776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33162]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27903]", "serialize_program_info_test :: strncmp(in_prototype->name, out_prototype->name, 256) == 0 for: 0 == 0 [#38808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#30142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21769]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 48 == 48 [#38958]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2898]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#23667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1217]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30962]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8869]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1069]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63504 (0x xf810) == 63504 (0xf810) [#1022]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30276 (0x7 7644) == 30276 (0x7644) [#866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37636 (0 0x9304) == 37636 (0x9304) [#19615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 72 <= 612 (0x264) [#16635]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#28969]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21638]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 ( (0x790) [#9879]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30669]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8347]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8044]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#10513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13323]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#22469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8221]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31740]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#29258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#21261]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20565]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32016]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80656 (0x x13b10) == 80656 (0x13b10) [#1086]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15128]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 189225 (0 0x2e329) == 189225 (0x2e329) [#7625]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37955]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28225]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#71]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2775]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#28545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#29941]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#27581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26743]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#11110]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6027]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#36542]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#11801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#34837]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30835]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3139]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12544 (0x3 3100) == 12544 (0x3100) [#742]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37886]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 237169 ( (0x39e71) == 237169 (0x39e71) [#32669]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30938]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#130]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15320]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12657]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 48 == 48 [#38940]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 586 (0x24a) == 586 (0x24a) [#40427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32502]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14551]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7312]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#30602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#22809]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#11939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9168]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116281 (0 0x1c639) == 116281 (0x1c639) [#1200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#24259]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34555]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#355]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34156]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26978]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#29388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15796]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#24274]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#23458]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#29964]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#35783]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#29591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20532]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8766]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#21744]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1089]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24544]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1849 (0x x739) == 1849 (0x739) [#31781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178929 ( (0x2baf1) == 178929 (0x2baf1) [#20073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2809 (0x xaf9) == 2809 (0xaf9) [#19333]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#27206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#33783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#22430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 (0x2284) [#9935]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.0.0/16\"' [#37428]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39561]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14777]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#33732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12171]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#276]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#22859]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#154]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#24061]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#10074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#36457]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6215]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 390 (0x186) == = 390 (0x186) [#39889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3364 (0x xd24) == 3364 (0xd24) [#19343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#22973]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#10415]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27634]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18539]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38025 (0 0x9489) == 38025 (0x9489) [#25850]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14461]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#35819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148996 (0 0x24604) == 148996 (0x24604) [#7527]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15376 (0 0x3c10) == 15376 (0x3c10) [#31943]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12855]", "bindmonitor-bpf2bpf-interpret :: emulate_bind(invoke, 2, \"fake_app_2\") == BIND_PERMIT for: 0 == 0 [#41040]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#30066]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#29520]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8239]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#30484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#30541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#35063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31607]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 700 (0x2bc) == 700 (0x2bc) [#40370]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26767]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39463]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21601]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38408]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#10714]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#23706]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#28740]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#11067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 193600 ( (0x2f440) == 193600 (0x2f440) [#20107]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#21111]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38541]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32628]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#30016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#22807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#35568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30786]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#11323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 95481 (0 0x174f9) == 95481 (0x174f9) [#32313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#23630]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133225 (0 0x20869) == 133225 (0x20869) [#1248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57600 (0 0xe100) == 57600 (0xe100) [#32175]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25095]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 18 88356 (0x2dfc4) [#9596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1603]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84681 (0x x14ac9) == 84681 (0x14ac9) [#7337]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12332]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#10301]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7326]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33113]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20497]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26075]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24867]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#30581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 17 79776 (0x2be40) [#9566]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#30454]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6002]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38198]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#36093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#23372]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14521]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20286]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6292]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 444 (0x1bc) == 444 (0x1bc) [#40498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#24197]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#27353]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38664]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0x x121) [#8345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6558]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 784 (0x3 310) == 784 (0x310) [#13046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55225 (0 0xd7b9) == 55225 (0xd7b9) [#13460]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 150 == 150 [#39769]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#30477]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#24351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22529]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#35643]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#10300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16129 (0 0x3f01) == 16129 (0x3f01) [#13244]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#23551]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#29515]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#29012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21359]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27180]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 202500 (0 0x31704) == 202500 (0x31704) [#7655]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8664]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21887]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8820]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#22771]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178929 ( (0x2baf1) == 178929 (0x2baf1) [#26306]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#34302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19072]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21215]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 400 (0x1 190) == 400 (0x190) [#25500]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 324 (0x144) == = 324 (0x144) [#39856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15434]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"10.10.10.10/8\"' and 'correct_value := \"10 0.0.0.0/8\"' [#37475]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#33876]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 776 (0x308) == 776 (0x308) [#40332]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37899]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38124]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32993]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#28181]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 171396 ( (0x29d84) == 171396 (0x29d84) [#32523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#23987]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53361 (0 0xd071) == 53361 (0xd071) [#25922]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164836 ( (0x283e4) == 164836 (0x283e4) [#26272]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#30472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32916]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#36540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12957]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2470]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#35985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#23562]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 404 (0x194) == 404 (0x194) [#40518]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28492]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#22747]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0x02) == EBPF_SUCCESS for: 0 == 0 [#31173]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#35829]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19540]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108900 ( (0x1a964) == 108900 (0x1a964) [#32355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31510]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3457]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#10624]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#23376]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#23322]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 928 (0x3a0) == 928 (0x3a0) [#40256]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38099]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#30450]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 280 (0x118) == = 280 (0x118) [#39834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#23707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24853]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#24263]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31329 (0x x7a61) == 31329 (0x7a61) [#7109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#22317]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 6451 16 (0xfc04) [#9056]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8704]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5724]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31155]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#11656]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#21141]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 54 == 54 [#40693]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96721 (0 0x179d1) == 96721 (0x179d1) [#32317]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#11236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#24040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8074]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#11044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3046]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 185761 (0 0x2d5a1) == 185761 (0x2d5a1) [#7617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8953]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31217]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32871]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37894]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9702]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#27065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#23217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#22910]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#34774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#11209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#23554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 5856 64 (0xe4c4) [#9020]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30976 (0 0x7900) == 30976 (0x7900) [#19579]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#837]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#11560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75625 (0 0x12769) == 75625 (0x12769) [#19777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#11400]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4900 (0x x1324) == 4900 (0x1324) [#31835]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#34536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#23960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#23990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33509]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 654 (0x28e) == 654 (0x28e) [#40393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7418]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 42 == 42 [#40699]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37249 (0x9 9181) == 37249 (0x9181) [#904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 72 <= 612 (0x264) [#22872]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24738]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 116 == 116 [#39752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13211]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3364 (0xd2 24) == 3364 (0xd24) [#634]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24969]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#11507]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#33546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#21390]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25440]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#21459]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#29195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#23471]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7744 (0x1e e40) == 7744 (0x1e40) [#694]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8271]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12277]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12914]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13049]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#29902]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#11660]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38619]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5969]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 156 == 156 [#40642]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#33282]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#299]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70756 (0 0x11464) == 70756 (0x11464) [#25992]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31754]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25600 (0x6 6400) == 25600 (0x6400) [#838]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10609 (0 0x2971) == 10609 (0x2971) [#19433]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4 == 4 [#522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18424]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#22300]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 220900 ( (0x35ee4) == 220900 (0x35ee4) [#20167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33334]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#36584]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34144]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34124]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42025 (0 0xa429) == 42025 (0xa429) [#32105]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#35034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19191]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25397]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1604]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30772]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12301]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#29832]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8473]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#29175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6832]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#30285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#22375]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#22540]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#811]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#28890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12168]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58564 (0 0xe4c4) == 58564 (0xe4c4) [#25944]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22027]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#28552]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 590 (0x24e) == 590 (0x24e) [#40425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18468]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4225 (0x x1081) == 4225 (0x1081) [#31825]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 864 436 (0x151a4) [#9176]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12528]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25402]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#11650]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19133]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25102]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2388]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96100 (0x x17764) == 96100 (0x17764) [#1138]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#35585]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#10219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1 == 1 [#30604]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 174724 ( (0x2aa84) == 174724 (0x2aa84) [#13826]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 834 (0x342) == 834 (0x342) [#40303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19518]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 584 (0x248) == 584 (0x248) [#40428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225 == 22 25 [#6785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#21480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#22565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#21918]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 5290 00 (0xcea4) [#8984]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 440 (0x1b8) == = 440 (0x1b8) [#39914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#35778]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30879]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 64 == 64 [#40688]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#34206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25953]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 28 == 28 [#39063]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38633]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#21600]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#23739]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#29923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#10349]", "interlocked operations :: value32 == 0xff for: 255 == 255 [#40818]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 6 == 6 [#38919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#10598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#36544]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#28163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14463]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#23560]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#21018]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37323]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18437]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#11359]", "epoch_test_two_threads :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38509]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 166464 ( (0x28a40) == 166464 (0x28a40) [#20043]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 18 81476 (0x2c4e4) [#9572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#27524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34439]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7586]", "epoch_test_stale_items :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#28598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25108]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#35591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24546]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#28247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#23725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 252004 ( (0x3d864) == 252004 (0x3d864) [#26464]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25331]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 212521 (0 0x33e29) == 212521 (0x33e29) [#7677]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19418]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 251001 ( (0x3d479) == 251001 (0x3d479) [#20229]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148225 ( (0x24301) == 148225 (0x24301) [#13760]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#11266]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2697]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#10298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#33660]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30900]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 856 (0x358) == = 856 (0x358) [#40122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19914]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#35719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#22786]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15463]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3084]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 224 == 224 [#39806]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9378]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 952 (0x3b8) == = 952 (0x3b8) [#40170]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31704]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 86 == 86 [#39092]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#10225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14399]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33812]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#35069]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#11121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#22960]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38313]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24748]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 729 (0x2d d9) == 729 (0x2d9) [#6809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3721 (0x xe89) == 3721 (0xe89) [#13112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#34782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6195]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#30481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37123]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#30531]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32680]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14249]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5329 (0x14 4d1) == 5329 (0x14d1) [#664]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#10108]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#28712]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#10313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#23600]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#29935]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14642]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96100 (0x x17764) == 96100 (0x17764) [#7375]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13215]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#20784]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 612 (0x264) == = 612 (0x264) [#40000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7882]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32232]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#11786]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18830]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1915]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9217]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32692]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#22725]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.14.4/32\"' and 'correct_value := \" \"192.168.14.0/29\"' [#37465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#24122]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1006 (0x3ee) = == 1006 (0x3ee) [#40197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#28433]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 418 (0x1a2) == 418 (0x1a2) [#40511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27003]", "map_crud_operations_lpm_trie_128 :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14398]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 15 56816 (0x26490) [#9482]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25219]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28332]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28263]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#28993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97969 (0 0x17eb1) == 97969 (0x17eb1) [#13616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33962]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15892]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28535]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32258]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#30528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#28768]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#29225]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#30304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#10428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27166]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37933]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#36419]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#11669]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#21822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#23845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13005]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#28813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28318]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26649]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#22452]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 89401 (0 0x15d39) == 89401 (0x15d39) [#13588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#34683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24762]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28429]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219024 ( (0x35790) == 219024 (0x35790) [#20163]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6758]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196 == 196 [#35006]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#33243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#24418]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31938]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33236]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#28889]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 532 (0x214) == 532 (0x214) [#40454]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1599]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25052]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27750]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37086]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30755]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31227]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31370]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39651]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156025 ( (0x26179) == 156025 (0x26179) [#32485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13799]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27616]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121 == 1 121 [#25482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#23721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18284]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32885]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34373]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169 == 16 69 [#6781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 255025 ( (0x3e431) == 255025 (0x3e431) [#14000]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#11568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#28888]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37229]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21130]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#23716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#11218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#36424]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#11689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0x x3c1) [#9864]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#30535]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#23466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#11875]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.16.0/24\"' [#37423]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8128]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#36702]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39541]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34150]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#11641]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 150 == 150 [#40645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#29219]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#28776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 (0x19a1) [#9920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#20868]", "droppacket-jit :: hook.fire(&ctx10, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40872]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#36150]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#35037]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13425]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#10394]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#11111]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#11516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#11469]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30793]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22091]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 2 == 2 [#40719]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38379]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7986]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#30147]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2245]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18499]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/120\"' and 'correct_value := \"DD/120\"' [#37622]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#23414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15371]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51076 (0xc c784) == 51076 (0xc784) [#970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#24159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39601 (0 0x9ab1) == 39601 (0x9ab1) [#13388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49729 (0 0xc241) == 49729 (0xc241) [#32141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12678]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12996 (0x3 32c4) == 12996 (0x32c4) [#746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 20 00704 (0x31000) [#9638]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34510]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7204]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#22481]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29241 (0 0x7239) == 29241 (0x7239) [#32037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#22841]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 228484 (0 0x37c84) == 228484 (0x37c84) [#1474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15206]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#30266]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#36351]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#36514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8114]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#11145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#23216]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#29285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 2280 01 (0x5911) [#9998]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#28659]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 11 15600 (0x1c390) [#9314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#10309]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14641 (0x x3931) == 14641 (0x3931) [#6997]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9180]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#11443]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2677]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33341]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7857]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2304]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38648]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#36026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#29790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#35499]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#22353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20727]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 4326 64 (0xa900) [#8918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#20805]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 1166 64 (0x2d90) [#9951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 193600 (0 0x2f440) == 193600 (0x2f440) [#7635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#36459]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#11395]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#11293]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14253]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9507]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20423]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#23115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#23356]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30859]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#35627]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2289]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8100 (0x x1fa4) == 8100 (0x1fa4) [#13170]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#10327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21851]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#10988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26707]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 256 (0x100) == 256 (0x100) [#40592]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8250]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#29249]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13443]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#10809]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12757]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#36455]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#35908]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3247]", "serialize_program_info_test :: in_prototype->return_type == out_prototype->return_type for: 1 == 1 [#38801]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 22 28484 (0x37c84) [#9728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#22215]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62500 (0 0xf424) == 62500 (0xf424) [#13490]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#24381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34025]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26001]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26365]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6079]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#34861]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#23499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#11409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9820]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8964]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 1768 89 (0x4519) [#9978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#24285]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#29670]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 216225 ( (0x34ca1) == 216225 (0x34ca1) [#32625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9060]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#36603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2620]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#34964]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 141376 ( (0x22840) == 141376 (0x22840) [#32447]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#10575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 134689 ( (0x20e21) == 134689 (0x20e21) [#19961]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1379]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#35323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#22322]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#10541]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#23145]", "interlocked operations :: value32 == 0 for: 0 == 0 [#40819]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 240100 ( (0x3a9e4) == 240100 (0x3a9e4) [#32675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#35331]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13345]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#10777]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#24102]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168921 ( (0x293d9) == 168921 (0x293d9) [#26282]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91204 (0 0x16444) == 91204 (0x16444) [#26064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2601 (0x xa29) == 2601 (0xa29) [#25562]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#23631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 2102 25 (0x5221) [#9992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190969 (0 0x2e9f9) == 190969 (0x2e9f9) [#7629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20487]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 212521 ( (0x33e29) == 212521 (0x33e29) [#32617]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#35804]", "async :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#40723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#23583]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1459]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26857]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#35366]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1840]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38685]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1695]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37291]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9760]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#24007]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37402]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34480]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18393]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25279]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32754]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34532]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#30209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#10998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34333]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#36142]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9055]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"192.168.0.1/4294967295\"' [#37507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#29157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28896]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34232]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21609 (0 0x5469) == 21609 (0x5469) [#19521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#23479]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#35773]", "async :: ebpf_async_set_cancel_callback(&async_context, &cancellation_context, , [](void* context) { auto cancellation_context = reinterpret_cast<_cancellation_ _context*>(context); cancellation_context->canceled = true; }) == EBPF_SUCCESS fo or: 0 == 0 [#40736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#22417]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 5107 76 (0xc784) [#8972]", "ring_buffer_reserve_submit_discard :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#40765]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57121 (0 0xdf21) == 57121 (0xdf21) [#19705]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31968]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#36346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#35107]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38145]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7921 (0x x1ef1) == 7921 (0x1ef1) [#13168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#22836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 129600 ( (0x1fa40) == 129600 (0x1fa40) [#19947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#28091]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#22269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 660 049 (0x10201) [#9065]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#36210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12981]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37095]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 408 (0x198) == = 408 (0x198) [#39898]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5734]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32838]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 812 (0x32c) == = 812 (0x32c) [#40100]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#20772]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25226]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#36084]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25291]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38089]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27544]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#28862]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 175561 (0 0x2adc9) == 175561 (0x2adc9) [#1356]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31354]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 255025 ( (0x3e431) == 255025 (0x3e431) [#32705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32512]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31346]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23716 (0x5 5ca4) == 23716 (0x5ca4) [#826]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 122 == 122 [#39110]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 105625 ( (0x19c99) == 105625 (0x19c99) [#26110]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#35536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#24087]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144 == 144 [#28932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25252]", "EBPF_OPERATION_CREATE_MAP :: invoke_protocol(EBPF_OPERATION_CREATE_MAP, request, reply) == EBPF_IN NVALID_ARGUMENT for: 6 == 6 [#37928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#10744]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#282]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#259]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1991]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38172]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 752 (0x2f0) == = 752 (0x2f0) [#40070]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27988]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34289]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1591]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 46 == 46 [#39072]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"19 92.168.14.0/30\"' [#37519]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#34092]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#35292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#35026]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3992]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#36219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#24396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31874]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#22398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20345]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31000]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31730]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#11870]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6697]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37289]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#11690]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37852]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25843]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#22400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#10457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4489 (0x x1189) == 4489 (0x1189) [#19361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225 == 2 225 [#19257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198916 ( (0x30904) == 198916 (0x30904) [#26352]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 264 (0x108) == = 264 (0x108) [#39826]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 338 (0x152) == 338 (0x152) [#40551]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2803]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12243]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 620 (0x26c) == = 620 (0x26c) [#40004]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#10736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#33798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12654]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#23515]", "verify random :: !has_dominant_frequency(1024 * 128, ebpf_random_uint32) for: true ebpf_random_uint32_biased Average frequency: 316.81 Std dev frequency: 175.223 Max frequency: 4558.19 Ratio of (max-average) to std:dev: 24.2056:1 [#40841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14065]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 18 == 18 [#40711]", "program :: ebpf_link_attach_program(link.get(), program.get()) == EBPF_SUCCESS f for: 0 == 0 [#37784]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3969 (0xf8 81) == 3969 (0xf81) [#644]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27660]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#28884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17689 (0 0x4519) == 17689 (0x4519) [#25726]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6469]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#23639]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21316 (0x x5344) == 21316 (0x5344) [#7047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#23339]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#10391]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7851]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31377]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6964]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32600]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56169 (0x xdb69) == 56169 (0xdb69) [#7229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#11709]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14388]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#11107]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33398]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1053]", "EBPF_OPERATION_UPDATE_PINNING :: invoke_protocol(EBPF_OPERATION_UPDATE_PINNING, request) == EBPF_INVAL LID_OBJECT for: 5 == 5 [#38187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13817]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7322]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25839]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#34680]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#29202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12683]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 25 55025 (0x3e431) [#9809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#22224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14058]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#27557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#35729]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#93]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#24375]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6930]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 15 55236 (0x25e64) [#9476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#22421]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 361 (0x1 169) == 361 (0x169) [#31733]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#11143]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25 == 25 [#528]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 115600 (0 0x1c390) == 115600 (0x1c390) [#1198]", "ring_buffer_async_query :: ebpf_map_pop_entry(map.get(), 0, nullptr, 0) == EBPF_OPERATION_NOT_SU UPPORTED for: 18 == 18 [#37810]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 826 (0x33a) == 826 (0x33a) [#40307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#29077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27693]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7280]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27912]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12185]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#35818]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: invoke_protocol(EBPF_OPERATION_MAP_GET_NEXT_KEY, request, reply) == E EBPF_INVALID_ARGUMENT for: 6 == 6 [#38136]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#29844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33449]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 529 (0x2 211) == 529 (0x211) [#13036]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#36257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#30287]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31125]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24647]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#325]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3576]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33054]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 426 (0x1aa) == 426 (0x1aa) [#40507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24784]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#35101]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#35691]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33869]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#29494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#11777]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10171]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3481 (0xd9 99) == 3481 (0xd99) [#636]", "epoch_test_two_threads :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15350]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#34925]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31491]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21055]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 50 == 50 [#39719]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6443]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38274]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21865]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7656]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34571]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#35003]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25577]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 62 == 62 [#38947]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#23969]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196249 (0 0x2fe99) == 196249 (0x2fe99) [#1404]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"00/0\" == \"00/0\" with h 2 messages: 'key_string := \"DD/115\"' and 'correct_value := \"00/0\"' [#37629]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#36683]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#10407]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12805]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#35846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36 == 36 [#13002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 159201 ( (0x26de1) == 159201 (0x26de1) [#13788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25421]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#35052]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#10257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#23796]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18288]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30976]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 141376 (0 0x22840) == 141376 (0x22840) [#1270]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27178]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#22485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2209 (0x x8a1) == 2209 (0x8a1) [#19321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#22912]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33199]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3253]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 160 == 160 [#39774]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31487]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#33579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76176 (0 0x12990) == 76176 (0x12990) [#26012]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#24126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34576]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.16.0/24\" == \"192.168.16.0 0/24\" with 2 messages: 'key_string := \"192.168.16.0/24\"' and 'correct_value := \"1 192.168.16.0/24\"' [#37436]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#29376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#24338]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 3572 21 (0x8b89) [#8861]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"DD/120\" == \"DD/120\" with 2 messages: 'key_string := \"DD/120\"' and 'correct_value := \"DD/120\"' [#37623]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20555]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 574 (0x23e) == = 574 (0x23e) [#39981]", "EBPF_OPERATION_RESOLVE_HELPER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37815]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39498]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9292]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 528 (0x210) == = 528 (0x210) [#39958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#10154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6706]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 44 == 44 [#39071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22302]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 82 == 82 [#39735]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#36050]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#11063]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6870]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#35939]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#30306]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19532]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15602]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38631]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3073]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#27344]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 616 (0x268) == = 616 (0x268) [#40002]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#11303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15578]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 25 56036 (0x3e824) [#9812]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7186]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 234256 ( (0x39310) == 234256 (0x39310) [#20195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#10813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#35580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#24140]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6071]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32148]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#29151]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#35571]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#32]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19127]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72361 (0 0x11aa9) == 72361 (0x11aa9) [#19765]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#27359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28228]", "ring_buffer_output :: ebpf_ring_buffer_return(ring_buffer, record->header.length) == EBPF_S SUCCESS for: 0 == 0 [#40758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16006]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#24024]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 144 == 144 [#40648]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 (0x1299) [#8501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20294]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#10026]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37112]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24533]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 334 (0x14e) == = 334 (0x14e) [#39861]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#126]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 229441 (0 0x38041) == 229441 (0x38041) [#1476]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#29989]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32504]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18918]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#36761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#11282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12349]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 1876 69 (0x4951) [#9984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20449]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2027]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#28840]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8937]", "state_test :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#10117]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 3960 01 (0x9ab1) [#8891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31626]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56169 (0 0xdb69) == 56169 (0xdb69) [#25934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20337]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#30008]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9450]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41209 (0xa a0f9) == 41209 (0xa0f9) [#924]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33353]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20262]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 746 (0x2ea) == = 746 (0x2ea) [#40067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#23516]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31276]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#11339]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27483]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7714]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#10239]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22279]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25403]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20020]", "async :: ebpf_async_set_completion_callback( &async_context, []( void* context t, size_t output_buffer_length, ebpf_result_t result) { (output_buffer_length); a auto async_context = reinterpret_cast<_async_context*>(context); async_context->r result = result; }) == EBPF_SUCCESS for: 0 == 0 [#40728]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39398]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 (0x2059) [#9932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#34137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32981]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7032]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#11912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#22970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81225 (0 0x13d49) == 81225 (0x13d49) [#19797]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33238]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#23761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18698]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8100 (0x x1fa4) == 8100 (0x1fa4) [#25640]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25304]", "divide_by_zero-native :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40979]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#10639]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31015]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#29883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#22986]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 472 (0x1d8) == 472 (0x1d8) [#40484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#28319]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#22564]", "name size :: ebpf_program_create(&program_parameters, &local_program) == EBPF_INVA ALID_ARGUMENT for: 6 == 6 [#37787]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.14.0/30\"' and 'correct_value := \" \"192.168.14.0/30\"' [#37439]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 546 (0x222) == = 546 (0x222) [#39967]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#895]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31223]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9630]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#11787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#23869]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33401]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28224]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#10069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21484]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12553]", "error codes :: result2 == result for: 34 == 34 [#40816]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#30115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6551]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1644]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#30646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26738]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9660]", "map_crud_operations_queue :: ebpf_map_delete_entry(map.get(), sizeof(return_value), reinterpret_ca ast<uint8_t*>(&return_value), 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#29644]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 6300 01 (0xf619) [#9047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#29464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7922]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21283]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#33471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#22456]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#10666]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24993]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33101]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#24112]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 111556 ( (0x1b3c4) == 111556 (0x1b3c4) [#13658]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#36800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3600 (0x xe10) == 3600 (0xe10) [#13110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19161]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#33666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24649]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#30625]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6169]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148225 ( (0x24301) == 148225 (0x24301) [#26230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6719]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25071]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39363]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.0.0/16\"' [#37486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24438]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#11108]", "trampoline_test :: test_function() == EBPF_OBJECT_ALREADY_EXISTS for: 8 == 8 [#38728]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6211]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#35557]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39616]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#11300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#24344]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37300]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47961 (0 0xbb59) == 47961 (0xbb59) [#25898]", "hash_table_test :: ebpf_hash_table_next_key(table.get(), returned_key.data(), returned_k key.data()) == EBPF_SUCCESS for: 0 == 0 [#38452]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21275]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 1 message: : 'key_string := \"192.168.0.1/4294967295\"' [#37508]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38896]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 594 (0x252) == 594 (0x252) [#40423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14987]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25895]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#35224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85849 (0 0x14f59) == 85849 (0x14f59) [#13576]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31663]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18947]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#24076]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#11483]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#10197]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#35248]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#36044]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#30388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94249 (0 0x17029) == 94249 (0x17029) [#19841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#21417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25093]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#30329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13225 (0 0x33a9) == 13225 (0x33a9) [#25690]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25159]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1433]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#22119]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2614]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6039]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#34939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#11527]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 132 == 132 [#40654]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53824 (0 0xd240) == 53824 (0xd240) [#13454]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#36230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#24147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2916 (0x xb64) == 2916 (0xb64) [#13098]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 860 (0x35c) == = 860 (0x35c) [#40124]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19020]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34256]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8896]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28242]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 441 (0x1 1b9) == 441 (0x1b9) [#13032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#23397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19938]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#10592]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0x x2d9) [#9860]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33221]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#35710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8616]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#30241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#30411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190096 ( (0x2e690) == 190096 (0x2e690) [#13862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7606]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9801 (0x2 2649) == 9801 (0x2649) [#6953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#23521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#24057]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27889 (0 0x6cf1) == 27889 (0x6cf1) [#32029]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39371]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#34569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18503]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#11277]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34622]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2424]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#35573]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#28963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24837]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34271]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#36759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6541]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42849 (0 0xa761) == 42849 (0xa761) [#19641]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#27059]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 117649 ( (0x1cb91) == 117649 (0x1cb91) [#32381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6484]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14502]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 0 == 0 [#38881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#27842]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34556]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8458]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#21654]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#10550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24336 (0 0x5f10) == 24336 (0x5f10) [#32007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#10156]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20253]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33489 (0 0x82d1) == 33489 (0x82d1) [#32061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#11548]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#30208]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6310]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#36733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#22937]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#11682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20629]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 723 361 (0x11aa9) [#9101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#11079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18360]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#35278]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#34383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19155]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#35078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9595]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7450]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 64 == 64 [#38948]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4124]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6607]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14731]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#34806]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#9846]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8521]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27891]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12793]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14410]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#10806]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#35836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#22954]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34052]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3267]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2715]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#28950]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21422]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 666 (0x29a) == = 666 (0x29a) [#40027]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#36646]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#11021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#22363]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3600 (0xe e10) == 3600 (0xe10) [#6875]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10404 (0 0x28a4) == 10404 (0x28a4) [#31899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30980]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#29998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1225 (0x x4c9) == 1225 (0x4c9) [#19297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#30596]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7849]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9331]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#28594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#10567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32332]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6653]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#23808]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32892]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 282 (0x11a) == 282 (0x11a) [#40579]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139876 (0 0x22264) == 139876 (0x22264) [#1266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10057]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 14 48225 (0x24301) [#9449]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28900 (0x x70e4) == 28900 (0x70e4) [#7095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#35813]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21686]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#39]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#21828]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 236 == 236 [#39812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#36838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#23890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#27590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34166]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31944]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19858]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 168 == 168 [#40636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5184 (0x x1440) == 5184 (0x1440) [#13134]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11664 (0 0x2d90) == 11664 (0x2d90) [#31911]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 250 == 250 [#40595]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#10560]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25079]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37041]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38570]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#28931]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#36014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#23172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#36632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33489 (0 0x82d1) == 33489 (0x82d1) [#13356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15847]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34294]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33764]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33937]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40401 (0 0x9dd1) == 40401 (0x9dd1) [#25862]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20361]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#29182]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8607]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14168]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7396]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37077]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#11781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#29922]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15619]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12364]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27330]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 11 16281 (0x1c639) [#9317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#36318]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65536 (0x x10000) == 65536 (0x10000) [#1030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#29687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24652]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#10093]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#28508]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#22799]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24709]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14274]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#27056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#23527]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1818]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0x x190) [#8354]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12100 (0 0x2f44) == 12100 (0x2f44) [#13210]", "map_crud_operations:BPF_MAP_TYPE_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#5202]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#28936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#36463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30824]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2986]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32911]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31434]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#571]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#21]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14276]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 904 (0x388) == = 904 (0x388) [#40146]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24649 (0x x6049) == 24649 (0x6049) [#7069]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#29597]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 512 (0x200) == 512 (0x200) [#40464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8764]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9604 (0x25 584) == 9604 (0x2584) [#714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#30603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1864]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"CC/96\"' [#37654]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 4665 56 (0xb640) [#8942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14594]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30913]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 74 == 74 [#39731]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39439]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34615]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26602]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#10092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20754]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#310]", "droppacket-interpret :: hook.fire(&ctx0, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14191]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37166]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 240100 (0 0x3a9e4) == 240100 (0x3a9e4) [#1498]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#34065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31096]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 158 == 158 [#39773]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33256]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9231]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29104]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14851]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5935]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 170569 ( (0x29a49) == 170569 (0x29a49) [#32521]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#11073]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#29290]", "Map and program information :: map_info.type == map_create.map_type for: 2 == 2 [#43624]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.14.0/29\" == \"192.168.14.0 0/29\" with 2 messages: 'key_string := \"192.168.14.4/32\"' and 'correct_value := \"1 192.168.14.0/29\"' [#37466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32903]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#10249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7332]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38680]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 15 57609 (0x267a9) [#9485]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#29154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#10423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#35015]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#35064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12544]", "interlocked operations :: value64 == 0xff for: 255 == 255 [#40821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#23929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20358]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#10789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#23317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12260]", "EBPF_OPERATION_GET_OBJECT_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38316]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#35994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20114]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#212]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 197136 (0 0x30210) == 197136 (0x30210) [#1406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12582]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28098]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#11275]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1055]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198916 ( (0x30904) == 198916 (0x30904) [#32587]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5625 (0x x15f9) == 5625 (0x15f9) [#31845]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#28540]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#35999]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#23923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#10410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#21297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27546]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33219]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#29373]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#35204]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33847]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30763]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 576 (0x240 0) == 576 (0x240) [#566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14806]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#23938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#22361]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26279]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#22345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#28730]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#11795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31676]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9345]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3364 (0x xd24) == 3364 (0xd24) [#13106]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#29138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#10212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31455]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5961]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39023]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19918]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144 == 144 [#36205]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1942]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#29007]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#10675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169 == 169 [#30108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22133]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#34814]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#353]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18466]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 163216 ( (0x27d90) == 163216 (0x27d90) [#20035]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"192.168.0.1/4294967295\"' [#37513]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_FIND_ELEMENT, request, reply) == E EBPF_INVALID_ARGUMENT for: 6 == 6 [#38028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#22734]", "pinned_map_enum :: error == 0 for: 0 == 0 [#41458]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110889 ( (0x1b129) == 110889 (0x1b129) [#19893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#23915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#33531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18434]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 178 == 178 [#40631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20474]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 948 (0x3b4) == 948 (0x3b4) [#40246]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6604]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33484]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40963]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 330 (0x14a) == = 330 (0x14a) [#39859]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33170]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33278]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#34380]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"CD/96\"' [#37578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#29660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#26999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#30295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#23998]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#28836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#10823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#8321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21389]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#30186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#36488]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 120409 ( (0x1d659) == 120409 (0x1d659) [#26154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1369 (0x x559) == 1369 (0x559) [#19301]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#29200]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34088]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 688 (0x2b0) == = 688 (0x2b0) [#40038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 16 64836 (0x283e4) [#9512]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99856 (0x x18610) == 99856 (0x18610) [#1150]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#22676]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 544 (0x220) == = 544 (0x220) [#39966]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#28184]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#8297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27694]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#29039]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#11376]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#10517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37153]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25317]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 234256 (0 0x39310) == 234256 (0x39310) [#1486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1 == 1 [#29045]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 132496 ( (0x20590) == 132496 (0x20590) [#13718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 92416 (0 0x16900) == 92416 (0x16900) [#26068]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 24 42064 (0x3b190) [#9770]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28050]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 98596 (0 0x18124) == 98596 (0x18124) [#32323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27585]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34376]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#28769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8006]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9018]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28900 (0 0x70e4) == 28900 (0x70e4) [#25800]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#35191]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#286]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 2958 84 (0x7390) [#8810]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 2250 00 (0x57e4) [#8744]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1895]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#35176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24721]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#23355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1823]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"DD/116\"' [#37596]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33536]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31586]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#29440]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#28907]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#11043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3481 (0x xd99) == 3481 (0xd99) [#13108]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18272]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6460]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 20 == 20 [#39169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81796 (0 0x13f84) == 81796 (0x13f84) [#19799]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13543]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#22733]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27982]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33085]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#23793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#29586]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"11.0.0.0/8\"' [#37573]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38410]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38031]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#29837]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 2689 96 (0x6910) [#8786]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14531]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35344 (0 0x8a10) == 35344 (0x8a10) [#25836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#23754]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26733]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38332]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#28331]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#10292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#24015]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25689]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3015]", "ring_buffer_async_query :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#37792]", "EBPF_OPERATION_CREATE_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37873]", "pinning_test :: another_object.object.base.reference_count == 1 for: 1 == 1 [#38491]", "EBPF_OPERATION_GET_EC_FUNCTION :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#29540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#23273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9792]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37276]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#36619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20042]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#29769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34652]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#21036]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64009 (0 0xfa09) == 64009 (0xfa09) [#32201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25338]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39249]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20132]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3801]", "program :: ((ebpf_core_object_t*)map.get())->base.reference_count == 2 for: 2 == = 2 [#37758]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37115]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33344]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5804]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4010]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key) - 1, reinterpret_cast<uint8_ _t*>(&key), reinterpret_cast<uint8_t*>(&key)) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#6234]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37376]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#23880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#22365]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#291]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15176]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#23924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#21198]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2874]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#33237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#27971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20513]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#36034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#22911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20733]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#11681]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14400 (0 0x3840) == 14400 (0x3840) [#31935]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 246 == 246 [#39817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26884]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#36649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 241081 ( (0x3adb9) == 241081 (0x3adb9) [#32677]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#21555]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38990]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#23447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12606]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#11195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64516 (0 0xfc04) == 64516 (0xfc04) [#13498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14140]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"DD/124\" \"' [#37656]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39418]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#456]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#22401]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26143]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 (0x2341) [#8579]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3028]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/127\" == \"BB/127\" with 2 messages: 'key_string := \"BB/127\"' and 'correct_value := \"BB/127\"' [#37635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32922]", "EBPF_OPERATION_GET_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20070]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#29640]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#23064]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#11176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20324]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 320 (0x140) == = 320 (0x140) [#39854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12774]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1165]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 6200 01 (0xf231) [#9041]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37253]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25302]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#10745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#21903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21713]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#30254]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39028]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#34874]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 380 (0x17c) == 380 (0x17c) [#40530]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5776]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#36688]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#22952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20434]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#10704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20297]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37324]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12035]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#28250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#34068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33473]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34808]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#23839]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#27041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#23556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#23875]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7742]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 70 == 70 [#39084]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15827]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#11807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25379]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#35305]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#10775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90601 (0 0x161e9) == 90601 (0x161e9) [#13592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21907]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#10556]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 130321 ( (0x1fd11) == 130321 (0x1fd11) [#13712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19506]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 220900 (0 0x35ee4) == 220900 (0x35ee4) [#1458]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#34885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#28823]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#115]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#35513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#23723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#23175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#36814]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#29498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#23992]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#36674]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6419]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18259]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26716]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27639]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26642]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8461]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14163]", "invalid_bpf_get_socket_cookie :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#42119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20930]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#20937]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#21267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31034]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#23907]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#36527]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#29601]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#33990]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#27071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#22487]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#28875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#24132]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#20850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 1299 96 (0x32c4) [#9957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15943]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.14.9/32\"' and 'correct_value := \" \"192.168.0.0/16\"' [#37467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73984 (0x x12100) == 73984 (0x12100) [#7299]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#28887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1951]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2038]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28060]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2709]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#383]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24480]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12525]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#35242]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#9834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#10487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19168]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 662 (0x296) == 662 (0x296) [#40389]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6256]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2763]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#10800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#10066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24905]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8484]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58081 (0 0xe2e1) == 58081 (0xe2e1) [#19709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12375]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#30556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#30058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21605]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#23597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14750]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22175]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#27431]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#35787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21923]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37833]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#53]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#33669]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#29474]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2716]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"192.169.0.0/32\"' and 'return_value := {null string}' [#37548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12778]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 474 (0x1da) == = 474 (0x1da) [#39931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#23103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20996]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32041 (0x7 7d29) == 32041 (0x7d29) [#876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#35927]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1781]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 98 == 98 [#39130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 ( (0x510) [#8402]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#10396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#23377]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#10099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#22406]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69169 (0 0x10e31) == 69169 (0x10e31) [#19753]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32766]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#11581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26693]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 176 == 176 [#39782]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#11360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6690]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#11231]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#22107]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#10326]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26423]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25098]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 770 (0x302) == = 770 (0x302) [#40079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#29246]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6605]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 840 (0x348) == = 840 (0x348) [#40114]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#22203]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#35465]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5625 (0x15 5f9) == 5625 (0x15f9) [#668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14435]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25292]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18509]", "verify random :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 ebpf_random_uint32 Zero count: 2.09855e+06 One count: 2.09575e+06 1.87187 [#40839]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#36615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7700]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 5 == 5 [#38802]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1799]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27786]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#11247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19370]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39536]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22270]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 22 29441 (0x38041) [#9731]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 1416 61 (0x3751) [#8651]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#34887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#21450]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#28654]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#29492]", "work_queue :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#40847]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4557]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27220]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8068]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#27926]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1353]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1271]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31553]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#10314]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6010]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8916]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#11949]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26125]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1986]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: invoke_protocol(EBPF_OPERATION_QUERY_PROGRAM_INFO, query_program_info o_request, reply) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13667]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 4884 41 (0xbec9) [#8957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#22901]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1261]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#36778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#35916]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37347]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37311]", "bindmonitor-tailcall-jit :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#41043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#28926]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#28715]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31397]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#36247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5184 (0x x1440) == 5184 (0x1440) [#19371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27070]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#192]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9651]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6566]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9544]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56169 (0 0xdb69) == 56169 (0xdb69) [#13464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#10131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13357]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#21084]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7116]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 672 (0x2a0) == = 672 (0x2a0) [#40030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36 == 36 [#35659]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#29065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25269]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#29700]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71824 (0x x11890) == 71824 (0x11890) [#1054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#23450]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1014 (0x3f6) = == 1014 (0x3f6) [#40201]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#35915]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27567]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15676]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 250000 ( (0x3d090) == 250000 (0x3d090) [#20227]", "ring_buffer_async_query :: ebpf_map_get_program_from_entry(map.get(), 0, 0) == nullptr for: null lptr == nullptr [#37803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16 == 16 [#29243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37102]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#33330]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 21 17156 (0x35044) [#9692]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25161]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#10644]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#36365]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#22998]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#11580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8829]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#35219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15586]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#36221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18911]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_OBJECT_NOT_FOUND for: 7 == 7 [#37712]", "bindmonitor-native :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40995]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#36303]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8617]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#34740]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#33813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27588]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 261121 ( (0x3fc01) == 261121 (0x3fc01) [#14012]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64 == 64 [#36543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#29406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12756]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 166464 (0 0x28a40) == 166464 (0x28a40) [#1334]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#11940]", "droppacket-interpret :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20651]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 130321 ( (0x1fd11) == 130321 (0x1fd11) [#32417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#22748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26569 (0x6 67c9) == 26569 (0x67c9) [#844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#11391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27279]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26231]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 646 (0x286) == 646 (0x286) [#40397]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#34428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#24183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15836]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34397]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#28697]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#36653]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30871]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#28058]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7200]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#36199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#27020]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31282]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22015]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6820]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#28097]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#10804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15869]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6493]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1018 (0x3fa) = == 1018 (0x3fa) [#40203]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8836 (0x2 2284) == 8836 (0x2284) [#6943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37250]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27886]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3346]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1810]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20646]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 332 (0x14c) == = 332 (0x14c) [#39860]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39278]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#29717]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#11480]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15100]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12360]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31080]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62500 (0 0xf424) == 62500 (0xf424) [#32195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28592]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#10906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18413]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#23722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16179]", "error codes :: result2 == result for: 16 == 16 [#40798]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) != EBPF_SUCCESS for: 6 != 0 [#38085]", "map_crud_operations_queue :: ebpf_map_delete_entry(map.get(), sizeof(return_value) - 1, reinterpre et_cast<uint8_t*>(&return_value), 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37704]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169 == 169 [#29068]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#11918]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27550]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#23081]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12761]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36984]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#36881]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#27725]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3388]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#29189]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17161 (0x4 4309) == 17161 (0x4309) [#780]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#24055]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#34326]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12223]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#11528]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#22388]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 8 == 8 [#38851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#28229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#10814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#28187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#24306]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1441]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8629]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 (0x2584) [#8588]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18335]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#35500]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12421]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100 == 100 [#35091]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 16 == 16 [#39171]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18338]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#11242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#34836]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33892]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#35413]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33727]", "EBPF_OPERATION_CREATE_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37869]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#30476]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22201 (0x x56b9) == 22201 (0x56b9) [#7053]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 24 43049 (0x3b569) [#9773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62001 (0x xf231) == 62001 (0xf231) [#7253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6561 (0x x19a1) == 6561 (0x19a1) [#13152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33108]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#30102]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#35589]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7002]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33057]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 2280 01 (0x5911) [#8747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 167281 ( (0x28d71) == 167281 (0x28d71) [#20045]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20586]", "verify random :: has_dominant_frequency(1024 * 128, ebpf_random_uint32_biased) for: tr rue ebpf_random_uint32 0000111100000100000010101001001111101001 0010000011010001110100011101010001101101 0000110000000110100111010010000000010111 0000111010110101100101100100100101101101 0110011101110010011001100001001111000001 0101011000010110100000011001100101001100 0110010001110000100001000010111010100000 1011101100111001010111100010100111100111 1011100101001100101010100010001101011110 1000010010101110110011101011111100010101 0100111001011110101011001111111111011100 1110101101000001100001011000011011111011 0101101100111100011010101011101000101001 1001010100100111111111000011001110111111 1011110011101111010001010101111000000111 0111101010010100001010101100101110111011 0100001000111101101011011001110011001110 1100101110111000010000101111000100110001 1111001001110111010011000010100000101011 0001100111001101101001101011101110000000 0011100000001110100000011011110101101001 0011101101100010010110011110011010111000 0101110100010011001110110100111101011010 1101110010110100010111000000111101000100 1101110101000011001111100001100100010111 [#40842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14845]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#11554]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33685]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#23030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 961 (0x3 3c1) == 961 (0x3c1) [#31757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#23174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14669]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78961 (0 0x13471) == 78961 (0x13471) [#26022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#23492]", "bindmonitor-ringbuf-jit :: process_map_fd > 0 for: 45 > 0 [#41060]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39451]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#35384]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6524]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#10515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104329 ( (0x19789) == 104329 (0x19789) [#19873]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7909]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#29088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12764]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33478]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56644 (0 0xdd44) == 56644 (0xdd44) [#25936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34609]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#23259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37383]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#30558]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 127449 ( (0x1f1d9) == 127449 (0x1f1d9) [#32409]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26595]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22378]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31870]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#34784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 135424 (0 0x21100) == 135424 (0x21100) [#7491]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1651]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27729]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 211600 ( (0x33a90) == 211600 (0x33a90) [#26380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#29371]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12544 (0 0x3100) == 12544 (0x3100) [#13214]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25164]", "EBPF_OPERATION_CREATE_MAP :: invoke_protocol(EBPF_OPERATION_CREATE_MAP, request, reply) == EBPF_IN NVALID_OBJECT for: 5 == 5 [#37925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#10097]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#11430]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14546]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#30447]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#30588]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#29086]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#30039]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28414]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 841 100 (0x14884) [#9164]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#27308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44521 (0 0xade9) == 44521 (0xade9) [#25882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19886]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 36 == 36 [#38964]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#10571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#23909]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#10798]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15139]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27889]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22359]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7238]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#36864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37062]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2916 (0x xb64) == 2916 (0xb64) [#25568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#29309]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32198]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8824]", "bindmonitor-bpf2bpf-jit :: ebpf_object_set_execution_type(_object, _execution_type) == EBPF_SUCC CESS for: 0 == 0 [#41009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#24041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27766]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6726]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 7 == 7 [#38812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31296]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 147456 ( (0x24000) == 147456 (0x24000) [#32463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#34881]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#11354]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9775]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#29978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6318]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26681]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#10629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#34557]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#28937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#35027]", "map_create_invalid :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'name := \"BPF_MAP_TYPE_ARRAY\"' [#37416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#29003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#22896]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31134]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#29619]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36900]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#22381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 (0x13b1) [#9910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#29275]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 259081 (0 0x3f409) == 259081 (0x3f409) [#7773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#11565]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#35183]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 116 == 116 [#39107]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#35490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#10080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#22315]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#29816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#35977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26577]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12323]", "droppacket-jit :: value == 1 for: 1 == 1 [#40880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21982]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6724 (0x1a a44) == 6724 (0x1a44) [#682]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#29772]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#35646]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3972]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#30200]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 796 (0x31c) == = 796 (0x31c) [#40092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 251001 (0 0x3d479) == 251001 (0x3d479) [#7757]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6732]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#30375]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#36806]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68121 (0x x10a19) == 68121 (0x10a19) [#1040]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#29044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 203401 ( (0x31a89) == 203401 (0x31a89) [#13892]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#34928]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#29554]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21278]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 19 98025 (0x30589) [#9629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#28127]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 676 (0x2a4) == = 676 (0x2a4) [#40032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#22517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#23226]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101761 ( (0x18d81) == 101761 (0x18d81) [#26098]", "bindmonitor-ringbuf-jit :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#41055]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26569 (0x x67c9) == 26569 (0x67c9) [#7081]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7702]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#24103]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#36130]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 110 == 110 [#39749]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33362]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145161 ( (0x23709) == 145161 (0x23709) [#26222]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2428]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18920]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20140]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7546]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24814]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3415]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26295]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#29500]", "bindmonitor-bpf2bpf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15151]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#35334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#11050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#27356]", "work_queue :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#40846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#35247]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19352]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32624]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#11373]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26181]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#28806]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18336]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33638]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 362 (0x16a) == 362 (0x16a) [#40539]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 1 for: 1 == 1 [#38425]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9627]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7760]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 850 (0x352) == = 850 (0x352) [#40119]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 21 18089 (0x353e9) [#9695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#27932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19554]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39213]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2476]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#35129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12809]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#23090]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13433]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3135]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15805]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19970]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81225 (0x x13d49) == 81225 (0x13d49) [#7325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21421]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31916]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6241 (0x x1861) == 6241 (0x1861) [#13148]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 625 (0x271 1) == 625 (0x271) [#568]", "ring_buffer_output :: producer == data.size() + (((size_t) & ((ebpf_ring_buffer_record_t*)0 0)->data)) for: 18 == 18 [#40761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#11435]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1369 (0x5 559) == 1369 (0x559) [#6829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34596 (0 0x8724) == 34596 (0x8724) [#25832]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31473]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27267]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#10828]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38098]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 540 (0x21c) == = 540 (0x21c) [#39964]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136900 (0 0x216c4) == 136900 (0x216c4) [#1258]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31386]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36937]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#164]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25539]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#35249]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#30540]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34751]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#33462]", "work_queue :: ebpf_timed_work_queue_is_empty(work_queue) == true for: true == true [#40853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25345]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32813]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3087]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#29600]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#34749]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#35229]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18229]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#29008]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12050]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#23325]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#10900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2209 (0x x8a1) == 2209 (0x8a1) [#25554]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15496]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15794]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19041]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9787]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2556]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21998]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2361]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 484 (0x1 1e4) == 484 (0x1e4) [#31739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31946]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#284]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5730]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#35387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#28986]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12003]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34223]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2895]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 86436 (0 0x151a4) == 86436 (0x151a4) [#32283]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41209 (0 0xa0f9) == 41209 (0xa0f9) [#25866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21845]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#35918]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1846]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#29089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#33906]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24920]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24892]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#28878]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21527]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6872]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 1368 89 (0x3579) [#8645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#23170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76176 (0 0x12990) == 76176 (0x12990) [#13542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12949]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19604]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#29759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#35041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#29956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2025 (0x x7e9) == 2025 (0x7e9) [#19317]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#64]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33823]", "map_crud_operations:BPF_MAP_TYPE_HASH :: memcmp(&retrieved_map_definition, &map_definition, sizeof(map_definiti ion)) == 0 for: 0 == 0 [#6233]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25455]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 162 == 162 [#39775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 185761 ( (0x2d5a1) == 185761 (0x2d5a1) [#20089]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#24194]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32723]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28407]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30853]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#23438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20319]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 4 == 4 [#39696]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#36262]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31796]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38642]", "error codes :: result2 == result for: 3 == 3 [#40785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18930]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#22408]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#29274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#10827]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 916 (0x394) == 916 (0x394) [#40262]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32200]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37979]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27354]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#23096]", "droppacket-jit :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114921 ( (0x1c0e9) == 114921 (0x1c0e9) [#26138]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#10432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18700]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15178]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 430 (0x1ae) == 430 (0x1ae) [#40505]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37262]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21398]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#29343]", "ring_buffer_async_query :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37791]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#10920]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27607]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#11728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18889]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2401 (0x9 961) == 2401 (0x961) [#6853]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15286]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1018 (0x3fa) == 1018 (0x3fa) [#40211]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38636]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#34854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#10214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25189]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#30271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28561 (0 0x6f91) == 28561 (0x6f91) [#25798]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#23555]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#35314]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#22938]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20116]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15788]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#11642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18458]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8057]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 138 == 138 [#39763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#23686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#30394]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9259]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#30475]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32851]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 10 05625 (0x19c99) [#9269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7734]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 214369 ( (0x34561) == 214369 (0x34561) [#32621]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#95]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#21363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#36160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20216]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1961]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#424]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#11018]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#11522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13456 (0 0x3490) == 13456 (0x3490) [#13222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#22571]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11971]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9523]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1777]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#23610]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#11272]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27118]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 122 == 122 [#40659]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#35720]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#30403]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 710 (0x2c6) == 710 (0x2c6) [#40365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9499]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#29351]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 38 == 38 [#40701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178084 ( (0x2b7a4) == 178084 (0x2b7a4) [#20071]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3210]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6623]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2695]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#10341]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#29862]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#35125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#35007]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1333]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 260100 (0 0x3f804) == 260100 (0x3f804) [#7775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#29110]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 876 (0x36c) == = 876 (0x36c) [#40132]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 172225 ( (0x2a0c1) == 172225 (0x2a0c1) [#32525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7358]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12362]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#33459]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13699]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5852]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.10.2 255.255/32\"' [#37498]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#35181]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25835]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3205]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33637]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9418]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31504]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#35537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 0 == 0 [#19227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7266]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31277]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 ( (0x640) [#9875]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7926]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2005]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38195]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#27593]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 18 84900 (0x2d244) [#9584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32840]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#11504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7396 (0x x1ce4) == 7396 (0x1ce4) [#19399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6312]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == EBPF_OBJECT_NOT_FOUND for: 7 = == 7 [#31174]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15739]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6216]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#30612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4761 (0x x1299) == 4761 (0x1299) [#19365]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#23443]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 34 == 34 [#39162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18289]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 582 (0x246) == = 582 (0x246) [#39985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#35182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29241 (0 0x7239) == 29241 (0x7239) [#25802]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#10318]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#901]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26197]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2604]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100 == 100 [#34098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33489 (0 0x82d1) == 33489 (0x82d1) [#19593]", "map_crud_operations_queue :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#37666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#23138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6574]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 162409 (0 0x27a69) == 162409 (0x27a69) [#7561]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24817]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2626]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6714]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#23150]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#19]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37249 (0 0x9181) == 37249 (0x9181) [#32081]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26641]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#28750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#23373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#23263]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#28160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#22391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91809 (0 0x166a1) == 91809 (0x166a1) [#13596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21937]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 180625 ( (0x2c191) == 180625 (0x2c191) [#26310]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#29948]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 148 == 148 [#40646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28275]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 888 (0x378) == 888 (0x378) [#40276]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#36656]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39239]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12311]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38552]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25679]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#35402]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#27320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15109]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#22823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#30597]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#11064]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#34461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14999]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#33912]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33152]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164836 (0 0x283e4) == 164836 (0x283e4) [#7567]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12098]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28422]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8892]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#11672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15129 (0 0x3b19) == 15129 (0x3b19) [#13236]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34367]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#28900]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#36681]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28087]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38121]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#103]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#36069]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8935]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26706]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1089 (0x x441) == 1089 (0x441) [#25526]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#28637]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#35552]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == = 0 [#5]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#30152]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#35306]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#699]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#35732]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26244 (0 0x6684) == 26244 (0x6684) [#13314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#28951]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 (0x14d1) [#9912]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100489 (0 0x18889) == 100489 (0x18889) [#7389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#23070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12480]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#29516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14198]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30756]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 5569 96 (0xd990) [#9002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20134]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2181]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31310]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28150]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32694]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#27536]", "program :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#37779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#24219]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65025 (0 0xfe01) == 65025 (0xfe01) [#32205]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 11 19716 (0x1d3a4) [#9332]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#35510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6533]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#407]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37357]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 818 (0x332) == = 818 (0x332) [#40103]", "program :: ebpf_program_get_helper_function_addresses(program.get(), (sizeof(hel lper_function_ids) / sizeof(helper_function_ids[0])), addresses) == EBPF_SUCCESS for: 0 == 0 [#37772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#10990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20198]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#30460]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6193]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#22167]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 ( (0x961) [#9884]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14506]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#35475]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22339]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#34257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6954]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"10.0.0.1/33\"' [#37505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 201601 ( (0x31381) == 201601 (0x31381) [#26358]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#29341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#23576]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32416]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#34907]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#36440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14158]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6889 (0x x1ae9) == 6889 (0x1ae9) [#25626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14356]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#23269]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 109561 (0 0x1abf9) == 109561 (0x1abf9) [#1180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11664 (0 0x2d90) == 11664 (0x2d90) [#13206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9375]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 247009 (0 0x3c4e1) == 247009 (0x3c4e1) [#1512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21355]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#30520]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31618]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142884 (0 0x22e24) == 142884 (0x22e24) [#1274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#22991]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#10002]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31637]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8406]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12864]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#11215]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#24359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#30368]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9271]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#35560]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1443]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5728]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24523]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 (0x1900) [#8534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 (0x1000) [#8486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20757]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#34452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#35576]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2025 (0x x7e9) == 2025 (0x7e9) [#13080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32310]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26856]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68644 (0x x10c24) == 68644 (0x10c24) [#1042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14216]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6153]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2575]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38529]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#11746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24594]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5835]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164025 ( (0x280b9) == 164025 (0x280b9) [#32505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#36209]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#23142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12167]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#29409]", "droppacket-jit :: bpf_map_update_elem(interface_index_map_fd, &key, &if_index, EBPF_ANY Y) == EBPF_SUCCESS for: 0 == 0 [#40862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#10144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1156 (0x x484) == 1156 (0x484) [#13058]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#10706]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34375]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18852]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32394]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#36577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#24350]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#11489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#11229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#10841]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#36106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#23501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28461]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173889 (0 0x2a741) == 173889 (0x2a741) [#7589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#35146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32894]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#27]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33094]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#10501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#35870]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 729 (0x2 2d9) == 729 (0x2d9) [#31749]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18423]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28518]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#29344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 181476 ( (0x2c4e4) == 181476 (0x2c4e4) [#13842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15415]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#29484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34562]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 ( (0x484) [#9869]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38101]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19152]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37108]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#28551]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9688]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5777]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#29887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#21492]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#36276]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#33921]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 217156 (0 0x35044) == 217156 (0x35044) [#7687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14564]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26879]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#10034]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32765]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2209 (0x x8a1) == 2209 (0x8a1) [#13084]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30625 (0 0x77a1) == 30625 (0x77a1) [#32045]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#10045]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#35377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19082]", "epoch_test_stale_items :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38512]", "error codes :: result2 == result for: 22 == 22 [#40804]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 30 == 30 [#39064]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1085]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25600 (0x x6400) == 25600 (0x6400) [#7075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#36444]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 102400 ( (0x19000) == 102400 (0x19000) [#32335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21340]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27576]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21919]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55225 (0 0xd7b9) == 55225 (0xd7b9) [#25930]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1656]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#35212]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27451]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169744 ( (0x29710) == 169744 (0x29710) [#26284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28224 (0x x6e40) == 28224 (0x6e40) [#7091]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9409 (0x x24c1) == 9409 (0x24c1) [#31889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#23703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 200704 (0 0x31000) == 200704 (0x31000) [#7651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13625]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26215]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28431]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#10471]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33485]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9312]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 666 (0x29a) == 666 (0x29a) [#40387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66564 (0 0x10404) == 66564 (0x10404) [#25976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9262]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5947]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5776 (0x16 690) == 5776 (0x1690) [#670]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#33858]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14350]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 940 (0x3ac) == 940 (0x3ac) [#40250]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#10557]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 926 (0x39e) == 926 (0x39e) [#40257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13771]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 5712 21 (0xdf21) [#9011]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 572 (0x23c) == = 572 (0x23c) [#39980]", "verify random :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#40836]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3586]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3186]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#30324]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25322]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8578]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#11930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#24138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12351]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#22095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#36436]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#24009]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19676]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#28989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#28656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#27713]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#35396]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110224 ( (0x1ae90) == 110224 (0x1ae90) [#13654]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#27989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18318]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 588 (0x24c) == = 588 (0x24c) [#39988]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 122500 ( (0x1de84) == 122500 (0x1de84) [#32395]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3345]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#34500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#14005]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#193]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38671]", "map_crud_operations_stack :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26559]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#35888]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#11180]", "pinned_map_enum :: results.find(pin_path) != results.end() for: {?} != {?} [#41490]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1193]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9550]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 28 == 28 [#40706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10001]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 132496 (0 0x20590) == 132496 (0x20590) [#1246]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#11774]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 770 (0x302) == 770 (0x302) [#40335]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#34995]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26327]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#23190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133225 ( (0x20869) == 133225 (0x20869) [#32425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18861]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1251]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5889]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#23598]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 5760 00 (0xe100) [#9014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14599]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#36077]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19044 (0x x4a64) == 19044 (0x4a64) [#7031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 11 11556 (0x1b3c4) [#9296]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33635]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#28905]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#23788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#24169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 19 94481 (0x2f7b1) [#9617]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#28301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31623]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 (0x1ef1) [#9930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#34840]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119716 (0 0x1d3a4) == 119716 (0x1d3a4) [#7447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18214]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9033]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#30366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8281 (0x x2059) == 8281 (0x2059) [#13172]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26285]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#33489]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26023]", "access_check :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38733]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1615]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33206]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 490 (0x1ea) == = 490 (0x1ea) [#39939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#10509]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#23507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18900]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39395]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#36875]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39034]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 56 == 56 [#40692]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26882]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31338]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12278]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 790 (0x316) == 790 (0x316) [#40325]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#36754]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#11074]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28054]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#865]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#22608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15254]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#11849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19296]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#27083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9649]", "ring_buffer_async_query :: ebpf_map_get_program_from_entry(map.get(), sizeof(&key), reinterpret_ _cast<uint8_t*>(&key)) == nullptr for: nullptr == nullptr [#37802]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#35769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6397]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31671]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#475]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6083]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19758]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#442]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30941]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26695]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12048]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"172.16.0.1/100\"' [#37515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21076]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27726]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#10853]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8670]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2878]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 670 (0x29e) == 670 (0x29e) [#40385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#21591]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#10334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18356]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#29745]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28198]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34394]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#24054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256036 ( (0x3e824) == 256036 (0x3e824) [#14002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82369 (0 0x141c1) == 82369 (0x141c1) [#26034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#23247]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#35989]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43264 (0x xa900) == 43264 (0xa900) [#7171]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49 == 49 [#6769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#33252]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 182329 ( (0x2c839) == 182329 (0x2c839) [#32549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18204]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31569]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#10500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#30073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#23847]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16463]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#23618]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#29394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#12991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#35987]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6094]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 420 (0x1a4) == 420 (0x1a4) [#40510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32408]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27225 (0x x6a59) == 27225 (0x6a59) [#7085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24875]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4356 (0x x1104) == 4356 (0x1104) [#31827]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#203]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#24297]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#20964]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#11319]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#11412]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38592]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#36175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#35363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#28548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25350]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7028]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 (0x1440) [#9911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#22191]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136161 ( (0x213e1) == 136161 (0x213e1) [#32433]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#22561]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#11869]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#10486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30677]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1616]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19276]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 22 == 22 [#39168]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31044]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9177]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 3534 44 (0x8a10) [#8858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#24181]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#11542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1681 (0x x691) == 1681 (0x691) [#25542]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 10 06929 (0x1a1b1) [#9275]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7406]", "state_test :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 12 28164 (0x1f4a4) [#9368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68644 (0 0x10c24) == 68644 (0x10c24) [#19751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#11613]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41180]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 296 (0x128) == = 296 (0x128) [#39842]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32728]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 706 (0x2c2) == 706 (0x2c2) [#40367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6677]", "divide_by_zero-native :: sample_program_info.initialize(EBPF_PROGRAM_TYPE_SAMPLE) == EBPF_SUCC CESS for: 0 == 0 [#40982]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31540]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12438]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#683]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 191844 ( (0x2ed64) == 191844 (0x2ed64) [#32571]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 510 (0x1fe) == = 510 (0x1fe) [#39949]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 512 (0x200) == = 512 (0x200) [#39950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 216225 ( (0x34ca1) == 216225 (0x34ca1) [#13920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24860]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18798]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145161 (0 0x23709) == 145161 (0x23709) [#7517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#23946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#10890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#11792]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9216 (0x x2400) == 9216 (0x2400) [#25652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#24053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24457]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#36590]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7444]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6856]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 6350 04 (0xf810) [#9050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15989]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#11292]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2712]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28519]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#34889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#22546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#21105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#23341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32350]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7016]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12032]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 235225 (0 0x396d9) == 235225 (0x396d9) [#1488]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#36366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#24320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110889 ( (0x1b129) == 110889 (0x1b129) [#13656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25106]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33704]", "serialize_program_info_test :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38788]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5872]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8142]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#36862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22624]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1267]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25600 (0 0x6400) == 25600 (0x6400) [#19547]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3060]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#11033]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26485]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#27476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15854]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#35949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22258]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70225 (0 0x11251) == 70225 (0x11251) [#32225]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75076 (0 0x12544) == 75076 (0x12544) [#26008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20656]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#22696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#29359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#21588]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#23133]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#10585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14077]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 243049 (0 0x3b569) == 243049 (0x3b569) [#7741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#30050]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#10366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22100]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#763]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#33528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#20844]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18373]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13513]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9025 (0x2 2341) == 9025 (0x2341) [#6945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#30071]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37151]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#27857]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#30322]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27016]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#474]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#27656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#27695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13031]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36901]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#36181]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21269]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#33720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19774]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38060]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 242 == 242 [#39815]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25525]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25623]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20064]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13291]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18895]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6364]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5911]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#27488]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#23684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32570]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 170569 ( (0x29a49) == 170569 (0x29a49) [#26286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21452]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12781]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3004]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31102]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#24003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19202]", "async :: async_context.result == EBPF_PENDING for: 28 == 28 [#40740]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#28526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37150]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#35735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#22236]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#35696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#29268]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#22329]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3333]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#10420]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#20762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15745]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11990]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#10043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65536 (0 0x10000) == 65536 (0x10000) [#25972]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1444 (0x5 5a4) == 1444 (0x5a4) [#6831]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#35488]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 21 19024 (0x35790) [#9698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#11616]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 162409 ( (0x27a69) == 162409 (0x27a69) [#20033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33050]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1083]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38699]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#436]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#11727]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1373]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8127]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38526]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38557]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14755]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18927]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#86]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#35376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24908]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41616 (0 0xa290) == 41616 (0xa290) [#25868]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#23510]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#28678]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#34985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13477]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#11206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30881]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#11452]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43264 (0 0xa900) == 43264 (0xa900) [#32111]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#29918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#27716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#11517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#11214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76176 (0x x12990) == 76176 (0x12990) [#7307]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#11806]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21610]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27327]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#11446]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38075]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20465]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#35217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#23210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#22245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#34855]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30625 (0x7 77a1) == 30625 (0x77a1) [#868]", "EBPF_OPERATION_UPDATE_PINNING :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38164]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#35902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13191]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34596 (0x8 8724) == 34596 (0x8724) [#890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19900]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#30360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#21096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27846]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#29162]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#29403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24912]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#36104]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#444]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#36507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#35253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#23916]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 79524 (0 0x136a4) == 79524 (0x136a4) [#26024]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#23388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#22931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3555]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#10940]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20827]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#30500]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 256 (0x100) == = 256 (0x100) [#39822]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#23733]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_FIND_ELEMENT, request, reply) == E EBPF_INVALID_ARGUMENT for: 6 == 6 [#38029]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37248]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5955]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39019]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9051]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3039]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#22800]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 252 == 252 [#40594]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#11829]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25921 (0 0x6541) == 25921 (0x6541) [#32017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#35192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#36292]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#11333]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#28882]", "error codes :: result2 == result for: 15 == 15 [#40797]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9480]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#27770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#11115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18332]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 3496 69 (0x8899) [#8855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14496]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9028]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#11398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#21546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#10177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18383]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12725]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14615]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5850]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#30498]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 238 == 238 [#39813]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31684 (0x7 7bc4) == 31684 (0x7bc4) [#874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13755]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#33291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33124 (0 0x8164) == 33124 (0x8164) [#32059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#29855]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"11.0.0.0/32\"' and 'correct_value := \"0.0. .0.0/0\"' [#37477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26425]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38143]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#30307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#28717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#12993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#36707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#23738]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#29145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#22935]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27309]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#36132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21733]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#861]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25645]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#11404]", "EBPF_OPERATION_LINK_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38217]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8282]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30746]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#35417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15986]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#11881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#24386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9013]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#35616]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38007]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31145]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37400]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#34844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27111]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#27479]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#10826]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18762]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#22915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20279]", "map_crud_operations_queue :: return_value == value for: 3 == 3 [#37687]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26893]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#30576]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#29331]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 862 (0x35e) == 862 (0x35e) [#40289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#36013]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 64 == 64 [#38950]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#11181]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#11382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18732]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28402]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#35850]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#36259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#36624]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26535]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196249 ( (0x2fe99) == 196249 (0x2fe99) [#20113]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22568]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#35079]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38179]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8464 (0x21 110) == 8464 (0x2110) [#702]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#36828]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#34898]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25156]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#24261]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#29072]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#27566]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#30372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#33993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19912]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31461]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#11170]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25125]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39202]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#30218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#10350]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8104]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&lpm_pair.first), 0, reinterpret_cast<const uint8_t*>(lpm_pair.second.c_str()), , EBPF_ANY, 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/ /32\"' [#37652]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 118336 (0 0x1ce40) == 118336 (0x1ce40) [#7443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13067]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31645]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#825]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32144]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1279]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27804]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8836 (0x22 284) == 8836 (0x2284) [#706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#20823]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34789]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6852]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32626]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 2433 36 (0x5f10) [#8762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#22429]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#11734]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14641]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1888]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == = 0 [#6]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20588]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12027]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13389]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: memcmp(&retrieved_map_definition, &map_definition, sizeof(map_definit tion)) == 0 for: 0 == 0 [#18705]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#11313]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 (0x1210) [#9907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26331]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198025 ( (0x30589) == 198025 (0x30589) [#20117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#21303]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71289 (0 0x11679) == 71289 (0x11679) [#13524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21569]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25999]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24568]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12246]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28291]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#24068]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#29504]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49 == 49 [#29560]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38203]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21475]", "access_check :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20549]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1397]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39571]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 176400 ( (0x2b110) == 176400 (0x2b110) [#32535]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 181476 ( (0x2c4e4) == 181476 (0x2c4e4) [#20079]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#21957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#11455]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2700]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#29030]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 926 (0x39e) == = 926 (0x39e) [#40157]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#34017]", "error codes :: result2 == result for: 20 == 20 [#40802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31684 (0 0x7bc4) == 31684 (0x7bc4) [#25816]", "verify random :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#40834]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14161 (0 0x3751) == 14161 (0x3751) [#19465]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#23658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#22386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13213]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88209 (0x x15891) == 88209 (0x15891) [#1112]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.14.0/29\" == \"192.168.14.0 0/29\" with 2 messages: 'key_string := \"192.168.14.0/29\"' and 'correct_value := \"1 192.168.14.0/29\"' [#37442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#23719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15376 (0 0x3c10) == 15376 (0x3c10) [#13238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#23687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32927]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15019]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#22614]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8099]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8101]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#36794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19984]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#29010]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#33795]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26849]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/63\"' and 'correct_value := \"BB/32\"' [#37642]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5833]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7826]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24440]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#36771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15938]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13941]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2805]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#10999]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24711]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#36281]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12415]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#34470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80656 (0 0x13b10) == 80656 (0x13b10) [#19795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21169]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24985]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#23185]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#22804]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 12 21104 (0x1d910) [#9338]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#11235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 2624 44 (0x6684) [#8780]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8409]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37688]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28092]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9234]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14587]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8646]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32864]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28416]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 17 74724 (0x2aa84) [#9548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14325]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 356 (0x164) == = 356 (0x164) [#39872]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24640]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#21915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#24294]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9151]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1985]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34174]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#10929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34117]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1239]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25825]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 456 (0x1c8) == 456 (0x1c8) [#40492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18210]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#10270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#35148]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27102]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#35267]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39320]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32046]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38701]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#30078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#23384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#35019]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#29479]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37173]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 22 27529 (0x378c9) [#9725]", "ring_buffer_reserve_submit_discard :: ebpf_ring_buffer_reserve(ring_buffer, &mem3, size + 1) == EBPF_INVALI ID_ARGUMENT for: 6 == 6 [#40779]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#29405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#22080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133956 ( (0x20b44) == 133956 (0x20b44) [#13722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14908]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#751]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 2 for: 2 == 2 [#38427]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#29000]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#36601]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22320]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37012]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6556]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#10100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#35275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#22649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#22357]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14513]", "bindmonitor-bpf2bpf-interpret :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 239121 ( (0x3a611) == 239121 (0x3a611) [#26438]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60516 (0x xec64) == 60516 (0xec64) [#7247]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 251001 ( (0x3d479) == 251001 (0x3d479) [#13992]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36956]", "error codes :: result2 == result for: 31 == 31 [#40813]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 606 (0x25e) == = 606 (0x25e) [#39997]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48400 (0 0xbd10) == 48400 (0xbd10) [#32135]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1437]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2457]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#317]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 754 (0x2f2) == 754 (0x2f2) [#40343]", "state_test :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19864]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27718]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1287]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#28463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#11794]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#34916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#22923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28072]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38579]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198916 (0 0x30904) == 198916 (0x30904) [#7647]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21634]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6892]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3372]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#27887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32999]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225 == 2 225 [#31725]", "droppacket-jit :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40870]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3190]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18402]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81225 (0 0x13d49) == 81225 (0x13d49) [#26030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 167281 ( (0x28d71) == 167281 (0x28d71) [#32513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18461]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12206]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32817]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 526 (0x20e) == = 526 (0x20e) [#39957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#23485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#29205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#29517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21170]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 261121 ( (0x3fc01) == 261121 (0x3fc01) [#26482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#20814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#11720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#36409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9654]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#22328]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11961]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2725]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 660 (0x294) == 660 (0x294) [#40390]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37874]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34448]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/128\"' [#37583]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198025 (0 0x30589) == 198025 (0x30589) [#1408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#36739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#35288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7352]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#29638]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#65]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#27830]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52441 (0 0xccd9) == 52441 (0xccd9) [#13448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#30086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7314]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#23411]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 912 (0x390) == 912 (0x390) [#40264]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#11546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22801 (0 0x5911) == 22801 (0x5911) [#13292]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#10132]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6187]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7660]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#29719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#11722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30937]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#29804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#24095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121 == 121 [#36275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18940]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#33600]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#24039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18258]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#34608]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38208]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#10412]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#21477]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#11933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91809 (0x x166a1) == 91809 (0x166a1) [#7361]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20084]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3418]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#30386]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#777]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13085]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8719]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31840]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#29730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43681 (0 0xaaa1) == 43681 (0xaaa1) [#32113]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 274 (0x112) == = 274 (0x112) [#39831]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#35044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#255]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33149]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#34350]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37240]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#10694]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#30309]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#34398]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#11498]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#28079]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14837]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39525]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 418 (0x1a2) == = 418 (0x1a2) [#39903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20296]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.15.0/24\"' and 'correct_value := \" \"192.168.15.0/24\"' [#37433]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#10665]", "divide_by_zero-interpret :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40985]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#22559]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#34728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1024 (0x4 400) == 1024 (0x400) [#6819]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#35028]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2209 (0x8 8a1) == 2209 (0x8a1) [#6849]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#29339]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: memcmp(&retrieved_map_definition, &map_definition, sizeof(map_definit tion)) == 0 for: 0 == 0 [#12468]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26710]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#23347]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38016]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#35832]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#10127]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#28700]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#22760]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20954]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#29194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#11739]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28297]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8281 (0x x2059) == 8281 (0x2059) [#31877]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 ( (0xcb1) [#8465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12541]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38283]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20483]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#24027]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6208]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9354]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35187]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#30589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56169 (0 0xdb69) == 56169 (0xdb69) [#32169]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 360 (0x168) == 360 (0x168) [#40540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21470]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10609 (0 0x2971) == 10609 (0x2971) [#31901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10201 (0x x27d9) == 10201 (0x27d9) [#6957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#11030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#28549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#35289]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 896 (0x380) == = 896 (0x380) [#40142]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#11882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15875]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#11139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14082]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12972]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#11076]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#45]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#35827]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24492]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#23882]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#29969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34051]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2299]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#28789]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#36102]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#504]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#28737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#30526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13899]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 197136 ( (0x30210) == 197136 (0x30210) [#32583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12236]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#36723]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#10992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 235225 ( (0x396d9) == 235225 (0x396d9) [#13960]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#35361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21437]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33140]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#11865]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18310]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25 == 25 [#33270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#23860]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#11386]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2464]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#29741]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#36285]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15476]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27547]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8281 (0x x2059) == 8281 (0x2059) [#25642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94864 (0 0x17290) == 94864 (0x17290) [#19843]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#30382]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"FF/128\"' and 'correct_value := \"00/0\"' [#37650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36864 (0 0x9000) == 36864 (0x9000) [#32079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25817]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1191]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 372 (0x174) == 372 (0x174) [#40534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20044]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30733]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28900 (0x7 70e4) == 28900 (0x70e4) [#858]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#28702]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39572]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#10771]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64 == 64 [#29264]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9045]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37875]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#28749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#11130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2427]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2190]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6404]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 44 == 44 [#38938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19422]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#22418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#35583]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#34]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28213]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#35273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18492]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65025 (0 0xfe01) == 65025 (0xfe01) [#25970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20999]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#29856]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11236 (0x2 2be4) == 11236 (0x2be4) [#730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16 == 16 [#12998]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32879]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1331]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 894 401 (0x15d39) [#9191]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38901]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1632]", "bindmonitor-ringbuf-jit :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#41058]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39424]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#11635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152881 ( (0x25531) == 152881 (0x25531) [#20009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#14011]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7512]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#23421]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34318]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6104]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18532]", "program :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37748]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"172.16.0.0/12\" == \"172.16.0.0/12\" wi ith 2 messages: 'key_string := \"172.16.0.0/12\"' and 'return_value := \"172.16.0.0/ /12\"' [#37544]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#11756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14139]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#34818]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#29596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22511]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32176]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#635]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21206]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 ( (0x9c4) [#9885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18796]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3481]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#9843]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20595]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#27722]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3270]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26185]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 32 == 32 [#38932]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39557]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 4536 69 (0xb139) [#8933]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31158]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#9844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19029]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#21924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19217]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26510]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38563]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#10591]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9439]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7354]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 113569 ( (0x1bba1) == 113569 (0x1bba1) [#19901]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31074]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#677]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#23408]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 13 36161 (0x213e1) [#9401]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#11905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#27872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9528]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28434]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38342]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6121]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2015]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15209]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#33675]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 125316 (0 0x1e984) == 125316 (0x1e984) [#7463]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21812]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#27944]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6045]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7178]", "error codes :: result2 == result for: 21 == 21 [#40803]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 16 60000 (0x27100) [#9494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#11243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51984 (0 0xcb10) == 51984 (0xcb10) [#19683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15787]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 980 (0x3d4) == = 980 (0x3d4) [#40184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#24361]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2374]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6059]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 774 (0x306) == = 774 (0x306) [#40081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25280]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#20817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#22413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#11666]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#36234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#30113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#35717]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31844]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#35196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 201601 ( (0x31381) == 201601 (0x31381) [#20125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31698]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#35854]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168100 ( (0x290a4) == 168100 (0x290a4) [#32515]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28123]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28260]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 840 (0x348) == 840 (0x348) [#40300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31415]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36 == 36 [#19239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14548]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 228 == 228 [#39808]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#22884]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#381]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26141]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#29168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26049]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156025 ( (0x26179) == 156025 (0x26179) [#26250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#21033]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27225 (0 0x6a59) == 27225 (0x6a59) [#25790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34487]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#34356]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34063]", "access_check :: ConvertStringSecurityDescriptorToSecurityDescriptorW( allow_sddl, 1, (PSECURITY_DESCRIPTOR*)&sd, &sd_size) for: 1 [#38735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#21369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#23942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25259]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#28710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26523]", "droppacket-jit :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#40858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#10402]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16350]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 568 (0x238) == = 568 (0x238) [#39978]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37293]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7774]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3499]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#36032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32902]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#33966]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#33399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12559]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#34101]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39594]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22801 (0 0x5911) == 22801 (0x5911) [#31997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#23671]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 209764 (0 0x33364) == 209764 (0x33364) [#1434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#35725]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#21513]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"CD/96\"' [#37655]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8662]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144 == 1 144 [#25484]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6482]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 14 45924 (0x23a04) [#9440]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12382]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 250000 (0 0x3d090) == 250000 (0x3d090) [#7755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#23086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 3880 09 (0x9799) [#8885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28561 (0x x6f91) == 28561 (0x6f91) [#7093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#23281]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15631]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#28652]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 250 == 250 [#39819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10190]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19125]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22500 (0 0x57e4) == 22500 (0x57e4) [#19527]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1712]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#10281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#21531]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2896]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#36129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#22965]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#10047]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 480 (0x1e0) == 480 (0x1e0) [#40480]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#21438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#20922]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#35731]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22500 (0 0x57e4) == 22500 (0x57e4) [#13290]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 227529 (0 0x378c9) == 227529 (0x378c9) [#1472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#30633]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51076 (0 0xc784) == 51076 (0xc784) [#32147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57121 (0 0xdf21) == 57121 (0xdf21) [#25938]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2170]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7566]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 452 (0x1c4) == = 452 (0x1c4) [#39920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37039]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25064]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32668]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40000 (0 0x9c40) == 40000 (0x9c40) [#25860]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#11609]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3379]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#10766]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#27263]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#555]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82944 (0x x14400) == 82944 (0x14400) [#1094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32761 (0 0x7ff9) == 32761 (0x7ff9) [#19589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#21798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18652]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33818]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#29070]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#34707]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 2 == 2 [#38981]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 244 == 244 [#40598]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#22588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18965]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#34104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 92416 (0 0x16900) == 92416 (0x16900) [#32303]", "work_queue :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#40845]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#22882]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#29005]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8164]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6718]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#33711]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#10111]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21880]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5884]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#22312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 180625 ( (0x2c191) == 180625 (0x2c191) [#13840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15637]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#34176]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#24239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#22424]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 5522 25 (0xd7b9) [#8999]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#11155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6932]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#10982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51076 (0 0xc784) == 51076 (0xc784) [#19679]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#36458]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#28004]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6889 (0x1a ae9) == 6889 (0x1ae9) [#684]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 118336 ( (0x1ce40) == 118336 (0x1ce40) [#26148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 ( (0x484) [#8396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24707]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26912]", "droppacket-jit :: value == 10 for: 10 == 10 [#40906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#22005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#22691]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#35701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13275]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34619]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 25 52004 (0x3d864) [#9800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#24382]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2191]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37344]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#11637]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"192.168.15.0/24\" == \"192.168.15.0/24 4\" with 2 messages: 'key_string := \"192.168.15.0/24\"' and 'return_value := \"192.1 168.15.0/24\"' [#37526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 113569 ( (0x1bba1) == 113569 (0x1bba1) [#13664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6889 (0x x1ae9) == 6889 (0x1ae9) [#31861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29241 (0x x7239) == 29241 (0x7239) [#7097]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#10087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1850]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/64\" == \"BB/64\" wi ith 2 messages: 'key_string := \"BB/65\"' and 'correct_value := \"BB/64\"' [#37639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#23522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#30248]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#27902]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1622]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 ( (0xc40) [#9893]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0x02) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#12467]", "ring_buffer_reserve_submit_discard :: ebpf_ring_buffer_create(&ring_buffer, size) == EBPF_SUCCESS for: 0 == = 0 [#40771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#24364]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63001 (0x xf619) == 63001 (0xf619) [#1020]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#10121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#36667]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#34842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#24327]", "map_reuse-native :: error == 0 for: 0 == 0 [#41810]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18278]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1151]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 (0x2110) [#8570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#29488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14016]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 684 (0x2ac) == = 684 (0x2ac) [#40036]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#29647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#11225]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40959]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38071]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 245025 (0 0x3bd21) == 245025 (0x3bd21) [#7745]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 482 (0x1e2) == = 482 (0x1e2) [#39935]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34610]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12420]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#30092]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28324]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12314]", "pinned_map_enum :: results.find(pin_path) != results.end() for: {?} != {?} [#41492]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#11608]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26734]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 122 == 122 [#39118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7833]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 10 == 10 [#38921]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#35921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#30538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#11109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#23163]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25533]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3535]", "epoch_test_stale_items :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38515]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#663]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31550]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8734]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33089]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5876]", "EBPF_OPERATION_GET_EC_FUNCTION :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38240]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8476]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 10 02400 (0x19000) [#9254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#23577]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1686]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36961]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 876 (0x36c) == 876 (0x36c) [#40282]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9216 (0x x2400) == 9216 (0x2400) [#31887]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 252 == 252 [#39820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#22461]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#23827]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7290]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5798]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32324]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27723]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31886]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#33480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#102]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37195]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 210681 (0 0x336f9) == 210681 (0x336f9) [#1436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15736]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#10193]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#29430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37159]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#10526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32484]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 98596 (0x x18124) == 98596 (0x18124) [#1146]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20403]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#27248]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#27209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#11505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#23973]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26843]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1797]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#35677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36929]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#10443]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31798]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26203]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#10237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15374]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32664]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.15.1/32\"' and 'correct_value := \" \"192.168.15.0/24\"' [#37455]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#36177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30955]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26221]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#36591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18552]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32874]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36916]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11964]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#36068]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 ( (0x559) [#9872]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#10934]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20689]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31107]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#35489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15482]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18628]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1749]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14789]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#36269]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81 == 81 [#31713]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14092]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14555]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6750]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#30063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14269]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24757]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37228]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73441 (0 0x11ee1) == 73441 (0x11ee1) [#26002]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#23107]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 884 (0x374) == = 884 (0x374) [#40136]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#29573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#23538]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26657]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12084]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#11884]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39524]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#10103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76729 (0 0x12bb9) == 76729 (0x12bb9) [#19781]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136161 ( (0x213e1) == 136161 (0x213e1) [#13728]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#35723]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31478]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#27665]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 (0x1ae9) [#8543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25325]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6896]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#247]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#933]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#36883]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19670]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#36730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#29629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15071]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9774]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8529]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#27329]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12477]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#22883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#23734]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#36011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21316]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14232]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2475]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"10.10.255.255/32\"' and 'correct_value := \"10.10.255.255/32\"' [#37447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#23076]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#11929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63504 (0 0xf810) == 63504 (0xf810) [#19731]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12124]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#27029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19122]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 252004 (0 0x3d864) == 252004 (0x3d864) [#1522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81 == 81 [#33309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#30127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24628]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 120 == 120 [#39754]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93636 (0 0x16dc4) == 93636 (0x16dc4) [#26072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#24190]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#10202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21796]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33131]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26271]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 18 85761 (0x2d5a1) [#9587]", "bindmonitor-bpf2bpf-interpret :: emulate_bind(invoke, 1, \"fake_app_1\") == BIND_REDIRECT for: 2 == 2 [#41038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#29997]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37135]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: invoke_protocol(EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY, request, reply, &async) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#23095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#23349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94864 (0x x17290) == 94864 (0x17290) [#7371]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9652]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25414]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#34359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103041 ( (0x19281) == 103041 (0x19281) [#26102]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#22068]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26349]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#33522]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12045]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#36349]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22549]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#11089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#35126]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18592]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1489]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#166]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3114]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#29236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#23717]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 764 (0x2fc) == 764 (0x2fc) [#40338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14038]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6373]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#35333]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19060]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9061]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#34494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6424]", "map_crud_operations_queue :: return_value == value for: 7 == 7 [#37695]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3411]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1296 (0x x510) == 1296 (0x510) [#13062]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38809 (0x x9799) == 38809 (0x9799) [#7149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16444]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33107]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#10168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19028]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31488]", "droppacket-interpret :: xdp_program_info.initialize(EBPF_PROGRAM_TYPE_XDP) == EBPF_SUCCESS fo or: 0 == 0 [#40920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#23140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#10048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 201601 (0 0x31381) == 201601 (0x31381) [#7653]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31025]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 286 (0x11e) == = 286 (0x11e) [#39837]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 900 (0x38 84) == 900 (0x384) [#6815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_pop_entry(map.get(), value.size(), value.data(), 0) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#24943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#35824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31616]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21407]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#11039]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#34834]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12161]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#29170]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 79524 (0 0x136a4) == 79524 (0x136a4) [#13554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7789]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6564]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#10252]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"CC/96\" == \"CC/96\" wi ith 2 messages: 'key_string := \"CC/97\"' and 'correct_value := \"CC/96\"' [#37611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22204]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 223729 ( (0x369f1) == 223729 (0x369f1) [#26406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#23980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31309]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#10377]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#10511]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"BB/128\"' [#37600]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1768]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94249 (0 0x17029) == 94249 (0x17029) [#26074]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12288]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3319]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33610]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 22 23729 (0x369f1) [#9713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36906]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#29101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8359]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12455]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9289]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#10392]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2724]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 210681 ( (0x336f9) == 210681 (0x336f9) [#32613]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38252]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#30416]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19534]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#35542]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33835]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#22766]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33044]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#22657]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 454 (0x1c6) == 454 (0x1c6) [#40493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6432]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26496]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55696 (0 0xd990) == 55696 (0xd990) [#19699]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3897]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24725]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.14.0/31\"' [#37482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20499]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25827]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13779]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8838]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 808 (0x328) == 808 (0x328) [#40316]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15200]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8130]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#35847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#34768]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27444]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#34293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33733]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37361]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#35359]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#11185]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#30524]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#36187]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#10768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#10110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19840]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2017]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#22233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21653]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15187]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#34329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#36200]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"00/0\" == \"00/0\" with 1 message: 'key_string := \"00/0\"' [#37609]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9258]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33187]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#29945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87616 (0 0x15640) == 87616 (0x15640) [#32287]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#29094]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12710]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15305]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27937]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44100 (0 0xac44) == 44100 (0xac44) [#13410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 1849 96 (0x4840) [#8702]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8263]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32788]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 664 (0x298) == 664 (0x298) [#40388]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26223]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#28784]", "pinning_test :: another_object.object.base.reference_count == 2 for: 2 == 2 [#38489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#11184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#23892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15070]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#23330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21847]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26071]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34720]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6015]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2961]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26867]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38411]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7873]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3420]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33640]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 924 (0x39c) == 924 (0x39c) [#40258]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3481 (0xd d99) == 3481 (0xd99) [#6873]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15958]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#35497]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1087]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#36583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7084]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#23350]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1265]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 155236 ( (0x25e64) == 155236 (0x25e64) [#32483]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#36206]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#20]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#27290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#29939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#21855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#30600]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#11191]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#33498]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 4 == 4 [#40718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27162]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1685]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 608 (0x260) == 608 (0x260) [#40416]", "trampoline_test :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38718]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#316]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 166464 ( (0x28a40) == 166464 (0x28a40) [#13806]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6724 (0x x1a44) == 6724 (0x1a44) [#25624]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1605]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#11381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#10881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52900 (0 0xcea4) == 52900 (0xcea4) [#19687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#36364]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2737]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#34819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16058]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#35240]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#36785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9367]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31110]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#36035]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28515]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#362]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == = 0 [#7]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#33924]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31512]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85264 (0 0x14d10) == 85264 (0x14d10) [#26044]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 866 (0x362) == = 866 (0x362) [#40127]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36 == 36 [#35116]", "droppacket-jit :: hook.fire(&ctx4, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 165649 ( (0x28711) == 165649 (0x28711) [#20041]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#35538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 239121 ( (0x3a611) == 239121 (0x3a611) [#13968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#24379]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#29599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31329 (0 0x7a61) == 31329 (0x7a61) [#32049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37234]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37932]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#11302]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32700]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20764]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#10181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#23748]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#28904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#30483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14503]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#36698]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49 == 49 [#25474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#35394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24766]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33871]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12389]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31187]", "map_crud_operations_queue :: return_value == value for: 5 == 5 [#37691]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 205209 ( (0x32199) == 205209 (0x32199) [#20133]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19157]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29929 (0x7 74e9) == 29929 (0x74e9) [#864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32809]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#35786]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99856 (0 0x18610) == 99856 (0x18610) [#19859]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8259]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20034]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9706]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 144 == 144 [#39766]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#11675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100 == 1 100 [#31715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19928]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#35010]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30987]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#36486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#27548]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12555]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15784]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 450 (0x1c2) == 450 (0x1c2) [#40495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#24036]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#713]", "bindmonitor-ringbuf-interpret :: it != _overlapped_buffers.end() for: {?} != {?} [#41191]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7766]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43681 (0 0xaaa1) == 43681 (0xaaa1) [#13408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81 == 81 [#29679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 141376 ( (0x22840) == 141376 (0x22840) [#19979]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#28040]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27615]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34279]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 734 441 (0x11ee1) [#9107]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6561 (0x x19a1) == 6561 (0x19a1) [#31857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14753]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5959]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#779]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#28520]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.14.1/32\"' and 'correct_value := \" \"192.168.14.0/31\"' [#37461]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#10659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1369 (0x x559) == 1369 (0x559) [#13064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 191844 ( (0x2ed64) == 191844 (0x2ed64) [#13866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14480]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85849 (0 0x14f59) == 85849 (0x14f59) [#19813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31371]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"DD/120\"' [#37580]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 25 59081 (0x3f409) [#9821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 441 (0x1 1b9) == 441 (0x1b9) [#19269]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5883]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#21939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12731]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: invoke_protocol(EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY, request, reply, &async) == EBPF_INVALID_OBJECT for: 5 == 5 [#38385]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15593]", "hash_table_test :: memcmp(values[index], data_1.data(), data_1.size()) == 0 for: 0 == 0 [#38433]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"00/0\" == \"00/0\" with h 2 messages: 'key_string := \"BB/31\"' and 'correct_value := \"00/0\"' [#37649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39204 (0 0x9924) == 39204 (0x9924) [#32091]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28224 (0 0x6e40) == 28224 (0x6e40) [#19563]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29241 (0x7 7239) == 29241 (0x7239) [#860]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 852 (0x354) == = 852 (0x354) [#40120]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#22463]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#21375]", "test_map_entries_limit :: entries_count == max_entries for: 2 == 2 [#42108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9693]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24928]", "ring_buffer_output :: producer == data.size() + (((size_t) & ((ebpf_ring_buffer_record_t*)0 0)->data)) for: 18 == 18 [#40754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20470]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31581]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5041 (0x1 13b1) == 5041 (0x13b1) [#6897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#24069]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20269]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27889 (0x6 6cf1) == 27889 (0x6cf1) [#852]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6561 (0x x19a1) == 6561 (0x19a1) [#19389]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34463]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 56 == 56 [#39722]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34646]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_push_entry(map.get(), value.size(), value.data(), 0) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#6235]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8229]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142884 ( (0x22e24) == 142884 (0x22e24) [#13746]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38109]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1461]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#28568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34499]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#33513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14774]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#29972]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2976]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 155236 (0 0x25e64) == 155236 (0x25e64) [#1306]", "EBPF_OPERATION_CREATE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#22131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#10274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8203]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31301]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#10317]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#23690]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#36647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#23602]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39560]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20184]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34643]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8322]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8512]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20535]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.14.0/31\" == \"192.168.14.0 0/31\" with 2 messages: 'key_string := \"192.168.14.0/31\"' and 'correct_value := \"1 192.168.14.0/31\"' [#37438]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 18 == 18 [#38856]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20494]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#27464]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2422]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#10294]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 370 (0x172) == = 370 (0x172) [#39879]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15202]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#30654]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#11232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#36010]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 366 (0x16e) == 366 (0x16e) [#40537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#23207]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 950 (0x3b6) == = 950 (0x3b6) [#40169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#11165]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 17 75561 (0x2adc9) [#9551]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8015]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16 == 16 [#36047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6254]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26069]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#29292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25050]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#10738]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#30343]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#33324]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3462]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25187]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#359]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 218089 (0 0x353e9) == 218089 (0x353e9) [#1452]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32841]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12942]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7794]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7004]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12371]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55696 (0 0xd990) == 55696 (0xd990) [#32167]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30899]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 986 (0x3da) == 986 (0x3da) [#40227]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29929 (0 0x74e9) == 29929 (0x74e9) [#25806]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7624]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36481 (0 0x8e81) == 36481 (0x8e81) [#25842]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#10284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9076]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38604]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#21327]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100489 ( (0x18889) == 100489 (0x18889) [#32329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#23530]", "ring_buffer_async_query :: result == EBPF_PENDING for: 28 == 28 [#37795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#21300]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#22613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#22784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190969 ( (0x2e9f9) == 190969 (0x2e9f9) [#20101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8773]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#35644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18367]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#33486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#30035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1 == 1 [#36893]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12741]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 16 == 16 [#38974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#30168]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2704 (0x xa90) == 2704 (0xa90) [#25564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#33849]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4096 (0x1 1000) == 4096 (0x1000) [#6883]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 244036 (0 0x3b944) == 244036 (0x3b944) [#7743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18496 (0 0x4840) == 18496 (0x4840) [#13262]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#28208]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8550]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#27851]", "async :: ebpf_async_cancel(&async_context) for: true [#40739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#22824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169 == 169 [#36357]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#29551]", "bindmonitor-interpret :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41000]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1295]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5879]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#11592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#22474]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#30643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24588]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#10078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#11273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19626]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#29112]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 ( (0x8a1) [#8435]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#10384]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6333]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 ( (0x640) [#8414]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49 == 49 [#28328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#10729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22042]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#35613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 241081 ( (0x3adb9) == 241081 (0x3adb9) [#13972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18581]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3394]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9025 (0x23 341) == 9025 (0x2341) [#708]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1004 (0x3ec) == 1004 (0x3ec) [#40218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24765]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3010]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#28061]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 21 15296 (0x34900) [#9686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7008]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6013]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9097]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25281 (0 0x62c1) == 25281 (0x62c1) [#32013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#30595]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#35982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#29036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#33750]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#29900]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32522]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8914]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39614]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26772]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#27008]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#28808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2500 (0x x9c4) == 2500 (0x9c4) [#19327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14081]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25272]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#10364]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#28557]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2253]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#11762]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 356 (0x164) == 356 (0x164) [#40542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#23167]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#22811]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#27980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34054]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#27845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 188356 ( (0x2dfc4) == 188356 (0x2dfc4) [#26328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24599]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#36136]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168 8.14.0/29\"' [#37495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35321]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2179]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1081]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1444 (0x5a a4) == 1444 (0x5a4) [#594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7114]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169 == 1 169 [#13016]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#833]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15163]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#30203]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32582]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52900 (0x xcea4) == 52900 (0xcea4) [#7215]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 212 == 212 [#39800]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 240 == 240 [#39814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18760]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12125]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14061]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#22098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19544]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2371]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#11761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#22850]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33928]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26187]", "pinning_test :: an_object.object.base.reference_count == 1 for: 1 == 1 [#38490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#21240]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#30223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#23829]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39391]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#36841]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 798 (0x31e) == 798 (0x31e) [#40321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42436 (0x xa5c4) == 42436 (0xa5c4) [#7167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#35315]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#11031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#10104]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#24289]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8094]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145161 (0 0x23709) == 145161 (0x23709) [#1280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#22122]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#28634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10210]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#11589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31339]", "invalid_bpf_get_socket_cookie :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#42117]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#28853]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"CD/120\"' and 'correct_value := \"CD/96\"' [#37612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#28923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20166]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39010]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#35647]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18754]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39334]", "map_crud_operations_stack :: return_value == value for: 4 == 4 [#37742]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#11885]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#36888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#22828]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24573]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2262]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6635]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21563]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2806]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39188]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#23566]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6366]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33790]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7056 (0x x1b90) == 7056 (0x1b90) [#25628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#11780]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5867]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38773]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5972]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#30175]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51984 (0xc cb10) == 51984 (0xcb10) [#974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#30091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#10453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#21621]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5886]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73984 (0 0x12100) == 73984 (0x12100) [#19771]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18328]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33899]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 3 for: 3 == 3 [#38445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30722]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28083]", "bindmonitor-bpf2bpf-native :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41021]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190969 (0 0x2e9f9) == 190969 (0x2e9f9) [#1392]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6418]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5874]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32721]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#11900]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24964 (0 0x6184) == 24964 (0x6184) [#13306]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#29490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#11269]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26513]", "EBPF_OPERATION_GET_PROGRAM_INFO :: invoke_protocol(EBPF_OPERATION_GET_PROGRAM_INFO, request, reply) == E EBPF_INVALID_OBJECT for: 5 == 5 [#38286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#35423]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15103]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 227529 (0 0x378c9) == 227529 (0x378c9) [#7709]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39006]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126025 ( (0x1ec49) == 126025 (0x1ec49) [#13700]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#33804]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 2856 61 (0x6f91) [#8801]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#10263]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#11158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18301]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#23883]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#11634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#24016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1 == 1 [#36378]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31422]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 222784 ( (0x36640) == 222784 (0x36640) [#20171]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#29841]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2209 (0x x8a1) == 2209 (0x8a1) [#31789]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#10063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6731]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13399]", "error codes :: result2 == result for: 8 == 8 [#40790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#24232]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173056 ( (0x2a400) == 173056 (0x2a400) [#26292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#34734]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30818]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 632 (0x278) == 632 (0x278) [#40404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8989]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#22653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12239]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14255]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#10277]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26361]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#10954]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#23956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#36272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4 == 4 [#12994]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38036]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4096 (0x x1000) == 4096 (0x1000) [#31823]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34103]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14214]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#11757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12627]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28158]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33443]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#11306]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31856]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 1392 24 (0x3664) [#9961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20321]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#21678]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#36826]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#34771]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18607]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100 == 100 [#36155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123904 ( (0x1e400) == 123904 (0x1e400) [#19931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18935]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#35728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33403]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 44 == 44 [#39716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9607]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#35694]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8160]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#10146]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#11433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#23619]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39628]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 147456 ( (0x24000) == 147456 (0x24000) [#26228]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#36268]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#36777]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#35689]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1527]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12573]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#10763]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#30499]", "INVALID_PROGRAM_DATA :: ebpf_program_get_helper_function_addresses( program.get(), (sizeof(he elper_function_ids) / sizeof(helper_function_ids[0])), addresses) == EBPF_SUCCESS S for: 0 == 0 [#38393]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31605]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#34596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77841 (0x x13011) == 77841 (0x13011) [#1076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34826]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 394 (0x18a) == 394 (0x18a) [#40523]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#11230]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38703]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#33654]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#36491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#36101]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18225 (0 0x4731) == 18225 (0x4731) [#19497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33905]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#10686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 (0x1324) [#8504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36481 (0 0x8e81) == 36481 (0x8e81) [#13372]", "map_crud_operations:BPF_MAP_TYPE_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#3591]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19321 (0 0x4b79) == 19321 (0x4b79) [#31973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#23395]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14279]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225625 (0 0x37159) == 225625 (0x37159) [#1468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#22987]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51529 (0 0xc949) == 51529 (0xc949) [#19681]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6466]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37636 (0 0x9304) == 37636 (0x9304) [#13378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#28777]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3364 (0x xd24) == 3364 (0xd24) [#25576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139129 ( (0x21f79) == 139129 (0x21f79) [#13736]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 206116 ( (0x32524) == 206116 (0x32524) [#26368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#11276]", "ring_buffer_output :: producer != consumer for: 18 != 0 [#40753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#21732]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#21162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12770]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34441]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90601 (0x x161e9) == 90601 (0x161e9) [#7357]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15876 (0 0x3e04) == 15876 (0x3e04) [#31947]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22031]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 132496 ( (0x20590) == 132496 (0x20590) [#32423]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13969]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#23648]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"AA/72\"' and 'correct_value := \"AA/64\"' [#37630]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6130]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24666]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 238144 ( (0x3a240) == 238144 (0x3a240) [#26436]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 894 (0x37e) == = 894 (0x37e) [#40141]", "program :: ((ebpf_core_object_t*)map.get())->base.reference_count == 1 for: 1 == = 1 [#37756]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3058]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#35173]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#33564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32380]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68644 (0x x10c24) == 68644 (0x10c24) [#7279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37035]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#27122]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#685]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1183]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#28672]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 4 == 4 [#38918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#23791]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#10620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14854]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97344 (0 0x17c40) == 97344 (0x17c40) [#19851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#10684]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#22445]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2541]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 312 (0x138) == = 312 (0x138) [#39850]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37266]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34586]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#23285]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25395]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 118336 (0 0x1ce40) == 118336 (0x1ce40) [#1206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#28693]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#23615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33248]", "droppacket-interpret :: value == 1 for: 1 == 1 [#40941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22178]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#23777]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#23387]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34357]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33415]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#10017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#21630]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15842]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#28866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22681]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38024]", "serialize_map_test :: ebpf_serialize_internal_map_info_array( map_count, internal_map_info_ _array, unique_buffer.get(), buffer_length, &serialized_length, &required_length) ) == EBPF_SUCCESS for: 0 == 0 [#38751]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15129 (0 0x3b19) == 15129 (0x3b19) [#25706]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 276 (0x114) == = 276 (0x114) [#39832]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#35355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#22704]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#28716]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38133]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#10502]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1669]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7800]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1804]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25390]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27274]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 668 (0x29c) == = 668 (0x29c) [#40028]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 756 (0x2f4) == 756 (0x2f4) [#40342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114244 ( (0x1be44) == 114244 (0x1be44) [#13666]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24699]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5864]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#23511]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#29453]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26755]", "show verification xdp_datasize_unsafe.o :: output_line == expected_output_line for: \"\" == \"\" [#42412]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19023]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26579]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#24052]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#10291]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3468]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_pop_entry(map.get(), value.size(), value.data(), 0) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#18708]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_push_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#31177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20736 (0x5 5100) == 20736 (0x5100) [#806]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2244]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#10073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19636]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18506]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20553]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#11879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#24392]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12966]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#363]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#11515]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196 == 196 [#546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#10695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8398]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20281]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6003]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26011]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34471]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39229]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"192.169.0.0/32\"' [#37566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#34521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#24298]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6267]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33763]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#30014]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 26 == 26 [#38969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36481 (0 0x8e81) == 36481 (0x8e81) [#32077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#21060]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#27671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18280]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: invoke_protocol(EBPF_OPERATION_MAP_GET_NEXT_KEY, request, reply) == E EBPF_INVALID_OBJECT for: 5 == 5 [#38135]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#10898]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33907]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 226 == 226 [#40607]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#22389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#22296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#11179]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41616 (0xa a290) == 41616 (0xa290) [#926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14801]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#41]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28222]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6422]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 (0x1b90) [#9923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#30222]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32920]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 (0x1c39) [#9926]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12882]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15404]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 162409 ( (0x27a69) == 162409 (0x27a69) [#13796]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38832]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 308 (0x134) == = 308 (0x134) [#39848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#36810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#34542]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#27377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25124]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#35022]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30705]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#228]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#10726]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15091]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#35682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15059]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8190]", "EBPF_OPERATION_CREATE_MAP :: invoke_protocol(EBPF_OPERATION_CREATE_MAP, request, reply) == EBPF_IN NVALID_OBJECT for: 5 == 5 [#37924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18371]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33512]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#36070]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38005]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27364]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14155]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#30354]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 212521 ( (0x33e29) == 212521 (0x33e29) [#20149]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#10863]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#36868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31019]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30678]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 8 == 8 [#38877]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8961]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#35290]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#23333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33749]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#11040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18448]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1562]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1940]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#35313]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14905]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32945]", "hash_table_stress_test :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38467]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.15.0/24\" == \"192.168.15.0 0/24\" with 2 messages: 'key_string := \"192.168.15.0/24\"' and 'correct_value := \"1 192.168.15.0/24\"' [#37434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20653]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#23329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#10129]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18415]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#21144]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7632]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#10762]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#33258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#23102]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8605]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33310]", "map_crud_operations_lpm_trie_32 :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21694]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#33729]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33706]", "serialize_program_info_test :: strncmp( in_program_info.program_type_descriptor->name, out_program_i info->program_type_descriptor->name, 256) == 0 for: 0 == 0 [#38797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#23765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#35233]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21136]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1655]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8134]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14302]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#35102]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"19 92.168.15.0/24\"' [#37516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24841]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27480]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 0 == 0 [#39179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#24010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#24223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#23831]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38994]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#34746]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5982]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31565]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 625 (0x27 71) == 625 (0x271) [#6805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18635]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#22654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21035]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27304]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#29460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#30033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33809]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1772]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#36559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16597]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32458]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#29621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#22759]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#29296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 158404 ( (0x26ac4) == 158404 (0x26ac4) [#13786]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34387]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14515]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142129 ( (0x22b31) == 142129 (0x22b31) [#32449]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30707]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9297]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21121]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25609]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8502]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25937]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#23806]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128164 ( (0x1f4a4) == 128164 (0x1f4a4) [#32411]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#11688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#11042]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#35476]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 691 169 (0x10e31) [#9083]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2619]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31529]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39593]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#29705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#35569]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#33939]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38151]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#27662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18362]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8535]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#28734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112225 ( (0x1b661) == 112225 (0x1b661) [#19897]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18225 (0 0x4731) == 18225 (0x4731) [#31965]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#10663]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12249]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26339]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 434 (0x1b2) == = 434 (0x1b2) [#39911]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36 == 36 [#36176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#34803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#23802]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6699]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12733]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38566]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#8333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31300]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136161 ( (0x213e1) == 136161 (0x213e1) [#19965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#29020]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#33390]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145161 ( (0x23709) == 145161 (0x23709) [#13752]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#36341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#21150]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#29810]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#11509]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1471]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#22693]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#27212]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99225 (0x x18399) == 99225 (0x18399) [#7385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18898]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33673]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#36821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30625 (0 0x77a1) == 30625 (0x77a1) [#19577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14758]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21608]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15604]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3003]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25641]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14617]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1560]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.15.7/32\"' and 'correct_value := \" \"192.168.15.7/32\"' [#37457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#28585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84100 (0 0x14884) == 84100 (0x14884) [#19807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19172]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39204 (0 0x9924) == 39204 (0x9924) [#19623]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#34811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19015]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26569 (0 0x67c9) == 26569 (0x67c9) [#32021]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27648]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#33987]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#23277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 149769 (0 0x24909) == 149769 (0x24909) [#7529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15557]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12242]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106929 ( (0x1a1b1) == 106929 (0x1a1b1) [#26114]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#11942]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39215]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 206 == 206 [#39797]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5912]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#10829]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25 == 25 [#28600]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31890]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27592]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12527]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 3240 00 (0x7e90) [#8834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#10328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 146689 ( (0x23d01) == 146689 (0x23d01) [#26226]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#36415]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#36662]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119716 (0 0x1d3a4) == 119716 (0x1d3a4) [#1210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21577]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24649 (0x6 6049) == 24649 (0x6049) [#832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25289]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#22863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19200]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6330]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#29018]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#35743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 200704 ( (0x31000) == 200704 (0x31000) [#20123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7150]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6269]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27225 (0x6 6a59) == 27225 (0x6a59) [#848]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#29643]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15926]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 432 (0x1b0) == = 432 (0x1b0) [#39910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#36183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#10251]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#10427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#35548]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#35623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#35867]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#23884]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7871]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 109561 ( (0x1abf9) == 109561 (0x1abf9) [#13652]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#29873]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5832]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1976]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148996 ( (0x24604) == 148996 (0x24604) [#19999]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#24409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 3610 00 (0x8d04) [#8864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#35634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14020]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#29976]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14195]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27010]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33491]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 (0x1081) [#9902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#24244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#28148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6591]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12102]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#28205]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1936 (0x79 90) == 1936 (0x790) [#606]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#10743]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21209]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 94 == 94 [#40673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#18189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57121 (0 0xdf21) == 57121 (0xdf21) [#32173]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37103]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6749]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14197]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31558]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6565]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93636 (0x x16dc4) == 93636 (0x16dc4) [#7367]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18883]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128164 (0 0x1f4a4) == 128164 (0x1f4a4) [#1234]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#24153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37216]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31544]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 28 == 28 [#38930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34596 (0 0x8724) == 34596 (0x8724) [#32067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18614]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#28961]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#10478]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#29598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#27545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#11128]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7698]", "bindmonitor-jit :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#40992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#11708]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 740 (0x2e4) == = 740 (0x2e4) [#40064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7921 (0x x1ef1) == 7921 (0x1ef1) [#31873]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38677]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1 == 1 [#28370]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38173]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#23565]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20402]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39575]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#28550]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11955]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31168]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#11335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18859]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30814]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31190]", "droppacket-jit :: value == 1001 for: 1001 (0x3e9) == 1001 (0x3e9) [#40868]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600) [#4558]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 105625 ( (0x19c99) == 105625 (0x19c99) [#13640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#10871]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26391]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#34810]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19694]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#23617]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10201 (0 0x27d9) == 10201 (0x27d9) [#13192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3481 (0x xd99) == 3481 (0xd99) [#25578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33515]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33778]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#27728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#34167]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#11702]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6132]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6956]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12150]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#29671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#11047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 13 30321 (0x1fd11) [#9377]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1313]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#10518]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25417]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25537]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#28902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9273]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#33657]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#36645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#33495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#36781]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9944]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12544 (0x x3100) == 12544 (0x3100) [#6979]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#35683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25362]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#30611]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6471]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37083]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#35303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#22673]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#29422]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#10414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20743]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 3132 29 (0x7a61) [#8825]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82944 (0 0x14400) == 82944 (0x14400) [#19803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26453]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2362]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33551]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 516 (0x204) == 516 (0x204) [#40462]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28207]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184041 (0 0x2cee9) == 184041 (0x2cee9) [#7613]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27424]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2397]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33641]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#24349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#28280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 111556 ( (0x1b3c4) == 111556 (0x1b3c4) [#19895]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#23939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20686]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#35415]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14079]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37280]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#28241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22238]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 448 (0x1c0) == 448 (0x1c0) [#40496]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22127]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18408]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14263]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48841 (0 0xbec9) == 48841 (0xbec9) [#32137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13269]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33000]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 342 (0x156) == = 342 (0x156) [#39865]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 236196 ( (0x39aa4) == 236196 (0x39aa4) [#26432]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4225 (0x1 1081) == 4225 (0x1081) [#6885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#22374]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116281 ( (0x1c639) == 116281 (0x1c639) [#13672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13351]", "ring_buffer_reserve_submit_discard :: ebpf_ring_buffer_reserve(ring_buffer, &mem1, 10) == EBPF_SUCCESS for: : 0 == 0 [#40775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25281 (0 0x62c1) == 25281 (0x62c1) [#13308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67081 (0 0x10609) == 67081 (0x10609) [#13508]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#29609]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20921]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34596 (0 0x8724) == 34596 (0x8724) [#19599]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12964]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#34290]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18287]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#36729]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7246]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#23279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32940]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 17 78084 (0x2b7a4) [#9560]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37880]", "hash_table_test :: returned_key == key_1 for: { '─', ']', '┌', '<', '}', 'W', 'Q', '╚', 'ç', 'Ö', 'Y', '¬', 'S' } == { '─', ']', '┌', '<', '}', 'W', 'Q', '╚', 'ç', 'Ö', , 'Y', '¬', 'S' } [#38449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#21975]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#35917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 243049 ( (0x3b569) == 243049 (0x3b569) [#13976]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#24371]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3112]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 924 (0x39c) == = 924 (0x39c) [#40156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#34860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#29906]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34082]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1369]", "EBPF_OPERATION_GET_OBJECT_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#28965]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9117]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#24047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#28774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#11655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#20802]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14266]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == = 0 [#3]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#22670]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 179776 (0 0x2be40) == 179776 (0x2be40) [#1366]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30715]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#29040]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39004]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#11396]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#11663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64009 (0 0xfa09) == 64009 (0xfa09) [#19733]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#24332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18436]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38301]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#28722]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 596 (0x254) == = 596 (0x254) [#39992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#21165]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20708]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15229]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21238]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#24295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#24217]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#29579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#36046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#29774]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19600 (0 0x4c90) == 19600 (0x4c90) [#31975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31045]", "ring_buffer_reserve_submit_discard :: ebpf_ring_buffer_map_buffer(ring_buffer, &buffer) == EBPF_SUCCESS for r: 0 == 0 [#40772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24700]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_inv valid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#6239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104329 ( (0x19789) == 104329 (0x19789) [#13636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21821]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32823]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49729 (0xc c241) == 49729 (0xc241) [#964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29241 (0 0x7239) == 29241 (0x7239) [#19569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 191844 (0 0x2ed64) == 191844 (0x2ed64) [#7631]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13299]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35282]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2754]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 112 == 112 [#39750]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6822]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8216]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#23983]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#34992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12529]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#29211]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 830 (0x33e) == 830 (0x33e) [#40305]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18615]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#11693]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14379]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 2073 36 (0x5100) [#8726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#30586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#10455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#36492]", "divide_by_zero-native :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#20904]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1577]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33904]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#36886]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8210]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#36716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#11472]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#36166]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 206116 ( (0x32524) == 206116 (0x32524) [#13898]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26647]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#22857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20630]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 157609 ( (0x267a9) == 157609 (0x267a9) [#26254]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#29475]", "state_test :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38823]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 140625 (0 0x22551) == 140625 (0x22551) [#7505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121104 ( (0x1d910) == 121104 (0x1d910) [#19923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 789 961 (0x13471) [#9137]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 674 (0x2a2) == = 674 (0x2a2) [#40031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18869]", "hash_table_test :: ebpf_hash_table_find(table.get(), key_1.data(), &returned_value) == E EBPF_SUCCESS for: 0 == 0 [#38446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20696]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36925]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30276 (0 0x7644) == 30276 (0x7644) [#32043]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#36258]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#22541]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#28232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25158]", "hash_table_test :: ebpf_hash_table_update(table.get(), key_2.data(), data_2.data(), EBPF F_HASH_TABLE_OPERATION_REPLACE) == EBPF_SUCCESS for: 0 == 0 [#38444]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8305]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 668 (0x29c) == 668 (0x29c) [#40386]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#33363]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37743]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3232]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#11767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168100 ( (0x290a4) == 168100 (0x290a4) [#13810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#30210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8056]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#30242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#23874]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1934]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#11476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21532]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2355]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34969 (0 0x8899) == 34969 (0x8899) [#32069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#22837]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#23224]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#36468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#23404]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8541]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#22699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#20970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24712]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 18432 (0x4800) <= 36864 (0x x9000) [#36381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8026]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31272]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31597]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#23289]", "state_test :: ebpf_state_store(allocated_index_1, reinterpret_cast<uintptr_t>(&foo) ), &state) == EBPF_SUCCESS for: 0 == 0 [#38827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#34830]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#36271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#21210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34225 (0 0x85b1) == 34225 (0x85b1) [#25830]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#35329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1849 (0x x739) == 1849 (0x739) [#25546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#11153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31071]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#29703]", "EBPF_OPERATION_CREATE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#34437]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"10.10.0.0/16\" == \"10.10.0.0/16\" w with 2 messages: 'key_string := \"10.10.10.10/32\"' and 'correct_value := \"10.10.0. .0/16\"' [#37472]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2415]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13185]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57600 (0 0xe100) == 57600 (0xe100) [#19707]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 712 289 (0x11679) [#9095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#20835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#28529]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39014]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9754]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39354]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 205209 (0 0x32199) == 205209 (0x32199) [#1424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#27284]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27796]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#30198]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5980]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#22555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20016]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14125]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133956 (0 0x20b44) == 133956 (0x20b44) [#7487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25165]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8135]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 940 (0x3ac) == = 940 (0x3ac) [#40164]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38373]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#22420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15553]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2370]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#30100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#28992]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 246 == 246 [#40597]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1243]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27562]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 ( (0x844) [#9881]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#11776]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28479]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#23927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8158]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 212521 ( (0x33e29) == 212521 (0x33e29) [#13912]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#30056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14639]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8350]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#33465]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39637]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6629]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31278]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#35525]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2833]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#22978]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1047]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#22752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#28556]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12952]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30971]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 406 (0x196) == = 406 (0x196) [#39897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#23000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13701]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#29932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#34266]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#27818]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1663]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#34203]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5842]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39409]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#11299]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#29276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#36678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 ( (0x844) [#8432]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 354 (0x162) == = 354 (0x162) [#39871]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31668]", "droppacket-jit :: value == 0 for: 0 == 0 [#40871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24444]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39419]", "droppacket-jit :: value == 0 for: 0 == 0 [#40911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#22919]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#35550]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 236196 (0 0x39aa4) == 236196 (0x39aa4) [#1490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19001]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: invoke_protocol(EBPF_OPERATION_GET_PINNED_MAP_INFO, request, reply) = == EBPF_SUCCESS for: 0 == 0 [#38312]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38416 (0 0x9610) == 38416 (0x9610) [#13382]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 108 == 108 [#39125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35169]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#29506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37019]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37326]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#428]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3538]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#28977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25080]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36 == 36 [#34161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#22451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24524]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6675]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14238]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#22284]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#28469]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41616 (0 0xa290) == 41616 (0xa290) [#13398]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#23178]", "hash_table_test :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38418]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8278]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#11823]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#35956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19342]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121104 ( (0x1d910) == 121104 (0x1d910) [#32391]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 780 (0x30c) == 780 (0x30c) [#40330]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14764]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4761 (0x12 299) == 4761 (0x1299) [#656]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 361 (0x1 169) == 361 (0x169) [#19265]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 14 42884 (0x22e24) [#9428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#24333]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#11941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19011]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20164 (0x x4ec4) == 20164 (0x4ec4) [#7039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18564]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 213444 ( (0x341c4) == 213444 (0x341c4) [#20151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#24012]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103041 ( (0x19281) == 103041 (0x19281) [#19869]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81 == 81 [#30194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#10709]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 30 == 30 [#39164]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32444]", "EBPF_OPERATION_LOAD_NATIVE_MODULE short header :: ebpf_core_invoke_protocol_handler( EBPF_OPERATION_LOAD_NATIVE_MODULE, , request_ptr, static_cast<uint16_t>(request_size), reply_ptr, static_cast<uint16 6_t>(reply_size), nullptr, completion) == EBPF_ARITHMETIC_OVERFLOW for: 22 == 22 [#38388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#24212]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34565]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33781]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5749]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 236196 ( (0x39aa4) == 236196 (0x39aa4) [#13962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#34131]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33335]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93636 (0 0x16dc4) == 93636 (0x16dc4) [#32307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34606]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#28880]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37172]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#11840]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#36147]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#23497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#11629]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#30021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#28677]", "hash_table_test :: count == 3 for: 3 == 3 [#38431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18631]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#30006]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#24313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#24049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#20928]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12908]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#28322]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38632]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#30043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14708]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 248004 ( (0x3c8c4) == 248004 (0x3c8c4) [#32691]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#10120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9537]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39341]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27997]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5476 (0x x1564) == 5476 (0x1564) [#25608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26244 (0 0x6684) == 26244 (0x6684) [#19551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#23241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12700]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14602]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#36425]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26967]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37386]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#22635]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#27794]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#21720]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25 == 25 [#29169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#23097]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#35942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152100 ( (0x25224) == 152100 (0x25224) [#13770]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#303]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3313]", "bindmonitor-ringbuf-jit :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#41061]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 141376 ( (0x22840) == 141376 (0x22840) [#26212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18689]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#10052]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#22642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12580]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#36097]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#29689]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#22516]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#398]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#11440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15887]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4225 (0x x1081) == 4225 (0x1081) [#25590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54289 (0 0xd411) == 54289 (0xd411) [#32161]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71289 (0 0x11679) == 71289 (0x11679) [#19761]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37911]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#29564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34627]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#36889]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#22593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19073]", "access_check :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38734]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121 == 121 [#36790]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13924 (0 0x3664) == 13924 (0x3664) [#19463]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37381]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 902 (0x386) == = 902 (0x386) [#40145]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3150]", "ring_buffer_reserve_submit_discard :: consumer == 0 for: 0 == 0 [#40781]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#10610]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 189225 ( (0x2e329) == 189225 (0x2e329) [#26330]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31906]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8168]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39642]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37164]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7134]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#30373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12584]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 632 (0x278) == = 632 (0x278) [#40010]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5979]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9327]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12996 (0 0x32c4) == 12996 (0x32c4) [#13218]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#209]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15397]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58081 (0x xe2e1) == 58081 (0xe2e1) [#7237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#29662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#21204]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37893]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#28651]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12434]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156816 ( (0x26490) == 156816 (0x26490) [#13782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#35194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#21252]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26087]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8046]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47961 (0xb bb59) == 47961 (0xbb59) [#956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#36638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15754]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 ( (0xbd1) [#9892]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#11771]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#23855]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3577]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1444 (0x x5a4) == 1444 (0x5a4) [#31771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12801]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#29354]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9585]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#10525]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 96 == 96 [#39131]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34120]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#24035]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10323]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#10536]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16900 (0x x4204) == 16900 (0x4204) [#7015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13177]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 202500 (0 0x31704) == 202500 (0x31704) [#1418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 203401 ( (0x31a89) == 203401 (0x31a89) [#20129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18215]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#28532]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9066]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#657]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#22656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27882]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39183]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 766 (0x2fe) == = 766 (0x2fe) [#40077]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34138]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62001 (0x xf231) == 62001 (0xf231) [#1016]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 95481 (0x x174f9) == 95481 (0x174f9) [#7373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8805]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#36599]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#35757]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#34919]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31166]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#24000]", "serialize_program_info_test :: in_prototype->return_type == out_prototype->return_type for: 0 == 0 [#38810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31364]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31006]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15535]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#10010]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 12 == 12 [#38853]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#23902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#10160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24673]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#22459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#35933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9600]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#36560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#22817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27082]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#22599]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12644]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#28136]", "trampoline_test :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64009 (0 0xfa09) == 64009 (0xfa09) [#25966]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3490]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3556]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 384 (0x180) == 384 (0x180) [#40528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30692]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#22831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#30234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#24209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15346]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32955]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#23664]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20713]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#11149]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 249001 (0 0x3cca9) == 249001 (0x3cca9) [#1516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 19 97136 (0x30210) [#9626]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#23490]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#36255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 221841 ( (0x36291) == 221841 (0x36291) [#26402]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#30351]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196249 (0 0x2fe99) == 196249 (0x2fe99) [#7641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87616 (0 0x15640) == 87616 (0x15640) [#13582]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9150]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 830 (0x33e) == = 830 (0x33e) [#40109]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2413]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#35632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#36743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6400 (0x x1900) == 6400 (0x1900) [#13150]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#10398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32756]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#35997]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 238144 ( (0x3a240) == 238144 (0x3a240) [#32671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 2560 00 (0x6400) [#8774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 (0x1d91) [#8555]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32986]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39510]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123201 (0 0x1e141) == 123201 (0x1e141) [#1220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 249001 ( (0x3cca9) == 249001 (0x3cca9) [#32693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#21690]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#11456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36 == 36 [#25472]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 910 (0x38e) == 910 (0x38e) [#40265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14478]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#30552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#11494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 1742 24 (0x4410) [#8690]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#36343]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#36738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14464]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2875]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1854]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37209]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#35241]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"CD/96\" == \"CD/96\" with 1 message: 'key_string := \"CD/96\"' [#37591]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30897]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12148]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#28430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#35781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#10185]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6124]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 170569 ( (0x29a49) == 170569 (0x29a49) [#13816]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 62 == 62 [#38951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14912]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#22035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#23506]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#38882]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#34389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22662]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 76 == 76 [#39087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7225 (0x1c c39) == 7225 (0x1c39) [#688]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 24 == 24 [#39706]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#36081]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8443]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6754]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 40 == 40 [#40700]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 900 (0x3 384) == 900 (0x384) [#25520]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#707]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#22661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#21729]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/121\"' and 'correct_value := \"DD/120\"' [#37620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#30402]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 6400 09 (0xfa09) [#9053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#29416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#23903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#23805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18857]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8293]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 706 (0x2c2) == = 706 (0x2c2) [#40047]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 658 (0x292) == = 658 (0x292) [#40023]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26015]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14636]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#33342]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2214]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 304 (0x130) == 304 (0x130) [#40568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13781]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 209764 ( (0x33364) == 209764 (0x33364) [#32611]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#23675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#23633]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#11010]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84100 (0 0x14884) == 84100 (0x14884) [#26040]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13309]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8270]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27265]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 23 39121 (0x3a611) [#9761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#11098]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#35759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25553]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#35468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#22637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#24413]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#30159]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7066]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#30260]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26586]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1859]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#29716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#36354]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#30305]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#27836]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112896 (0 0x1b900) == 112896 (0x1b900) [#1190]", "hash_table_test :: ebpf_hash_table_find(table.get(), key_2.data(), &returned_value) == E EBPF_SUCCESS for: 0 == 0 [#38440]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#34926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#22730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#30626]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219961 ( (0x35b39) == 219961 (0x35b39) [#32633]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8592]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50625 (0 0xc5c1) == 50625 (0xc5c1) [#25910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30689]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33115]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17689 (0 0x4519) == 17689 (0x4519) [#31961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#23666]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#35674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14333]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#28960]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31417]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1519]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21889]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29584 (0 0x7390) == 29584 (0x7390) [#25804]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#35660]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37185]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 906 (0x38a) == 906 (0x38a) [#40267]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#11861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#35124]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#35382]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#22949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#27572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#22953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#10868]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#27791]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#27761]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#35665]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#30482]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26351]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 64 == 64 [#39081]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#11555]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32242]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#23626]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#35066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7648]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#603]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27051]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39558]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#27692]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#29261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#11246]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14693]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25327]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6112]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31169]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#365]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6173]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33884]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#36089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16055]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9430]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#23256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21707]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 842 (0x34a) == 842 (0x34a) [#40299]", "bindmonitor-bpf2bpf-interpret :: program_fd > 0 for: 23 > 0 [#41033]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 24 == 24 [#39167]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13703]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39383]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17956 (0 0x4624) == 17956 (0x4624) [#31963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36481 (0x8 8e81) == 36481 (0x8e81) [#900]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7994]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38634]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#30320]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27637]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#24175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#36453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#21237]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 720 (0x2d0) == = 720 (0x2d0) [#40054]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 496 (0x1f0) == = 496 (0x1f0) [#39942]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 200704 ( (0x31000) == 200704 (0x31000) [#26356]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#21387]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 841 (0x34 49) == 841 (0x349) [#6813]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12230]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33489 (0x x82d1) == 33489 (0x82d1) [#7121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#21039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#24004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19117]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#35009]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#23532]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37935]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 21 16225 (0x34ca1) [#9689]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#27338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#22137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18491]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142884 ( (0x22e24) == 142884 (0x22e24) [#26216]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 466 (0x1d2) == = 466 (0x1d2) [#39927]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13225 (0 0x33a9) == 13225 (0x33a9) [#19457]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9201]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2845]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 (0x1000) [#9901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#11607]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#28511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#29404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#29744]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#30294]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#11134]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#34074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20040]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#29058]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#24089]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25296]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#21573]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9364]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#11041]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1936 (0x x790) == 1936 (0x790) [#31783]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#403]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 832 (0x340) == 832 (0x340) [#40304]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16052]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#36401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22625]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#21645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#28742]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7744 (0x x1e40) == 7744 (0x1e40) [#13166]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30873]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#36006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31576]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11967]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5763]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6476]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#35059]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160000 (0 0x27100) == 160000 (0x27100) [#1318]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3103]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#28578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25 == 25 [#27173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 195364 ( (0x2fb24) == 195364 (0x2fb24) [#13874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#36016]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#30593]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#35070]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27351]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#35448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#21177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25054]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 230400 (0 0x38400) == 230400 (0x38400) [#1478]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17689 (0 0x4519) == 17689 (0x4519) [#19493]", "ring_buffer_async_query :: ebpf_map_find_entry(map.get(), 0, nullptr, sizeof(value2), reinterpre et_cast<uint8_t*>(&value2), 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#29550]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18610]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#29399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12100 (0x x2f44) == 12100 (0x2f44) [#6975]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#34524]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131044 ( (0x1ffe4) == 131044 (0x1ffe4) [#26184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21016]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 580 (0x244) == = 580 (0x244) [#39984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18738]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 220 == 220 [#40610]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#28867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#36567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19270]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7843]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#10862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#30512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19282]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#29429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24630]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#36651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20639]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3025 (0xbd d1) == 3025 (0xbd1) [#628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#23888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19881 (0 0x4da9) == 19881 (0x4da9) [#25742]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10609 (0 0x2971) == 10609 (0x2971) [#25666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#23700]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75625 (0x x12769) == 75625 (0x12769) [#7305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#36330]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19882]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#400]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#34593]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37190]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#35841]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5853]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#22688]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#29366]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34561]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12750]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31746]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#29575]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32612]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#29248]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#10859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14222]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1926]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.15.7/32\" == \"192.168.15.7 7/32\" with 2 messages: 'key_string := \"192.168.15.7/32\"' and 'correct_value := \"1 192.168.15.7/32\"' [#37444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22145]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 247009 ( (0x3c4e1) == 247009 (0x3c4e1) [#26454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#22640]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 215296 ( (0x34900) == 215296 (0x34900) [#20155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#10638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#20991]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8065]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34630]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207025 (0 0x328b1) == 207025 (0x328b1) [#1428]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#36406]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#33663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key) - 1, reinterpret_cast<uint8 8_t*>(&key), reinterpret_cast<uint8_t*>(&key)) == EBPF_INVALID_ARGUMENT for: 6 == = 6 [#18706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19348]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#35656]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28326]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#28827]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11664 (0x x2d90) == 11664 (0x2d90) [#6971]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#36805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#29563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#23179]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#29032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#36482]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26530]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 80 == 80 [#39139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#21693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#23474]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3024]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4427]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 110 == 110 [#40665]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37328]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#34332]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33922]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63001 (0 0xf619) == 63001 (0xf619) [#25962]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2686]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55696 (0 0xd990) == 55696 (0xd990) [#25932]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0x x240) [#9857]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 204304 (0 0x31e10) == 204304 (0x31e10) [#1422]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33964]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27976]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61504 (0 0xf040) == 61504 (0xf040) [#25956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24621]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39193]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#23552]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#34894]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#11415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12672]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13456 (0 0x3490) == 13456 (0x3490) [#31927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27871]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#36438]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#36212]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#29136]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12385]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#11265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20664]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25473]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#29487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 20 06116 (0x32524) [#9656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#28633]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#29521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14422]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#24275]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6338]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6522]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5877]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 148 == 148 [#39768]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#503]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1277]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#29871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#27014]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32767]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#23209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#11680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#22765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#29973]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18718]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33032]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#11809]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 74 == 74 [#40683]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14377]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#24312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#23203]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34450]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26916]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26863]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#29866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18828]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 163216 ( (0x27d90) == 163216 (0x27d90) [#32503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207936 ( (0x32c40) == 207936 (0x32c40) [#13902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#29255]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 181476 ( (0x2c4e4) == 181476 (0x2c4e4) [#32547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33488]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#24098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#21948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0x x100) [#8342]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39339]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18896]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27270]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37379]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#34869]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3544]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2685]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#10657]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225625 ( (0x37159) == 225625 (0x37159) [#26410]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8877]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#36184]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 886 (0x376) == = 886 (0x376) [#40137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112225 ( (0x1b661) == 112225 (0x1b661) [#13660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#21756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60025 (0 0xea79) == 60025 (0xea79) [#19717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22268]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8698]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37124]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30940]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#23158]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9276]", "bindmonitor-bpf2bpf-jit :: emulate_bind(invoke, 1, \"fake_app_1\") == BIND_REDIRECT for: 2 == 2 [#41017]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16384 (0 0x4000) == 16384 (0x4000) [#25716]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#29350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#20859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90000 (0 0x15f90) == 90000 (0x15f90) [#26060]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#36190]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#68]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#35118]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#22728]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28114]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26847]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3453]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#35496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 162409 ( (0x27a69) == 162409 (0x27a69) [#32501]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#11706]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#34305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15481]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14720]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#29731]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 664 (0x298) == = 664 (0x298) [#40026]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156025 (0 0x26179) == 156025 (0x26179) [#1308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14199]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144 == 144 [#36720]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49729 (0 0xc241) == 49729 (0xc241) [#19673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6728]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#705]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 904 (0x388) == 904 (0x388) [#40268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28320]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6098]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#11172]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#30355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#23818]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20704]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#36589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#21447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#34119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33150]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28387]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34172]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13949]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#10630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#14007]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8952]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1133]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37059]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#10337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31362]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#29508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#23867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#36290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25122]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34408]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6666]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7998]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14420]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/125\"' and 'correct_value := \"DD/124\"' [#37614]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14497]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#30401]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#29587]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#34308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#21714]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#23904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12134]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 412 (0x19c) == = 412 (0x19c) [#39900]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#21528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#23520]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1156 (0x x484) == 1156 (0x484) [#19295]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145924 (0 0x23a04) == 145924 (0x23a04) [#7519]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1444 (0x x5a4) == 1444 (0x5a4) [#25536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34106]", "droppacket-interpret :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 23 33289 (0x38f49) [#9743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#29982]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33943]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#29830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7934]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6733]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 780 (0x30c) == = 780 (0x30c) [#40084]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24683]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#11019]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#28810]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#9845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15403]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26953]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1509]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39517]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#34410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#11601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#30196]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2656]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18514]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2740]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 330 (0x14a) == 330 (0x14a) [#40555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#22092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16521]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6172]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12221]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 80 == 80 [#40680]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#29302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24808]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38366]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60025 (0 0xea79) == 60025 (0xea79) [#25950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26131]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14390]", "epoch_test_two_threads :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38510]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#22038]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#36059]", "INVALID_PROGRAM_DATA :: ebpf_program_set_helper_function_ids( program.get(), (sizeof(helper_f function_ids) / sizeof(helper_function_ids[0])), helper_function_ids) == EBPF_SUC CCESS for: 0 == 0 [#38392]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31193]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#21639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#35959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12628]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#36336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#23079]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#36570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12682]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#29678]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33833]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38758]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6252]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8685]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12138]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#29377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32729]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#10847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#35392]", "bindmonitor-bpf2bpf-native :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 bpf_object__open: error: 22 [#41023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#36233]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#21849]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#22900]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#28779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15800]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31780]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5858]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24499]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#459]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19696]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37898]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 151321 ( (0x24f19) == 151321 (0x24f19) [#26238]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15437]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19832]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22795]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#27785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#10915]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 149769 ( (0x24909) == 149769 (0x24909) [#32469]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#29603]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#10158]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 920 (0x398) == = 920 (0x398) [#40154]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2919]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#36144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#22774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 (0x1a44) [#8540]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39667]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#29387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#21717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19219]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 14 44400 (0x23410) [#9434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18550]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 246016 ( (0x3c100) == 246016 (0x3c100) [#13982]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12762]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 554 (0x22a) == 554 (0x22a) [#40443]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20528]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6812]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15265]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#11138]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14286]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14848]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#29306]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8132]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#30195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21491]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12738]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33587]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#35232]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#23651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18812]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"192.168.14.0/29\" != nullptr with 2 mess sages: 'key_string := \"192.168.14.0/29\"' and 'return_value := \"192.168.14.0/29\"' [#37537]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 882 (0x372) == 882 (0x372) [#40279]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#22612]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103041 (0 0x19281) == 103041 (0x19281) [#7397]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 310 (0x136) == = 310 (0x136) [#39849]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#10807]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#35279]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14884 (0 0x3a24) == 14884 (0x3a24) [#13234]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16 == 16 [#28680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 254016 ( (0x3e040) == 254016 (0x3e040) [#13998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12569]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#23822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#23213]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#34893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20792]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1717]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#36308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12321 (0 0x3021) == 12321 (0x3021) [#13212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18832]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26774]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8201]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38697]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#11137]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#21453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14539]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#30579]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#36854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#11290]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#181]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10228]", "EBPF_OPERATION_LINK_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 1188 81 (0x2e69) [#8621]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#29853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27301]", "program :: ebpf_link_create(EBPF_ATTACH_TYPE_SAMPLE, nullptr, 0, &local_link) == = EBPF_SUCCESS for: 0 == 0 [#37780]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3486]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#10595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#23271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#29469]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38150]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#29565]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3163]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#36359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#29527]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#22527]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27721]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#28567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#24032]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15559]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#33618]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33496]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4489 (0x x1189) == 4489 (0x1189) [#25594]", "work_queue :: ebpf_timed_work_queue_is_empty(work_queue) == true for: true == true [#40855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#24288]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#30429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 153664 ( (0x25840) == 153664 (0x25840) [#13774]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#35062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16368]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#23550]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#11665]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39689]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#36115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110889 ( (0x1b129) == 110889 (0x1b129) [#26126]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14049]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_push_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#12470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#11948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#11910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15947]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#22926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#30135]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#30405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15130]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#33354]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207025 ( (0x328b1) == 207025 (0x328b1) [#32605]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#11052]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#27221]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21346]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25221]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27285]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3358]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 19 91844 (0x2ed64) [#9608]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42849 (0 0xa761) == 42849 (0xa761) [#25874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#11187]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1641]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 163216 (0 0x27d90) == 163216 (0x27d90) [#1326]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6155]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5773]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#29938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 228484 ( (0x37c84) == 228484 (0x37c84) [#13946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#29367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22060]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#30469]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#22307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#30134]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#36370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16012]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#10918]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37321]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 2160 09 (0x5469) [#9994]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#23585]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91809 (0 0x166a1) == 91809 (0x166a1) [#26066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 3802 25 (0x9489) [#8879]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9772]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 718 (0x2ce) == = 718 (0x2ce) [#40053]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#10889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21644]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#11851]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 324 (0x1 144) == 324 (0x144) [#25496]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#30121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13243]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67081 (0 0x10609) == 67081 (0x10609) [#25978]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1924]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#27383]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#29588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#34958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#22554]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55696 (0xd d990) == 55696 (0xd990) [#990]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21727]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#10879]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 1612 29 (0x3f01) [#8675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#23004]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9282]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 22 24676 (0x36da4) [#9716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#34473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13881]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#863]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 177241 ( (0x2b459) == 177241 (0x2b459) [#26302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19786]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.10.0.0/16\"' [#37488]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1764 (0x x6e4) == 1764 (0x6e4) [#31779]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"0.0.0.0 0/0\"' [#37501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114921 ( (0x1c0e9) == 114921 (0x1c0e9) [#19905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68121 (0 0x10a19) == 68121 (0x10a19) [#19749]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#36174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14465]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"DD/116\"' [#37581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69696 (0 0x11040) == 69696 (0x11040) [#13518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99225 (0 0x18399) == 99225 (0x18399) [#19857]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#35383]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2197]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14409]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4 == 4 [#36580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19742]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20864]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8217]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27499]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#30276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2704 (0x xa90) == 2704 (0xa90) [#19331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#35834]", "serialize_map_test :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38749]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#36535]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 1488 84 (0x3a24) [#8660]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#30022]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27225 (0 0x6a59) == 27225 (0x6a59) [#32025]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#11740]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#34623]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14711]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 1210 00 (0x2f44) [#8624]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39031]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27090]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6170]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1606]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 16 == 16 [#40712]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31571]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219024 ( (0x35790) == 219024 (0x35790) [#26396]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#24045]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18274]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1590]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 28 == 28 [#38867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15428]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 111556 ( (0x1b3c4) == 111556 (0x1b3c4) [#32363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#27125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#35454]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#36149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14936]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5894]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#10549]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20246]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#11072]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11881 (0 0x2e69) == 11881 (0x2e69) [#19445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#29692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#10321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#23509]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#11553]", "trampoline_test :: ebpf_update_trampoline_table( table.get(), (sizeof(provider_helper_fu unction_ids) / sizeof(provider_helper_function_ids[0])), provider_helper_function n_ids, &helper_function_addresses2) == EBPF_SUCCESS for: 0 == 0 [#38727]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#23699]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#29739]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38553]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#36859]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2473]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38112]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#23542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20583]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1493]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169744 ( (0x29710) == 169744 (0x29710) [#32519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27679]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#10537]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#11603]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#29888]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#10989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#21468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15010]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30925]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#33294]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5745]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6290]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#22840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64 == 64 [#13006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33683]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81225 (0 0x13d49) == 81225 (0x13d49) [#32265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 155236 ( (0x25e64) == 155236 (0x25e64) [#13778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21458]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37853]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13741]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#24034]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7925]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 185761 ( (0x2d5a1) == 185761 (0x2d5a1) [#13852]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3463]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#33234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19780]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22801 (0x x5911) == 22801 (0x5911) [#7057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#22440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18681]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33574]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#36037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#23391]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#415]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#36728]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26151]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24551]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#35254]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33165]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#10462]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33482]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207936 ( (0x32c40) == 207936 (0x32c40) [#20139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#29605]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#29805]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 416 (0x1a0) == = 416 (0x1a0) [#39902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0x x2d9) [#8375]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#35234]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#23932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#29340]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#36139]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#24405]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7638]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 15 56025 (0x26179) [#9479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#28154]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#20796]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12892]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37717]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 6 == 6 [#39052]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#36288]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#24071]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 24 48004 (0x3c8c4) [#9788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#27368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13461]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32334]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21316 (0 0x5344) == 21316 (0x5344) [#31987]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24583]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33521]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#10740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#23294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25372]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37846]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1 == 1 [#6757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#17675]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16384 (0x x4000) == 16384 (0x4000) [#7011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#29347]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26267]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15689]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#30358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#35692]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#27203]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6561]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18894]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30863]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#30650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#22940]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6739]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12112]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 242064 (0 0x3b190) == 242064 (0x3b190) [#1502]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51984 (0x xcb10) == 51984 (0xcb10) [#7211]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25 == 25 [#6765]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33124 (0x x8164) == 33124 (0x8164) [#7119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14511]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2373]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35017]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6978]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#36185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 92416 (0x x16900) == 92416 (0x16900) [#7363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25685]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 718 (0x2ce) == 718 (0x2ce) [#40361]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#35119]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 68 == 68 [#39728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14499]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19214]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101124 ( (0x18b04) == 101124 (0x18b04) [#32331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#22002]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#11374]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 678 (0x2a6) == = 678 (0x2a6) [#40033]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27885]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2500 (0x9c c4) == 2500 (0x9c4) [#618]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#35399]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27201]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#36563]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#22556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#35919]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28239]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24463]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19538]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20144]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#30117]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34637]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 682 (0x2aa) == 682 (0x2aa) [#40379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21097]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#29017]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3079]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#11057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14714]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#35235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#27089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#11351]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39041]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#36192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27225 (0 0x6a59) == 27225 (0x6a59) [#13320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14171]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13367]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37973]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6926]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13069]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9073]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3048]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#29337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30706]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#23119]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#23460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#29652]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12284]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 0 == 0 [#38982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69696 (0x x11040) == 69696 (0x11040) [#7283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#10923]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8338]", "bindmonitor-native :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#40997]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25141]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#10679]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37735]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1157]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 66 == 66 [#40687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1879]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25555]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2683]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 11 16964 (0x1c8e4) [#9320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 201601 ( (0x31381) == 201601 (0x31381) [#13888]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 116 == 116 [#40662]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#10371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#29518]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28020]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#35046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#22826]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7744 (0x x1e40) == 7744 (0x1e40) [#19403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8604]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12839]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25823]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#36475]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#29123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9786]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 210681 ( (0x336f9) == 210681 (0x336f9) [#13908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 (0x24c1) [#9938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13353]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 254016 ( (0x3e040) == 254016 (0x3e040) [#20235]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 189225 ( (0x2e329) == 189225 (0x2e329) [#32565]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#23327]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6640]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 482 (0x1e2) == 482 (0x1e2) [#40479]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7356]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26926]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#30273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#22962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168921 ( (0x293d9) == 168921 (0x293d9) [#20049]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 20 07936 (0x32c40) [#9662]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78400 (0 0x13240) == 78400 (0x13240) [#13550]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7128]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#36626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#21768]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2736]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#11694]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#23544]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31031]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37382]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 396 (0x18c) == = 396 (0x18c) [#39892]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 212521 (0 0x33e29) == 212521 (0x33e29) [#1440]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 610 (0x262) == = 610 (0x262) [#39999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20453]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#35386]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18854]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6075]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27069]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24706]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 822 (0x336) == = 822 (0x336) [#40105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#21765]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78961 (0 0x13471) == 78961 (0x13471) [#13552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22201]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6774]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21290]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#11928]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1010 (0x3f2) = == 1010 (0x3f2) [#40199]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#23058]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#29811]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 232324 ( (0x38b84) == 232324 (0x38b84) [#20191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4761 (0x1 1299) == 4761 (0x1299) [#6893]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#10874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9103]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30935]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#30488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27831]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8096]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1683]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#35040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#10824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#29046]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34340]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121801 ( (0x1dbc9) == 121801 (0x1dbc9) [#32393]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38194]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#34227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 19 98916 (0x30904) [#9632]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31049]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6109]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#29075]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#23586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33302]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 3422 25 (0x85b1) [#8849]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37161]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#11370]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#11625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 186624 (0 0x2d900) == 186624 (0x2d900) [#7619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100 == 100 [#29393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#10330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#10667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#289]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2395]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15845]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 604 (0x25c) == = 604 (0x25c) [#39996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#29698]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#34005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#23306]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#28571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16639]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6662]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 578 (0x242) == 578 (0x242) [#40431]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 696 (0x2b8) == = 696 (0x2b8) [#40042]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26908]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13123]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26837]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34433]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#29106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#23763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31633]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9469]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#40721]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#10431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 231361 ( (0x387c1) == 231361 (0x387c1) [#13952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#36608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207025 ( (0x328b1) == 207025 (0x328b1) [#13900]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1885]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6738]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 235225 (0 0x396d9) == 235225 (0x396d9) [#7725]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19044 (0 0x4a64) == 19044 (0x4a64) [#19503]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11997]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#29766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13924 (0 0x3664) == 13924 (0x3664) [#25696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#22470]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 86436 (0x x151a4) == 86436 (0x151a4) [#1106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#23448]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#24339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#23374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#23840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 289 (0x1 121) == 289 (0x121) [#19261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33250]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1697]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27849]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 460 (0x1cc) == = 460 (0x1cc) [#39924]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1285]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38406]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26191]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25458]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#29397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21334]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27957]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#36261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15701]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#35772]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27462]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#10021]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#29050]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#23601]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31264]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14042]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 23 31361 (0x387c1) [#9737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19156]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39584]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#28547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#34936]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2706]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27033]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7424]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#29079]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6842]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38714]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 468 (0x1d4) == = 468 (0x1d4) [#39928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20018]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 2073 36 (0x5100) [#9991]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26201]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 42 == 42 [#39158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139876 ( (0x22264) == 139876 (0x22264) [#19975]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#755]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 678 (0x2a6) == 678 (0x2a6) [#40381]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 40 == 40 [#38936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14500]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31144]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#27755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99225 (0 0x18399) == 99225 (0x18399) [#13620]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#35480]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15179]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#28094]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#23697]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#11049]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#11487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20753]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9106]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38535]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8024]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12376]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#30065]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#11008]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27108]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32859]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#21981]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#10329]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39309]", "hash_table_stress_test :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#21027]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#10983]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#30302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#21906]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == 0 for: 0 == 0 [#42101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1936 (0x x790) == 1936 (0x790) [#25548]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#22562]", "bindmonitor-ringbuf-jit :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#41057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15922]", "ring_buffer_async_query :: ebpf_ring_buffer_map_query_buffer(map.get(), &completion.buffer, &com mpletion.consumer_offset) == EBPF_SUCCESS for: 0 == 0 [#37793]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25457]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58081 (0 0xe2e1) == 58081 (0xe2e1) [#32177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#21078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6367]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33761]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#11628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#11697]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#22]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#20898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#24130]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#29093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34543]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33060]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 192.168.14.0/29\"' and 'return_value := \"192.168.14.0/29\"' [#37536]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1687]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#29749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51076 (0x xc784) == 51076 (0xc784) [#7207]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2577]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#29213]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 210 == 210 [#39799]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#29838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#30081]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#35096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22010]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 4840 00 (0xbd10) [#8954]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39632]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#35611]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 187489 ( (0x2dc61) == 187489 (0x2dc61) [#32561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#34053]", "program :: async_context.get_completed() == true for: true == true [#37768]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#28708]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30758]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#11874]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#36829]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#30629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#28638]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13987]", "work_queue :: ebpf_timed_work_queue_is_empty(work_queue) == false for: false == fal lse [#40854]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 776 (0x308) == = 776 (0x308) [#40082]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#33882]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3034]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30866]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8379]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1691]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33281]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#30529]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#11564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#35953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101761 (0 0x18d81) == 101761 (0x18d81) [#7393]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 588 (0x24c) == 588 (0x24c) [#40426]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12459]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#543]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16235]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14345]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#27965]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28527]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#30301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#23613]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7136]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#33693]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26063]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 18 == 18 [#39170]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#30191]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"AA/64\" == \"AA/64\" with 1 message: 'key_string := \"AA/64\"' [#37599]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 998 856 (0x18610) [#9242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#36882]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.15.7/32\" == \"192.168.15.7 7/32\" with 2 messages: 'key_string := \"192.168.15.7/32\"' and 'correct_value := \"1 192.168.15.7/32\"' [#37458]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12321 (0 0x3021) == 12321 (0x3021) [#19449]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25927]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24964 (0 0x6184) == 24964 (0x6184) [#32011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26219]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8500]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#28490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20120]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#33492]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_FIND_ELEMENT, request, reply) == E EBPF_INVALID_OBJECT for: 5 == 5 [#38027]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#35481]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47961 (0 0xbb59) == 47961 (0xbb59) [#13428]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 52 == 52 [#39153]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#11932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#20943]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 120409 (0 0x1d659) == 120409 (0x1d659) [#1212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#35756]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32962]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#28975]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#22607]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21538]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25157]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24742]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18261]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1413]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#593]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33374]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#30415]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27610]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9111]", "interlocked operations :: ebpf_interlocked_compare_exchange_int32(&value32, 2, 1) == 1 for: 1 = == 1 [#40823]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#36293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 72 <= 612 (0x264) [#35340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22283]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == (max_entries_limited ? expected_error : 0) for: 0 == 0 [#42107]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 231361 (0 0x387c1) == 231361 (0x387c1) [#7717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#22992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#23381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#11871]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#29073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#12474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#11667]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36918]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26287]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39654]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7168]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8063]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27169]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169 == 1 169 [#31721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#36565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#21357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18314]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#23469]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#29117]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#28733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18254]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32528]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2508]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38760]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1753]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7779]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#29826]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#11692]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#28982]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3009]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#29623]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121801 ( (0x1dbc9) == 121801 (0x1dbc9) [#19925]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#28863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14013]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#23416]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#22337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#22652]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1565]", "pinning_test :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38477]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52900 (0 0xcea4) == 52900 (0xcea4) [#32155]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2439]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.15.7/32\"' and 'correct_value := \" \"192.168.15.7/32\"' [#37443]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#34491]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#23147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37180]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15650]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152881 ( (0x25531) == 152881 (0x25531) [#32477]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18840]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1867]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#30164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18567]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 245025 ( (0x3bd21) == 245025 (0x3bd21) [#13980]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#11436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5476 (0x x1564) == 5476 (0x1564) [#19375]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25062]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#29773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 221841 ( (0x36291) == 221841 (0x36291) [#20169]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#35630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25180]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 159201 (0 0x26de1) == 159201 (0x26de1) [#1316]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31206]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37009]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#24354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#24164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21310]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33448]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#27239]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#30140]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 ( (0x6e4) [#8420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21005]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18664]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13895]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12165]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#27164]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1849 (0x7 739) == 1849 (0x739) [#6841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#23038]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#23856]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30735]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2502]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#275]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#35844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#10303]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#21837]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#22260]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#29526]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#29757]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7855]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 300 (0x12c) == 300 (0x12c) [#40570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#11081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#30129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22216]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5041 (0x13 3b1) == 5041 (0x13b1) [#660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#24407]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#27698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#23804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#33312]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#11938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#10733]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13103]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#30326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 176400 ( (0x2b110) == 176400 (0x2b110) [#13830]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4 == 4 [#33828]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38153]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25771]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 209764 ( (0x33364) == 209764 (0x33364) [#13906]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25444]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31587]", "invalid_bpf_get_socket_cookie :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#42114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#33468]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#23672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#35702]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2835]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6982]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#29477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#28627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#28193]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#11486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#29561]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#11406]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35207]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#23582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21565]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11966]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 22 == 22 [#38927]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#30562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160801 ( (0x27421) == 160801 (0x27421) [#20029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20995]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7964]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7044]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#35597]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39443]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62001 (0 0xf231) == 62001 (0xf231) [#32193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 17 77241 (0x2b459) [#9557]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44944 (0x xaf90) == 44944 (0xaf90) [#7179]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 114 == 114 [#39751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#23999]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 179776 ( (0x2be40) == 179776 (0x2be40) [#20075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31211]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#10555]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4 == 4 [#27719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#10340]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24529]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12094]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90000 (0 0x15f90) == 90000 (0x15f90) [#19827]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148225 ( (0x24301) == 148225 (0x24301) [#19997]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#35978]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38008]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#34662]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39446]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32024]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32747]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#27053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14243]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 216225 (0 0x34ca1) == 216225 (0x34ca1) [#7685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#36447]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145924 ( (0x23a04) == 145924 (0x23a04) [#32459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3600 (0x xe10) == 3600 (0xe10) [#19347]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32994]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#11590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#35189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34187]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15129 (0x3 3b19) == 15129 (0x3b19) [#764]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1607]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31065]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110224 (0 0x1ae90) == 110224 (0x1ae90) [#1182]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 125316 (0 0x1e984) == 125316 (0x1e984) [#1226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 117649 (0 0x1cb91) == 117649 (0x1cb91) [#7441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#23093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14479]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 ( (0xf81) [#9900]", "EBPF_OPERATION_CREATE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#308]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#22478]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#831]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 22 26576 (0x37510) [#9722]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26235]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22492]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#261]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#23399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#33972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#22354]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 8 == 8 [#40716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25921 (0 0x6541) == 25921 (0x6541) [#19549]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2581]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32917]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30945]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9082]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6581]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 195364 (0 0x2fb24) == 195364 (0x2fb24) [#7639]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#124]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3214]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#11082]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 846 (0x34e) == = 846 (0x34e) [#40117]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 584 (0x248) == = 584 (0x248) [#39986]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#27317]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27883]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#105]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34547]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9646]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8575]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#29728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#23088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21301]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#27155]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#35864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 215296 ( (0x34900) == 215296 (0x34900) [#13918]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49 == 49 [#13004]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 17 73056 (0x2a400) [#9542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#29608]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 448 (0x1c0) == = 448 (0x1c0) [#39918]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38311]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6444]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#22724]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41072]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18324]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36997]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#23732]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27861]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#30428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27927]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61504 (0 0xf040) == 61504 (0xf040) [#13486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32906]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25200]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 34 == 34 [#38965]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 42 == 42 [#39715]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25018]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#23445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34195]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40898]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#36328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13745]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 151321 (0 0x24f19) == 151321 (0x24f19) [#1296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142129 ( (0x22b31) == 142129 (0x22b31) [#19981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18821]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7708]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32402]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#22764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#20889]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7590]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#22242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 257049 ( (0x3ec19) == 257049 (0x3ec19) [#20241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#22506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#24393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7744 (0x x1e40) == 7744 (0x1e40) [#25636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14250]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#58]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#11610]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96100 (0 0x17764) == 96100 (0x17764) [#26080]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32834]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#10975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19440]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#10389]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#35624]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28038]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#30356]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#24226]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#36711]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26757]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 5382 24 (0xd240) [#8990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15916]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#36890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75625 (0 0x12769) == 75625 (0x12769) [#13540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12164]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 900 (0x3 384) == 900 (0x384) [#31755]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 134689 ( (0x20e21) == 134689 (0x20e21) [#26194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#35817]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39597]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#34935]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114244 ( (0x1be44) == 114244 (0x1be44) [#19903]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#28874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8392]", "error codes :: result2 == result for: 26 == 26 [#40808]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 117649 (0 0x1cb91) == 117649 (0x1cb91) [#1204]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#11567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#30384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#27668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13059]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38292]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 205209 (0 0x32199) == 205209 (0x32199) [#7661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#23824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20282]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#11341]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38573]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#21651]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7396 (0x x1ce4) == 7396 (0x1ce4) [#25632]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#29233]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#10123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9604]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#509]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30276 (0 0x7644) == 30276 (0x7644) [#25808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#29064]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39017]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#23609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#36007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198025 ( (0x30589) == 198025 (0x30589) [#13880]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 218089 ( (0x353e9) == 218089 (0x353e9) [#26394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37384]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8743]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25085]", "droppacket-jit :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26931]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#11788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19044]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#10843]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 89401 (0x x15d39) == 89401 (0x15d39) [#1116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#22609]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#23310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18249]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#23486]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#36223]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#28112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32861]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 24 40100 (0x3a9e4) [#9764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#23910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#33585]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12038]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#29620]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 414 (0x19e) == 414 (0x19e) [#40513]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6084]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1876]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#35276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47524 (0 0xb9a4) == 47524 (0xb9a4) [#19663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22701]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#21702]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#11857]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24959]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#10979]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33586]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#29507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14732]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 806 (0x326) == = 806 (0x326) [#40097]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5950]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256 (0x100 0) == 256 (0x100) [#550]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#29502]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 552 (0x228) == 552 (0x228) [#40444]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28287]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#36546]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27825]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#28274]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39260]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76729 (0 0x12bb9) == 76729 (0x12bb9) [#13544]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#735]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 ( (0x691) [#9876]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#22422]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 966 (0x3c6) == 966 (0x3c6) [#40237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#28783]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27990]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18876]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27385]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#11501]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21472]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19326]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14591]", "EBPF_OPERATION_GET_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38267]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#24207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#29326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#36602]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#11213]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == 0 for: 0 == 0 [#42106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27517]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39509]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#23662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 3385 56 (0x8440) [#8846]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#36138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#10289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32730]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 742 (0x2e6) == = 742 (0x2e6) [#40065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#29186]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#28641]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6184]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#11844]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#36813]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19091]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37378]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#21378]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8091]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4 == 4 [#30387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#29196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#36687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#35460]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 2 for: 2 == 2 [#38457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20512]", "serialize_map_test :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20906]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#23850]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#29572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15749]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 246016 (0 0x3c100) == 246016 (0x3c100) [#1510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25881]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#35751]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38254]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 604 (0x25c) == 604 (0x25c) [#40418]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24505]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33898]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#29107]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80656 (0 0x13b10) == 80656 (0x13b10) [#26028]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 25 53009 (0x3dc51) [#9803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#27428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18262]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(bad_key), reinterpret_cast<c const uint8_t*>(&bad_key), value.size(), value.data(), EBPF_ANY, 0) == ((behavior r_on_max_entries != MAP_BEHAVIOR_FAIL) ? EBPF_SUCCESS : error_on_full) for: 0 == 0 [#25459]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 24 == 24 [#38970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#35269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 200704 ( (0x31000) == 200704 (0x31000) [#13886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25140]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32578]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#11152]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22021]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#35685]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25281 (0x x62c1) == 25281 (0x62c1) [#7073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6490]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 188356 ( (0x2dfc4) == 188356 (0x2dfc4) [#13858]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 84 == 84 [#39091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30976 (0x x7900) == 30976 (0x7900) [#7107]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34216]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26885]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3243]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8434]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5914]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#24202]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 596 (0x254) == 596 (0x254) [#40422]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#29546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#22622]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#33615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#11194]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2442]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32810]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#10885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#28966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 (0x1e40) [#8558]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8668]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19052]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31497]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38682]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#10253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14095]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#22879]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10000 (0x2 2710) == 10000 (0x2710) [#718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18960]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97344 (0 0x17c40) == 97344 (0x17c40) [#26084]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#33630]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28531]", "async :: ebpf_async_set_completion_callback( &async_context, []( void* context t, size_t output_buffer_length, ebpf_result_t result) { (output_buffer_length); a auto async_context = reinterpret_cast<_async_context*>(context); async_context->r result = result; }) == EBPF_SUCCESS for: 0 == 0 [#40735]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 24 == 24 [#38859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20879]", "invalid_bpf_get_socket_cookie :: result == -22 for: -22 == -22 [#42118]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31212]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12922]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33241]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#35105]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14134]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1557]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26937]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#29724]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34382]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37339]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#22041]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6089]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12017]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 15 59201 (0x26de1) [#9491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#35714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26533]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19175]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#11377]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28315]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#30227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33078]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15155]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#448]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#10359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20774]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6368]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#11670]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7976]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26762]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37330]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58564 (0x xe4c4) == 58564 (0xe4c4) [#7239]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14024]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 105625 ( (0x19c99) == 105625 (0x19c99) [#19877]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 11 18336 (0x1ce40) [#9326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15515]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#21795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22201 (0 0x56b9) == 22201 (0x56b9) [#13288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19672]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18374]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#23794]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#21561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4 == 4 [#34991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13709]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39686]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#22818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#34512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1849 (0x x739) == 1849 (0x739) [#19313]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3574]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6371]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70756 (0x x11464) == 70756 (0x11464) [#7287]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#27446]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12005]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87616 (0x x15640) == 87616 (0x15640) [#1110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18766]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1 == 1 [#31697]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9 == 9 [#36508]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 54 == 54 [#38955]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 930 025 (0x16b61) [#9209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 15 53664 (0x25840) [#9470]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#29001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#24317]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3444]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#885]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1681 (0x x691) == 1681 (0x691) [#31777]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 20 == 20 [#38871]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 114 == 114 [#40663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26508]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25659]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38620]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39648]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12577]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9249]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38294]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#35075]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19019]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"10.10.0.0/16\" == \"10.10.0.0/16\" w with 2 messages: 'key_string := \"10.10.0.0/16\"' and 'correct_value := \"10.10.0.0/ /16\"' [#37450]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12461]", "ring_buffer_async_query :: ebpf_map_update_entry(map.get(), sizeof(key), reinterpret_cast<uint8_ _t*>(&key), 0, nullptr, EBPF_ANY, 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37799]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#23326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15011]", "hash_table_test :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38422]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#11122]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207936 ( (0x32c40) == 207936 (0x32c40) [#26372]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1221]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 183184 ( (0x2cb90) == 183184 (0x2cb90) [#26316]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#11588]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1877]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#35709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#36885]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#10939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#22689]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110224 (0 0x1ae90) == 110224 (0x1ae90) [#7419]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#8330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 86436 (0 0x151a4) == 86436 (0x151a4) [#13578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32829]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#33918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77284 (0x x12de4) == 77284 (0x12de4) [#7311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 ( (0xaf9) [#8453]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6423]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28561 (0 0x6f91) == 28561 (0x6f91) [#19565]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27018]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6084 (0x1 17c4) == 6084 (0x17c4) [#6911]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#10143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 243049 ( (0x3b569) == 243049 (0x3b569) [#20213]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1561]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76729 (0x x12bb9) == 76729 (0x12bb9) [#1072]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#30193]", "error codes :: result2 == result for: 30 == 30 [#40812]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#10786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34313]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#22143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16369]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21568]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.15.1/32\"' [#37479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72900 (0 0x11cc4) == 72900 (0x11cc4) [#13530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31554]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21920]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#11199]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#10116]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32825]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33986]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38765]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6221]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#35598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27685]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6724 (0x1 1a44) == 6724 (0x1a44) [#6919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#23876]", "pinning_test :: ebpf_pinning_table_insert(pinning_table.get(), &bar, &another_object. .object) == EBPF_SUCCESS for: 0 == 0 [#38483]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34048]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85849 (0x x14f59) == 85849 (0x14f59) [#1104]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100 == 100 [#538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#35443]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7817]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1016 (0x3f8) == 1016 (0x3f8) [#40212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#36025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#22155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#11867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#36665]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34969 (0 0x8899) == 34969 (0x8899) [#13364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37249 (0 0x9181) == 37249 (0x9181) [#13376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#21021]", "ring_buffer_output :: consumer == data.size() + (((size_t) & ((ebpf_ring_buffer_record_t*)0 0)->data)) for: 18 == 18 [#40762]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1899]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7420]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8337]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 46 == 46 [#40697]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 1040 04 (0x28a4) [#9945]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#35871]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 137641 (0 0x219a9) == 137641 (0x219a9) [#1260]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1980]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#11060]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26758]", "droppacket-interpret :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#40919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14060]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 394 (0x18a) == = 394 (0x18a) [#39891]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6561 (0x19 9a1) == 6561 (0x19a1) [#680]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#11876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#22744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25343]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#22981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#33375]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 122 == 122 [#39755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19079]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#22647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24638]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 10 == 10 [#40715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#21159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#14525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15595]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24915]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 19 93600 (0x2f440) [#9614]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7284]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39595]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#35170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 237169 ( (0x39e71) == 237169 (0x39e71) [#13964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21814]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#34879]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#30546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 135424 ( (0x21100) == 135424 (0x21100) [#13726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#10461]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2445]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 822 (0x336) == 822 (0x336) [#40309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13457]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30675]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198916 (0 0x30904) == 198916 (0x30904) [#1410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#11448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13341]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94864 (0x x17290) == 94864 (0x17290) [#1134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22265]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#348]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21473]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119716 ( (0x1d3a4) == 119716 (0x1d3a4) [#32387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#28985]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 732 (0x2dc) == 732 (0x2dc) [#40354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#10724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#11342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27714]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#11953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#28666]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#36031]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 129600 ( (0x1fa40) == 129600 (0x1fa40) [#32415]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 10 07584 (0x1a440) [#9278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21146]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 44 == 44 [#40698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#35332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#11704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13045]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#36532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#29905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#29181]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3460]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39497]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3096]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38542]", "droppacket-jit :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#40860]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39319]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#23442]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27669]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39488]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#10037]", "async :: async_context.result == EBPF_SUCCESS for: 0 == 0 [#40732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#23368]", "trampoline_test :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38720]", "map_crud_operations:BPF_MAP_TYPE_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#5717]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#29536]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6209]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#36236]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28503]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26684]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#28645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16900 (0 0x4204) == 16900 (0x4204) [#25720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14969]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#23067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 ( (0xaf9) [#9890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34277]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#96]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12918]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#10554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#10834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30944]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20846]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#27554]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39396]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#30413]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19199]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 58 == 58 [#40691]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#375]", "EBPF_OPERATION_RESOLVE_HELPER :: invoke_protocol(EBPF_OPERATION_RESOLVE_HELPER, request, reply) == EBP PF_SUCCESS for: 0 == 0 [#37838]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3844 (0xf0 04) == 3844 (0xf04) [#642]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#35988]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 786 (0x312) == 786 (0x312) [#40327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#23153]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37045]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#36307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26165]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6068]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39693]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33259]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#30656]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#35005]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2071]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3721 (0x xe89) == 3721 (0xe89) [#31817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14809]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 946 (0x3b2) == = 946 (0x3b2) [#40167]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#10355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#22939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#24230]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#23276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28512]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5750]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#33705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#23069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12876]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25309]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9508]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 316 (0x13c) == = 316 (0x13c) [#39852]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#35061]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12054]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26966]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22796]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#11009]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73441 (0x x11ee1) == 73441 (0x11ee1) [#1060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18355]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 414 (0x19e) == = 414 (0x19e) [#39901]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31665]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#29190]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#11334]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#10030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19075]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30907]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#33540]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9270]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#28277]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#29857]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20531]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#967]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#22686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 2890 00 (0x70e4) [#8804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20849]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3193]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#10147]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9130]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#24070]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 202500 ( (0x31704) == 202500 (0x31704) [#32595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#23811]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3159]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26077]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6587]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 272 (0x110) == 272 (0x110) [#40584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34742]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33680]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32718]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34600]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34423]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20413]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13823]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67600 (0 0x10810) == 67600 (0x10810) [#19747]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1020 (0x3fc) = == 1020 (0x3fc) [#40204]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13295]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1988]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#36398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32965]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34631]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#36554]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#23968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#11281]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#23160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32779]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#22310]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 289 (0x121 1) == 289 (0x121) [#552]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#21057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18375]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#10220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#24388]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 (0x1fa4) [#8564]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20714]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184041 ( (0x2cee9) == 184041 (0x2cee9) [#32553]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8377]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#22687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18443]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#22791]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#30069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#22905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5790]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#30547]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1600 (0x x640) == 1600 (0x640) [#31775]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#33852]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 968 (0x3c8) == 968 (0x3c8) [#40236]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33682]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key) - 1, reinterpret_cast<uint8 8_t*>(&key), reinterpret_cast<uint8_t*>(&key)) == EBPF_INVALID_ARGUMENT for: 6 == = 6 [#24941]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38527]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#24125]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#23773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 670 081 (0x10609) [#9071]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27214]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 3027 76 (0x7644) [#8816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33832]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39389]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#30332]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 816 (0x330) == 816 (0x330) [#40312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#23803]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#35991]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 206116 ( (0x32524) == 206116 (0x32524) [#20135]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#30457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#30359]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7999]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 628 (0x274) == 628 (0x274) [#40406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(bad_key), reinterpret_cast<co onst uint8_t*>(&bad_key), value.size(), value.data(), EBPF_ANY, 0) == ((behavior_ _on_max_entries != MAP_BEHAVIOR_FAIL) ? EBPF_SUCCESS : error_on_full) for: 6 == 6 [#6752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15893]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27195]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47089 (0 0xb7f1) == 47089 (0xb7f1) [#32129]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1966]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20258]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6145]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7488]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26325]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3492]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37963]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25360]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21193]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19044 (0x4 4a64) == 19044 (0x4a64) [#794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#23682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#35755]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#27809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13975]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#36818]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#11817]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#10499]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#33789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#23098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#24277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12841]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#22888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152881 ( (0x25531) == 152881 (0x25531) [#13772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7933]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26780]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24528]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 441 (0x1 1b9) == 441 (0x1b9) [#31737]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27654]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#10005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#22316]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#186]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14146]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13487]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39326]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27024]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6160]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27388]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1269]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#302]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#23759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#34647]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28513]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65025 (0 0xfe01) == 65025 (0xfe01) [#13500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#36165]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#10242]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4900 (0x1 1324) == 4900 (0x1324) [#6895]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34596 (0x x8724) == 34596 (0x8724) [#7127]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77284 (0 0x12de4) == 77284 (0x12de4) [#26016]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6303]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27187]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#28751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#10723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#29199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#11424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#23468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#35972]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12231]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 852 (0x354) == 852 (0x354) [#40294]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32246]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"DD/120\" \"' [#37657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14086]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#23407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33225]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41098]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21523]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1894]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3505]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#22843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#36353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#29668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#11462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24704]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#33702]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 21 12521 (0x33e29) [#9677]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6503]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"10.10.255.255/32\" == \"10.10.255.2 255/32\" with 2 messages: 'key_string := \"10.10.255.255/32\"' and 'correct_value := = \"10.10.255.255/32\"' [#37448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#36613]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#122]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25691]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45369 (0 0xb139) == 45369 (0xb139) [#25886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18778]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19226]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37203]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#35990]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28411]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13013]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38106]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#28928]", "droppacket-interpret :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#40921]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5973]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6026]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18195]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2509]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12452]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#22467]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 378 (0x17a) == = 378 (0x17a) [#39883]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#36299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20371]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#36845]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34655]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8228]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#29346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#23358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7092]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20579]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8790]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63001 (0x xf619) == 63001 (0xf619) [#7257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#35185]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25328]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#35108]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#18]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#36650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33814]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119025 ( (0x1d0f1) == 119025 (0x1d0f1) [#26150]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21664]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1972]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37246]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35131]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2704 (0xa9 90) == 2704 (0xa90) [#622]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28471]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18925]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20878]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 960 (0x3c0) == 960 (0x3c0) [#40240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#36635]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6691]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47524 (0 0xb9a4) == 47524 (0xb9a4) [#25896]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15871]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 213444 ( (0x341c4) == 213444 (0x341c4) [#26384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9 == 9 [#29704]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#35502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13015]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13239]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 196 == 196 [#40622]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#21846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#22690]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178929 (0 0x2baf1) == 178929 (0x2baf1) [#1364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31231]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9849]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39551]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#29336]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6616]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27643]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14372]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25947]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36987]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 102400 (0 0x19000) == 102400 (0x19000) [#1158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15169]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#30385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21149]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#28316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26830]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38033]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#10569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#22499]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34516]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21025 (0x x5221) == 21025 (0x5221) [#7045]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78961 (0x x13471) == 78961 (0x13471) [#7317]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 288 (0x120) == 288 (0x120) [#40576]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#30272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14073]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#35388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#35986]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9606]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14161 (0 0x3751) == 14161 (0x3751) [#25698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8069]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#30536]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25347]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 492 (0x1ec) == 492 (0x1ec) [#40474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14112]", "map_reuse-jit :: error == 0 for: 0 == 0 [#41793]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#29262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#21861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#22251]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 10 08900 (0x1a964) [#9284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18405]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25025]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27147]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14899]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#405]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2051]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#10416]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34661]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#36844]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#23549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#35374]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#10840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#21420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#22597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#28157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#21483]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#10375]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#24105]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15764]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#10288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#10597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#24084]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#11624]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6289]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#35]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#34972]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25513]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#10921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21020]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 3276 61 (0x7ff9) [#8837]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7492]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#36099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#36062]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7947]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#21888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#23879]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 800 089 (0x138d9) [#9143]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#11146]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2146]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#29038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#22971]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#34917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#35184]", "bindmonitor-bpf2bpf-native :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#41022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12823]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#22465]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7516]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#28584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#22878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15017]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#30565]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#33567]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 1060 09 (0x2971) [#9946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14567]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25004]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1720]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6481]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#10454]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38416 (0x x9610) == 38416 (0x9610) [#7147]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#29153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#34841]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#10805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#22763]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#27197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#23663]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#36746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20666]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5776 (0x x1690) == 5776 (0x1690) [#19379]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#23176]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#29566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80089 (0 0x138d9) == 80089 (0x138d9) [#13556]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12363]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 28 == 28 [#39708]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#33807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6946]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31122]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12319]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20354]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#29836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3249 (0x xcb1) == 3249 (0xcb1) [#19341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#30251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#28073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#23494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 2190 04 (0x5590) [#9995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15880]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9 == 9 [#30219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#28364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#36876]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6181]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7997]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13359]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20872]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#35777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97969 (0x x17eb1) == 97969 (0x17eb1) [#7381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#24257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19390]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 14 41376 (0x22840) [#9422]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21535]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25921 (0x x6541) == 25921 (0x6541) [#7077]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7995]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#11368]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#29664]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 841 (0x349 9) == 841 (0x349) [#576]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80089 (0x x138d9) == 80089 (0x138d9) [#7321]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#29379]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#21987]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#34107]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25973]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9 == 9 [#31701]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 500 (0x1f4) == = 500 (0x1f4) [#39944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32122]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#33510]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20498]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 16 == 16 [#38855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33093]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9477]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1539]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1990]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 936 636 (0x16dc4) [#9212]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3301]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#23816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9729]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3432]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 248004 (0 0x3c8c4) == 248004 (0x3c8c4) [#1514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#11872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14654]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22453]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#34170]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"192.168.16.0/24\" == \"192.168.16.0/24 4\" with 2 messages: 'key_string := \"192.168.16.0/24\"' and 'return_value := \"192.1 168.16.0/24\"' [#37529]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6186]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#28822]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26677]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27757]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#34155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#20880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22833]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18637]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2401 (0x x961) == 2401 (0x961) [#19325]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38397]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#11719]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39555]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#29684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34748]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 209764 (0 0x33364) == 209764 (0x33364) [#7671]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38618]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26461]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13081]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5924]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14549]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 902 (0x386) == 902 (0x386) [#40269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#23877]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38623]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27343]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3540]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#35164]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33071]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#28780]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9138]", "bindmonitor-ringbuf-interpret :: it != _overlapped_buffers.end() for: {?} != {?} [#41252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12688]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#27293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22088]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34697]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#22272]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31297]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#22466]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1952]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27333]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#29228]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10000 (0 0x2710) == 10000 (0x2710) [#31895]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#10090]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#29431]", "pinning_test :: an_object.initialize() == EBPF_SUCCESS for: 0 == 0 [#38478]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10362]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12352]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9549]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#11196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32905]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#23760]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34225 (0x8 85b1) == 34225 (0x85b1) [#888]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15337]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#35519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26731]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#23154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34529]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28096]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68121 (0 0x10a19) == 68121 (0x10a19) [#32217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6912]", "work_queue :: ebpf_timed_work_queue_create( &work_queue, 0, &interval, []( void* co ontext, uint32_t cpu_id, ebpf_list_entry_t* entry) { (context); (cpu_id); auto wo ork_item_context = reinterpret_cast<_work_item_context*>(entry); KeSetEvent(&work k_item_context->completion_event, 0, 0); }, &context) == EBPF_SUCCESS for: 0 == 0 [#40849]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21641]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#252]", "ring_buffer_output :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#40746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#36388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#23900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24731]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13283]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4624 (0x12 210) == 4624 (0x1210) [#654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#36278]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#23245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 729 900 (0x11cc4) [#9104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#29755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#12995]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19692]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3007]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 550 (0x226) == 550 (0x226) [#40445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#34341]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3331]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18290]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19990]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#22239]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#36753]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 36 == 36 [#39067]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6123]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33425]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13175]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 203401 ( (0x31a89) == 203401 (0x31a89) [#26362]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37283]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24506]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#23039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20825]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13773]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37145]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20657]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31307]", "ring_buffer_output :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#40745]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6348]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#23433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18612]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#30059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54756 (0 0xd5e4) == 54756 (0xd5e4) [#25928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#24358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#11579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43264 (0 0xa900) == 43264 (0xa900) [#13406]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#35830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7146]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27604]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#24192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#22787]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6180]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37317]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#36749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 1562 25 (0x3d09) [#9970]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2089]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#28609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13093]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#29828]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 127449 (0 0x1f1d9) == 127449 (0x1f1d9) [#7469]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14419]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#30636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15053]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14200]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6171]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"00/0\" == \"00/0\" with h 2 messages: 'key_string := \"FF/128\"' and 'correct_value := \"00/0\"' [#37651]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12166]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#29799]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 191844 ( (0x2ed64) == 191844 (0x2ed64) [#20103]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 328 (0x148) == = 328 (0x148) [#39858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#23868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#11346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34430]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116281 ( (0x1c639) == 116281 (0x1c639) [#19909]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#11210]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37332]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#29402]", "map_crud_operations_lpm_trie_32 :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#37421]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#36531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#21108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#23708]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#30325]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#33861]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8644]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#98]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7712]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#27176]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#29100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19548]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#36751]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#883]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31678]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34193]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30826]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#34062]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38097]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 3348 89 (0x82d1) [#8843]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25 == 25 [#30205]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#21867]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#30427]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#29713]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#23594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#10796]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12674]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14995]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32764]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#36858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13689]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27774]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103684 ( (0x19504) == 103684 (0x19504) [#13634]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32496]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36 == 36 [#6767]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25202]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#10601]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12414]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 498 (0x1f2) == 498 (0x1f2) [#40471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19017]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#22514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#10676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#29472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#29784]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2364]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#22364]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18944]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#29099]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#30308]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 1562 25 (0x3d09) [#8669]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15454]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28204]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 784 (0x3 310) == 784 (0x310) [#31751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18331]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61504 (0x xf040) == 61504 (0xf040) [#1014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25097]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#10778]", "trampoline_test :: test_function() == EBPF_SUCCESS for: 0 == 0 [#38726]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39274]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 238 == 238 [#40601]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1325]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1913]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 74529 (0 0x12321) == 74529 (0x12321) [#19773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28494]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#659]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39225]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145161 ( (0x23709) == 145161 (0x23709) [#32457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26993]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#27050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#23007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#11263]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#28978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15706]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#34977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#11819]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#23500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#33558]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17161 (0 0x4309) == 17161 (0x4309) [#25722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#11914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13749]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25883]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#36379]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15196]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#21333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#28922]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#22735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21995]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28080]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37187]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32712]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3316]", "name size :: program_info_provider.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCC CESS for: 0 == 0 [#37786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#35445]", "map_create_invalid :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'name := \"BPF_MAP_TYPE_ARRAY_OF_MA APS\"' [#37417]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#29023]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#10029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25693]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1602]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6189]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38140]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38705]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#10211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27559]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38116]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6613]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8087]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27297]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18429]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#35940]", "droppacket-interpret :: hook.batch_end(state) == EBPF_SUCCESS for: 0 == 0 [#40965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#23385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178929 ( (0x2baf1) == 178929 (0x2baf1) [#32541]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24547]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7811]", "epoch_test_single_epoch_cache_aligned :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#23005]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#23403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 4752 24 (0xb9a4) [#8948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12295]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6642]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#11321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13233]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14473]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#29332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#21762]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#23536]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#27305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#23849]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#34989]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 74 == 74 [#39086]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1689]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#35912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20164 (0 0x4ec4) == 20164 (0x4ec4) [#13274]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#29491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#36726]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#11375]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#29577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25961]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#29735]", "map_crud_operations_stack :: return_value == value for: 2 == 2 [#37746]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184900 ( (0x2d244) == 184900 (0x2d244) [#26320]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#24293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#22679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#23866]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39020]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9205]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 66 == 66 [#39082]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 1345 56 (0x3490) [#9959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12775]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#11465]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6291]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#10107]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#30167]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#21456]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1758]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#10081]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33323]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 322 (0x142) == 322 (0x142) [#40559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14150]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38644]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#36374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27531]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#10098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22121]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52900 (0xc cea4) == 52900 (0xcea4) [#978]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34504]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36481 (0x x8e81) == 36481 (0x8e81) [#7137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#29111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#22984]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#28938]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25819]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#36123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13759]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#35051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#35395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21533]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7569 (0x x1d91) == 7569 (0x1d91) [#13164]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#28421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#36744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#23756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9637]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33122]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#306]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34118]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2379]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12130]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 30 == 30 [#39709]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21857]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12656]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#29742]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2949]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49729 (0x xc241) == 49729 (0xc241) [#7201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#21312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#23531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#24343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#27575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119025 (0 0x1d0f1) == 119025 (0x1d0f1) [#7445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#34038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2601 (0x xa29) == 2601 (0xa29) [#19329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#29481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#34242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 154449 (0 0x25b51) == 154449 (0x25b51) [#7541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 (0x1729) [#9916]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33247]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#35089]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#24106]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26756]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#28635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2796]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24971]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#29381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#11714]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10152]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156025 ( (0x26179) == 156025 (0x26179) [#20017]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77284 (0x x12de4) == 77284 (0x12de4) [#1074]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 152 == 152 [#40644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#10446]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4900 (0x13 324) == 4900 (0x1324) [#658]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#394]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#11397]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#35636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12849]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38147]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#30448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33730]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#27167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#29835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#23614]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7056 (0x x1b90) == 7056 (0x1b90) [#13158]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6889 (0x1 1ae9) == 6889 (0x1ae9) [#6921]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 179776 ( (0x2be40) == 179776 (0x2be40) [#13838]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88804 (0 0x15ae4) == 88804 (0x15ae4) [#26056]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26009]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#21501]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 229441 ( (0x38041) == 229441 (0x38041) [#26418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15832]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12893]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/123\"' and 'correct_value := \"DD/120\"' [#37618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13499]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14225]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#11816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14926]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13737]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39473]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#35038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19806]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26419]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#10217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#10062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#24215]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13815]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27280]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#28597]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#29348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25426]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1369 (0x x559) == 1369 (0x559) [#31769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32110]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#20856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#28946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14217]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1115]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39295]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7672]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18527]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14085]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#35996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#11331]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25092]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#23481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#36894]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#23930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#35587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#34701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15617]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 694 (0x2b6) == = 694 (0x2b6) [#40041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31053]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8187]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#10884]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33135]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35206]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#36168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#35698]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36912]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7940]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32867]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26701]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8758]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 180625 (0 0x2c191) == 180625 (0x2c191) [#1368]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#11104]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#23628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26802]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#24019]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 6 == 6 [#38850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21587]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT, request) == EBPF_A ARITHMETIC_OVERFLOW for: 22 == 22 [#38054]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#29920]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#29908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8866]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#30133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#27782]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#24390]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32116]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#21189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21722]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38893]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5792]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101761 ( (0x18d81) == 101761 (0x18d81) [#19865]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#871]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#21135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32596]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33856]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13629]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 18432 (0x4800) <= 18432 (0x x4800) [#23398]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5825]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#36661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20619]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6898]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2302]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 698 (0x2ba) == 698 (0x2ba) [#40371]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#35266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12109]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#23681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18649]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#10261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31631]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225 == 225 [#33555]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37677]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#36575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15674]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#149]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27091]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30933]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#35318]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12096]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#29098]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26982]", "bindmonitor-ringbuf-jit :: it != _overlapped_buffers.end() for: {?} != {?} [#41074]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#36708]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#34632]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25072]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#27086]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#35861]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#24291]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26896 (0 0x6910) == 26896 (0x6910) [#19555]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100489 (0 0x18889) == 100489 (0x18889) [#1152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14303]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#29637]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#33927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25979]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#24062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20779]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1 == 1 [#520]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2500 (0x9 9c4) == 2500 (0x9c4) [#6855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26613]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26917]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3300]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21316 (0 0x5344) == 21316 (0x5344) [#25752]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15376 (0x3 3c10) == 15376 (0x3c10) [#766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24459]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#36441]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24984]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27730]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 730 (0x2da) == 730 (0x2da) [#40355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50176 (0xc c400) == 50176 (0xc400) [#966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#30274]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#33453]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 52 == 52 [#39075]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#10102]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#35808]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8827]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#21282]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 90 == 90 [#39094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#36113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#30505]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 74529 (0 0x12321) == 74529 (0x12321) [#32241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14355]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12903]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#30261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2412]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#29979]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#30083]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14491]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7854]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#22566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22295]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11449 (0 0x2cb9) == 11449 (0x2cb9) [#13204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12409]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 36 == 36 [#38934]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#30539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#34832]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6944]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#30339]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 124609 ( (0x1e6c1) == 124609 (0x1e6c1) [#19933]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 410 (0x19a) == 410 (0x19a) [#40515]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#35532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#23901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#11798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19038]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#30060]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20467]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#29303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12718]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34031]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37393]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#28566]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#11262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#24305]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#22692]", "bindmonitor-tailcall-native :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#41048]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23716 (0 0x5ca4) == 23716 (0x5ca4) [#19535]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 (0x2400) [#8582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14614]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38774]", "bindmonitor-ringbuf-jit :: it != _overlapped_buffers.end() for: {?} != {?} [#41082]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7202]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1613]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27661]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#29385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#22819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9381]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#35166]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#27620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#11468]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#29770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12791]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#373]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8632]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1670]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#34878]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49284 (0x xc084) == 49284 (0xc084) [#7199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#30088]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39630]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 78 == 78 [#39733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#10310]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#36809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19171]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2070]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42025 (0xa a429) == 42025 (0xa429) [#928]", "serialize_program_info_test :: strncmp(in_prototype->name, out_prototype->name, 256) == 0 for: 0 == 0 [#38817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#23315]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#10875]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#36521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13871]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28725]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110889 (0 0x1b129) == 110889 (0x1b129) [#1184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25733]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 441 (0x1 1b9) == 441 (0x1b9) [#25502]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#34804]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 (0x2284) [#8576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#24397]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12931]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#36757]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7785]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27337]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38809 (0 0x9799) == 38809 (0x9799) [#13384]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#34934]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#29955]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 268 (0x10c) == 268 (0x10c) [#40586]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7120]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2091]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#28493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#30095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#22393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 79524 (0 0x136a4) == 79524 (0x136a4) [#19791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27291]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"10.0.0.0/8\" == \"10.0.0.0/8\" with 2 messages: 'key_string := \"10.11.10.10/32\"' and 'correct_value := \"10.0.0.0/8\"' [#37474]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#35680]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13847]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#29418]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 396 (0x18c) == 396 (0x18c) [#40522]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#30395]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31689]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8496]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#244]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14600]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 88 == 88 [#39738]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34352]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 143641 (0 0x23119) == 143641 (0x23119) [#1276]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#29718]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#33756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#24408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20396]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 175561 ( (0x2adc9) == 175561 (0x2adc9) [#32533]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1296 (0x5 510) == 1296 (0x510) [#6827]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#23188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#8327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12796]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1156 (0x x484) == 1156 (0x484) [#31763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34540]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75625 (0 0x12769) == 75625 (0x12769) [#32245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9219]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#11197]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#21891]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#21801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31988]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 0 == 0 [#38916]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38989]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#33537]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33946]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25044]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 384 (0x180) == = 384 (0x180) [#39886]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32837]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#22342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26962]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5929 (0x x1729) == 5929 (0x1729) [#25614]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#1]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18914]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12885]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#11715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12976]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1967]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#23480]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27513]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8809]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#28238]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 996 (0x3e4) == = 996 (0x3e4) [#40192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#29071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 216225 ( (0x34ca1) == 216225 (0x34ca1) [#20157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#22179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#11891]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#246]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8493]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101761 ( (0x18d81) == 101761 (0x18d81) [#32333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#36628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17956 (0 0x4624) == 17956 (0x4624) [#19495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#36356]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6117]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#30580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#10588]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#27068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14297]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#34970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32802]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6440]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#36571]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#30157]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#10422]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#29824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#20919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 109561 ( (0x1abf9) == 109561 (0x1abf9) [#19889]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#10655]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 704 (0x2c0) == 704 (0x2c0) [#40368]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207936 (0 0x32c40) == 207936 (0x32c40) [#7667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126736 ( (0x1ef10) == 126736 (0x1ef10) [#19939]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/127\"' and 'correct_value := \"BB/127\"' [#37634]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33490]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 4 == 4 [#39051]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#11643]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#35534]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9805]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 522 (0x20a) == = 522 (0x20a) [#39955]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31606]", "EBPF_OPERATION_CREATE_MAP :: invoke_protocol(EBPF_OPERATION_CREATE_MAP, request, reply) == EBPF_IN NVALID_ARGUMENT for: 6 == 6 [#37927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 1904 44 (0x4a64) [#8708]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8565]", "pinning_test :: ebpf_pinning_table_insert(pinning_table.get(), &foo, &an_object.objec ct) == EBPF_SUCCESS for: 0 == 0 [#38481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#31180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23716 (0 0x5ca4) == 23716 (0x5ca4) [#25768]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 261121 (0 0x3fc01) == 261121 (0x3fc01) [#7777]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#30162]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#35159]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14941]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#23057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#21030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#27413]", "bindmonitor-bpf2bpf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41016]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36899]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2212]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 380 (0x17c) == = 380 (0x17c) [#39884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#23116]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#28085]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9963]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#36764]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10361]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#28214]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70756 (0 0x11464) == 70756 (0x11464) [#19759]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15779]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32034]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#843]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41228]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#30459]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#22751]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#30583]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#29384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#23781]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#785]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#29570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#23366]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8847]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#23821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7983]", "error codes :: result2 == result for: 32 == 32 [#40814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14103]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1600 (0x x640) == 1600 (0x640) [#25540]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24739]", "map_crud_operations_stack :: return_value == value for: 3 == 3 [#37744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133225 ( (0x20869) == 133225 (0x20869) [#13720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#34966]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8464 (0x x2110) == 8464 (0x2110) [#31879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#36825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#35733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22205]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7768]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#28765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#34938]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#33738]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39676]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 50 == 50 [#39074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#22443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#22626]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#29252]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#10584]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39692]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41223]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#21087]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#22446]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#30068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#21633]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5828]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34765]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#35944]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32041 (0x x7d29) == 32041 (0x7d29) [#7113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#35053]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37060]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30625 (0x x77a1) == 30625 (0x77a1) [#7105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19700]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33830]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15064]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 79524 (0 0x136a4) == 79524 (0x136a4) [#32259]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#28139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22019]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2116 (0x8 844) == 2116 (0x844) [#6847]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#22955]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#29115]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#267]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.0.0/16\"' and 'correct_value := \"1 192.168.0.0/16\"' [#37445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#29840]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"DD/116\" \"' [#37658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#33978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24455]", "ring_buffer_async_query :: result == EBPF_SUCCESS for: 0 == 0 [#37796]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 170569 ( (0x29a49) == 170569 (0x29a49) [#20053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14219]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 231361 ( (0x387c1) == 231361 (0x387c1) [#20189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19706]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21754]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#36003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#11828]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9801 (0x x2649) == 9801 (0x2649) [#19425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225625 ( (0x37159) == 225625 (0x37159) [#20177]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 794 (0x31a) == = 794 (0x31a) [#40091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#10792]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#34371]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#24403]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#36830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#10186]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12353]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#29284]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108241 ( (0x1a6d1) == 108241 (0x1a6d1) [#32353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#29140]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#35799]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#33507]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 229441 (0 0x38041) == 229441 (0x38041) [#7713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6940]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2608]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7124]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15518]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 324 (0x1 144) == 324 (0x144) [#31731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3546]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8619]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#36426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26547]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1812]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 226576 ( (0x37510) == 226576 (0x37510) [#13942]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6657]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 24 == 24 [#39061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88804 (0 0x15ae4) == 88804 (0x15ae4) [#13586]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24884]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90601 (0x x161e9) == 90601 (0x161e9) [#1120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5041 (0x x13b1) == 5041 (0x13b1) [#25602]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#11684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#35752]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 1322 25 (0x33a9) [#8639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34064]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8111]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#30333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#35272]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#29798]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 340 (0x154) == 340 (0x154) [#40550]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25366]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 2656 69 (0x67c9) [#8783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7544]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8280]", "EBPF_OPERATION_UPDATE_PINNING :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38168]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 20 == 20 [#38857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#33561]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 143641 (0 0x23119) == 143641 (0x23119) [#7513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#22672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13689 (0 0x3579) == 13689 (0x3579) [#19461]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#36100]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#23695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#29108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#11657]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31444]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26825]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#496]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31521]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 23 34256 (0x39310) [#9746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 1102 25 (0x2b11) [#8609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#34278]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24948]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20316]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12996 (0x x32c4) == 12996 (0x32c4) [#6983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20364]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2692]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#11747]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#11205]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#33762]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38025]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 998 (0x3e6) == = 998 (0x3e6) [#40193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#22338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#22740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24756]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39601 (0x x9ab1) == 39601 (0x9ab1) [#7153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30276 (0x x7644) == 30276 (0x7644) [#7103]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#36056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#36612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#22497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 244036 ( (0x3b944) == 244036 (0x3b944) [#32683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#23299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#23753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16641 (0 0x4101) == 16641 (0x4101) [#25718]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15359]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#36169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12081]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"00/0\"' [#37587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37290]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#35880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#11751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26519]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8236]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 316 (0x13c) == 316 (0x13c) [#40562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#34317]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33427]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#29272]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#10650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#11514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19674]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12811]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12873]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39291]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19458]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39428]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#22089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#35766]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8767]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 526 (0x20e) == 526 (0x20e) [#40457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15680]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32376]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#35441]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 226576 (0 0x37510) == 226576 (0x37510) [#1470]", "program :: ebpf_link_attach_program(link.get(), program.get()) == EBPF_EXTENSION N_FAILED_TO_LOAD for: 23 == 23 [#37781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18422]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 52 == 52 [#39720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#21612]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27819]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28176]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20703]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#34755]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2785]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#34386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12219]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39012]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6134]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#29320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#21207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#22326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34252]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#34947]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38340]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38662]", "bindmonitor-bpf2bpf-jit :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#41004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20178]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32488]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#10774]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18845]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#34857]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#29788]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20670]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#83]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21214]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"BB/127\"' [#37602]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2052]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25006]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#222]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13689 (0 0x3579) == 13689 (0x3579) [#13224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#22392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14148]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#10539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6531]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 32 == 32 [#39065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#35551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22183]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#35672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16426]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#11355]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#11029]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#30184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27216]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#28771]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34460]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#10084]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20024]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15317]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#10126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34664]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#23571]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 794 (0x31a) == 794 (0x31a) [#40323]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#33888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 165649 ( (0x28711) == 165649 (0x28711) [#26274]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 186624 (0 0x2d900) == 186624 (0x2d900) [#1382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31083]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#33483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#23513]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25595]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#10974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#10331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#35012]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37722]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#10566]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 484 (0x1e4) == 484 (0x1e4) [#40478]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27379]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12113]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33541]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1588]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#22950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#23189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81 == 81 [#35892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15503]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#30211]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1057]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 572 (0x23c) == 572 (0x23c) [#40434]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 199809 ( (0x30c81) == 199809 (0x30c81) [#26354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8523]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#11283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9225]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 900 (0x384) == 900 (0x384) [#40270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#29114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#36836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#36847]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#23979]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 124609 ( (0x1e6c1) == 124609 (0x1e6c1) [#32401]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#29096]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#11738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19215]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#29063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34922]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 930 (0x3a2) == = 930 (0x3a2) [#40159]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 223729 ( (0x369f1) == 223729 (0x369f1) [#20173]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#10942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#33969]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 208 == 208 [#39798]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 1 message: : 'key_string := \"172.16.0.1/100\"' [#37512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#24143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6724 (0x x1a44) == 6724 (0x1a44) [#13154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12954]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20226]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#151]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26569 (0 0x67c9) == 26569 (0x67c9) [#25786]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 214369 ( (0x34561) == 214369 (0x34561) [#20153]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39205]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7174]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33979]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#11559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25425]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#441]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#10282]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31366]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31691]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34508]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 702 (0x2be) == 702 (0x2be) [#40369]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 6144 (0x1800) <= 12288 (0x30 000) [#5204]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26869]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1997]", "ring_buffer_output :: ebpf_ring_buffer_create(&ring_buffer, size) == EBPF_SUCCESS for: 0 == = 0 [#40748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14132]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5329 (0x x14d1) == 5329 (0x14d1) [#25606]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26866]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 72 == 72 [#39143]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#35365]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3481 (0x xd99) == 3481 (0xd99) [#31813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31059]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#199]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#36229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#10910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#23864]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#10797]", "epoch_test_single_epoch_cache_aligned :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38500]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28296]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32791]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198025 ( (0x30589) == 198025 (0x30589) [#32585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10816 (0 0x2a40) == 10816 (0x2a40) [#25668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31640]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#30426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 127449 ( (0x1f1d9) == 127449 (0x1f1d9) [#26174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14241]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7514]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#28736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#23229]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#28626]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31557]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25921 (0 0x6541) == 25921 (0x6541) [#25782]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27820]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#21534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#24387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 174724 ( (0x2aa84) == 174724 (0x2aa84) [#20063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31978]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"11.0.0.0/8\"' and 'return_value := {null string}' [#37561]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#11775]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 270 (0x10e) == 270 (0x10e) [#40585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18980]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 361 (0x16 69) == 361 (0x169) [#6793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9781]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#36618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#21258]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#22869]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#11904]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#34994]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13985]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3498]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33776]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#33963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#177]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 12 == 12 [#38922]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93025 (0 0x16b61) == 93025 (0x16b61) [#19837]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#11264]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12091]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#24326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31592]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#35100]", "bindmonitor-bpf2bpf-jit :: program_fd > 0 for: 21 > 0 [#41012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20022]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#22570]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1201]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26793]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25019]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15340]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#36079]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#33348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#34895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18690]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2434]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3249 (0x xcb1) == 3249 (0xcb1) [#13104]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#23238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13921]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#30341]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13225 (0x x33a9) == 13225 (0x33a9) [#6985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#21771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24909]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26859]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7894]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#10955]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#10459]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#30653]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#29858]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#27956]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 196 == 196 [#39792]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#21597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#27638]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2830]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#21066]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5826]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#23363]", "program :: memcmp(&program_parameters.program_type, &returned_program_type, size eof(program_parameters.program_type)) == 0 for: 0 == 0 [#37753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28273]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48841 (0 0xbec9) == 48841 (0xbec9) [#13432]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#334]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16084]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#22447]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6710]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 562 (0x232) == 562 (0x232) [#40439]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#36036]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8982]", "droppacket-jit :: hook.fire(&ctx0, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40865]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#28824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31137]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#23025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18577]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64 == 64 [#36028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13285]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3469]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34114]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12680]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9733]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38209]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8577]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12926]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5925]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32166]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18713]", "access_check :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1570]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27709]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#22805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190096 ( (0x2e690) == 190096 (0x2e690) [#20099]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#10519]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9657]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 676 (0x2a a4) == 676 (0x2a4) [#6807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#20958]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#11902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24972]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 476 (0x1dc) == 476 (0x1dc) [#40482]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#23964]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33003]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29584 (0 0x7390) == 29584 (0x7390) [#32039]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#29797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#10201]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3055]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#35160]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#23580]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26473]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142884 ( (0x22e24) == 142884 (0x22e24) [#19983]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20505]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38764]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33607]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#10523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#22993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#21006]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#11228]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#35905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71289 (0x x11679) == 71289 (0x11679) [#1052]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 12 24609 (0x1e6c1) [#9353]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39381]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 772 (0x304) == = 772 (0x304) [#40080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 237169 ( (0x39e71) == 237169 (0x39e71) [#20201]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33099]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#30096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#23042]", "serialize_program_info_test :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21704]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#29137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15865]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1802]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37129]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#35911]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2848]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#33387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(bad_key), reinterpret_cast<co onst uint8_t*>(&bad_key), 0) == expected_result for: 0 == 0 [#12988]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#36312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#22438]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#24148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#30502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18315]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30799]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21811]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22201 (0x5 56b9) == 22201 (0x56b9) [#816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14618]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64 == 64 [#27452]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#22881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14451]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37990]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15809]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96100 (0 0x17764) == 96100 (0x17764) [#13610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19149]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#11782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1681]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 50 == 50 [#38941]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15704]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33752]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#35928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#22281]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22082]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21515]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#30253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37286]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14935]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#490]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#633]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9441]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21223]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#29054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15691]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25717]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33202]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1012 (0x3f4) = == 1012 (0x3f4) [#40200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12601]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#35572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#35887]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 4 == 4 [#38849]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20222]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27165]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81796 (0 0x13f84) == 81796 (0x13f84) [#13562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#36833]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#36134]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#22496]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22025]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#10783]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219961 (0 0x35b39) == 219961 (0x35b39) [#1456]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39305]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19076]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 166464 (0 0x28a40) == 166464 (0x28a40) [#7571]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21140]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 856 (0x358) == 856 (0x358) [#40292]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39245]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 530 (0x212) == = 530 (0x212) [#39959]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#10589]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 44 == 44 [#39157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20414]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#21243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#35095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#23931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#34158]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#36296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30670]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 900 (0x384) == = 900 (0x384) [#40144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106276 ( (0x19f24) == 106276 (0x19f24) [#19879]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 175561 ( (0x2adc9) == 175561 (0x2adc9) [#20065]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136900 (0 0x216c4) == 136900 (0x216c4) [#7495]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39618]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17956 (0 0x4624) == 17956 (0x4624) [#13258]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31062]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#10265]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6080]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6163]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#30549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27556 (0 0x6ba4) == 27556 (0x6ba4) [#32027]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 (0x15f9) [#8519]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21544]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12916]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/64\" == \"BB/64\" wi ith 2 messages: 'key_string := \"BB/64\"' and 'correct_value := \"BB/64\"' [#37641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18733]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2832]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#8294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14023]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12495]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5329 (0x x14d1) == 5329 (0x14d1) [#19373]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9193]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 656 (0x290) == = 656 (0x290) [#40022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#21636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#16640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#11390]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219961 ( (0x35b39) == 219961 (0x35b39) [#26398]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#30174]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21736]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#22349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21991]", "async :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#40725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#30568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22294]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38141]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#991]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13631]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198916 ( (0x30904) == 198916 (0x30904) [#20119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44100 (0 0xac44) == 44100 (0xac44) [#19647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#11006]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#20949]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6379]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8775]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#29445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#23587]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#21669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#35507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#30230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12145]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26907]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27234]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#29131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#23547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#23105]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#11096]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#10332]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18453]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37110]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7464]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#34050]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32980]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#10962]", "hash_table_test :: ebpf_hash_table_next_key(table.get(), returned_key.data(), returned_k key.data()) == EBPF_NO_MORE_KEYS for: 25 == 25 [#38454]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30712]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 56 == 56 [#39151]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1936 (0x7 790) == 1936 (0x790) [#6843]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#24218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 134689 ( (0x20e21) == 134689 (0x20e21) [#13724]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19892]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#22479]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#27815]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 104 == 104 [#39127]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6588]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21098]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35865]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12491]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#22026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#24378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110224 ( (0x1ae90) == 110224 (0x1ae90) [#19891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21509]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#28964]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#29242]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12909]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36976]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27042]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#35831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#24266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13203]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 (0x1081) [#8489]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 6 == 6 [#39176]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 586 (0x24a) == = 586 (0x24a) [#39987]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#24031]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#29987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7866]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#11477]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37260]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 211600 (0 0x33a90) == 211600 (0x33a90) [#7675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32806]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38093]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30802]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 562 (0x232) == = 562 (0x232) [#39975]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4125]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#10447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 158404 ( (0x26ac4) == 158404 (0x26ac4) [#20023]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37731]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#23539]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#11886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34558]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30754]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#28169]", "epoch_test_single_epoch_cache_aligned :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#36498]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39211]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#11274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33134]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2553]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14641 (0 0x3931) == 14641 (0x3931) [#31937]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#34413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#11713]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9025]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12896]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 78 == 78 [#39088]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#11078]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73984 (0x x12100) == 73984 (0x12100) [#1062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14530]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 510 (0x1fe) == 510 (0x1fe) [#40465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#23074]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 58 == 58 [#38945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24857]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#27596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1113]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12798]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25469]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#23819]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3063]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25422]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25987]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33520]", "hash_table_test :: ebpf_hash_table_iterate(table.get(), &cookie, &count, keys.data(), va alues.data()) == EBPF_NO_MORE_KEYS for: 25 == 25 [#38436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 (0x2584) [#9939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#11944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#35676]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73441 (0 0x11ee1) == 73441 (0x11ee1) [#19769]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#35640]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#23143]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#35308]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#29545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#21783]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33265]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#35135]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26505]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9802]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15244]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2352]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#36857]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#36430]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 450 (0x1c2) == = 450 (0x1c2) [#39919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20568]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8884]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#36745]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#28623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#35562]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 529 (0x21 11) == 529 (0x211) [#6801]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5857]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#29055]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#35753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24856]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27754]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 26 61121 (0x3fc01) [#9827]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 814 (0x32e) == 814 (0x32e) [#40313]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20228]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#10527]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1600 (0x6 640) == 1600 (0x640) [#6835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22000]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#36752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20836]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 574 (0x23e) == 574 (0x23e) [#40433]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#34873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#23313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133956 ( (0x20b44) == 133956 (0x20b44) [#19959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8637]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13089]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18622]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#35790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#24234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#22636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#23537]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#27650]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108241 (0 0x1a6d1) == 108241 (0x1a6d1) [#1176]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#35076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#35492]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39565]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21680]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#377]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2472]", "map_crud_operations_queue :: ebpf_map_peek_entry(map.get(), sizeof(return_value), reinterpret_cast t<uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37680]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#10072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6293]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196 == 196 [#27686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 238144 (0 0x3a240) == 238144 (0x3a240) [#7731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 183184 ( (0x2cb90) == 183184 (0x2cb90) [#13846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#35071]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6055]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#28828]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37373]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31329 (0 0x7a61) == 31329 (0x7a61) [#25814]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37156]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0x x384) [#9863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18358]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 218089 (0 0x353e9) == 218089 (0x353e9) [#7689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19107]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61009 (0 0xee51) == 61009 (0xee51) [#32189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 13 34689 (0x20e21) [#9395]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#34641]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3136 (0x xc40) == 3136 (0xc40) [#25572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#36807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15386]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225 == 225 [#35453]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 892 (0x37c) == = 892 (0x37c) [#40140]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#34554]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#20865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6529]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#29912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24714]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#36501]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#29456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196249 ( (0x2fe99) == 196249 (0x2fe99) [#13876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#20787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#22988]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6569]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#10876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#36793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9471]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#29904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#30224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#22867]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32771]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 2 == 2 [#38917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19262]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#35703]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#20778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32734]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36959]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1837]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34414]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43264 (0 0xa900) == 43264 (0xa900) [#25876]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#29442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#35615]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#23053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15838]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 762 (0x2fa) == 762 (0x2fa) [#40339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22377]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7896]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#36704]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#11647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20395]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22228]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24918]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 722 (0x2d2) == = 722 (0x2d2) [#40055]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3274]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#28957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6245]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#29524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#23785]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21742]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2304 (0x90 00) == 2304 (0x900) [#614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31802]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#23768]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#27110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19476]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11963]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156816 (0 0x26490) == 156816 (0x26490) [#7547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24692]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32186]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27969]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#28647]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 602 (0x25a) == = 602 (0x25a) [#39995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#24281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7921 (0x1 1ef1) == 7921 (0x1ef1) [#6933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#24273]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25453]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 ( (0x8a1) [#9882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 130321 (0 0x1fd11) == 130321 (0x1fd11) [#7477]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39306]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57121 (0xd df21) == 57121 (0xdf21) [#996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#28109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 2160 09 (0x5469) [#8735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#22801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13545]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8491]", "program :: ebpf_program_associate_maps(program.get(), maps, (sizeof(maps) / size eof(maps[0]))) == EBPF_SUCCESS for: 0 == 0 [#37757]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8166]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#36137]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 282 (0x11a) == = 282 (0x11a) [#39835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#10386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9444]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#10439]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20080]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#23252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12928]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#36043]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43681 (0x xaaa1) == 43681 (0xaaa1) [#7173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128881 ( (0x1f771) == 128881 (0x1f771) [#13708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#23228]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#29929]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#183]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34342]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#11785]", "droppacket-interpret :: hook.fire(&ctx10, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 25 58064 (0x3f010) [#9818]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#23996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26427]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8316]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#35103]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26886]", "divide_by_zero-jit :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40973]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#22448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15799]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#155]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#34638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14717]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#36085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20810]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18769 (0x4 4951) == 18769 (0x4951) [#792]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#11674]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 542 (0x21e) == 542 (0x21e) [#40449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33073]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#29867]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7034]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_OBJECT_NOT_FOUND for: 7 == 7 [#37702]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#28807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18720]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26651]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25253]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 502 (0x1f6) == 502 (0x1f6) [#40469]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31186]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#34272]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#24252]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#10468]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#35410]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#27179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#35628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19770]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#24135]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 216225 ( (0x34ca1) == 216225 (0x34ca1) [#26390]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38178]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 179776 (0 0x2be40) == 179776 (0x2be40) [#7603]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160801 ( (0x27421) == 160801 (0x27421) [#32497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#10275]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#10835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6473]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#10316]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#35687]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8875]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31154]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26417]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 784 (0x310) == = 784 (0x310) [#40086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#33447]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#34983]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5761]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6191]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_invali id, &local_map) == EBPF_SUCCESS for: 0 == 0 [#2]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48841 (0x xbec9) == 48841 (0xbec9) [#7197]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77284 (0 0x12de4) == 77284 (0x12de4) [#13546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19844]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15292]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 ( (0x559) [#8405]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 420 (0x1a4) == = 420 (0x1a4) [#39904]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36986]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3166]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14439]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2401 (0x96 61) == 2401 (0x961) [#616]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39368]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12321 (0x3 3021) == 12321 (0x3021) [#740]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#28726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119025 ( (0x1d0f1) == 119025 (0x1d0f1) [#19917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144 == 144 [#35147]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 6 == 6 [#39697]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 111556 ( (0x1b3c4) == 111556 (0x1b3c4) [#26128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8179]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9718]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7176]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3016]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30885]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#34980]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1089 (0x44 41) == 1089 (0x441) [#584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#10325]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32326]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 266 (0x10a) == = 266 (0x10a) [#39827]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#35459]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27420]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#11729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 155236 ( (0x25e64) == 155236 (0x25e64) [#20015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19572]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38181]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#35968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#28555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#22887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#36301]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 ( (0xe89) [#9898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#21933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#22330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#20883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20152]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 290 (0x122) == 290 (0x122) [#40575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 24 49001 (0x3cca9) [#9791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20843]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13571]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30886]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2338]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18221]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100489 ( (0x18889) == 100489 (0x18889) [#19861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#23393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#22557]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#10346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 (0x1440) [#8510]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27556 (0x6 6ba4) == 27556 (0x6ba4) [#850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 10 08241 (0x1a6d1) [#9281]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3109]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 432 (0x1b0) == 432 (0x1b0) [#40504]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31352]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 124 == 124 [#40658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12259]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#10772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#23106]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#107]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 192721 (0 0x2f0d1) == 192721 (0x2f0d1) [#7633]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1933]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2008]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#33909]", "droppacket-interpret :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40935]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#35466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#36802]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 498 (0x1f2) == = 498 (0x1f2) [#39943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#11428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#22916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#24005]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 14 40625 (0x22551) [#9419]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12698]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#29639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 117649 ( (0x1cb91) == 117649 (0x1cb91) [#13676]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1435]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 324 (0x14 44) == 324 (0x144) [#6791]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#27191]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#29738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20660]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#757]", "bindmonitor-interpret :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40999]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#35178]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#22716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121801 (0 0x1dbc9) == 121801 (0x1dbc9) [#7453]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33347]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6241 (0x x1861) == 6241 (0x1861) [#25618]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#10602]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 812 225 (0x13d49) [#9149]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30998]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#10623]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14322]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#36595]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38355]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13925]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#34503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#23316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25505]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31383]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#38949]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16641 (0x4 4101) == 16641 (0x4101) [#776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#23233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#35030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#35721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31449]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 912 (0x390) == = 912 (0x390) [#40150]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#24137]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#29451]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34666]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#29576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24792]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#30013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#29212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73984 (0 0x12100) == 73984 (0x12100) [#32239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12669]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18578]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37945]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#36658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#29436]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21703]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#11951]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85264 (0 0x14d10) == 85264 (0x14d10) [#32279]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3228]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#361]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9427]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15004]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41193]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31928]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#10649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34596 (0 0x8724) == 34596 (0x8724) [#13362]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7918]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#11069]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32320]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#36848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32654]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#22914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91204 (0 0x16444) == 91204 (0x16444) [#13594]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#35869]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37063]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#11189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#36122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30884]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.0.0.0/8\"' [#37431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20507]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#35099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 195364 ( (0x2fb24) == 195364 (0x2fb24) [#32579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31129]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 223729 (0 0x369f1) == 223729 (0x369f1) [#1464]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#22547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 253009 ( (0x3dc51) == 253009 (0x3dc51) [#20233]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.10.255.255/32\"' [#37487]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14052]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37296]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#36437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12607]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 251001 ( (0x3d479) == 251001 (0x3d479) [#32697]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#29501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32862]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38667]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#28172]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 404 (0x194) == = 404 (0x194) [#39896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#20916]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12887]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#10055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21383]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#35981]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30911]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0x x144) [#8348]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#23244]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#49]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14884 (0 0x3a24) == 14884 (0x3a24) [#19471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#20976]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#29304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 5428 89 (0xd411) [#8993]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#23045]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 10 == 10 [#39174]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 978 (0x3d2) == = 978 (0x3d2) [#40183]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 12 == 12 [#40714]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#35134]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22126]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26652]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#29198]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#23338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 230400 ( (0x38400) == 230400 (0x38400) [#20187]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#28070]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 640 (0x280) == 640 (0x280) [#40400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12297]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39588]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#29800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33228]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160000 ( (0x27100) == 160000 (0x27100) [#13790]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30892]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41210]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 107584 (0 0x1a440) == 107584 (0x1a440) [#7411]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#21393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6264]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28447]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#36529]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 200704 (0 0x31000) == 200704 (0x31000) [#1414]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#11349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5329 (0x1 14d1) == 5329 (0x14d1) [#6901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27367]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#28688]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26107]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15266]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 642 (0x282) == 642 (0x282) [#40399]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#29743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 143641 ( (0x23119) == 143641 (0x23119) [#32453]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 4579 96 (0xb2e4) [#8936]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27252]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 179776 ( (0x2be40) == 179776 (0x2be40) [#26308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#23129]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#33900]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3916]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2314]", "ring_buffer_output :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#40744]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#28475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8511]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1626]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#36741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26736]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#35901]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#33297]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41136]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#33942]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#36817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#30348]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#24044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#23976]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24802]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23104 (0x x5a40) == 23104 (0x5a40) [#7059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18767]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13867]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6576]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#30076]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2157]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1667]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#11432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#23962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54289 (0 0xd411) == 54289 (0xd411) [#13456]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#11540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#21945]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#10586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13727]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(extra_value), reinterpret_cast< <uint8_t*>(&extra_value), 0) == EBPF_OUT_OF_SPACE for: 29 == 29 [#37678]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1303]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#29665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#24271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28108]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#34843]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#10634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6299]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#27998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164836 ( (0x283e4) == 164836 (0x283e4) [#20039]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1897]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#10877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 235225 ( (0x396d9) == 235225 (0x396d9) [#26430]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18866]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6988]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31403]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#34952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#24208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20837]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#23011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#23836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9610]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28267]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6416]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32781]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37040]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31086]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32761 (0x7 7ff9) == 32761 (0x7ff9) [#880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9783]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 722 (0x2d2) == 722 (0x2d2) [#40359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#30239]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#10987]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#29006]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#10494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#21696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#23741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#30034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13924 (0x x3664) == 13924 (0x3664) [#6991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12787]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#36773]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6081]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27477]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 542 (0x21e) == = 542 (0x21e) [#39965]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26822]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 570 (0x23a) == 570 (0x23a) [#40435]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28393]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#11337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123904 (0 0x1e400) == 123904 (0x1e400) [#1222]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#35020]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#10622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27039]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 134689 (0 0x20e21) == 134689 (0x20e21) [#7489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12030]", "async :: async_context.result == EBPF_PENDING for: 28 == 28 [#40730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19141]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38319]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39641]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10404 (0x x28a4) == 10404 (0x28a4) [#6959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20130]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#22669]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#10930]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#29428]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32698]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31368]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#11295]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25009]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1844]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#29571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#22563]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39402]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12004]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15250]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6096]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33422]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#33378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24662]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#29480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6102]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14605]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14254]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#33411]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 18 == 18 [#39058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#29834]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119025 ( (0x1d0f1) == 119025 (0x1d0f1) [#32385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36909]", "map_crud_operations_stack :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#37711]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18576]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#229]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18322]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12128]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7106]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3354]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30723]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31684 (0 0x7bc4) == 31684 (0x7bc4) [#19583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#11133]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 28 == 28 [#39165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#35782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33959]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 5808 81 (0xe2e1) [#9017]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25669]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#30649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34225 (0 0x85b1) == 34225 (0x85b1) [#13360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10324]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#36256]", "error codes :: result2 == result for: 27 == 27 [#40809]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5726]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35264]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#28903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24747]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 19 96249 (0x2fe99) [#9623]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21032]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27556 (0 0x6ba4) == 27556 (0x6ba4) [#25792]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#27641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13827]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 978 (0x3d2) == 978 (0x3d2) [#40231]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#23950]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12340]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31332]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#36244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#34611]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 88 == 88 [#39135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21430]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#23644]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33163]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37684]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2649]", "async :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#40722]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#10752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25003]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#10101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8934]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16129 (0 0x3f01) == 16129 (0x3f01) [#31949]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3553]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#29147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#36283]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#29843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31594]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 122500 ( (0x1de84) == 122500 (0x1de84) [#26160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8281 (0x x2059) == 8281 (0x2059) [#19409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#11362]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14207]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#11419]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30703]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#641]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#34515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#24304]", "ring_buffer_async_query :: ebpf_ring_buffer_map_output(map.get(), reinterpret_cast<uint8_t*>(&va alue), sizeof(value)) == EBPF_SUCCESS for: 0 == 0 [#37797]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#23896]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20650]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 226 == 226 [#39807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21877]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#36642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52900 (0 0xcea4) == 52900 (0xcea4) [#25920]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2679]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24931]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#11649]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1732]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#36812]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#30311]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38260]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38809 (0 0x9799) == 38809 (0x9799) [#19621]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152100 ( (0x25224) == 152100 (0x25224) [#32475]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/32\"' [#37586]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41211]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18225 (0 0x4731) == 18225 (0x4731) [#25730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#29651]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 146689 ( (0x23d01) == 146689 (0x23d01) [#32461]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1665]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39481]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22277]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#23257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#28798]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7324]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19207]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33166]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25 == 25 [#29690]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6860]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32058]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139876 ( (0x22264) == 139876 (0x22264) [#13738]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 608 (0x260) == = 608 (0x260) [#39998]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#10142]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 508 (0x1fc) == = 508 (0x1fc) [#39948]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39366]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2196]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#29245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#9837]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103684 ( (0x19504) == 103684 (0x19504) [#32339]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7740]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10019]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#30347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40000 (0 0x9c40) == 40000 (0x9c40) [#32095]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38684]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38291]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15079]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32796]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#23028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19976]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6031]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26784]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#30442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#10576]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#35746]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4624 (0x x1210) == 4624 (0x1210) [#25596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15259]", "hash_table_test :: ebpf_hash_table_delete(table.get(), key_1.data()) == EBPF_SUCCESS for r: 0 == 0 [#38461]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#11593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 220900 ( (0x35ee4) == 220900 (0x35ee4) [#13930]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2461]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8009]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12747]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3124]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18777]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30928]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1756]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2994]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#27218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28900 (0 0x70e4) == 28900 (0x70e4) [#19567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#23006]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38560]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 177241 ( (0x2b459) == 177241 (0x2b459) [#32537]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39302]", "verify random :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#40838]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#11126]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30975]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178084 (0 0x2b7a4) == 178084 (0x2b7a4) [#7599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32660]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#10235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 137641 ( (0x219a9) == 137641 (0x219a9) [#26202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12630]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 50 == 50 [#38957]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36922]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32392]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7316]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18340]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#28337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33229]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37084]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27945]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8214]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 34 == 34 [#40703]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#23746]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34165]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53824 (0 0xd240) == 53824 (0xd240) [#25924]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 243049 ( (0x3b569) == 243049 (0x3b569) [#26446]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#22494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24558]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#35671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#36568]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22076]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#29734]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#23752]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#33996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#30249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#28841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20429]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11988]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#14001]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3721 (0xe e89) == 3721 (0xe89) [#6877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#28340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 214369 (0 0x34561) == 214369 (0x34561) [#7681]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34079]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6165]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 368 (0x170) == 368 (0x170) [#40536]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8313]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33216]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1039]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#21726]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 246016 ( (0x3c100) == 246016 (0x3c100) [#26452]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3306]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#28910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#35712]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37176]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#30327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26369]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30832]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#35802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#30515]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#11545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18865]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16039]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 18 == 18 [#38973]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#30637]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225 == 225 [#34890]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#557]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#22772]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33103]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#551]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#10054]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#30280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24669]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#27707]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#34829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37042]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#29142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20409]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 200 == 200 [#40620]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18565]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7442]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 14 == 14 [#38975]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14603]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#35360]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#36616]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#28870]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#11463]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 16 == 16 [#38924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#29876]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47089 (0 0xb7f1) == 47089 (0xb7f1) [#25894]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#28559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27879]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3211]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1293]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 338 (0x152) == = 338 (0x152) [#39863]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#35163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37221]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#23451]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.15.0/24\"' [#37422]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34657]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8277]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31748]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7972]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 12 23904 (0x1e400) [#9350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#21723]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#11314]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6037]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#23984]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#29636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7074]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 (0x1564) [#8516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#24284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#22767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15876 (0 0x3e04) == 15876 (0x3e04) [#25712]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#35369]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38905]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 818 (0x332) == 818 (0x332) [#40311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 918 809 (0x166a1) [#9203]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33416]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#35780]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25090]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#29057]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#27758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#22754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#23473]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 199809 ( (0x30c81) == 199809 (0x30c81) [#32589]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#11574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21656]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#23770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7898]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#35231]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32212]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#11234]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#36866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#35113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#29121]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#23564]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 94 == 94 [#39132]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6514]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35344 (0 0x8a10) == 35344 (0x8a10) [#13366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#24368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12513]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30681]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#36801]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1600]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18627]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#35520]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10816 (0 0x2a40) == 10816 (0x2a40) [#19435]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#11356]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#70]", "ring_buffer_output :: producer == consumer for: 0 == 0 [#40750]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34055]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#10306]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#35699]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 508 (0x1fc) == 508 (0x1fc) [#40466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59536 (0x xe890) == 59536 (0xe890) [#7243]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 994 (0x3e2) == 994 (0x3e2) [#40223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#36462]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#28546]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#29852]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"192.168.14.0/30\" != nullptr with 2 mess sages: 'key_string := \"192.168.14.0/30\"' and 'return_value := \"192.168.14.0/30\"' [#37534]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#502]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25921]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14375]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 124609 ( (0x1e6c1) == 124609 (0x1e6c1) [#13696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#22918]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15215]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21976]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#35812]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1401]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 302 (0x12e) == = 302 (0x12e) [#39845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28044]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#29060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 248004 ( (0x3c8c4) == 248004 (0x3c8c4) [#20223]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#11241]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3583]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20635]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#34221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156025 (0 0x26179) == 156025 (0x26179) [#7545]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13329]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#23843]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#21930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10000 (0x x2710) == 10000 (0x2710) [#6955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 153664 ( (0x25840) == 153664 (0x25840) [#20011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#23288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 171396 ( (0x29d84) == 171396 (0x29d84) [#20055]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53824 (0 0xd240) == 53824 (0xd240) [#32159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#22437]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30918]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#11035]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25557]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27810]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4356 (0x11 104) == 4356 (0x1104) [#650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#11845]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21874]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#23425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#23049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#35262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 484 (0x1 1e4) == 484 (0x1e4) [#19271]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39264]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#29185]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20597]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#33780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31305]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28356]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#10627]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#11920]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33703]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 261121 ( (0x3fc01) == 261121 (0x3fc01) [#32717]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36934]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#711]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#28830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7432]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21904]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38988]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#34868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#34047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#29825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22099]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28282]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20460]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key) - 1, reinterpret_cast<uint8 8_t*>(&key), reinterpret_cast<uint8_t*>(&key)) == EBPF_INVALID_ARGUMENT for: 6 == = 6 [#37411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#28735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#28799]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 220900 (0 0x35ee4) == 220900 (0x35ee4) [#7695]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37126]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13809]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21595]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#11547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14272]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#36477]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 208849 ( (0x32fd1) == 208849 (0x32fd1) [#20141]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25300]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 120 == 120 [#39119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21614]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#260]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#35422]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1167]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 88 == 88 [#40676]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#10530]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27556]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18849]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#24330]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9370]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7436]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"0.0.0.0/0\"' and 'return_value := {null string}' [#37565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#23893]", "access_check :: ebpf_validate_security_descriptor(sd_ptr.get(), sd_size) == EBPF_SUCC CESS for: 0 == 0 [#38736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22072]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 322 (0x142) == = 322 (0x142) [#39855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34217]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#28675]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 221841 (0 0x36291) == 221841 (0x36291) [#7697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69696 (0 0x11040) == 69696 (0x11040) [#25988]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#11454]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#34976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#10496]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2826]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#34900]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18783]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33133]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6582]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#11353]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#10838]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#33885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26983]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#36333]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2515]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#28607]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25413]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 700 (0x2bc) == = 700 (0x2bc) [#40044]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18225 (0x x4731) == 18225 (0x4731) [#7025]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 (0x1564) [#9913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#24067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21941]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30767]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6756]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6625]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1071]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#11345]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 361 (0x169 9) == 361 (0x169) [#556]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13355]", "hash_table_test :: ebpf_hash_table_delete(table.get(), key_2.data()) == EBPF_SUCCESS for r: 0 == 0 [#38456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26522]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21677]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1660]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33364]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27136]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61009 (0x xee51) == 61009 (0xee51) [#1012]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#29775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#33771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21460]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#11320]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26313]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 157609 ( (0x267a9) == 157609 (0x267a9) [#32489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14528]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 54 == 54 [#39721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#34008]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#36787]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1259]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#372]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 438 (0x1b6) == 438 (0x1b6) [#40501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34258]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39210]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#10430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#10082]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21443]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1642]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6077]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3045]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#21972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20624]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7937]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1881]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8551]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#36061]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23716 (0x x5ca4) == 23716 (0x5ca4) [#7063]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55696 (0 0xd990) == 55696 (0xd990) [#13462]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12238]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11664 (0 0x2d90) == 11664 (0x2d90) [#19443]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#30435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81 == 81 [#34798]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25448]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 736 (0x2e0) == = 736 (0x2e0) [#40062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33550]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9765]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#22702]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2557]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39576]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 3686 64 (0x9000) [#8870]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9091]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25303]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31402]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#35082]", "error codes :: result2 == result for: 18 == 18 [#40800]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2458]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18344]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#10295]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#30011]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#22590]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37977]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#35884]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8802]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3136 (0x xc40) == 3136 (0xc40) [#31807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8155]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2884]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0x x1e4) [#9855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#29974]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 808 (0x328) == = 808 (0x328) [#40098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18481]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"172.16.0.0/11\"' and 'return_value := {null string}' [#37558]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 962 (0x3c2) == 962 (0x3c2) [#40239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24629]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39564]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39569]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#27170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13143]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#28226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15625 (0x x3d09) == 15625 (0x3d09) [#7005]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38600]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27283]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21082]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32104]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#11294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21494]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1327]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39518]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33242]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9825]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 14 == 14 [#40713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#23941]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14161 (0x3 3751) == 14161 (0x3751) [#756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20593]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33020]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34447]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26027]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#10176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#36719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#21324]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37017]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39668]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1954]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#23873]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39362]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31635]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25324]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#29778]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15129 (0x x3b19) == 15129 (0x3b19) [#7001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 250000 ( (0x3d090) == 250000 (0x3d090) [#32695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14914]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#28842]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#35080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#22659]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123201 ( (0x1e141) == 123201 (0x1e141) [#32397]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#21936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38025 (0 0x9489) == 38025 (0x9489) [#13380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18396]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#11577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22876]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#29993]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 115600 ( (0x1c390) == 115600 (0x1c390) [#13670]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#35440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36864 (0 0x9000) == 36864 (0x9000) [#13374]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#11901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14019]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#22668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18814]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#29329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13209]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#23949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27940]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#10307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13733]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28914]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71289 (0 0x11679) == 71289 (0x11679) [#32229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6433]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53824 (0xd d240) == 53824 (0xd240) [#982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9160]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38986]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2010]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#10728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#10245]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22273]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#35446]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 25 57049 (0x3ec19) [#9815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36938]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31128]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#11916]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26679]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#23986]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#27026]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184041 (0 0x2cee9) == 184041 (0x2cee9) [#1376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#22708]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20780]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6621]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 24 45025 (0x3bd21) [#9779]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 191844 (0 0x2ed64) == 191844 (0x2ed64) [#1394]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55225 (0x xd7b9) == 55225 (0xd7b9) [#7225]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 4243 36 (0xa5c4) [#8912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#23060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#21999]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#29253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#22534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19035]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#238]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#513]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131044 (0 0x1ffe4) == 131044 (0x1ffe4) [#7479]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8871]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27109]", "access_check :: ebpf_access_check(sd_ptr.get(), 1, &generic_mapping) == EBPF_SUCCESS for: 0 == 0 [#38737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19768]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#237]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 74529 (0x x12321) == 74529 (0x12321) [#1064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28450]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8748]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19468]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25919]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 388 (0x184) == = 388 (0x184) [#39888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57121 (0 0xdf21) == 57121 (0xdf21) [#13468]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 804 (0x324) == 804 (0x324) [#40318]", "interlocked operations :: ebpf_interlocked_compare_exchange_int32(&value32, 2, 1) == 2 for: 2 = == 2 [#40824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62001 (0 0xf231) == 62001 (0xf231) [#13488]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6960]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#28998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#36105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#23413]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34322]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20362]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26618]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#28595]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6024]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9804]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#29937]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116964 ( (0x1c8e4) == 116964 (0x1c8e4) [#13674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#24255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190969 ( (0x2e9f9) == 190969 (0x2e9f9) [#13864]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#35855]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 212 == 212 [#40614]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#23050]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 1123 36 (0x2be4) [#8612]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38616]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#23476]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 102 == 102 [#39100]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 998 (0x3e6) == 998 (0x3e6) [#40221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#11878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13829]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"CD/96\" == \"CD/96\" wi ith 2 messages: 'key_string := \"CD/120\"' and 'correct_value := \"CD/96\"' [#37613]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31547]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36 == 36 [#29374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#29675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#22951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#10688]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25284]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1803]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#36323]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34013]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#36525]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#35014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30920]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#10051]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3859]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33304]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2467]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6097]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#22674]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37982]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#29485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#33477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26877]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 26 == 26 [#38929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32990]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#29539]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15356]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13456 (0x x3490) == 13456 (0x3490) [#6987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9726]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#33948]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39607]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15952]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24586]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#30567]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33821]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#35518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26777]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33502]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33983]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 16 60801 (0x27421) [#9497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8422]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32622]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10 0.0.0.0/8\"' [#37523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#30335]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 820 (0x334) == 820 (0x334) [#40310]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2024]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1800]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28561 (0x6 6f91) == 28561 (0x6f91) [#856]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#33279]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#22893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219961 ( (0x35b39) == 219961 (0x35b39) [#20165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53361 (0 0xd071) == 53361 (0xd071) [#32157]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0x x1b9) [#8357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18333]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#23810]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14051]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6942]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20252]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#34809]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#11058]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12153]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26914]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5796]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28311]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#23290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#35679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 214369 ( (0x34561) == 214369 (0x34561) [#26386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22193]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#535]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#33624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33268]", "program :: ebpf_program_load_code( program.get(), EBPF_CODE_JIT, nullptr, reinte erpret_cast<uint8_t*>(test_function), 0x1000) == EBPF_SUCCESS for: 0 == 0 [#37762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20426]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18580]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#30179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14169]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67600 (0 0x10810) == 67600 (0x10810) [#32215]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33542]", "droppacket-jit :: hook.attach_link(program_fd, &if_index, sizeof(if_index), &link) == E EBPF_SUCCESS for: 0 == 0 [#40863]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#23225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13611]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33269]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#36193]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#35514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#22956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#35067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24622]", "program :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#37752]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#35505]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#33933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#34786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#29322]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6712]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8215]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37826]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#10671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#10472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#8324]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32808]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 138384 ( (0x21c90) == 138384 (0x21c90) [#32439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13924 (0 0x3664) == 13924 (0x3664) [#13226]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1725]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8677]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12743]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12127]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#30202]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 248004 (0 0x3c8c4) == 248004 (0x3c8c4) [#7751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18530]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19150]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 22 == 22 [#39060]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108241 (0 0x1a6d1) == 108241 (0x1a6d1) [#7413]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20980]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38202]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6530]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#27185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33377]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27606]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32270]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30878]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#10109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 2592 21 (0x6541) [#8777]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33018]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1211]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 111556 (0 0x1b3c4) == 111556 (0x1b3c4) [#1186]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 820 (0x334) == = 820 (0x334) [#40104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37239]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1778]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12170]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#23423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#11866]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12865]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 872 (0x368) == 872 (0x368) [#40284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#10850]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 938 (0x3aa) == 938 (0x3aa) [#40251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#36541]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#33915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133225 ( (0x20869) == 133225 (0x20869) [#19957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18279]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#11835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28077]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34219]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1958]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33916]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#10581]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#10734]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#35716]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#23001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#35013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#27734]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 64 == 64 [#39147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#21564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20122]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#29947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36100 (0x x8d04) == 36100 (0x8d04) [#7135]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#36383]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#36516]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31862]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31644]", "droppacket-jit :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32761 (0 0x7ff9) == 32761 (0x7ff9) [#13352]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32340]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1403]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#22603]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24689]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27045]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31243]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18303]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"DD/120\" == \"DD/120\" with 2 messages: 'key_string := \"DD/121\"' and 'correct_value := \"DD/120\"' [#37621]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1620]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 392 (0x188) == 392 (0x188) [#40524]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#34215]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32811]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25515]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#12997]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64 == 64 [#19243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#23029]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1175]", "map_crud_operations_queue :: ebpf_map_peek_entry(map.get(), sizeof(return_value) - 1, reinterpret_ _cast<uint8_t*>(&return_value), 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37707]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8497]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21127]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26193]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28152]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7666]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#10467]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26865]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#28253]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 124 == 124 [#39756]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#27119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15146]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20292]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41102]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#22188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9184]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_pop_entry(map.get(), value.size(), value.data(), 0) == EBPF_I INVALID_ARGUMENT for: 6 == 6 [#6236]", "droppacket-jit :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40879]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#21537]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#29657]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26487]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#35833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#29628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16102]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#11227]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#27182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12266]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1832]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#10727]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#34990]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37031]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28395]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#10075]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#10476]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#29740]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1977]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(previous_key), reinterpret_cast< <const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key)) == EBPF_N NO_MORE_KEYS for: 25 == 25 [#20763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20379]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33082]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#29885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 625 (0x2 271) == 625 (0x271) [#25510]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 82 == 82 [#39138]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 624 (0x270) == 624 (0x270) [#40408]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 182329 (0 0x2c839) == 182329 (0x2c839) [#7609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#10413]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#23455]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#29206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#23254]", "droppacket-jit :: hook_result == XDP_PASS for: 1 == 1 [#40909]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3262]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#23966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8430]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30991]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26813]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18469]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#30398]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2304 (0x x900) == 2304 (0x900) [#13086]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#35421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13807]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 36 == 36 [#40702]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27145]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#10469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8806]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#29928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6834]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#36248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#20946]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#204]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#10969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#34071]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#30550]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#10544]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25353]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 90 == 90 [#40675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28221]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14331]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14161 (0x x3751) == 14161 (0x3751) [#6993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20721]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#28142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#11726]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33371]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#10596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#30101]", "EBPF_OPERATION_GET_OBJECT_INFO :: invoke_protocol(EBPF_OPERATION_GET_OBJECT_INFO, request, reply) == EB BPF_INVALID_OBJECT for: 5 == 5 [#38336]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 530 (0x212) == 530 (0x212) [#40455]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8043]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22214]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66564 (0x x10404) == 66564 (0x10404) [#1034]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6164]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#789]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5755]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#36015]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18341]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#36267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20519]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 92 == 92 [#40674]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#21183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11974]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38571]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34136]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#39180]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#11685]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93025 (0 0x16b61) == 93025 (0x16b61) [#13600]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#36873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#30112]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24612]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2151]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26501]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#82]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 (0x1729) [#8525]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3277]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#36114]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6011]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 4410 00 (0xac44) [#8924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9442]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#33684]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9243]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 150544 (0 0x24c10) == 150544 (0x24c10) [#7531]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#34957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#11056]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2916]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#11578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#23581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 484 (0x1 1e4) == 484 (0x1e4) [#25504]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 38 == 38 [#38935]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8712]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 (0x1900) [#9919]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 748 (0x2ec) == = 748 (0x2ec) [#40068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29929 (0 0x74e9) == 29929 (0x74e9) [#19573]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#36456]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 754 (0x2f2) == = 754 (0x2f2) [#40071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14066]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#29942]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8095]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == = 0 [#9]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31456]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 118 == 118 [#39753]", "serialize_program_info_test :: in_prototype->helper_id == out_prototype->helper_id for: 1001 (0x3e9) ) == 1001 (0x3e9) [#38809]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#30148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20740]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#34467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6928]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13859]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#29216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13139]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9 == 9 [#28616]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8451]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11979]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103684 ( (0x19504) == 103684 (0x19504) [#19871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21397]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#16063]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#10673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#11585]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32272]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6396]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3019]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7841]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39271]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#11148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#23378]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#10008]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26289]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#34833]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4489 (0x x1189) == 4489 (0x1189) [#31829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24627]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37919]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#10194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12897]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#28523]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38306]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38092]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 153664 (0 0x25840) == 153664 (0x25840) [#1302]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 122500 (0 0x1de84) == 122500 (0x1de84) [#1218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34708]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27591]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#36467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12636]", "EBPF_OPERATION_LOAD_CODE :: invoke_protocol(EBPF_OPERATION_LOAD_CODE, load_code_request) == EBPF_ _BLOCKED_BY_POLICY for: 21 == 21 [#37978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#23558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31994]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#29420]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#27983]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"0.0.0.0/0\"' [#37490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24471]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100 == 1 100 [#25480]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26244 (0 0x6684) == 26244 (0x6684) [#25784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9025 (0x x2341) == 9025 (0x2341) [#13180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#22602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#30173]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36 == 36 [#31707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_peek_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#24944]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21329]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33665]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3174]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#36874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#29330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#23704]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7306]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#29423]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38113]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 6 == 6 [#40717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#24222]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198025 ( (0x30589) == 198025 (0x30589) [#26350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18987]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#36040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#11059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#23579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12955]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1383]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33827]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41213]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20875]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#28544]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#35493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12484]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#11407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19610]", "droppacket-interpret :: hook.batch_begin(sizeof(state), state) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#40943]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6119]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31115]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#34551]", "EBPF_OPERATION_GET_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38264]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#34963]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#23643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#22994]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76176 (0 0x12990) == 76176 (0x12990) [#32247]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3402]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 (0x1a44) [#9921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#10164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#22697]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 146 == 146 [#39767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30995]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#30417]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#10162]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2268]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#34143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108900 ( (0x1a964) == 108900 (0x1a964) [#13650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 157609 ( (0x267a9) == 157609 (0x267a9) [#20021]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36944]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56169 (0 0xdb69) == 56169 (0xdb69) [#19701]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#23266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8890]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70756 (0x x11464) == 70756 (0x11464) [#1050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13775]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#30571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21322]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#34752]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40401 (0x x9dd1) == 40401 (0x9dd1) [#7157]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33926]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51076 (0 0xc784) == 51076 (0xc784) [#25912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#23311]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 7 == 7 [#31695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178084 ( (0x2b7a4) == 178084 (0x2b7a4) [#26304]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2598]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#11664]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6517]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97969 (0x x17eb1) == 97969 (0x17eb1) [#1144]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13313]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#595]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26619]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31600]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9 == 9 [#524]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#10924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#23688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#22525]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33629]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133225 (0 0x20869) == 133225 (0x20869) [#7485]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13924 (0x3 3664) == 13924 (0x3664) [#754]", "state_test :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38818]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7828]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7644]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5992]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38545]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#35792]", "hash_table_test :: returned_key == key_2 for: { '£', 'π', '[', 'P', 3, '[', '-', 'p', 'ó ó', '8', 'é', 'z', '╛' } == { '£', 'π', '[', 'P', 3, '[', '-', 'p', 'ó', '8', 'é' ', 'z', '╛' } [#38451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15876 (0 0x3e04) == 15876 (0x3e04) [#19479]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#56]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22073]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1714]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2317]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26808]", "droppacket-jit :: xdp_program_info.initialize(EBPF_PROGRAM_TYPE_XDP) == EBPF_SUCCESS fo or: 0 == 0 [#40859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#22723]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28839]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21341]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30827]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6122]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#11393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#24369]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 105625 (0 0x19c99) == 105625 (0x19c99) [#1168]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#29011]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#23541]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#22808]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 237169 (0 0x39e71) == 237169 (0x39e71) [#1492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#23312]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9666]", "invalid_bpf_get_socket_cookie :: xdp_program_info.initialize(EBPF_PROGRAM_TYPE_XDP) == EBPF_SUCCESS fo or: 0 == 0 [#42121]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104976 (0 0x19a10) == 104976 (0x19a10) [#7403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#10004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#24205]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 215296 (0 0x34900) == 215296 (0x34900) [#1446]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#10167]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24759]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 118 == 118 [#39108]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#24180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106276 ( (0x19f24) == 106276 (0x19f24) [#13642]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#10490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#10652]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#29135]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9159]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#27416]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 257049 (0 0x3ec19) == 257049 (0x3ec19) [#7769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#11848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#35555]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38282]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#35398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#24414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15419]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8478]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#112]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27103]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3042]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#28373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#21429]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#29473]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#22528]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 5953 36 (0xe890) [#9026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#30229]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27892]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#11015]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13621]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#29048]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#28657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20605]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#21270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#22781]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#10481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#28454]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34006]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#34982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6384]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60025 (0x xea79) == 60025 (0xea79) [#1008]", "get_authentication_id :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#40830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53361 (0 0xd071) == 53361 (0xd071) [#13452]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28063]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#29368]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#36433]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39508]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3763]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25363]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9420]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#11880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18351]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 266 (0x10a) == 266 (0x10a) [#40587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14454]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#11937]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20546]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 243049 ( (0x3b569) == 243049 (0x3b569) [#32681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12476]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3178]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#391]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9591]", "droppacket-interpret :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40940]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25398]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#27929]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26923]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#35437]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#35826]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36990]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#11636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#28929]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 214369 (0 0x34561) == 214369 (0x34561) [#1444]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2001]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6922]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104976 ( (0x19a10) == 104976 (0x19a10) [#32343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#10678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#23926]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34703]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35721 (0 0x8b89) == 35721 (0x8b89) [#19605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#23422]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 270 (0x10e) == = 270 (0x10e) [#39829]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#10200]", "ring_buffer_async_query :: ebpf_map_find_entry(map.get(), sizeof(key), reinterpret_cast<uint8_t* *>(&key), 0, nullptr, 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37804]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#22581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23409 (0 0x5b71) == 23409 (0x5b71) [#25766]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8391]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#36237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18818]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24760]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#569]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7396 (0x x1ce4) == 7396 (0x1ce4) [#31867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9025 (0x x2341) == 9025 (0x2341) [#25650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#36585]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 538 (0x21a) == = 538 (0x21a) [#39963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8856]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31681]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#34281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#11615]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12121]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#22712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#22065]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190096 (0 0x2e690) == 190096 (0x2e690) [#7627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27172]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 147456 (0 0x24000) == 147456 (0x24000) [#1286]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#22468]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14271]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31601]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33193]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12833]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#35368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20707]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#10922]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#23606]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#22619]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8048]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 704 (0x2c0) == = 704 (0x2c0) [#40046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#22584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 961 (0x3c c1) == 961 (0x3c1) [#6817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18863]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#669]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 ( (0xa90) [#9889]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#29723]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#35764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21008]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 298 (0x12a) == 298 (0x12a) [#40571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20471]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15898]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#11157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#28563]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9190]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28359]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103684 (0 0x19504) == 103684 (0x19504) [#7399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32400 (0 0x7e90) == 32400 (0x7e90) [#32055]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24796]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/115\"' and 'correct_value := \"00/0\"' [#37628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#10429]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31736]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8649 (0x x21c9) == 8649 (0x21c9) [#31881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20325]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38844]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31621]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#28893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#30009]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27843]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25683]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 768 (0x300) == 768 (0x300) [#40336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#29127]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5795]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#10280]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7819]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19600 (0 0x4c90) == 19600 (0x4c90) [#25740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21955]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#414]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38289]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15554]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#34086]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26941]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#28660]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#36253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#21882]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#897]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#34578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256 (0x1 100) == 256 (0x100) [#13022]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40804 (0 0x9f64) == 40804 (0x9f64) [#32099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#36564]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 14 42129 (0x22b31) [#9425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14425]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#36228]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27076]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133225 ( (0x20869) == 133225 (0x20869) [#26190]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#23523]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34135]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38048]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#689]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6633]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#29300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#33525]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#35948]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#24398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#23814]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#425]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"10.0.0.1/33\"' [#37514]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19822]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3025 (0xb bd1) == 3025 (0xbd1) [#6865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30276 (0 0x7644) == 30276 (0x7644) [#19575]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#333]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7738]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 177241 ( (0x2b459) == 177241 (0x2b459) [#13832]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#28103]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22096]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5843]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#33246]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14944]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#695]", "bindmonitor-interpret :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 ebpf_program_load failed with 76: Upper bound must be at most packet_size (valid d_access(r3.offset, width=r4) for read) [#41002]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#60]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#22794]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37223]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1857]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8608]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#10411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82944 (0 0x14400) == 82944 (0x14400) [#13566]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22114]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#30471]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#11367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14074]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#36360]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59536 (0 0xe890) == 59536 (0xe890) [#25948]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2983]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28194]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31185]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12283]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#21834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#29827]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#23529]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106929 ( (0x1a1b1) == 106929 (0x1a1b1) [#32349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26560]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1700]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#121]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100 == 100 [#35638]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#10071]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37122]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#29756]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7887]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8083]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"AA/64\" == \"AA/64\" wi ith 2 messages: 'key_string := \"AA/72\"' and 'correct_value := \"AA/64\"' [#37631]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72900 (0 0x11cc4) == 72900 (0x11cc4) [#19767]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12037]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#11284]", "EBPF_OPERATION_GET_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33146]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21445]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8039]", "hash_table_test :: memcmp(returned_value, data_2.data(), data_2.size()) == 0 for: 0 == 0 [#38443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15164]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27229]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25443]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#29335]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6107]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#139]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20613]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#36241]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#23881]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31976]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8237]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#23148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12705]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#28912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2440]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#30647]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2941]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27004]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30625 (0 0x77a1) == 30625 (0x77a1) [#25810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#30330]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#23337]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2266]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21613]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#23264]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26852]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1773]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#23022]", "interlocked operations :: value64 == 0 for: 0 == 0 [#40822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21979]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12530]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21467]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12744]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13335]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 728 (0x2d8) == = 728 (0x2d8) [#40058]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14978]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#27863]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#27485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31599]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8469]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#22762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31098]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26019]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#35416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#23343]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25681]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6908]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34766]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15129 (0 0x3b19) == 15129 (0x3b19) [#31941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33925]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39375]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#21465]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9043]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37636 (0x9 9304) == 37636 (0x9304) [#906]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#35193]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#34236]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 782 (0x30e) == 782 (0x30e) [#40329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15376 (0 0x3c10) == 15376 (0x3c10) [#19475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16483]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#35337]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30757]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#30106]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 1849 96 (0x4840) [#9983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19145]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#10056]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178929 (0 0x2baf1) == 178929 (0x2baf1) [#7601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14441]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#23056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18235]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64 == 64 [#35509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34225 (0 0x85b1) == 34225 (0x85b1) [#32065]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27780]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 118336 ( (0x1ce40) == 118336 (0x1ce40) [#19915]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#30265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#34419]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#21042]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#36282]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64009 (0x xfa09) == 64009 (0xfa09) [#7261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7098]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1369 (0x x559) == 1369 (0x559) [#25534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15502]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32939]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2698]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#29896]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"BB/128\" == \"BB/128\" wit th 1 message: 'key_string := \"BB/128\"' [#37601]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106929 (0 0x1a1b1) == 106929 (0x1a1b1) [#7409]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 233289 ( (0x38f49) == 233289 (0x38f49) [#26426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#23635]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 930 (0x3a2) == 930 (0x3a2) [#40255]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30976 (0x7 7900) == 30976 (0x7900) [#870]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7839]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#34795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20736 (0 0x5100) == 20736 (0x5100) [#19515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#23974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#23431]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#163]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26281]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27241]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34682]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2161]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9079]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18473]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7162]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7104]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#10986]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21314]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#34035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#35482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#22908]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33096]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#24178]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38327]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19246]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14630]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12878]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 402 (0x192) == 402 (0x192) [#40519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#29375]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20966]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14028]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#679]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 204304 (0 0x31e10) == 204304 (0x31e10) [#7659]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 422 (0x1a6) == = 422 (0x1a6) [#39905]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15407]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27394]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31085]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20911]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6152]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#22407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18693]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 976 (0x3d0) == = 976 (0x3d0) [#40182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14105]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30950]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1918]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39311]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20890]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1769]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1421]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38647]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#29822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31295]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34705]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39212]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#11711]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#21897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15431]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#24262]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10404 (0x2 28a4) == 10404 (0x28a4) [#722]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2451]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39399]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2601 (0xa2 29) == 2601 (0xa29) [#620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9105]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#35882]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39646]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7558]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20463]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18406]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 690 (0x2b2) == 690 (0x2b2) [#40375]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#34245]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168921 ( (0x293d9) == 168921 (0x293d9) [#13812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31664]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#27047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8530]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19272]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25341]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38612]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#20871]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#35899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#23645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#24352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18782]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25957]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 180625 ( (0x2c191) == 180625 (0x2c191) [#32545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31292]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2863]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#11768]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 204 == 204 [#40618]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#34800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 137641 ( (0x219a9) == 137641 (0x219a9) [#13732]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1024 (0x x400) == 1024 (0x400) [#19291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104329 ( (0x19789) == 104329 (0x19789) [#32341]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31289]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#22941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15145]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#10552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#28753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15362]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#34716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#36506]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#30631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 1060 09 (0x2971) [#8603]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 1587 76 (0x3e04) [#8672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190969 ( (0x2e9f9) == 190969 (0x2e9f9) [#26334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11994]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2809 (0x xaf9) == 2809 (0xaf9) [#25566]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7038]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#35881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25192]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1764 (0x6 6e4) == 1764 (0x6e4) [#6839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12948]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#35935]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#36837]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#10611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 3168 84 (0x7bc4) [#8828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20236]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31458]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#23215]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3136 (0xc4 40) == 3136 (0xc40) [#630]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#35639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31266]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 ( (0x739) [#9878]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#36146]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#21642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#34802]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#28695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#23720]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32897]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#11220]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37994]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20452]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37340]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#29438]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30666]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21676]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14828]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#27743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 154449 ( (0x25b51) == 154449 (0x25b51) [#13776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9777]", "epoch_test_two_threads :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38506]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26443]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#36636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25477]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32876]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13231]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#10722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26896 (0 0x6910) == 26896 (0x6910) [#25788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34276]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#27509]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#23629]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25913]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26760]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#10438]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9513]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5836]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 784 (0x3 310) == 784 (0x310) [#19283]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#22660]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37081]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36 == 36 [#36691]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#36431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#21870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126025 ( (0x1ec49) == 126025 (0x1ec49) [#26170]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19600 (0 0x4c90) == 19600 (0x4c90) [#13270]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1722]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5960]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6135]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#11502]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#392]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1103]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80089 (0x x138d9) == 80089 (0x138d9) [#1084]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77841 (0 0x13011) == 77841 (0x13011) [#32253]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14233]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27736]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#28925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19021]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 692 (0x2b4) == = 692 (0x2b4) [#40040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8103]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 146689 (0 0x23d01) == 146689 (0x23d01) [#7521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94864 (0 0x17290) == 94864 (0x17290) [#13606]", "divide_by_zero-native :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#40981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#28911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#21759]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#22426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62001 (0 0xf231) == 62001 (0xf231) [#25958]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#36321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37206]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8172]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#30468]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 944 (0x3b0) == 944 (0x3b0) [#40248]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#20931]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9801 (0x x2649) == 9801 (0x2649) [#25658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#23454]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#23553]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8911]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#28818]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#11219]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26918]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33124 (0 0x8164) == 33124 (0x8164) [#25824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#24006]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19000]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39356]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#22929]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#29666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#22449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34097]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#10963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22166]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#22412]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 152 == 152 [#39770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160000 (0 0x27100) == 160000 (0x27100) [#7555]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#30377]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22187]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33356]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#29087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#345]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8238]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1225 (0x4c c9) == 1225 (0x4c9) [#588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#33975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#36260]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34159]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#28601]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37152]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#23024]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#29680]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28420]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31335]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#10735]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101761 (0 0x18d81) == 101761 (0x18d81) [#1156]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#27674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#22995]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18588]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#28202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22136]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1627]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37121]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#312]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31027]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39008]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#35261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24616]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39191]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31163]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96721 (0x x179d1) == 96721 (0x179d1) [#7377]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#390]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#29879]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#23917]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 26 == 26 [#38860]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2554]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#33393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 484 (0x1e e4) == 484 (0x1e4) [#6799]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#36637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14183]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 164 == 164 [#39776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14294]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#27923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14366]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8659]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#23517]", "hash_table_test :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128881 (0 0x1f771) == 128881 (0x1f771) [#7473]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19582]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#23243]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#35839]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8266]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22567]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#28196]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3330]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 246016 ( (0x3c100) == 246016 (0x3c100) [#32687]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7550]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38221]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#22650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#22572]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 16 64025 (0x280b9) [#9509]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160801 (0 0x27421) == 160801 (0x27421) [#1320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#11114]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#10854]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3283]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#23085]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#34839]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14336]", "name size :: ebpf_map_create(&oversize_name, &map_definition, (uintptr_t)ebpf_hand dle_invalid, &local_map) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#22629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#29113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12608]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#30408]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 1000 00 (0x2710) [#8594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#23673]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39268]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5741]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(bad_key), reinterpret_cast<c const uint8_t*>(&bad_key), value.size(), value.data(), EBPF_ANY, 0) == ((behavior r_on_max_entries != MAP_BEHAVIOR_FAIL) ? EBPF_SUCCESS : error_on_full) for: 0 == 0 [#31694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 224676 ( (0x36da4) == 224676 (0x36da4) [#13938]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#30566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19147]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25016]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2730]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15896]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12028]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#28478]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 138384 (0 0x21c90) == 138384 (0x21c90) [#7499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21938]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#11813]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18882]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 259081 ( (0x3f409) == 259081 (0x3f409) [#20245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#10888]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#23035]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 17 78929 (0x2baf1) [#9563]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29929 (0x x74e9) == 29929 (0x74e9) [#7101]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#21129]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30858]", "droppacket-interpret :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40918]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26383]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114244 ( (0x1be44) == 114244 (0x1be44) [#32371]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38593]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#29829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20541]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#23232]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#22410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31215]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#35642]", "hash_table_test :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38417]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18403]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24443]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21265]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 (0x1e40) [#9929]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10816 (0 0x2a40) == 10816 (0x2a40) [#13198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#23504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59049 (0 0xe6a9) == 59049 (0xe6a9) [#32181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 211600 (0 0x33a90) == 211600 (0x33a90) [#1438]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#28376]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#11091]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38641]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8025]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39414]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38656]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 211600 ( (0x33a90) == 211600 (0x33a90) [#32615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18427]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26551]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#29589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#29898]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12057]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#27611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#22254]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 62 == 62 [#39725]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39677]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39440]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8105]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#11099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32792]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#11453]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 1232 21 (0x3021) [#8627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4 == 4 [#29353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27184]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#34626]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178929 ( (0x2baf1) == 178929 (0x2baf1) [#13836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9426]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#11676]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14457]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12082]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 2016 64 (0x4ec4) [#8720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#34029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184900 (0 0x2d244) == 184900 (0x2d244) [#7615]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_SUCCESS for: 0 == 0 [#37891]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37959]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6084 (0x x17c4) == 6084 (0x17c4) [#19383]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#23834]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24336 (0x x5f10) == 24336 (0x5f10) [#7067]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#28921]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25 == 25 [#13000]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26553]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#27533]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26654]", "bindmonitor-tailcall-jit :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#41041]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#35330]", "ring_buffer_output :: record == nullptr for: nullptr == nullptr [#40759]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#29184]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#10189]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26711]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#11329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4900 (0x x1324) == 4900 (0x1324) [#19367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 176400 ( (0x2b110) == 176400 (0x2b110) [#20067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#21843]", "work_queue :: ebpf_timed_work_queue_is_empty(work_queue) == false for: false == fal lse [#40851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#30461]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 230400 ( (0x38400) == 230400 (0x38400) [#32655]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97969 (0 0x17eb1) == 97969 (0x17eb1) [#26086]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#11387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#22889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#22462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 183184 ( (0x2cb90) == 183184 (0x2cb90) [#20083]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13553]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1022 (0x3fe) == 1022 (0x3fe) [#40209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30849]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#11237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8446]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131044 (0 0x1ffe4) == 131044 (0x1ffe4) [#1242]", "droppacket-interpret :: hook.attach_link(program_fd, &if_index, sizeof(if_index), &link) == E EBPF_SUCCESS for: 0 == 0 [#40924]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#408]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3246]", "bindmonitor-bpf2bpf-jit :: emulate_bind(invoke, 0, \"fake_app_0\") == BIND_DENY for: 1 == 1 [#41015]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5896]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#29338]", "droppacket-interpret :: hook_result == XDP_PASS for: 1 == 1 [#40970]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28278]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5476 (0x1 1564) == 5476 (0x1564) [#6903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#35567]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164836 ( (0x283e4) == 164836 (0x283e4) [#32507]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#30517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82944 (0x x14400) == 82944 (0x14400) [#7331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#29163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#22798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#29042]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#10691]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#22020]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 234256 ( (0x39310) == 234256 (0x39310) [#26428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14981]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 518 (0x206) == 518 (0x206) [#40461]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#29299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20393]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38627]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39559]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9708]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15700]", "serialize_program_info_test :: ebpf_serialize_program_info(&in_program_info, nullptr, buffer_length, , &serialized_length, &required_length) for: 24 [#38789]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#29747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19804]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31314]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#23948]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28089]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20725]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9796]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#34650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33077]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2401 (0x x961) == 2401 (0x961) [#31793]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#30001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31475]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22643]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 10 01761 (0x18d81) [#9251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32963]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#11644]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#29968]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#35530]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7024]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#22873]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#453]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 910 (0x38e) == = 910 (0x38e) [#40149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#23755]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 60 == 60 [#39724]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116281 ( (0x1c639) == 116281 (0x1c639) [#32377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7652]", "bindmonitor-bpf2bpf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41037]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#11385]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 23 37169 (0x39e71) [#9755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 841 (0x3 349) == 841 (0x349) [#13048]", "error codes :: result2 == result for: 2 == 2 [#40784]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#29833]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34757]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26773]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#35930]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#28283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61504 (0x xf040) == 61504 (0xf040) [#7251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#28770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#11105]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72361 (0 0x11aa9) == 72361 (0x11aa9) [#13528]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20422]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38280]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#10179]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#29870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225 == 225 [#28639]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1764 (0x x6e4) == 1764 (0x6e4) [#13074]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8724]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#30220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20641]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#35110]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#36763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_peek_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#18709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169 == 169 [#34704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21970]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18515]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15980]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20310]", "droppacket-jit :: hook.batch_begin(sizeof(state), state) == EBPF_SUCCESS for: 0 == 0 [#40883]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32778]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#11773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#21225]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#29037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 208849 ( (0x32fd1) == 208849 (0x32fd1) [#13904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19402]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#35215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12320]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 142 == 142 [#39765]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 1123 36 (0x2be4) [#9949]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36920]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#11887]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51529 (0x xc949) == 51529 (0xc949) [#7209]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 6144 (0x1800) <= 12288 (0x3 3000) [#30146]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#29519]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#36694]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#36087]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 167281 (0 0x28d71) == 167281 (0x28d71) [#7573]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 124 == 124 [#39117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27225 (0 0x6a59) == 27225 (0x6a59) [#19557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#35060]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20331]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23409 (0x x5b71) == 23409 (0x5b71) [#7061]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142884 ( (0x22e24) == 142884 (0x22e24) [#32451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28470]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34316]", "epoch_test_stale_items :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#38516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 4928 84 (0xc084) [#8960]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#11394]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#11068]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#10938]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25222]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9069]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#29437]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#29116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80656 (0 0x13b10) == 80656 (0x13b10) [#13558]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14102]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25182]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26548]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#36675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26620]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#11062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20556]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#24287]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 259081 (0 0x3f409) == 259081 (0x3f409) [#1536]", "droppacket-interpret :: bpf_map_update_elem(dropped_packet_map_fd, &key, &value, EBPF_ANY) == = EBPF_SUCCESS for: 0 == 0 [#40925]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25757]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#305]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39209]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#27455]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27666]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32292]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#30231]", "bindmonitor-bpf2bpf-interpret :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#41027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15953]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#29505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24919]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#369]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1936 (0x x790) == 1936 (0x790) [#19315]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#11691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 230400 ( (0x38400) == 230400 (0x38400) [#13950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33917]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 900 (0x3 384) == 900 (0x384) [#19287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52900 (0 0xcea4) == 52900 (0xcea4) [#13450]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11986]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 (0x1ae9) [#9922]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 810 (0x32a) == 810 (0x32a) [#40315]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#134]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5847]", "hash_table_test :: memcmp(returned_value, data_2.data(), data_2.size()) == 0 for: 0 == 0 [#38441]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#34961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#28918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 204304 ( (0x31e10) == 204304 (0x31e10) [#13894]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#10259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#35705]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#10852]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9604 (0x x2584) == 9604 (0x2584) [#19423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31442]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6019]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#841]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1989]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 680 (0x2a8) == = 680 (0x2a8) [#40034]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 922 (0x39a) == 922 (0x39a) [#40259]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_pop_entry(map.get(), value.size(), value.data(), 0) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#37413]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 201601 (0 0x31381) == 201601 (0x31381) [#1416]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9309]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#11640]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38913]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32510]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87025 (0x x153f1) == 87025 (0x153f1) [#1108]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#36625]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#29]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18969]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#28576]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#34821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#24091]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 235225 ( (0x396d9) == 235225 (0x396d9) [#20197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#23920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12481]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20587]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 135424 ( (0x21100) == 135424 (0x21100) [#32431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13901]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#35479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#20820]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#28088]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31536]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#35420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#22176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#10238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54756 (0 0xd5e4) == 54756 (0xd5e4) [#13458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23409 (0x5 5b71) == 23409 (0x5b71) [#824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#36537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#23828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#23186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#10692]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#35718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26357]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30964]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#10227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19090]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#23139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#10339]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8467]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#29083]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3054]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9172]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38009]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#34560]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 100 == 100 [#40670]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#11208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#29215]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#34251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#30509]", "state_test :: ebpf_state_allocate_index(&allocated_index_1) == EBPF_SUCCESS for: 0 == 0 [#38824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#21444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15881]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8520]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26938]", "program :: result == 42 for: 42 == 42 [#37764]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT, request) == EBPF_I INVALID_OBJECT for: 5 == 5 [#38053]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#36207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#22218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#36194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93025 (0 0x16b61) == 93025 (0x16b61) [#26070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21929]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#29207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#24247]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33164]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38544]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#29916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15395]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: invoke_protocol(EBPF_OPERATION_QUERY_PROGRAM_INFO, query_program_info o_request, reply) == EBPF_INVALID_OBJECT for: 5 == 5 [#38161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 2044 49 (0x4fe1) [#9990]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 306 (0x132) == = 306 (0x132) [#39847]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 188 == 188 [#39788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#12473]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21101]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13465]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25483]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#35081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21541]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37948]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#27914]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#36767]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#35823]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#34629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19878]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15376 (0 0x3c10) == 15376 (0x3c10) [#25708]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24868]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36898]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7122]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 182 == 182 [#39785]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26804]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7112]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8527]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#22306]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37249]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 (0x1690) [#9915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2025 (0x7 7e9) == 2025 (0x7e9) [#6845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24670]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14373]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33799]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27919]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#29534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#23563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21319]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == EBPF_OBJECT_NOT_FOUND for: 7 = == 7 [#37409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18922]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#10016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71824 (0 0x11890) == 71824 (0x11890) [#13526]", "get_authentication_id :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#40827]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"BB/127\" == \"BB/127\" wit th 1 message: 'key_string := \"BB/127\"' [#37603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20981]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27469]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37287]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#11606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14170]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25313]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#10449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16384 (0 0x4000) == 16384 (0x4000) [#13246]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#23922]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16033]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24592]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#35822]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#36189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20311]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169 == 169 [#35317]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3249 (0x xcb1) == 3249 (0xcb1) [#31809]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#36051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#35128]", "map_crud_operations_queue :: return_value == value for: 6 == 6 [#37693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#23218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#23861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#22966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7640]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#24203]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144 == 144 [#30503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14593]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6844]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33754]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#28930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32262]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1839]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14560]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#34344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#22976]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#11730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#24157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14434]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#11803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#29607]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#30443]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#27245]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#29537]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 14 == 14 [#38923]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#34929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#23841]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21025 (0 0x5221) == 21025 (0x5221) [#25750]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#5203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24534]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#28954]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#36143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#22578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33742]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9 == 9 [#29183]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2025 (0x x7e9) == 2025 (0x7e9) [#31785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15601]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8153]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25969]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69169 (0x x10e31) == 69169 (0x10e31) [#1044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20346]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#30421]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#61]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 4 == 4 [#38980]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#11402]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21185]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15656]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#34799]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 564 (0x234) == 564 (0x234) [#40438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12576]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25709]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#24248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21166]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#10028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#23430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14705]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 308 (0x134) == 308 (0x134) [#40566]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#29069]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32676]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#28538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#10125]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#22513]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54289 (0 0xd411) == 54289 (0xd411) [#25926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2691]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 728 (0x2d8) == 728 (0x2d8) [#40356]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6375]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#29155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12322]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3382]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34969 (0x x8899) == 34969 (0x8899) [#7129]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#781]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.15.0/24\"' [#37480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#10912]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31684]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#27962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37213]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 90 == 90 [#39134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24687]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#29361]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#11705]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1701]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#23010]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 824 (0x338) == = 824 (0x338) [#40106]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136161 (0 0x213e1) == 136161 (0x213e1) [#1256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 159201 ( (0x26de1) == 159201 (0x26de1) [#20025]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == 0 for: 0 == 0 [#42097]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30915]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 154449 (0 0x25b51) == 154449 (0x25b51) [#1304]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 841 (0x3 349) == 841 (0x349) [#25518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11985]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#27347]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 246016 (0 0x3c100) == 246016 (0x3c100) [#7747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 784 (0x3 310) == 784 (0x310) [#25516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#24096]", "EBPF_OPERATION_RESOLVE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37842]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38025 (0x x9489) == 38025 (0x9489) [#7145]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#35190]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#23954]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#35426]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225625 ( (0x37159) == 225625 (0x37159) [#32645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13885]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#11032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#36204]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13167]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#10821]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39448]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28107]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31119]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#30527]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/32\"' [#37663]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 2402 25 (0x5dd9) [#8759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34648]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 1368 89 (0x3579) [#9960]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27664]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16040]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15608]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1073]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25519]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#10354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0x x310) [#8378]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2382]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2704 (0xa a90) == 2704 (0xa90) [#6859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#21603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6110]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#160]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#23121]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#29820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 208849 ( (0x32fd1) == 208849 (0x32fd1) [#26374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31680]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156816 (0 0x26490) == 156816 (0x26490) [#1310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19039]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 348 (0x15c) == = 348 (0x15c) [#39868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#36018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#24199]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2140]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#24311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12454]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#10130]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22201 (0 0x56b9) == 22201 (0x56b9) [#19525]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#35825]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6060]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#33870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15458]", "EBPF_OPERATION_GET_PINNED_OBJECT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38193]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121 == 121 [#34458]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#21132]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27826]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6286]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16178]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#22616]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39544]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28467]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37249 (0 0x9181) == 37249 (0x9181) [#25846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#34933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15191]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25893]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31196]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7920]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#27905]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15766]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13405]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#34314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7569 (0x x1d91) == 7569 (0x1d91) [#25634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#11118]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14884 (0 0x3a24) == 14884 (0x3a24) [#31939]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6084 (0x17 7c4) == 6084 (0x17c4) [#674]", "async :: !ebpf_async_cancel(&async_context) for: true [#40734]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#29176]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#29543]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 68 == 68 [#39145]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#30235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#30658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9010]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28763]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7569 (0x1d d91) == 7569 (0x1d91) [#692]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100 == 100 [#30425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#28628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12856]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 118336 ( (0x1ce40) == 118336 (0x1ce40) [#32383]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12792]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#36063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#22185]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 165649 (0 0x28711) == 165649 (0x28711) [#1332]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39365]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#27077]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#10945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19748]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#27494]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27532]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#21951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18286]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21914]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10000 (0 0x2710) == 10000 (0x2710) [#25660]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31401]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#34999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#28879]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#28908]", "droppacket-interpret :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40931]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88804 (0x x15ae4) == 88804 (0x15ae4) [#7351]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30753]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#10747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51076 (0 0xc784) == 51076 (0xc784) [#13442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#23123]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2242]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6638]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#10865]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32991]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81 == 81 [#25478]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 900 (0x384 4) == 900 (0x384) [#578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31555]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33021]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26600]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 167281 ( (0x28d71) == 167281 (0x28d71) [#13808]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 62 == 62 [#39080]", "bindmonitor-bpf2bpf-interpret :: emulate_bind(invoke, 0, \"fake_app_0\") == BIND_DENY for: 1 == 1 [#41036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11987]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24451]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 778 (0x30a) == 778 (0x30a) [#40331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25310]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70225 (0 0x11251) == 70225 (0x11251) [#13520]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38184]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#11924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19103]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 8 == 8 [#39698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#11095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27538]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#342]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#34835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#28794]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9303]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == 0 for: 0 == 0 [#42093]", "ring_buffer_output :: ebpf_ring_buffer_output(ring_buffer, data.data(), data.size()) == EBP PF_SUCCESS for: 0 == 0 [#40764]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38531]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26483]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40888]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#10685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#27044]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 590 (0x24e) == = 590 (0x24e) [#39989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#23908]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 2220 01 (0x56b9) [#9996]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1000 (0x3e8) == 1000 (0x3e8) [#40220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22097]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8086]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26635]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#21507]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#35098]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2304 (0x9 900) == 2304 (0x900) [#6851]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#36736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12604]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27642]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31962]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#11250]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28284]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#33336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#22520]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#10927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#11586]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#35998]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 66 == 66 [#39727]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6229]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 636 (0x27c) == 636 (0x27c) [#40402]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39570]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121 == 121 [#35760]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26209]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 788 (0x314) == = 788 (0x314) [#40088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 233289 ( (0x38f49) == 233289 (0x38f49) [#13956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14256]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34640]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 ( (0xf81) [#8483]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_DELETE_ELEMENT, request) == EBPF_I INVALID_OBJECT for: 5 == 5 [#38110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#23832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#22560]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33171]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15020]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#10493]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178084 ( (0x2b7a4) == 178084 (0x2b7a4) [#32539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9906]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#10049]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 1690 00 (0x4204) [#8684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18747]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 426 (0x1aa) == = 426 (0x1aa) [#39907]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33008]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 16 68100 (0x290a4) [#9524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131769 ( (0x202b9) == 131769 (0x202b9) [#19953]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 218 == 218 [#39803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12544 (0 0x3100) == 12544 (0x3100) [#19451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#29706]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#36452]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#35143]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15376 (0x x3c10) == 15376 (0x3c10) [#7003]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12273]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#30362]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#23825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#21192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9 == 9 [#33612]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168921 (0 0x293d9) == 168921 (0x293d9) [#7577]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#11117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20866]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25321]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9555]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 1440 00 (0x3840) [#8654]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1796]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#33435]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#22077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21373]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31321]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#23305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#35239]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#35809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22009]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6056]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39562]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#28448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#34913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#23394]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37999]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21701]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#28855]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#36066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#11224]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1843]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#339]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#35605]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14921]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#10642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#30190]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#23596]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#10466]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#402]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25089]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#29454]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#36709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#11113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7756]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20210]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31448]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 524 (0x20c) == 524 (0x20c) [#40458]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20736]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 14 43641 (0x23119) [#9431]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11025 (0x x2b11) == 11025 (0x2b11) [#6965]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18496 (0x x4840) == 18496 (0x4840) [#7027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13965]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37055]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28195]", "serialize_program_info_test :: in_program_info.program_type_descriptor->program_type == out_program_ _info->program_type_descriptor->program_type for: {?} == {?} [#38793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24968]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#30189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7224]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#10773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14992]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 40 == 40 [#39159]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3318]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7560]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#28590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20521]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#10981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#22403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#10269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18643]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26558]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 195364 (0 0x2fb24) == 195364 (0x2fb24) [#1402]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6297]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 1144 49 (0x2cb9) [#8615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12432]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#28505]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39605]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#23055]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#10855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#22551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24565]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#10418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#21927]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#23251]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#11506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#22822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15925]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#27500]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 442 (0x1ba) == = 442 (0x1ba) [#39915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15977]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19568]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26596]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#343]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33200]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#35653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9738]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7598]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31682]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 1690 00 (0x4204) [#9975]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#28997]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33124 (0 0x8164) == 33124 (0x8164) [#13354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 985 596 (0x18124) [#9236]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3493]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#35109]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#22753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25139]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26946]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2182]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39553]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7852]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#29419]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#34790]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#36201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 289 (0x1 121) == 289 (0x121) [#13024]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 140625 ( (0x22551) == 140625 (0x22551) [#19977]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37070]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#35021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65536 (0 0x10000) == 65536 (0x10000) [#13502]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24561]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#24028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20359]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25429]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3249 (0xc cb1) == 3249 (0xcb1) [#6869]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/64\"' and 'correct_value := \"BB/64\"' [#37640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#11100]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27972]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 187489 ( (0x2dc61) == 187489 (0x2dc61) [#26326]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9681]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17424 (0x4 4410) == 17424 (0x4410) [#782]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30743]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44521 (0 0xade9) == 44521 (0xade9) [#32117]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#36045]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#36315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19818]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1623]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28024]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37997]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#35876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#36495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#35840]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3721 (0xe8 89) == 3721 (0xe89) [#640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 25 54016 (0x3e040) [#9806]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#29894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#22996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#29024]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#30575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#22694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19153]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7328]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3171]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34591]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190096 ( (0x2e690) == 190096 (0x2e690) [#32567]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21158]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31267]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13456 (0x3 3490) == 13456 (0x3490) [#750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58081 (0 0xe2e1) == 58081 (0xe2e1) [#13472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#22373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#29578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#33441]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#29235]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#23044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 484 (0x1e4 4) == 484 (0x1e4) [#562]", "serialize_map_test :: ebpf_serialize_internal_map_info_array( map_count, internal_map_info_ _array, nullptr, buffer_length, &serialized_length, &required_length) == EBPF_INS SUFFICIENT_BUFFER for: 24 == 24 [#38750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13557]", "access_check :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49 == 49 [#30590]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#11687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#35860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26521]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19600 (0x4 4c90) == 19600 (0x4c90) [#798]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33005]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#33285]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2025 (0x x7e9) == 2025 (0x7e9) [#25550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#35162]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#10958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#27629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20370]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 13 39876 (0x22264) [#9416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144 == 144 [#29988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#27257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#22618]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27822]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39047]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#63]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27889 (0x x6cf1) == 27889 (0x6cf1) [#7089]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26942]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21904 (0 0x5590) == 21904 (0x5590) [#25756]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#34801]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25174]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5803]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 554 (0x22a) == = 554 (0x22a) [#39971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#23744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7528]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20926]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 444 (0x1bc) == = 444 (0x1bc) [#39916]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#28729]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#33627]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21073]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#22542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#23685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144 == 144 [#34248]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#28676]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#36582]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12120]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13697]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#10311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#27953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#22974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31139]", "EBPF_OPERATION_LINK_PROGRAM :: invoke_protocol(EBPF_OPERATION_LINK_PROGRAM, request, reply) == EBPF_ _INVALID_OBJECT for: 5 == 5 [#38237]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18792]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#34918]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#35393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 21 14369 (0x34561) [#9683]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6023]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#35153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22271]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2929]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3001]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6537]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32996]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37338]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121104 ( (0x1d910) == 121104 (0x1d910) [#13686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#30537]", "map_reuse-jit :: error == 0 for: 0 == 0 [#41794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#30634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24804]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 556 (0x22c) == = 556 (0x22c) [#39972]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44521 (0xa ade9) == 44521 (0xade9) [#940]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26562]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6636]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#29893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15289]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#30278]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2484]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29584 (0x7 7390) == 29584 (0x7390) [#862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21217]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"192.168.0.1/4294967295\"' [#37504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#11016]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#30480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#30514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8574]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#11190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#33504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18676]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13333]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1921]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#23008]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#35449]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#11193]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38105]", "EBPF_OPERATION_LOAD_CODE :: invoke_protocol(EBPF_OPERATION_LOAD_CODE, load_code_request) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#37953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22147]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#29118]", "droppacket-interpret :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40966]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#35529]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#23286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20212]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#23412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#29254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#22844]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#20862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#29886]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34483]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#11821]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#36277]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144400 ( (0x23410) == 144400 (0x23410) [#26220]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 936 (0x3a8) == = 936 (0x3a8) [#40162]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31393]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67600 (0 0x10810) == 67600 (0x10810) [#13510]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#28537]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3349]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 126 == 126 [#39112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37302]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33785]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34396]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1444 (0x x5a4) == 1444 (0x5a4) [#13066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33233]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#29780]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144 == 144 [#542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142129 ( (0x22b31) == 142129 (0x22b31) [#13744]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18757]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12862]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2877]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#35784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#11182]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#33588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#35432]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#11677]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#653]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39404]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21802]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41181]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12548]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18736]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13027]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#30099]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#11401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6724 (0x x1a44) == 6724 (0x1a44) [#19391]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#36012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26389]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 109561 ( (0x1abf9) == 109561 (0x1abf9) [#32357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#22101]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#35444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21325]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 216 == 216 [#39802]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#22830]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#29878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14923]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 146689 ( (0x23d01) == 146689 (0x23d01) [#19993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#33651]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37087]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101124 (0 0x18b04) == 101124 (0x18b04) [#7391]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15331]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#22864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#36712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#22197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#23171]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"10.10.255.255/32\"' and 'correct_value := \"10.10.255.255/32\"' [#37469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34085]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 60 == 60 [#38952]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26607]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142129 ( (0x22b31) == 142129 (0x22b31) [#26214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12020]", "Map and program information :: map_info.id != 0 for: 2 != 0 [#43625]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33185]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 800 (0x320) == = 800 (0x320) [#40094]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6427]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 18 == 18 [#38925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13401]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12632]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#21432]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12500]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34729]", "EBPF_OPERATION_GET_PROGRAM_INFO :: invoke_protocol(EBPF_OPERATION_GET_PROGRAM_INFO, request, reply) == E EBPF_INSUFFICIENT_BUFFER for: 24 == 24 [#38288]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#36815]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#30610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#24094]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32114]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#416]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37720]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#11868]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#30228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 92416 (0 0x16900) == 92416 (0x16900) [#19835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 232324 ( (0x38b84) == 232324 (0x38b84) [#13954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 2016 64 (0x4ec4) [#9989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27460]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 10 04976 (0x19a10) [#9266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6646]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"10.11.10.10/32\"' and 'correct_value := \"1 10.0.0.0/8\"' [#37473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32041 (0 0x7d29) == 32041 (0x7d29) [#25818]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 194481 ( (0x2f7b1) == 194481 (0x2f7b1) [#26342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#21234]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#27653]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#24156]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7404]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#36630]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 662 (0x296) == = 662 (0x296) [#40025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30665]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_peek_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#31179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18238]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 21 10681 (0x336f9) [#9671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15728]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1020 (0x3fc) == 1020 (0x3fc) [#40210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14734]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2020]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#955]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13325]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 278 (0x116) == = 278 (0x116) [#39833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#30255]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8481]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13939]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14076]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1521 (0x x5f1) == 1521 (0x5f1) [#25538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121 == 1 121 [#31717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13371]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#29617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#23905]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37167]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33124 (0 0x8164) == 33124 (0x8164) [#19591]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#27551]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 217156 (0 0x35044) == 217156 (0x35044) [#1450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#36784]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#29389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#24177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26628]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1361]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#11750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27357]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#450]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69169 (0 0x10e31) == 69169 (0x10e31) [#25986]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#28575]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19658]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19130]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31150]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19930]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3136 (0xc c40) == 3136 (0xc40) [#6867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#22627]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9099]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96721 (0 0x179d1) == 96721 (0x179d1) [#13612]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1784]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7500]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13245]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12557]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20391]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#36648]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#10035]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19920]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#23762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#24193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#23728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#22576]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30779]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28224 (0 0x6e40) == 28224 (0x6e40) [#25796]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8782]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32400 (0x x7e90) == 32400 (0x7e90) [#7115]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#28624]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#28618]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 306 (0x132) == 306 (0x132) [#40567]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 838 (0x346) == = 838 (0x346) [#40113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#36505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11025 (0 0x2b11) == 11025 (0x2b11) [#13200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#10226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136900 ( (0x216c4) == 136900 (0x216c4) [#19967]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#35511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18669]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#44]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93025 (0x x16b61) == 93025 (0x16b61) [#7365]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9114]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7242]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#28602]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"10.0.0.0/8\" == \"10.0.0.0/8\" with 2 messages: 'key_string := \"10.0.0.0/8\"' and 'correct_value := \"10.0.0.0/8\"' [#37452]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#22182]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#33879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#33345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18744]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 244036 (0 0x3b944) == 244036 (0x3b944) [#1506]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#20913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 117649 ( (0x1cb91) == 117649 (0x1cb91) [#19913]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 20 09764 (0x33364) [#9668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#11893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21323]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#30340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#11417]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#30453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14824]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_peek_entry(map.get(), value.size(), value.data(), 0) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#6237]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2880]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 320 (0x140) == 320 (0x140) [#40560]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3558]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#171]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 570 (0x23a) == = 570 (0x23a) [#39979]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28174]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 60 == 60 [#39149]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25723]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8611]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#11541]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19067]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#30025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21752]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#34778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22719]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36864 (0 0x9000) == 36864 (0x9000) [#25844]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#21522]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39452]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2200]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38776]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 988 (0x3dc) == = 988 (0x3dc) [#40188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#35157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13099]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#10456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15533]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39690]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#11605]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12427]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39604]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15199]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#59]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#10296]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#36057]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#29583]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#35336]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31236]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#76]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8509]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8700]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#10568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#23677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 227529 ( (0x378c9) == 227529 (0x378c9) [#32649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19110]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#11054]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13173]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39459]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5957]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26013]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 954 481 (0x174f9) [#9221]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33664]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14447]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38402]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#22957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12101]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#23173]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 192.168.16.0/24\"' and 'return_value := \"192.168.16.0/24\"' [#37527]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#10845]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40866]", "EBPF_OPERATION_GET_PINNED_OBJECT short header :: ebpf_core_invoke_protocol_handler( EBPF_OPERATION_GET_PINNED_OBJECT, request_ptr, static_cast<uint16_t>(request_size), reply_ptr, static_cast<uint16_ _t>(reply_size), nullptr, completion) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13929]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#30268]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 994 (0x3e2) == = 994 (0x3e2) [#40191]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20323]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#36371]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 2340 09 (0x5b71) [#8753]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#11945]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 638 (0x27e) == = 638 (0x27e) [#40013]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2992]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2500 (0x x9c4) == 2500 (0x9c4) [#25560]", "divide_by_zero-jit :: sample_program_info.initialize(EBPF_PROGRAM_TYPE_SAMPLE) == EBPF_SUCC CESS for: 0 == 0 [#40976]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39492]", "bindmonitor-jit :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15295]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#30004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#23168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20449 (0 0x4fe1) == 20449 (0x4fe1) [#19513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14495]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31037]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 130321 (0 0x1fd11) == 130321 (0x1fd11) [#1240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#21213]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 20 == 20 [#39059]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/116\"' and 'correct_value := \"DD/116\"' [#37626]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26972]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#10360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16482]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 203401 (0 0x31a89) == 203401 (0x31a89) [#7657]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#22600]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18636]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16019]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#11503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32124]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34902]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16384 (0 0x4000) == 16384 (0x4000) [#31951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13365]", "EBPF_OPERATION_LOAD_NATIVE_MODULE short header :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38387]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 620 (0x26c) == 620 (0x26c) [#40410]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 232 == 232 [#40604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67600 (0x x10810) == 67600 (0x10810) [#7275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25096]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32974]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#36286]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#23830]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#29950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 1988 81 (0x4da9) [#9988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21898]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0x x349) [#9862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#29192]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#296]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#35043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152100 ( (0x25224) == 152100 (0x25224) [#26240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31804]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14770]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19144]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25667]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31245]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33104]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44100 (0xa ac44) == 44100 (0xac44) [#938]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33151]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#30118]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"10.0.0.0/8\" == \"10.0.0.0/8\" with 2 m messages: 'key_string := \"10.0.0.0/8\"' and 'return_value := \"10.0.0.0/8\"' [#37547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32634]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24464]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25983]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 12 26025 (0x1ec49) [#9359]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 324 (0x144) == 324 (0x144) [#40558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#34275]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38096]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256 (0x1 100) == 256 (0x100) [#25492]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#28589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#35293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37333]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29241 (0 0x7239) == 29241 (0x7239) [#13332]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#30414]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 83521 (0 0x14641) == 83521 (0x14641) [#32273]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78961 (0 0x13471) == 78961 (0x13471) [#32257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#23589]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6276]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1296 (0x x510) == 1296 (0x510) [#31767]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38285]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 298 (0x12a) == = 298 (0x12a) [#39843]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#10757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#22775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#36245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#36713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 16 61604 (0x27744) [#9500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#22729]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37014]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#120]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 100 == 100 [#39744]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28149]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9 == 9 [#35993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#36027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#23478]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28012]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 102 == 102 [#39128]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#11936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21700]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#22979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14121]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32516]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33784]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 255025 (0 0x3e431) == 255025 (0x3e431) [#7765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31001]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21122]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24649 (0 0x6049) == 24649 (0x6049) [#13304]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#28690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#34794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#29530]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121 == 12 21 [#6777]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32054]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2851]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#33687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#23823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30867]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34845]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#33936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#11365]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24649 (0 0x6049) == 24649 (0x6049) [#32009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7658]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#21306]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7860]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31410]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43681 (0 0xaaa1) == 43681 (0xaaa1) [#25878]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 556 (0x22c) == 556 (0x22c) [#40442]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1123]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#36657]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7144]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34207]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#35447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#24399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#36742]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#36504]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#10984]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16 == 16 [#29762]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 86 == 86 [#40677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114921 ( (0x1c0e9) == 114921 (0x1c0e9) [#32373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#27764]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 942 (0x3ae) == 942 (0x3ae) [#40249]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#29677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#36519]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#33633]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 83521 (0 0x14641) == 83521 (0x14641) [#26038]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"0.0.0.0/0\"' [#37432]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 906 (0x38a) == = 906 (0x38a) [#40147]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8041]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#36208]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19762]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34190]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25903]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25320]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 58 == 58 [#38953]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26149]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#10403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#23786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34478]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12126]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#11084]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"19 92.168.16.0/24\"' [#37517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#33321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#35715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#35291]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 346 (0x15a) == = 346 (0x15a) [#39867]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 228484 (0 0x37c84) == 228484 (0x37c84) [#7711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#28400]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37245]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#29410]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 82 == 82 [#39090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#27080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15607]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#10562]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25045]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27678]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207936 (0 0x32c40) == 207936 (0x32c40) [#1430]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26565]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#23457]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3255]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9766]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#21246]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78400 (0x x13240) == 78400 (0x13240) [#7315]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#24389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20432]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49 == 49 [#35749]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14172]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 184 == 184 [#39786]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152881 (0 0x25531) == 152881 (0x25531) [#1300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#23691]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18639]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#10348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37270]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#30192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43264 (0 0xa900) == 43264 (0xa900) [#19643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18632]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15023]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#11316]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#22442]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39252]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34169]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31561]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2145]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7198]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#22726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18439]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12339]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#11855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#11003]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126025 ( (0x1ec49) == 126025 (0x1ec49) [#32405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20804]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2655]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20831]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6447]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 258064 (0 0x3f010) == 258064 (0x3f010) [#7771]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31513]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#35104]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3249]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1005]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54289 (0x xd411) == 54289 (0xd411) [#7221]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169 == 169 [#28427]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#293]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#30645]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6552]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#406]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20356]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32322]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#37407]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67600 (0x x10810) == 67600 (0x10810) [#1038]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26742]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37023]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#36717]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#30149]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2148]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 216225 (0 0x34ca1) == 216225 (0x34ca1) [#1448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21622]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 6150 04 (0xf040) [#9038]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38834]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34567]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#11271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24644]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1735]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27525]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8274]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#33414]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6889 (0x x1ae9) == 6889 (0x1ae9) [#19393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20576]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27225]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6141]", "ring_buffer_output :: record->header.length == data.size() + (((size_t) & ((ebpf_ring_buffe er_record_t*)0)->data)) for: 18 == 18 [#40757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14026]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#221]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25162]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 4202 25 (0xa429) [#8909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#23013]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#35662]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26335]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 436 (0x1b4) == 436 (0x1b4) [#40502]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2817]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 534 (0x216) == 534 (0x216) [#40453]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#36030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52441 (0 0xccd9) == 52441 (0xccd9) [#25918]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#36835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85264 (0x x14d10) == 85264 (0x14d10) [#7339]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3021]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39262]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == 0 for: 0 == 0 [#42092]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#33609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#33810]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#21966]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#11571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#10849]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#34772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#23165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#29754]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#9841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81225 (0 0x13d49) == 81225 (0x13d49) [#13560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84681 (0 0x14ac9) == 84681 (0x14ac9) [#13572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31010]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#35401]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40954]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26255]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#34659]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#495]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 94 == 94 [#39096]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#29892]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32826]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32102]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11881 (0x x2e69) == 11881 (0x2e69) [#6973]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33298]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41178]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101124 (0 0x18b04) == 101124 (0x18b04) [#1154]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 180 == 180 [#39784]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#30120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#29125]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2500]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1004 (0x3ec) = == 1004 (0x3ec) [#40196]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28308]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37951]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#94]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37831]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#22768]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19962]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1699]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6249]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#35658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#11825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#10505]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37950]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2116]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39204 (0x9 9924) == 39204 (0x9924) [#914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18518]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 441 (0x1b b9) == 441 (0x1b9) [#6797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14825]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#29014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26574]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#33864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20436]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33589]", "EBPF_OPERATION_GET_PROGRAM_INFO :: invoke_protocol(EBPF_OPERATION_GET_PROGRAM_INFO, request, reply) == E EBPF_INVALID_ARGUMENT for: 6 == 6 [#38287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44944 (0 0xaf90) == 44944 (0xaf90) [#13414]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#28259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#33699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14536]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 655 536 (0x10000) [#9062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33914]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85264 (0x x14d10) == 85264 (0x14d10) [#1102]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 694 (0x2b6) == 694 (0x2b6) [#40373]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#35874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#11594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#8300]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: invoke_protocol(EBPF_OPERATION_MAP_GET_NEXT_KEY, request, reply) == E EBPF_INVALID_ARGUMENT for: 6 == 6 [#38137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#35138]", "EBPF_OPERATION_UPDATE_PINNING :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20290]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2916 (0xb6 64) == 2916 (0xb64) [#626]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 2822 24 (0x6e40) [#8798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13035]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54289 (0xd d411) == 54289 (0xd411) [#984]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#24225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#23318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#34942]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 10 == 10 [#38977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#23082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190096 ( (0x2e690) == 190096 (0x2e690) [#26332]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1381]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27133]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#11764]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21028]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2116 (0x84 44) == 2116 (0x844) [#610]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78961 (0 0x13471) == 78961 (0x13471) [#19789]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8170]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#11255]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7384]", "show verification xdp_datasize_unsafe.o :: output_line == expected_output_line for: \"\" == \"\" [#42407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 16 62409 (0x27a69) [#9503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38416 (0 0x9610) == 38416 (0x9610) [#25852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225 == 2 225 [#13020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#23212]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26933]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27124]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#23978]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22192]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#29082]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31490]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26812]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3844 (0x xf04) == 3844 (0xf04) [#25584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#23182]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3364 (0x xd24) == 3364 (0xd24) [#31811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156816 ( (0x26490) == 156816 (0x26490) [#20019]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12766]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13689 (0x3 3579) == 13689 (0x3579) [#752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#21000]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18263]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 130321 ( (0x1fd11) == 130321 (0x1fd11) [#26182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7288]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#36095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20963]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#28217]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#10]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#30232]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36905]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5625 (0x x15f9) == 5625 (0x15f9) [#19377]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 6144 (0x1800) <= 6144 (0x18 800) [#29631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156025 ( (0x26179) == 156025 (0x26179) [#13780]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20248]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25137]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#30029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#24142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#11790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16013]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7614]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#30400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7975]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 752 (0x2f0) == 752 (0x2f0) [#40344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33322]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#23253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#23227]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#34044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42025 (0 0xa429) == 42025 (0xa429) [#13400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#36557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#36240]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#35380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 1102 25 (0x2b11) [#9948]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2039]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32954]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#35378]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 1716 61 (0x4309) [#8687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#22945]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38843]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#21354]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30903]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#10159]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#11552]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25116]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12408]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#22793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#11160]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12258]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#22553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15379]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39015]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2479]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 13 39129 (0x21f79) [#9413]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19044 (0 0x4a64) == 19044 (0x4a64) [#13266]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 185761 ( (0x2d5a1) == 185761 (0x2d5a1) [#26322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19924]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14400 (0 0x3840) == 14400 (0x3840) [#25700]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3954]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#23963]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41071]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54756 (0x xd5e4) == 54756 (0xd5e4) [#7223]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#10687]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 12 == 12 [#38875]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#33801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12879]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/32\" == \"BB/32\" wi ith 2 messages: 'key_string := \"BB/32\"' and 'correct_value := \"BB/32\"' [#37647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#10574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25334]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39189]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103684 (0 0x19504) == 103684 (0x19504) [#1162]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6070]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 634 (0x27a) == = 634 (0x27a) [#40011]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33875]", "EBPF_OPERATION_GET_PINNED_OBJECT :: invoke_protocol(EBPF_OPERATION_GET_PINNED_OBJECT, request, reply) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#24198]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#28944]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#9836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24680]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#368]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37395]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#29259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#34548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14194]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 946 (0x3b2) == 946 (0x3b2) [#40247]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38906]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196 == 1 196 [#31723]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30868]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19286]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#158]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#34239]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1657]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11025 (0 0x2b11) == 11025 (0x2b11) [#31905]", "map_crud_operations_lpm_trie_32 :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#37503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#23603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#22134]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#10928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#22894]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1089 (0x x441) == 1089 (0x441) [#31761]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2013]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#11837]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27289]", "program :: program_info_provider.initialize(EBPF_PROGRAM_TYPE_SAMPLE) == EBPF_SU UCCESS for: 0 == 0 [#37750]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#23415]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#23578]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#11482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#22592]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3097]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#21294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#29229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7378]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#22789]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37668]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25228]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18476]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 20 01601 (0x31381) [#9641]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20164 (0x4 4ec4) == 20164 (0x4ec4) [#802]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#10643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14975]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 188 == 188 [#40626]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#21816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#36548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27540]", "memory_map_test :: ebpf_protect_memory(memory_descriptor.get(), EBPF_PAGE_PROTECT_READ_O ONLY) == EBPF_SUCCESS for: 0 == 0 [#38743]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#89]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 154449 ( (0x25b51) == 154449 (0x25b51) [#20013]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#396]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"11.0.0.0/8\"' [#37572]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14822]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25965]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#34347]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6571]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45796 (0 0xb2e4) == 45796 (0xb2e4) [#19655]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24570]", "interlocked operations :: value64 == 0xffff for: 65535 (0xffff) == 65535 (0xffff) [#40820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9 == 9 [#19233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#23782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33676]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 20 04304 (0x31e10) [#9650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#10012]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6453]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#23588]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#11311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26177]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2392]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#35754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#24186]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 (0x1861) [#8531]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9682]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#27098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#24335]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 1512 29 (0x3b19) [#9968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20918]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#11600]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#67]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8156]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34351]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#30551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6888]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#11812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#22152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#29693]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2601 (0xa a29) == 2601 (0xa29) [#6857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13437]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#28871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20648]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33028]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#35167]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6284]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#36797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#10614]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21392]", "bindmonitor-ringbuf-jit :: hook.attach_link(program_fd, nullptr, 0, &link) == EBPF_SUCCESS for: 0 == 0 [#41062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#23072]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#35367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9691]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6198]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#10887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#927]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#36327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#30390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#24166]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#23083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9582]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#35711]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#23470]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30672]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2773]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31387]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8079]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#30283]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18454]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14069]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#29441]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#34905]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39272]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1866]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27159]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5775]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12140]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#28619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25340]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2827]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#35287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#10964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21062]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34027]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#28927]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 230 == 230 [#40605]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8587]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#29380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24025 (0 0x5dd9) == 24025 (0x5dd9) [#25770]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#30525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22040]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#36706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6804]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 406 (0x196) == 406 (0x196) [#40517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9394]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#10119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24563]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#30561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37163]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38329]", "ring_buffer_output :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#40747]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#227]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#28343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24597]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 199809 (0 0x30c81) == 199809 (0x30c81) [#7649]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27331]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#29940]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 30 == 30 [#40705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36964]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1764 (0x6e e4) == 1764 (0x6e4) [#602]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20643]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#10913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#22983]", "trampoline_test :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18326]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#23292]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#11539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18471]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#11156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#24321]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4030]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20449 (0x x4fe1) == 20449 (0x4fe1) [#7041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#36171]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7834]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8770]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34283]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25178]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3427]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#28106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13003]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34334]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#36715]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40927]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#34909]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20387]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 424 (0x1a8) == = 424 (0x1a8) [#39906]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#803]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#28001]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 (0x1189) [#9904]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5976]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#22044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2784]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 882 209 (0x15891) [#9185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24730]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21316 (0x5 5344) == 21316 (0x5344) [#810]", "error codes :: result2 == result for: 1 == 1 [#40783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#23512]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#573]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18879]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8863]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17424 (0 0x4410) == 17424 (0x4410) [#25724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18557]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#28856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#22922]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27832]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#23320]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31072]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8143]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184041 ( (0x2cee9) == 184041 (0x2cee9) [#13848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7080]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8141]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2083]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53824 (0 0xd240) == 53824 (0xd240) [#19691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#23242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8298]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 708 (0x2c4) == = 708 (0x2c4) [#40048]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#11862]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#35593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#23194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26563]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1922]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#28711]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#35934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#22980]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27153]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8826]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19628]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32648]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9799]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32738]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9583]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38407]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2136]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25281 (0x6 62c1) == 25281 (0x62c1) [#836]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#36451]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 104 == 104 [#39746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#10640]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73441 (0 0x11ee1) == 73441 (0x11ee1) [#32237]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25715]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 800 (0x320) == 800 (0x320) [#40320]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26129]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32156]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#24362]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 19 99809 (0x30c81) [#9635]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#29004]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#27365]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#29889]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18986]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38608]", "pinned_map_enum :: error == 0 for: 0 == 0 [#41456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#10931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#36153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#23487]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#30492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73984 (0 0x12100) == 73984 (0x12100) [#13534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#22471]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85849 (0 0x14f59) == 85849 (0x14f59) [#32281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#22813]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#11083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#24216]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#27275]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1948]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#22538]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#29763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32839]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#33396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#8315]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#30054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3025 (0x xbd1) == 3025 (0xbd1) [#13100]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6528]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173889 ( (0x2a741) == 173889 (0x2a741) [#32529]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#36879]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18603]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 22 == 22 [#38870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12021]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#10356]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39045]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"10.10.10.10/32\"' and 'correct_value := \"1 10.10.0.0/16\"' [#37471]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26964]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#29305]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#28833]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37824]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24429]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#29160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#28397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#29097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22234]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16384 (0x4 4000) == 16384 (0x4000) [#774]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22142]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7592]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#31]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#10470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21364]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 676 (0x2a4) == 676 (0x2a4) [#40382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#29712]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7582]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 48 == 48 [#40696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27021]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38546]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#30323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15698]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9409 (0x24 4c1) == 9409 (0x24c1) [#712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 195364 ( (0x2fb24) == 195364 (0x2fb24) [#20111]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7554]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38197]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#15]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#29791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 120409 ( (0x1d659) == 120409 (0x1d659) [#19921]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 149769 (0 0x24909) == 149769 (0x24909) [#1292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#21054]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196 == 1 196 [#25488]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#30007]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31523]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1780]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#29708]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 48 == 48 [#39155]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#35920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32010]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 166464 ( (0x28a40) == 166464 (0x28a40) [#32511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#23817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26413]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#21810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#28460]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7526]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27636]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#10374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#23345]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#11931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#11445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#23157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 209764 ( (0x33364) == 209764 (0x33364) [#26376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38025 (0x9 9489) == 38025 (0x9489) [#908]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#35324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19148]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18496 (0 0x4840) == 18496 (0x4840) [#25732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#22665]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34827]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39528]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#10479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94249 (0 0x17029) == 94249 (0x17029) [#13604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#10767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13109]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1862]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#28631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18701]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17689 (0x x4519) == 17689 (0x4519) [#7021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#22409]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26502]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#29899]", "droppacket-jit :: bpf_map_delete_elem(dropped_packet_map_fd, &key) == EBPF_SUCCESS for: : 0 == 0 [#40869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#11896]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34444]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26073]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17161 (0x x4309) == 17161 (0x4309) [#7017]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19908]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#23848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#11116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20622]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#733]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#11144]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51529 (0 0xc949) == 51529 (0xc949) [#25914]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#27647]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3249 (0xcb b1) == 3249 (0xcb1) [#632]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12316]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6682]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#10973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21245]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2997]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#16]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#464]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33935]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32268]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 828 (0x33c) == 828 (0x33c) [#40306]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#34792]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#11899]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32238]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34588]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 (0x14d1) [#8513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#27092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21872]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 68 == 68 [#39083]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25600 (0 0x6400) == 25600 (0x6400) [#13310]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#27107]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19232]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#28569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16042]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#33759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#35800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31556]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#11484]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#11388]", "map_create_invalid :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#35296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15808]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#22778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33604]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 8 == 8 [#39175]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#23467]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8124]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#24245]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#29081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20628]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38063]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13161]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 162 == 162 [#40639]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#27242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19640]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38330]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7102]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14674]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80089 (0 0x138d9) == 80089 (0x138d9) [#26026]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#35251]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#30213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25115]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 89401 (0 0x15d39) == 89401 (0x15d39) [#32293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30924]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18623]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35344 (0x8 8a10) == 35344 (0x8a10) [#894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19776]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6157]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#33402]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#35171]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108241 ( (0x1a6d1) == 108241 (0x1a6d1) [#13648]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25427]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3478]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#33519]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#11151]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169 == 169 [#35842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#22683]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 95481 (0 0x174f9) == 95481 (0x174f9) [#26078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32540]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#11167]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28224 (0 0x6e40) == 28224 (0x6e40) [#13326]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15955]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#34113]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#20799]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#9842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13255]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 14 47456 (0x24000) [#9446]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#34825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1 == 1 [#12992]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#28643]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#11508]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44944 (0 0xaf90) == 44944 (0xaf90) [#25884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27556 (0 0x6ba4) == 27556 (0x6ba4) [#13322]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6046]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90601 (0 0x161e9) == 90601 (0x161e9) [#19829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9102]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#28665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18825]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#11066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#24322]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#28570]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18769 (0 0x4951) == 18769 (0x4951) [#25734]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#35932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#34581]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#35498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#24074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24626]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25198]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#508]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#30074]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#35463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14505]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#34083]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22139]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#35405]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6222]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24954]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#182]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#35708]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#30519]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9771]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3181]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 1822 25 (0x4731) [#8699]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#28606]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3261]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#30292]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25779]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3297]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12310]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#29618]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3447]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24545]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#36180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21463]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21107]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2809 (0x xaf9) == 2809 (0xaf9) [#13096]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 228 == 228 [#40606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#29271]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7914]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 261121 ( (0x3fc01) == 261121 (0x3fc01) [#20249]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#10009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#21372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#10670]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#27407]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 46 == 46 [#38939]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 602 (0x25a) == 602 (0x25a) [#40419]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#36643]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#11267]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 ( (0x691) [#8417]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37912]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31159]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9658]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22286]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#22709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40804 (0 0x9f64) == 40804 (0x9f64) [#19631]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#34820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8195]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 576 (0x240) == = 576 (0x240) [#39982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#10538]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39687]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#23641]", "program :: ebpf_get_trampoline_function( table.get(), 0xFFFF + 1, reinterpret_ca ast<void**>(&test_function)) == EBPF_SUCCESS for: 0 == 0 [#37761]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#34901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#8306]", "serialize_map_test :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38745]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13456 (0 0x3490) == 13456 (0x3490) [#25692]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36954]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#29232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37236]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61009 (0 0xee51) == 61009 (0xee51) [#25954]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#22832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#23945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32898]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#27350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21581]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 95481 (0x x174f9) == 95481 (0x174f9) [#1136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#21876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15478]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38694]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#30090]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39556]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8161]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#29848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#10378]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1600 (0x x640) == 1600 (0x640) [#19307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15598]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27115]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#20988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#23200]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#33696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1225 (0x x4c9) == 1225 (0x4c9) [#31765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#10613]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#9828]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#22930]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30895]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#10013]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/65\"' and 'correct_value := \"BB/64\"' [#37638]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#10677]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7832]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33802]", "bindmonitor-bpf2bpf-jit :: hook.attach_link(program_fd, attach_parameters, attach_parameters_siz ze, &_link) == EBPF_SUCCESS for: 0 == 0 [#41013]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 370 (0x172) == 370 (0x172) [#40535]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#28785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#10365]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#10258]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30829]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39282]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18440]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#23975]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35149]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7494]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#30564]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168 8.14.0/30\"' [#37494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19042]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8341]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38138]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#22782]", "ring_buffer_output :: consumer == 0 for: 0 == 0 [#40751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32518]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32160]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#34479]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 961 100 (0x17764) [#9224]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19048]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#29709]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15677]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#20838]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#36727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 153664 ( (0x25840) == 153664 (0x25840) [#26244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27645]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3273]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15092]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5776 (0x x1690) == 5776 (0x1690) [#25612]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#8290]", "ring_buffer_reserve_submit_discard :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#40768]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#11725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14519]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#11805]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8439]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 900 000 (0x15f90) [#9194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8889]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25446]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36979]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25781]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#28685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32026]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7744 (0x x1e40) == 7744 (0x1e40) [#31871]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26696]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 192 == 192 [#40624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#35047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20495]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#27002]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#22460]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#35797]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#23401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#23919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12857]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 2 == 2 [#39050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#23865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#10216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14566]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#21048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12534]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#36362]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#23274]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26557]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6708]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#22816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22834]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 86 == 86 [#39737]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#35577]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31643]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#24108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#23380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18298]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10209]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#36722]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34001]", "program :: ebpf_update_trampoline_table( table.get(), (sizeof(test_function_ids) ) / sizeof(test_function_ids[0])), test_function_ids, &helper_function_addresses) ) == EBPF_SUCCESS for: 0 == 0 [#37760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#35220]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#10788]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#36572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#10050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12545]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#340]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#28052]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2286]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 2131 16 (0x5344) [#9993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#22631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#11457]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34180]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#36853]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 582 (0x246) == 582 (0x246) [#40429]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#35845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13249]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30921]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#20832]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15550]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30988]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 13 36900 (0x216c4) [#9404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#30506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27217]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#34200]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14699]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#29672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#21099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#36791]", "serialize_map_test :: ebpf_deserialize_map_info_array(serialized_length, unique_buffer.get( (), map_count, &map_info_array) == EBPF_SUCCESS for: 0 == 0 [#38752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14306]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7604]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38222]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4624 (0x x1210) == 4624 (0x1210) [#31831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#23561]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22084]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#28909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18241]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65025 (0x xfe01) == 65025 (0xfe01) [#7265]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 90 == 90 [#39739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18231]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#24249]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20637]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27618]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37226]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2965]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#28854]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#35348]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#11350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33409]", "bindmonitor-tailcall-jit :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#41044]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#11570]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#30497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37078]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#30622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#21462]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20736 (0x x5100) == 20736 (0x5100) [#7043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#23221]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#34974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67081 (0 0x10609) == 67081 (0x10609) [#19745]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39461]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39280]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26783]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#30017]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7722]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184900 (0 0x2d244) == 184900 (0x2d244) [#1378]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#36250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#22360]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#33267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1 == 1 [#30089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#30027]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2755]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#8339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57600 (0 0xe100) == 57600 (0xe100) [#13470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18826]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5927]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 174724 (0 0x2aa84) == 174724 (0x2aa84) [#1354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9229]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2367]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#22741]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13983]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23104 (0 0x5a40) == 23104 (0x5a40) [#31999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30864]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#21069]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25809]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32594]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16129 (0 0x3f01) == 16129 (0x3f01) [#25714]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37033]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#194]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 254 == 254 [#40593]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#29372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6992]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7336]", "EBPF_OPERATION_RESOLVE_HELPER :: invoke_protocol(EBPF_OPERATION_RESOLVE_HELPER, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37839]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 231361 ( (0x387c1) == 231361 (0x387c1) [#26422]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21734]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13605]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#10637]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33092]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32856]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37020]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11025 (0x2 2b11) == 11025 (0x2b11) [#728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#10668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7570]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 129600 ( (0x1fa40) == 129600 (0x1fa40) [#26180]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 260100 (0 0x3f804) == 260100 (0x3f804) [#1538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9148]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#11240]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#28558]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21230]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#36524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#22017]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30764]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#23911]", "map_crud_operations_queue :: return_value == value for: 2 == 2 [#37685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32224]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 506 (0x1fa) == = 506 (0x1fa) [#39947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 232324 ( (0x38b84) == 232324 (0x38b84) [#26424]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#28968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18511]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19430]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#23015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#29701]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30942]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 729 (0x2d9 9) == 729 (0x2d9) [#572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33644]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 314 (0x13a) == = 314 (0x13a) [#39851]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31670]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33489 (0 0x82d1) == 33489 (0x82d1) [#25826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26750]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38987]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 98596 (0 0x18124) == 98596 (0x18124) [#19855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 105625 ( (0x19c99) == 105625 (0x19c99) [#32345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12697]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8718]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 784 400 (0x13240) [#9134]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#10872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#23449]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#28562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#23019]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#29803]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#10279]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19948]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1012 (0x3f4) == 1012 (0x3f4) [#40214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#23272]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#10996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30776]", "EBPF_OPERATION_CREATE_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15740]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#36766]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19590]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25600 (0 0x6400) == 25600 (0x6400) [#25780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32388]", "EBPF_OPERATION_RESOLVE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37845]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2721]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39413]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2097]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#477]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19186]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31545]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38210]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#36526]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25224]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12369]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27015]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34468]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148225 (0 0x24301) == 148225 (0x24301) [#1288]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14998]", "droppacket-interpret :: value == 0 for: 0 == 0 [#40972]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#30156]", "hash_table_test :: ebpf_hash_table_next_key(table.get(), returned_key.data(), returned_k key.data()) == EBPF_SUCCESS for: 0 == 0 [#38450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#11671]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 0 == 0 [#518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1089 (0x4 441) == 1089 (0x441) [#6821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59536 (0 0xe890) == 59536 (0xe890) [#13478]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 141376 ( (0x22840) == 141376 (0x22840) [#13742]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31998]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#30542]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#11]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#28941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#28406]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#36434]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 6502 25 (0xfe01) [#9059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#23032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#36211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#10787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#10707]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133956 ( (0x20b44) == 133956 (0x20b44) [#26192]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 814 (0x32e) == = 814 (0x32e) [#40101]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#30409]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#178]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7728]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#36]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30708]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12049]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46656 (0xb b640) == 46656 (0xb640) [#950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#36496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#22331]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 42 == 42 [#39070]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#22173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9052]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39684]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#30300]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27601]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#24337]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3126]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14405]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40804 (0 0x9f64) == 40804 (0x9f64) [#13394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14252]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33475]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#22865]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30736]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28573]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#11383]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24858]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_pop_entry(map.get(), value.size(), value.data(), 0) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#31178]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#10587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19952]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 976 (0x3d0) == 976 (0x3d0) [#40232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#30445]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#10943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6296]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25058]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#30601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14522]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1195]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#29722]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37855]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#11007]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24497]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37967]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31361]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12517]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39186]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#29781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#22714]", "map_crud_operations_queue :: return_value == value for: 4 == 4 [#37689]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21142]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"DD/124\" == \"DD/124\" with 2 messages: 'key_string := \"DD/124\"' and 'correct_value := \"DD/124\"' [#37617]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#34590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16384 (0 0x4000) == 16384 (0x4000) [#19483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#34209]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#36148]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27463]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1628]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 734 (0x2de) == 734 (0x2de) [#40353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#27419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#23573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#35984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 1768 89 (0x4519) [#8693]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7270]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 40 == 40 [#38962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15876 (0x x3e04) == 15876 (0x3e04) [#7007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22644]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2911]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#29165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 676 (0x2 2a4) == 676 (0x2a4) [#25512]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#22299]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#36692]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39519]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38205]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#35470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20244]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 726 (0x2d6) == = 726 (0x2d6) [#40057]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34520]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6560]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#11630]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#36634]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#36403]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"BB/64\"' [#37604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#10165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: memcmp(&retrieved_map_definition, &map_definition, sizeof(map_definit tion)) == 0 for: 0 == 0 [#37410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148996 ( (0x24604) == 148996 (0x24604) [#13762]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25995]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8823]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#35983]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14062]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#36124]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0x02) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#24939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80656 (0x x13b10) == 80656 (0x13b10) [#7323]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32400 (0x7 7e90) == 32400 (0x7e90) [#878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#23275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#29897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196 == 196 [#28791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#22860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#20901]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 4622 25 (0xb491) [#8939]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#27839]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#27968]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#28418]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#34287]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25015]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8836 (0x x2284) == 8836 (0x2284) [#13178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#34464]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25637]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26981]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39304]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#23077]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#33891]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31075]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7282]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19321 (0x x4b79) == 19321 (0x4b79) [#7033]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#88]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3129]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0x x121) [#9850]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"172.16.0.1/100\"' [#37506]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#35666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 (0x1fa4) [#9931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#35284]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36955]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#29019]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#21051]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15890]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#27515]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9330]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12834]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7916]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#27326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33601]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7856]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25861]", "error codes :: result2 == result for: 10 == 10 [#40792]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 78 == 78 [#39140]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 876 616 (0x15640) [#9182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#10272]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#23419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#22263]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#22779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18447]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27085]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19432]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13865]", "EBPF_OPERATION_GET_PINNED_OBJECT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38189]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#30055]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26569 (0 0x67c9) == 26569 (0x67c9) [#13316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#27860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#24179]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51984 (0 0xcb10) == 51984 (0xcb10) [#13446]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39456]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#35461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#23235]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37358]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1249]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7981]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114244 ( (0x1be44) == 114244 (0x1be44) [#26136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#36127]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#30183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24512]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#28892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15913]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#29398]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9817]", "droppacket-interpret :: result == 0 for: 0 == 0 [#40922]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15433]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4356 (0x x1104) == 4356 (0x1104) [#25592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26592]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#10553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4 == 4 [#19231]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 215296 ( (0x34900) == 215296 (0x34900) [#32623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6465]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26725]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19736]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 696 696 (0x11040) [#9086]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#28704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 729 (0x2 2d9) == 729 (0x2d9) [#13044]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#33573]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#35428]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14075]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#609]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#11087]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#28732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21632]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#11530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#23776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 193600 ( (0x2f440) == 193600 (0x2f440) [#13870]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#10697]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#11602]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#28739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12509]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26898]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#36811]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 622 (0x26e) == = 622 (0x26e) [#40005]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 176400 ( (0x2b110) == 176400 (0x2b110) [#26300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15436]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#23933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 113569 ( (0x1bba1) == 113569 (0x1bba1) [#26134]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#29962]", "EBPF_OPERATION_CREATE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37906]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#35868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#11742]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5184 (0x14 440) == 5184 (0x1440) [#662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 1512 29 (0x3b19) [#8663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20677]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 312 (0x138) == 312 (0x138) [#40564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25255]", "program :: ebpf_program_execute_test_run( program.get(), &options, &async_contex xt, &unused_completion_context, []( ebpf_result_t result, const ebpf_program_t* p program, const ebpf_program_test_run_options_t* options, void* completion_context t, void* async_context) { ((void)( (!!(program != nullptr)) || (_wassert(L\"progra am != nullptr\", L\"C:\\\\testbed\\\\libs\\\\execution_context\\\\unit\\\\execution_context_u unit_test.cpp\", (unsigned)(1187)), 0)) ); ((void)( (!!(options != nullptr)) || (_ _wassert(L\"options != nullptr\", L\"C:\\\\testbed\\\\libs\\\\execution_context\\\\unit\\\\exe ecution_context_unit_test.cpp\", (unsigned)(1187)), 0)) ); ((void)( (!!(completion n_context != nullptr)) || (_wassert(L\"completion_context != nullptr\", L\"C:\\\\testb bed\\\\libs\\\\execution_context\\\\unit\\\\execution_context_unit_test.cpp\", (unsigned)( (1187)), 0)) ); ((void)( (!!(async_context != nullptr)) || (_wassert(L\"async_cont text != nullptr\", L\"C:\\\\testbed\\\\libs\\\\execution_context\\\\unit\\\\execution_context t_unit_test.cpp\", (unsigned)(1187)), 0)) ); ebpf_async_complete(async_context, op ptions->data_size_out, result); }) == EBPF_PENDING for: 28 == 28 [#37765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#28130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 6051 16 (0xec64) [#9032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 625 (0x2 271) == 625 (0x271) [#13040]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#11131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#21171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139129 ( (0x21f79) == 139129 (0x21f79) [#19973]", "bindmonitor-jit :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 ebpf_program_load failed with 76: Upper bound must be at most packet_size (valid d_access(r3.offset, width=r4) for read) [#40993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169 == 1 169 [#19253]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 326 (0x146) == 326 (0x146) [#40557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#36750]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#30]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21487]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 124 == 124 [#39111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 186624 ( (0x2d900) == 186624 (0x2d900) [#13854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21482]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38996]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 253009 ( (0x3dc51) == 253009 (0x3dc51) [#32701]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14101]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43681 (0xa aaa1) == 43681 (0xaaa1) [#936]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#11304]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#200]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1752]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 42 == 42 [#38961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30668]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38375]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 188356 (0 0x2dfc4) == 188356 (0x2dfc4) [#1386]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#34856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26541]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#22710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#11310]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#30334]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#10559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26632]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28162]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37944]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 868 (0x364) == 868 (0x364) [#40286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 3841 16 (0x9610) [#8882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#23191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#23155]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#27974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12715]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 114 == 114 [#39106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#35223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#35316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2938]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 350 (0x15e) == = 350 (0x15e) [#39869]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#11001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32078]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2149]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 138384 ( (0x21c90) == 138384 (0x21c90) [#26204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25150]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#35758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28561 (0 0x6f91) == 28561 (0x6f91) [#13328]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39577]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37936]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#29025]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 398 (0x18e) == 398 (0x18e) [#40521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#28860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#28816]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25014]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31216]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14055]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36100 (0 0x8d04) == 36100 (0x8d04) [#19607]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7911]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38091]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26796]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31084]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 74 == 74 [#39142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#11438]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#30434]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#30051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37065]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5772]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7618]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#413]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"0.0.0.0/0\" == \"0.0.0.0/0\" with 2 messages: 'key_string := \"0.0.0.0/0\"' and 'correct_value := \"0.0.0.0/0\"' [#37454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20746]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"172.16.0.0/11\"' and 'return_value := {null string}' [#37559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#23018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20305]", "serialize_program_info_test :: ebpf_deserialize_program_info(serialized_length, unique_buffer.get(), , &out_program_info) == EBPF_SUCCESS for: 0 == 0 [#38791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22814]", "pinning_test :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38476]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7905]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3592]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#27995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#21366]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.14.0/30\"' [#37483]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26555]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 690 (0x2b2) == = 690 (0x2b2) [#40039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#20985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8490]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#28385]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#36469]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#28022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10133]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#11796]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24992]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31653]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#29715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21374]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#35686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31974]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19074]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25465]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38103]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0x x1b9) [#9854]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#30187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#21675]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6658]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14270]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9751]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18697]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18605]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#23348]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8139]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#29035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#27704]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26876]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24587]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#34956]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7390]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#10442]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14909]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#52]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#24158]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31140]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#10615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14084]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19472]", "bindmonitor-bpf2bpf-interpret :: error == 0 for: 0 == 0 [#41032]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39386]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40893]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37370]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#10680]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10816 (0 0x2a40) == 10816 (0x2a40) [#31903]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37883]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38129]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8545]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12298]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 206116 (0 0x32524) == 206116 (0x32524) [#7663]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#10007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14397]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#29758]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33239]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#11135]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19522]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 24 47009 (0x3c4e1) [#9785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18320]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31424]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6532]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1825]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5854]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 193600 (0 0x2f440) == 193600 (0x2f440) [#1398]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#11952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19374]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84681 (0 0x14ac9) == 84681 (0x14ac9) [#19809]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#10064]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164025 ( (0x280b9) == 164025 (0x280b9) [#13800]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.0.0.0/8\"' [#37489]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#33639]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25166]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19881 (0x4 4da9) == 19881 (0x4da9) [#800]", "ring_buffer_async_query :: ebpf_map_push_entry(map.get(), 0, nullptr, 0) == EBPF_OPERATION_NOT_S SUPPORTED for: 18 == 18 [#37809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#21276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#23410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7060]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 14 == 14 [#38874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7906]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19490]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#30244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 203401 ( (0x31a89) == 203401 (0x31a89) [#32597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#21063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#23636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#27074]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#30087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10000 (0 0x2710) == 10000 (0x2710) [#13190]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25613]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169 == 169 [#30623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#36598]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7798]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#11090]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38704]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9813]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#21705]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 222 == 222 [#40609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20822]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#22343]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31152]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 720 (0x2d0) == 720 (0x2d0) [#40360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27889 (0 0x6cf1) == 27889 (0x6cf1) [#13324]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#35486]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37850]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12901]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46656 (0 0xb640) == 46656 (0xb640) [#13422]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21406]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32020]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6370]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2139]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#371]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13791]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#29794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21566]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31315]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18928]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#33408]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21766]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5849]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#11591]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 10 04329 (0x19789) [#9263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18870]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#11297]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14493]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31591]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#11724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#23729]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31534]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#29752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#23653]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7913]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 796 (0x31c) == 796 (0x31c) [#40322]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36991]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6017]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2119]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37027]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22500 (0 0x57e4) == 22500 (0x57e4) [#25760]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#22925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20352]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#29062]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7166]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38023]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39376]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#11444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#22721]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3177]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18827]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#11005]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#27251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32304]", "bindmonitor-tailcall-native :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#41046]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#22552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#11890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7190]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61009 (0 0xee51) == 61009 (0xee51) [#19721]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88804 (0x x15ae4) == 88804 (0x15ae4) [#1114]", "droppacket-interpret :: hook.attach_link(program_fd, &if_index, sizeof(if_index), &link) == E EBPF_SUCCESS for: 0 == 0 [#40937]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#23]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24336 (0 0x5f10) == 24336 (0x5f10) [#25772]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#29673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#23193]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 132 == 132 [#39760]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 224676 (0 0x36da4) == 224676 (0x36da4) [#7703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#11623]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27600]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22256]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#35544]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63001 (0 0xf619) == 63001 (0xf619) [#13492]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5929 (0x x1729) == 5929 (0x1729) [#19381]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28491]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 180 == 180 [#40630]", "ring_buffer_async_query :: completion.value == value for: 1 == 1 [#37798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12685]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 22 22784 (0x36640) [#9710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13681]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#24329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123201 ( (0x1e141) == 123201 (0x1e141) [#26162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28404]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14161 (0 0x3751) == 14161 (0x3751) [#31933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128164 ( (0x1f4a4) == 128164 (0x1f4a4) [#19943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 154449 ( (0x25b51) == 154449 (0x25b51) [#32481]", "hash_table_test :: memcmp(values[index], data_3.data(), data_3.size()) == 0 for: 0 == 0 [#38435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#22348]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19024]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"DD/116\" == \"DD/116\" wit th 1 message: 'key_string := \"DD/116\"' [#37597]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6446]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#30437]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5944]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#27362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#22146]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18407]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24964 (0 0x6184) == 24964 (0x6184) [#25776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33497]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#10842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24843]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#21423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#35412]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#22056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#22543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6315]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22500 (0 0x57e4) == 22500 (0x57e4) [#31995]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24842]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#29080]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#153]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7210]", "bindmonitor-bpf2bpf-interpret :: ebpf_object_set_execution_type(_object, _execution_type) == EBPF_SUCC CESS for: 0 == 0 [#41030]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"BB/64\" == \"BB/64\" with 1 message: 'key_string := \"BB/64\"' [#37605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#23650]", "trampoline_test :: ebpf_get_trampoline_function( table.get(), 0xFFFF + 1, reinterpret_ca ast<void**>(&test_function)) == EBPF_SUCCESS for: 0 == 0 [#38725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33418]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1811]", "droppacket-jit :: bpf_map_delete_elem(dropped_packet_map_fd, &key) == EBPF_SUCCESS for: : 0 == 0 [#40881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#29980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#35637]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8976]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21619]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47961 (0 0xbb59) == 47961 (0xbb59) [#32133]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37272]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27402]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173056 (0 0x2a400) == 173056 (0x2a400) [#7587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#24286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#34710]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#29648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#23283]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#21090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#28764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 260100 ( (0x3f804) == 260100 (0x3f804) [#20247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9468]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26828]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#34416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#29952]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#11538]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#11744]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#30410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75076 (0 0x12544) == 75076 (0x12544) [#19775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 529 (0x2 211) == 529 (0x211) [#19273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#11770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#23214]", "hash_table_stress_test :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38466]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18513]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19204]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33188]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38611]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#22206]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12216]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8011]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 242 == 242 [#40599]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/64\"' [#37662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#28361]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#35210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121 == 1 121 [#19249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#21558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24735]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#23418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28477]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25107]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19366]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5811]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#10616]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#10917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12198]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1553]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#11037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20601]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#24107]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#23365]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1567]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5766]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#250]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#28013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25418]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38206]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 10 06276 (0x19f24) [#9272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#24146]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#34969]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5908]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30976 (0 0x7900) == 30976 (0x7900) [#32047]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 4708 89 (0xb7f1) [#8945]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26700]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#11626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#22628]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36970]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26665]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6400 (0x x1900) == 6400 (0x1900) [#31855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#29919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40000 (0 0x9c40) == 40000 (0x9c40) [#19627]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32870]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23409 (0 0x5b71) == 23409 (0x5b71) [#13296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8252]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#11325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#23870]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 185761 ( (0x2d5a1) == 185761 (0x2d5a1) [#32557]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42849 (0xa a761) == 42849 (0xa761) [#932]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#30379]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81796 (0 0x13f84) == 81796 (0x13f84) [#32267]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#35211]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5756]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3397]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#23872]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#10223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#35957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30894]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#35909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126025 ( (0x1ec49) == 126025 (0x1ec49) [#19937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34184]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#22515]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2218]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7979]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#338]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22018]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26451]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#34847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#34993]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#11308]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 750 076 (0x12544) [#9116]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#27992]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#23981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32370]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#28979]", "hash_table_test :: returned_key == key_3 for: { 'Q', 'ì', '3', 'j', '≤', 29, 15, '│', 25 5, 'ù', 16, 'ê', '2' } == { 'Q', 'ì', '3', 'j', '≤', 29, 15, '│', 25, 'ù', 16, 'ê ê', '2' } [#38455]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24474]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 529 (0x2 211) == 529 (0x211) [#25506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#11141]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"192.168.0.0/16\" != nullptr with 2 messa ages: 'key_string := \"192.168.0.0/16\"' and 'return_value := \"192.168.0.0/16\"' [#37540]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#479]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9762]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39611]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6970]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#28115]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#29967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#10290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30773]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 529 (0x2 211) == 529 (0x211) [#31741]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12650]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15101]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#22313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14432]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#11915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32038]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0x x240) [#8366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21350]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 24 == 24 [#38928]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9267]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11236 (0 0x2be4) == 11236 (0x2be4) [#19439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#30655]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#36157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34045]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 242064 ( (0x3b190) == 242064 (0x3b190) [#32679]", "droppacket-native :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#40914]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29028]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#10445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24522]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39453]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#30313]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#20826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#28564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31263]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33652]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15625 (0x3 3d09) == 15625 (0x3d09) [#768]", "EBPF_OPERATION_LINK_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38219]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39048]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#35197]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#489]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31329 (0x7 7a61) == 31329 (0x7a61) [#872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14265]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#30020]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18510]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#10419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12561]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#29357]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 229441 ( (0x38041) == 229441 (0x38041) [#32653]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145924 ( (0x23a04) == 145924 (0x23a04) [#19991]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28129]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#35347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#29159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#21441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14070]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12996 (0 0x32c4) == 12996 (0x32c4) [#31923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#11380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28258]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25227]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#30046]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#22639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12000]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#30619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12560]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#28872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18477]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14193]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 241081 ( (0x3adb9) == 241081 (0x3adb9) [#26442]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34537]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1928]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#35744]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38180]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#309]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#36186]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13469]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6062]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22491]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#28244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60025 (0x xea79) == 60025 (0xea79) [#7245]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 254016 ( (0x3e040) == 254016 (0x3e040) [#26468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30276 (0 0x7644) == 30276 (0x7644) [#13338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14879]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3519]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9315]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#29688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9318]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#28211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22003]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7462]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#22713]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3522]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22220]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3231]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#30270]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22801 (0 0x5911) == 22801 (0x5911) [#19529]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31257]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#11046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34090]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 1464 41 (0x3931) [#9966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28045]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#22355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1415]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26257]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35721 (0x8 8b89) == 35721 (0x8b89) [#896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12711]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22052]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 760 (0x2f8) == 760 (0x2f8) [#40340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#11752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15919]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8971]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9 == 9 [#35472]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3136 (0x xc40) == 3136 (0xc40) [#19339]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144 == 1 144 [#31719]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32182]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30734]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#34230]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256036 (0 0x3e824) == 256036 (0x3e824) [#1530]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1225 (0x x4c9) == 1225 (0x4c9) [#13060]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#35186]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168100 (0 0x290a4) == 168100 (0x290a4) [#1338]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#29925]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2487]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39297]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31625]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12970]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1067]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#10599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#10155]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3969 (0x xf81) == 3969 (0xf81) [#25586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16273]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8836 (0x x2284) == 8836 (0x2284) [#31883]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#35058]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4167]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2082]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38200]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119025 (0 0x1d0f1) == 119025 (0x1d0f1) [#1208]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32542]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#34906]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26659]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5758]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 1 for: 1 == 1 [#38462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#30530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#35763]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12939]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38369]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#35515]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2194]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34096]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31294]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#36892]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8064]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13481]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#23319]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#29845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#28773]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16 == 16 [#34971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18508]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68644 (0 0x10c24) == 68644 (0x10c24) [#25984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25034]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#22854]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#29529]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8697]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#35141]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#23858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19868]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 193600 ( (0x2f440) == 193600 (0x2f440) [#26340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18464]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#34020]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#35068]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10201 (0 0x27d9) == 10201 (0x27d9) [#25662]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26794]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#36421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#22376]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57121 (0x xdf21) == 57121 (0xdf21) [#7233]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#11703]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 183184 ( (0x2cb90) == 183184 (0x2cb90) [#32551]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 258064 (0 0x3f010) == 258064 (0x3f010) [#1534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#22371]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#22623]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38696]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 934 (0x3a6) == 934 (0x3a6) [#40253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#23835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18488]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112896 ( (0x1b900) == 112896 (0x1b900) [#32367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 188356 ( (0x2dfc4) == 188356 (0x2dfc4) [#20095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12724]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#23525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9319]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9604 (0x x2584) == 9604 (0x2584) [#13186]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"DD/124\"' [#37592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#23291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31918]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26854]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/32\"' and 'correct_value := \"BB/32\"' [#37646]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 334 (0x14e) == 334 (0x14e) [#40553]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 8 == 8 [#38813]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20761]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20186]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6319]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18874]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12668]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 600 (0x258) == = 600 (0x258) [#39994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33143]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#35618]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12394]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#11557]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15491]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37995]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5041 (0x x13b1) == 5041 (0x13b1) [#31837]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#27017]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27453]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25899]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8356]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#33516]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#30510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#35477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31489]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27922]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"192.169.0.0/24\"' and 'return_value := {null string}' [#37551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20375]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34424]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27889 (0 0x6cf1) == 27889 (0x6cf1) [#25794]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 648 (0x288) == 648 (0x288) [#40396]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2565]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#23261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#22577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15725]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30843]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26616]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31023]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32672]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6680]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#30139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#10151]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 6144 (0x1800) <= 12288 (0x3 3000) [#11441]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#24188]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21616]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#22895]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#35327]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32060]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 280 (0x118) == 280 (0x118) [#40580]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 778 (0x30a) == = 778 (0x30a) [#40083]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15194]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#36718]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#36474]", "async :: !cancellation_context.canceled for: true [#40738]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#34888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28027]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 233289 (0 0x38f49) == 233289 (0x38f49) [#1484]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#11340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#24182]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114921 (0 0x1c0e9) == 114921 (0x1c0e9) [#1196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 218089 ( (0x353e9) == 218089 (0x353e9) [#13924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1681 (0x x691) == 1681 (0x691) [#13072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37297]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#11034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101124 ( (0x18b04) == 101124 (0x18b04) [#19863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#36852]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 241081 (0 0x3adb9) == 241081 (0x3adb9) [#7737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139129 ( (0x21f79) == 139129 (0x21f79) [#26206]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#11324]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#607]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#10791]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26025]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 201601 ( (0x31381) == 201601 (0x31381) [#32593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18583]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31394]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3276]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#35741]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1849 (0x73 39) == 1849 (0x739) [#604]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#29149]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#10641]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#11894]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#36384]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39515]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#36220]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#36005]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 236196 ( (0x39aa4) == 236196 (0x39aa4) [#32667]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34078]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39296]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#565]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#34870]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26913]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33499]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9064]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13225 (0x3 33a9) == 13225 (0x33a9) [#748]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#11913]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#24121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#35601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#34986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14133]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18619]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3025]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 104 == 104 [#39101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#10213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58564 (0 0xe4c4) == 58564 (0xe4c4) [#19711]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90000 (0x x15f90) == 90000 (0x15f90) [#7355]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#10836]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#35002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#22439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#27587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12262]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#23402]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#33273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#23766]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#35742]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 74529 (0 0x12321) == 74529 (0x12321) [#13536]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#10244]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38700]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 452 (0x1c4) == 452 (0x1c4) [#40494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139876 (0 0x22264) == 139876 (0x22264) [#7503]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11236 (0 0x2be4) == 11236 (0x2be4) [#25672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22102]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#23344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36936]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20427]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#29286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6376]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39042]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28384]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1 == 1 [#34767]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32942]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2025 (0x7e e9) == 2025 (0x7e9) [#608]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22154]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33331]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 70 == 70 [#39729]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12095]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#30169]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6295]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#34912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13387]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#35609]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#11363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#36337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#22536]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33319]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27712]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#11136]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5829]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21037]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21926]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65536 (0 0x10000) == 65536 (0x10000) [#32207]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32508]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2542]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12544 (0 0x3100) == 12544 (0x3100) [#31919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17161 (0 0x4309) == 17161 (0x4309) [#19489]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37261]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37713]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31275]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 12 25316 (0x1e984) [#9356]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27442]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18591]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#29362]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#29120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#10302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9604 (0x2 2584) == 9604 (0x2584) [#6951]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#29884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24572]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#23891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#34218]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#35771]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33109]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == EBPF_OBJECT_NOT_FOUND for: 7 == = 7 [#6232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 150544 ( (0x24c10) == 150544 (0x24c10) [#26236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#11307]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1219]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19846]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#29606]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#35177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#36422]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2283]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22530]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41096]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#23201]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#35821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#10203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#22194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11449 (0x x2cb9) == 11449 (0x2cb9) [#6969]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#27563]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#36392]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#29809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184900 ( (0x2d244) == 184900 (0x2d244) [#20087]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32452]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#35554]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39552]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#506]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 938 (0x3aa) == = 938 (0x3aa) [#40163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#23885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 155236 ( (0x25e64) == 155236 (0x25e64) [#26248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31251]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32556]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#36587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#23166]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20736 (0 0x5100) == 20736 (0x5100) [#13278]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#21168]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 243049 (0 0x3b569) == 243049 (0x3b569) [#1504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#34080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#23357]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 26 == 26 [#39707]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#36214]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 10 03684 (0x19504) [#9260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#11467]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 194481 (0 0x2f7b1) == 194481 (0x2f7b1) [#7637]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15152]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31515]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 128 == 128 [#40656]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) == EBPF_INVALID_OBJECT for: 5 == 5 [#38084]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15844]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#24163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#23187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123201 ( (0x1e141) == 123201 (0x1e141) [#19929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20366]", "invalid_bpf_get_socket_cookie :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#42115]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#907]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#36120]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#33903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21002]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#30289]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#28718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80089 (0 0x138d9) == 80089 (0x138d9) [#19793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19137]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34022]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#36641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14729]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1634]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#28796]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#35603]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#23863]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26646]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#23332]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 516 (0x204) == = 516 (0x204) [#39952]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50176 (0 0xc400) == 50176 (0xc400) [#25908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#29103]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25196]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37910]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 13 33225 (0x20869) [#9389]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 6250 00 (0xf424) [#9044]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#28466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#10753]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33661]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 566 (0x236) == = 566 (0x236) [#39977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6392]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25186]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#10440]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1153]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#11733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18772]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 251001 ( (0x3d479) == 251001 (0x3d479) [#26462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#22014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26764]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#29161]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 79524 (0x x136a4) == 79524 (0x136a4) [#1082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#28133]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 286 (0x11e) == 286 (0x11e) [#40577]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38321]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#30282]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#35158]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35721 (0 0x8b89) == 35721 (0x8b89) [#25838]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38594]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#29334]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 164 == 164 [#40638]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7569 (0x x1d91) == 7569 (0x1d91) [#31869]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2979]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3456]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106276 (0 0x19f24) == 106276 (0x19f24) [#1170]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 1322 25 (0x33a9) [#9958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9559]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0x x349) [#8381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33800]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#30486]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 996 (0x3e4) == 996 (0x3e4) [#40222]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#29880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21691]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 1188 81 (0x2e69) [#9952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 900 (0x3 384) == 900 (0x384) [#13050]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18414]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#23842]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20490]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#35325]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#10434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#35633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22171]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#10178]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600) [#4428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27447]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9409 (0x x24c1) == 9409 (0x24c1) [#25654]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7694]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38142]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 802 (0x322) == 802 (0x322) [#40319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#10893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#30361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61009 (0 0xee51) == 61009 (0xee51) [#13484]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#857]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#34975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#28615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12826]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 234256 (0 0x39310) == 234256 (0x39310) [#7723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 102400 ( (0x19000) == 102400 (0x19000) [#19867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#11712]", "pinning_test :: ebpf_pinning_table_allocate(&local_pinning_table) == EBPF_SUCCESS for r: 0 == 0 [#38480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#11080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#29470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14696]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#36788]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#34871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24964 (0 0x6184) == 24964 (0x6184) [#19543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18646]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#23833]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6167]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#29139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12853]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2727]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60025 (0 0xea79) == 60025 (0xea79) [#13480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#10869]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27322]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1107]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9504]", "serialize_program_info_test :: ebpf_serialize_program_info( &in_program_info, unique_buffer.get(), b buffer_length, &serialized_length, &required_length) == EBPF_SUCCESS for: 0 == 0 [#38790]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#10163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#34665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#10908]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#23977]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33184]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121 == 121 [#35227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#10344]", "EBPF_OPERATION_CREATE_MAP :: invoke_protocol(EBPF_OPERATION_CREATE_MAP, request, reply) == EBPF_IN NVALID_ARGUMENT for: 6 == 6 [#37922]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12151]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#11347]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#11203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#24310]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54756 (0xd d5e4) == 54756 (0xd5e4) [#986]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 344 (0x158) == 344 (0x158) [#40548]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14989]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 10 03041 (0x19281) [#9257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14282]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#30123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22777]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#30243]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#29961]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31896]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1209]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9216 (0x x2400) == 9216 (0x2400) [#19419]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14641 (0x3 3931) == 14641 (0x3931) [#760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 192721 ( (0x2f0d1) == 192721 (0x2f0d1) [#26338]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#28898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22069]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15299]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5888]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 2496 64 (0x6184) [#8768]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#36270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13105]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 874 (0x36a) == 874 (0x36a) [#40283]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16615]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8374]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#22877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 226576 ( (0x37510) == 226576 (0x37510) [#20179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#23851]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2536]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25240]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19354]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#23568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#21774]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5974]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2316]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20054]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#274]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 264 (0x108) == 264 (0x108) [#40588]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#10376]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#28358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#23678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13957]", "hash_table_test :: ebpf_hash_table_iterate(table.get(), &cookie, &count, keys.data(), va alues.data()) == EBPF_INSUFFICIENT_BUFFER for: 24 == 24 [#38430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#22488]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25697]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#36786]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24613]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#33954]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 890 (0x37a) == 890 (0x37a) [#40275]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32300]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20626]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 83521 (0x x14641) == 83521 (0x14641) [#7333]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#28622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6509]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#29257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#30111]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#36314]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6615]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7670]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#27422]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31341]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#36414]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37259]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 221841 ( (0x36291) == 221841 (0x36291) [#13932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20299]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#23654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36942]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#11392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24557]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#24173]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38809 (0x9 9799) == 38809 (0x9799) [#912]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#13]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18275]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37038]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38348]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64516 (0x xfc04) == 64516 (0xfc04) [#1026]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24906]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#11427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20277]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196 == 196 [#29861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#34254]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12963]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#23605]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2752]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 412 (0x19c) == 412 (0x19c) [#40514]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#30290]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 76 == 76 [#39141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36100 (0 0x8d04) == 36100 (0x8d04) [#13370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25306]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38279]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#34527]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 284 (0x11c) == = 284 (0x11c) [#39836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#8318]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#34781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#29053]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#21384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#30446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20798]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 236 == 236 [#40602]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32761 (0 0x7ff9) == 32761 (0x7ff9) [#32057]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#10397]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#30423]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19118]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33010]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/64\" == \"BB/64\" wi ith 2 messages: 'key_string := \"BB/126\"' and 'correct_value := \"BB/64\"' [#37637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 89401 (0 0x15d39) == 89401 (0x15d39) [#19825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24719]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#28642]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#20793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32500]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39196]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#30591]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1883]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#11673]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#28178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32592]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#29051]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#29269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#23637]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7864]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8005]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6388]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#10215]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 168 == 168 [#39778]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 ( (0xe10) [#9897]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16129 (0x3 3f01) == 16129 (0x3f01) [#772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#22539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24605]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 237169 ( (0x39e71) == 237169 (0x39e71) [#26434]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#27467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 222784 ( (0x36640) == 222784 (0x36640) [#13934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21395]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20006]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#10169]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 76 == 76 [#40682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24593]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2328]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 89401 (0x x15d39) == 89401 (0x15d39) [#7353]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#22333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#35438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15427]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20938]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#10367]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 103684 ( (0x19504) == 103684 (0x19504) [#26104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21626]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7732]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"192.169.0.0/32\"' and 'return_value := {null string}' [#37549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#35406]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66049 (0 0x10201) == 66049 (0x10201) [#13504]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 258064 ( (0x3f010) == 258064 (0x3f010) [#14006]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6329]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#27299]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164025 (0 0x280b9) == 164025 (0x280b9) [#7565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#23137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#24260]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13491]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 230400 (0 0x38400) == 230400 (0x38400) [#7715]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#36652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6084 (0x x17c4) == 6084 (0x17c4) [#13146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#34758]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42436 (0 0xa5c4) == 42436 (0xa5c4) [#32107]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9237]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#11384]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#10287]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#21147]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1647]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 646 (0x286) == = 646 (0x286) [#40017]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 806 656 (0x13b10) [#9146]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14653]", "serialize_program_info_test :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38787]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21609 (0x5 5469) == 21609 (0x5469) [#812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15803]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#10174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30718]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 239121 (0 0x3a611) == 239121 (0x3a611) [#1496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33856 (0 0x8440) == 33856 (0x8440) [#32063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14888]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 252004 ( (0x3d864) == 252004 (0x3d864) [#32699]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#27281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24462]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50176 (0x xc400) == 50176 (0xc400) [#7203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12593]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26527]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#35086]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37351]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 578 (0x242) == = 578 (0x242) [#39983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#29707]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14365]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#36597]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12457]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33340]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39612]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28251]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1447]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30714]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39197]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20112]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#23809]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 165649 ( (0x28711) == 165649 (0x28711) [#32509]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 214 == 214 [#40613]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7883]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#10886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18834]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#29277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13129]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26831]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#23020]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34390]", "bindmonitor-bpf2bpf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41018]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4225 (0x x1081) == 4225 (0x1081) [#13120]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 106 == 106 [#39126]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#36033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33901]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25945]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 ( (0x510) [#9871]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7764]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#10060]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#29538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#35862]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 198 == 198 [#39793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6459]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#29390]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28293]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#29148]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1533]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27081]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#36395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#24111]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 245025 (0 0x3bd21) == 245025 (0x3bd21) [#1508]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#36831]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#11211]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#23206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24737]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31026]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 0 == 0 [#6755]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#29917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75076 (0 0x12544) == 75076 (0x12544) [#32243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#30116]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38271]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#27143]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 56 == 56 [#38944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#36304]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#36004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#23021]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9216 (0x24 400) == 9216 (0x2400) [#710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9597]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(previous_key), reinterpret_cast<c const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key)) == EBPF_NO O_MORE_KEYS for: 25 == 25 [#2054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7574]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 2755 56 (0x6ba4) [#8792]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#23951]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1296 (0x51 10) == 1296 (0x510) [#590]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#287]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24987]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5476 (0x15 564) == 5476 (0x1564) [#666]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148996 ( (0x24604) == 148996 (0x24604) [#32467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#11461]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2733]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#28671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14321]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#29461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#28885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21260]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 107584 ( (0x1a440) == 107584 (0x1a440) [#26116]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7746]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 710 (0x2c6) == = 710 (0x2c6) [#40049]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#29126]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#22736]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 400 (0x1 190) == 400 (0x190) [#13030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#21510]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8071]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19814]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5768]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53824 (0x xd240) == 53824 (0xd240) [#7219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 257049 ( (0x3ec19) == 257049 (0x3ec19) [#14004]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#29313]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2425]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106276 ( (0x19f24) == 106276 (0x19f24) [#26112]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31067]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#35132]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4900 (0x x1324) == 4900 (0x1324) [#25600]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32941]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 908 (0x38c) == 908 (0x38c) [#40266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18377]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31693]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20289]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24682]", "state_test :: allocated_index_2 != allocated_index_1 for: 1 != 0 [#38826]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 8 == 8 [#38920]", "EBPF_OPERATION_RESOLVE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37841]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25120]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#22248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31440]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#28741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12321 (0 0x3021) == 12321 (0x3021) [#25682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32736]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#28286]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190096 (0 0x2e690) == 190096 (0x2e690) [#1390]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33053]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 60 == 60 [#40690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14157]", "EBPF_OPERATION_GET_PINNED_OBJECT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(previous_key), reinterpret_cast<c const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key)) == EBPF_NO O_MORE_KEYS for: 25 == 25 [#8291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#34089]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14401]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8036]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20688]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 172225 ( (0x2a0c1) == 172225 (0x2a0c1) [#13820]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21106]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#30105]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46656 (0x xb640) == 46656 (0xb640) [#7187]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126736 (0 0x1ef10) == 126736 (0x1ef10) [#1230]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 252004 ( (0x3d864) == 252004 (0x3d864) [#13994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13289]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#357]", "droppacket-native :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40913]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 25 50000 (0x3d090) [#9794]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#35451]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3433]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#11413]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#29996]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13279]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"10.0.0.0/8\" != nullptr with 2 messages: : 'key_string := \"10.0.0.0/8\"' and 'return_value := \"10.0.0.0/8\"' [#37546]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15242]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#28913]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#36217]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3802]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33811]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#22856]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2673]", "error codes :: result2 == result for: 14 == 14 [#40796]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"0.0.0.0/0\"' and 'return_value := {null string}' [#37564]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33659]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#29999]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#384]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32968]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#10512]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26341]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41134]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 692 (0x2b4) == 692 (0x2b4) [#40374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#30336]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#31181]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#36387]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1739]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31057]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2254]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8865]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#35837]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 15 58404 (0x26ac4) [#9488]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"10.0.0.1/33\"' [#37509]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 520 (0x208) == = 520 (0x208) [#39954]", "epoch_test_single_epoch_cache_aligned :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38501]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25561]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38117]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25463]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32818]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12769 (0x x31e1) == 12769 (0x31e1) [#6981]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 0 for: 0 == 0 [#38464]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#28755]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8569]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29584 (0 0x7390) == 29584 (0x7390) [#13334]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#30369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#11827]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#35434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#22909]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#18711]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7869]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#23714]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#10425]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 386 (0x182) == = 386 (0x182) [#39887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 159201 ( (0x26de1) == 159201 (0x26de1) [#32493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21227]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38004]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20313]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#28100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44944 (0 0xaf90) == 44944 (0xaf90) [#19651]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15877]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1035]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#29877]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 628 (0x274) == = 628 (0x274) [#40008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14087]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39567]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31788]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#11061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27339]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7394]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#21264]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9240]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#29602]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#21318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14363]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27675]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1566]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 162409 ( (0x27a69) == 162409 (0x27a69) [#26266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39204 (0 0x9924) == 39204 (0x9924) [#13386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6846]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7300]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#29279]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#23134]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24964 (0x x6184) == 24964 (0x6184) [#7071]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#10696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 86436 (0 0x151a4) == 86436 (0x151a4) [#19815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7716]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#417]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13087]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12704]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14182]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#35853]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14444]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#10256]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#21396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#22858]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#35478]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#35341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#27371]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == = 0 [#4]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#10708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#10207]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#11092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15523]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#36471]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6065]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18282]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12182]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#34443]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#20886]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 (0x17c4) [#8528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18621]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31369]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#36574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27255]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#11558]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145924 (0 0x23a04) == 145924 (0x23a04) [#1282]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72361 (0 0x11aa9) == 72361 (0x11aa9) [#25998]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26820]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100489 ( (0x18889) == 100489 (0x18889) [#13624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#33381]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#34488]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 934 (0x3a6) == = 934 (0x3a6) [#40161]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38396]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14400 (0x3 3840) == 14400 (0x3840) [#758]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#38983]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39537]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#35294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13533]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 180625 (0 0x2c191) == 180625 (0x2c191) [#7605]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31922]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6864]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8123]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38770]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2638]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31161]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#36760]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#11529]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#10658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#35311]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#21288]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 194481 ( (0x2f7b1) == 194481 (0x2f7b1) [#32577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19644]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#11753]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91204 (0x x16444) == 91204 (0x16444) [#1122]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33856 (0x x8440) == 33856 (0x8440) [#7123]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1552]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20433]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#10808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#21684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 ( (0xb64) [#9891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#11859]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33320]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#29614]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#23731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#30154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#24109]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32474]", "ring_buffer_async_query :: ebpf_map_peek_entry(map.get(), 0, nullptr, 0) == EBPF_OPERATION_NOT_S SUPPORTED for: 18 == 18 [#37811]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9685]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#427]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34484]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2788]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12550]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3199]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20338]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21091]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 376 (0x178) == = 376 (0x178) [#39882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12222]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#10233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14972]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: invoke_protocol(EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER, request, , reply) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38361]", "EBPF_OPERATION_UPDATE_PINNING :: invoke_protocol(EBPF_OPERATION_UPDATE_PINNING, request) == EBPF_INVAL LID_ARGUMENT for: 6 == 6 [#38186]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23104 (0 0x5a40) == 23104 (0x5a40) [#13294]", "map_crud_operations_stack :: return_value == value for: 6 == 6 [#37738]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 12 == 12 [#39055]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2304 (0x900) == 2304 ( (0x900) [#8438]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#36846]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37972]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#36017]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#24051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#33230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6693]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33124 (0x8 8164) == 33124 (0x8164) [#882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == EBPF_OBJECT_NOT_FOUND for: 7 = == 7 [#18704]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#10839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25297]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15742]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#30048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12542]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39039]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 24 <= 204 [#10400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12479]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39688]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#23616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31451]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 594 (0x252) == = 594 (0x252) [#39991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13843]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26617]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 970 (0x3ca) == = 970 (0x3ca) [#40179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#28581]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 1932 21 (0x4b79) [#9986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 1392 24 (0x3664) [#8648]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#35607]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32725]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12263]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26127]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#318]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#36770]", "async :: !cancellation_context.canceled for: true [#40731]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#24246]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#23657]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33992]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28345]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#35849]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#36476]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 240100 ( (0x3a9e4) == 240100 (0x3a9e4) [#20207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20818]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13689 (0 0x3579) == 13689 (0x3579) [#31929]", "EBPF_OPERATION_GET_EC_FUNCTION :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38242]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#22327]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8674]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 2102 25 (0x5221) [#8729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21433]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#29076]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15278]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 188356 ( (0x2dfc4) == 188356 (0x2dfc4) [#32563]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"19 92.168.14.0/29\"' [#37520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#21627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21178]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25281 (0 0x62c1) == 25281 (0x62c1) [#19545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12515]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 ( (0x441) [#9866]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 1537 76 (0x3c10) [#8666]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 247009 (0 0x3c4e1) == 247009 (0x3c4e1) [#7749]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30740]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3526]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1836]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27055]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == 0 for: 0 == 0 [#42105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14623]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19524]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33844]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14508]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32244]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#29694]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#23314]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#12999]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39038]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37698]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36996]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#35575]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#35457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25378]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8185]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#36509]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#79]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15625 (0 0x3d09) == 15625 (0x3d09) [#31945]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31954]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#28533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32076]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#10542]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6118]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#29352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#21153]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#29659]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#36103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#21003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 11 10224 (0x1ae90) [#9290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28015]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1521 (0x5 5f1) == 1521 (0x5f1) [#6833]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20923]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 480 (0x1e0) == = 480 (0x1e0) [#39934]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27555]", "state_test :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27904]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 289 (0x1 121) == 289 (0x121) [#31729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#23382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#30638]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7954]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#24088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#21570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18419]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#29882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7172]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9120]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6241 (0x18 861) == 6241 (0x1861) [#676]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#27683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26714]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 204304 ( (0x31e10) == 204304 (0x31e10) [#32599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#28958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25103]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#28778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#35964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20559]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#36135]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#10036]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1674]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#29782]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 914 (0x392) == 914 (0x392) [#40263]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#11245]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 576 (0x2 240) == 576 (0x240) [#19275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84100 (0 0x14884) == 84100 (0x14884) [#13570]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 125316 ( (0x1e984) == 125316 (0x1e984) [#26168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#22861]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#29433]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26930]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#11102]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"192.168.0.0/0\"' and 'return_value := {null string}' [#37555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93636 (0 0x16dc4) == 93636 (0x16dc4) [#19839]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 138 == 138 [#40651]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#29468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59049 (0x xe6a9) == 59049 (0xe6a9) [#7241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15134]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#36479]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#11822]", "error codes :: result2 == result for: 25 == 25 [#40807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12404]", "map_create_invalid :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'name := \"BPF_MAP_TYPE_RINGBUF\"' [#37419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1444 (0x x5a4) == 1444 (0x5a4) [#19303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#23128]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6535]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25243]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9165]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24676]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 118 == 118 [#39120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#10935]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#27035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#36668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#11024]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#23440]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24964 (0x6 6184) == 24964 (0x6184) [#834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#23331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7812]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#159]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 4000 00 (0x9c40) [#8894]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#172]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#22899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#30279]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14906]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32108]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5990]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24469]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27183]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 109561 ( (0x1abf9) == 109561 (0x1abf9) [#26122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#30166]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#10033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#22444]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2385]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26552]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 190969 ( (0x2e9f9) == 190969 (0x2e9f9) [#32569]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20935]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25647]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37005]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#11414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#23066]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 1664 41 (0x4101) [#9974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#11537]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32804]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27079]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19098]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#35619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#20769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#24014]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#35008]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#35268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21863]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19600 (0x x4c90) == 19600 (0x4c90) [#7035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 193600 ( (0x2f440) == 193600 (0x2f440) [#32575]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126025 (0 0x1ec49) == 126025 (0x1ec49) [#1228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15014]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12730]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#36172]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#10994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#27440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#23967]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#23543]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#24402]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#22990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#35979]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32909]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38574]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19193]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21574]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5799]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#29443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100 == 1 100 [#19247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8998]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10404 (0 0x28a4) == 10404 (0x28a4) [#25664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#36465]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7957]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#34173]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39316]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#24042]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"192.168.14.0/31\" != nullptr with 2 mess sages: 'key_string := \"192.168.14.0/31\"' and 'return_value := \"192.168.14.0/31\"' [#37531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#22997]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#27104]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#23608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#22742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#22433]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#35958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#29328]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 ( (0xc40) [#8462]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26490]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#28379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#22380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18293]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 210 == 210 [#40615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#23463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15026]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 361 (0x1 169) == 361 (0x169) [#13028]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50625 (0 0xc5c1) == 50625 (0xc5c1) [#32145]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 (0x1ce4) [#8552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#29311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#11471]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#33873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#22368]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30694]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#33591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#22827]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#11101]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2527]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#23674]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#33840]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12769 (0x3 31e1) == 12769 (0x31e1) [#744]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#24231]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 98 == 98 [#40671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#11379]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 550 (0x226) == = 550 (0x226) [#39969]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12193]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#525]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9025 (0x x2341) == 9025 (0x2341) [#31885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25909]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#11481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33988]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#33405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#22717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#22743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22776]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39627]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121104 (0 0x1d910) == 121104 (0x1d910) [#7451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11881 (0 0x2e69) == 11881 (0x2e69) [#13208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#30462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#21687]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#30532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#23751]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#35980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14113]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#35894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#23169]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1296 (0x x510) == 1296 (0x510) [#25532]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#34822]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18994]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#36654]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 490 (0x1ea) == 490 (0x1ea) [#40475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 1000 00 (0x2710) [#9941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31860]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32860]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37109]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90601 (0 0x161e9) == 90601 (0x161e9) [#32297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#28076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18208]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 237169 (0 0x39e71) == 237169 (0x39e71) [#7729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#30225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#36696]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#11442]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#30318]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12324]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9409 (0x2 24c1) == 9409 (0x24c1) [#6949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#29132]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1 == 1 [#25462]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27966]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12800]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54756 (0 0xd5e4) == 54756 (0xd5e4) [#19695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20544]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22153]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12670]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#35926]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 532 (0x214) == = 532 (0x214) [#39960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#23642]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 961 (0x3 3c1) == 961 (0x3c1) [#25522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25855]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93025 (0x x16b61) == 93025 (0x16b61) [#1128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14166]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8901]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#24129]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#476]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1746]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#29655]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14161 (0 0x3751) == 14161 (0x3751) [#13228]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0x x2a4) [#8372]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#36735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#27869]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#28352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12629]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1767]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#10199]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5819]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14452]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#24160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20328]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 22 == 22 [#39705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 729 (0x2 2d9) == 729 (0x2d9) [#25514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12817]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38281]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1043]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#30316]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20502]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29085]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#10357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27963]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12209]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2662]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#14009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#27302]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#24270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#10264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13935]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9558]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6641]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#10122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20851]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#36870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34763]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#27491]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25873]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94864 (0 0x17290) == 94864 (0x17290) [#32311]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90000 (0 0x15f90) == 90000 (0x15f90) [#13590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14190]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#23508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#21114]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 1960 00 (0x4c90) [#9987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 745 529 (0x12321) [#9113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27325]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#29926]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#10604]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38607]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18949]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24560]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#33681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19012]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"172.48.0.0/12\"' and 'return_value := {null string}' [#37556]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#21138]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14687]", "droppacket-jit :: hook.batch_begin(sizeof(state), state) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#40882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14713]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20560]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15080]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#36071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14202]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3304]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 211600 ( (0x33a90) == 211600 (0x33a90) [#13910]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33539]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39237]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21609 (0x x5469) == 21609 (0x5469) [#7049]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1185]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14280]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71824 (0 0x11890) == 71824 (0x11890) [#19763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#35914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#22383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19792]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20164 (0 0x4ec4) == 20164 (0x4ec4) [#31979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#23177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#23237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#21549]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#30444]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 890 (0x37a) == = 890 (0x37a) [#40139]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13685]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#11011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#30422]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.10.255.255/32\"' [#37429]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 494 (0x1ee) == 494 (0x1ee) [#40473]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2970]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7446]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#36072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#24416]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5890]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 828 (0x33c) == = 828 (0x33c) [#40108]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27625]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#29522]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#28795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34469]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#23812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121 == 1 121 [#13012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 249001 ( (0x3cca9) == 249001 (0x3cca9) [#20225]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#29737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#28713]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#28292]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#23838]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39340]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#27287]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#35408]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#24161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19063]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#23862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 1081 16 (0x2a40) [#8606]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#28861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37140]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91809 (0 0x166a1) == 91809 (0x166a1) [#32301]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20539]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#11778]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#29226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16003]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27663]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12181]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#22493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#29489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20845]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106276 ( (0x19f24) == 106276 (0x19f24) [#32347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14698]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7438]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33283]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27733]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#36076]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#36503]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 11 17649 (0x1cb91) [#9323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12225]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.14.0/30\"' [#37425]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#36020]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"192.168.15.0/24\" != nullptr with 2 mess sages: 'key_string := \"192.168.15.0/24\"' and 'return_value := \"192.168.15.0/24\"' [#37525]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14014]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#36839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8407]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57600 (0x xe100) == 57600 (0xe100) [#7235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#10023]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36962]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#11510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12492]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8107]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2365]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#28792]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32988]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37116]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8913]", "bindmonitor-ringbuf-jit :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41056]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38207]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 184041 ( (0x2cee9) == 184041 (0x2cee9) [#20085]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 4120 09 (0xa0f9) [#8903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#21681]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#10546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 16 69744 (0x29710) [#9530]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#21750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#24347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#22903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#35700]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10816 (0x x2a40) == 10816 (0x2a40) [#6963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18568]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61504 (0 0xf040) == 61504 (0xf040) [#32191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6278]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#28346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#23944]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8365]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#10572]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#11411]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22548]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7686]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#28604]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#36768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18602]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#10484]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#22934]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 0 == 0 [#38814]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 388 (0x184) == 388 (0x184) [#40526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15527]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88209 (0x x15891) == 88209 (0x15891) [#7349]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28572]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7815]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20014]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5748]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#484]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#11737]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29584 (0 0x7390) == 29584 (0x7390) [#19571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 ( (0x4c9) [#9870]", "droppacket-jit :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33313]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25154]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2048]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#23712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7750]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7863]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37636 (0 0x9304) == 37636 (0x9304) [#25848]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#28445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33019]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#35411]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 (0x1104) [#9903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25747]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27772]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33623]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#30396]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8163]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22229]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#27425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47089 (0 0xb7f1) == 47089 (0xb7f1) [#19661]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34489]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8836 (0x x2284) == 8836 (0x2284) [#25648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#10590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31519]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#22458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#73]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#30314]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#35807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198025 (0 0x30589) == 198025 (0x30589) [#7645]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9580]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#22500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37000]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87025 (0 0x153f1) == 87025 (0x153f1) [#32285]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#35907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#28268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14115]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30737]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#10646]", "droppacket-jit :: value == 0 for: 0 == 0 [#40875]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26081]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#21579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15802]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6810]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#10514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#10230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12312]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24965]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 158404 ( (0x26ac4) == 158404 (0x26ac4) [#32491]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19234]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38020]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 242064 (0 0x3b190) == 242064 (0x3b190) [#7739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#35673]", "map_crud_operations_lpm_trie_128 :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#37576]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38076]", "hash_table_test :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25262]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#36867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#35373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#28536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47961 (0 0xbb59) == 47961 (0xbb59) [#19665]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#35588]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18913]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 476 (0x1dc) == = 476 (0x1dc) [#39932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19321 (0 0x4b79) == 19321 (0x4b79) [#25738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8269]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24435]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#35631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20425]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#36041]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33191]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#22839]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#28684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12100 (0 0x2f44) == 12100 (0x2f44) [#31915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18394]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 167281 ( (0x28d71) == 167281 (0x28d71) [#26278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#21909]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#35600]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#10801]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64 == 64 [#34950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#36317]", "ring_buffer_reserve_submit_discard :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#40769]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#28747]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25005]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31692]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31672]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#29541]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#27260]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#35452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 188356 (0 0x2dfc4) == 188356 (0x2dfc4) [#7623]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1858]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 386 (0x182) == 386 (0x182) [#40527]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#27749]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14226]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#28899]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2916 (0xb b64) == 2916 (0xb64) [#6863]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34034]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6794]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39484]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 506 (0x1fa) == 506 (0x1fa) [#40467]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 171396 ( (0x29d84) == 171396 (0x29d84) [#13818]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 161604 ( (0x27744) == 161604 (0x27744) [#26264]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 208849 (0 0x32fd1) == 208849 (0x32fd1) [#7669]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7752]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27138]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32008]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5831]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1564]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6916]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 18 89225 (0x2e329) [#9599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#23928]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#23750]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#29333]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48841 (0xb bec9) == 48841 (0xbec9) [#960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15853]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49 == 49 [#35214]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31648]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 478 (0x1de) == 478 (0x1de) [#40481]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21823]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#35487]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#211]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37318]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 250000 (0 0x3d090) == 250000 (0x3d090) [#1518]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17956 (0x4 4624) == 17956 (0x4624) [#786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16236]", "bindmonitor-bpf2bpf-interpret :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#41025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#22880]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 20 02500 (0x31704) [#9644]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 638 (0x27e) == 638 (0x27e) [#40401]", "EBPF_OPERATION_RESOLVE_HELPER :: invoke_protocol(EBPF_OPERATION_RESOLVE_HELPER, request, reply) == EBP PF_INVALID_OBJECT for: 5 == 5 [#37835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7402]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 62 == 62 [#39148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7795]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#587]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24431]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#21174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#36610]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6796]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28236]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#35362]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#10770]", "EBPF_OPERATION_CREATE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9360]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173889 ( (0x2a741) == 173889 (0x2a741) [#26294]", "droppacket-interpret :: value == 1001 for: 1001 (0x3e9) == 1001 (0x3e9) [#40929]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#11288]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#597]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#24345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#23595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21827]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33919]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#35309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26518]", "get_authentication_id :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#40828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 189225 ( (0x2e329) == 189225 (0x2e329) [#13860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28230]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#35582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#10608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22297]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#36534]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19321 (0 0x4b79) == 19321 (0x4b79) [#19505]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7924]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#29860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26145]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#27149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#23780]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 552 (0x228) == = 552 (0x228) [#39970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33419]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18218]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#35851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18850]", "error codes :: result2 == result for: 29 == 29 [#40811]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25869]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12788]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32278]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25132]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 92 == 92 [#39133]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21074]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15497]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#27512]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26745]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91204 (0 0x16444) == 91204 (0x16444) [#32299]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2916 (0x xb64) == 2916 (0xb64) [#31803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20599]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#510]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12327]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#91]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14054]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31820]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1919]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#29753]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 116 == 116 [#39121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14954]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71824 (0 0x11890) == 71824 (0x11890) [#32231]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#30357]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 2310 04 (0x5a40) [#9999]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19412]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/32\" == \"BB/32\" wi ith 2 messages: 'key_string := \"BB/63\"' and 'correct_value := \"BB/32\"' [#37643]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25126]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#24118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14443]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#29977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14488]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"192.168.0.0/0\"' [#37569]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12203]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27202]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1521 (0x x5f1) == 1521 (0x5f1) [#13068]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&lpm_pair.first), 0, reinterpret_cast<const uint8_t*>(lpm_pair.second.c_str()), , EBPF_ANY, 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/ /33\"' [#37653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#35049]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 468 (0x1d4) == 468 (0x1d4) [#40486]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#35431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#29771]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#35357]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3839]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7056 (0x x1b90) == 7056 (0x1b90) [#31863]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38357]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#30040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9216 (0x x2400) == 9216 (0x2400) [#13182]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#35904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 24 46016 (0x3c100) [#9782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20680]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20250]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 138384 ( (0x21c90) == 138384 (0x21c90) [#13734]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5897]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#8312]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#27812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#34996]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39619]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35245]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21514]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37353]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#951]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#11364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 165649 ( (0x28711) == 165649 (0x28711) [#13804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21256]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#35172]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8295]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225625 ( (0x37159) == 225625 (0x37159) [#13940]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 21 13444 (0x341c4) [#9680]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#35602]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#21819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12024]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#34518]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#30644]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3844 (0x xf04) == 3844 (0xf04) [#19351]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25032]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64516 (0x xfc04) == 64516 (0xfc04) [#7263]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#34785]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26471]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#10810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#30378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160000 ( (0x27100) == 160000 (0x27100) [#26260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#10661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13879]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#28817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#33420]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32358]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 15 52100 (0x25224) [#9464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#10950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#24238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20326]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9325]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#28037]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#11826]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20104]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41065]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33595]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#29029]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#29413]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15625 (0 0x3d09) == 15625 (0x3d09) [#25710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225 == 225 [#29725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#10059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14178]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8055]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 72 == 72 [#39085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99856 (0 0x18610) == 99856 (0x18610) [#13622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128164 (0 0x1f4a4) == 128164 (0x1f4a4) [#7471]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#11723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#24253]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 230400 ( (0x38400) == 230400 (0x38400) [#26420]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33226]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#879]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#24097]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 120 == 120 [#40660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19396]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#10902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#29370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32749]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 254 == 254 [#39821]", "bindmonitor-ringbuf-jit :: it != _overlapped_buffers.end() for: {?} != {?} [#41107]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 54 == 54 [#39152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14716]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#29764]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 11 10889 (0x1b129) [#9293]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#35285]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#30592]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#30608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#22589]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#29278]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 10 == 10 [#38852]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8249]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20449 (0 0x4fe1) == 20449 (0x4fe1) [#25746]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27979]", "map_crud_operations_stack :: return_value == value for: 7 == 7 [#37736]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14462]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20580]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#23801]", "EBPF_OPERATION_CREATE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#11533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32636]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#11301]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9403]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31156]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20162]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 ( (0xd24) [#9895]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8845]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26790]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20405]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#28829]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32919]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16021]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#23955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15173]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30997]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#28752]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 124609 (0 0x1e6c1) == 124609 (0x1e6c1) [#7461]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38246]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#22414]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64 == 64 [#534]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1010 (0x3f2) == 1010 (0x3f2) [#40215]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#36372]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37265]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#35435]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#10790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97969 (0 0x17eb1) == 97969 (0x17eb1) [#32321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12986]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28099]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6246]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28452]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#35954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12123]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#11633]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#29624]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99225 (0 0x18399) == 99225 (0x18399) [#26090]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#27884]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#21864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 18432 (0x4800) <= 36864 (0x x9000) [#23913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71289 (0 0x11679) == 71289 (0x11679) [#25994]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28437]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25509]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#23192]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9214]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#23775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35721 (0x x8b89) == 35721 (0x8b89) [#7133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28972]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38234]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37840]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25163]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219961 (0 0x35b39) == 219961 (0x35b39) [#7693]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13897]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#35606]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2809]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28423]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6226]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26469]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21490]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#35584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19254]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35074]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 106 == 106 [#39102]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_SUCCESS for: 0 == 0 [#37897]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 78 == 78 [#40681]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#10785]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 220 == 220 [#39804]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#27395]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31674]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#55]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#27824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#29446]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 15 51321 (0x24f19) [#9461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#23346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#36538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#23400]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2521]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34580]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#21249]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6058]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#30137]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#10698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#11253]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#28692]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 922 (0x39a) == = 922 (0x39a) [#40155]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 140625 ( (0x22551) == 140625 (0x22551) [#26210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23409 (0 0x5b71) == 23409 (0x5b71) [#19533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#34805]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#36405]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34498]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#22161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#23033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13713]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#22427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#22526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26888]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#36539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6260]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 102400 ( (0x19000) == 102400 (0x19000) [#26100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26353]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33829]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4 == 4 [#31699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97344 (0 0x17c40) == 97344 (0x17c40) [#13614]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#10600]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 175561 (0 0x2adc9) == 175561 (0x2adc9) [#7593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#23745]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14563]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#11119]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#22651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#21672]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34732]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1319]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#144]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7796]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20623]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14338]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8656]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19634]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 98596 (0 0x18124) == 98596 (0x18124) [#26088]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#34179]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#10083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9466]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12742]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2418]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7226]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#29476]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#27710]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 84 == 84 [#39736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 127449 ( (0x1f1d9) == 127449 (0x1f1d9) [#19941]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12378]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#36725]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 440 (0x1b8) == 440 (0x1b8) [#40500]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#262]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9162]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#29315]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12354]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 170 == 170 [#39779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#23496]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108241 ( (0x1a6d1) == 108241 (0x1a6d1) [#19885]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 866 (0x362) == 866 (0x362) [#40287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#24078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15944]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25424]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 167281 (0 0x28d71) == 167281 (0x28d71) [#1336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30792]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6545]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#11683]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27586]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16216]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#24235]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21131]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39683]", "epoch_test_single_epoch :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38492]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#36227]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 231361 (0 0x387c1) == 231361 (0x387c1) [#1480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116281 (0 0x1c639) == 116281 (0x1c639) [#7437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#23036]", "pinning_test :: ebpf_pinning_table_find(pinning_table.get(), &foo, (ebpf_core_object_ _t**)&some_object) == EBPF_SUCCESS for: 0 == 0 [#38485]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16406]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#23113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#35450]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27084]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#28949]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#11569]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39234]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#35521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14860]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 410 (0x19a) == = 410 (0x19a) [#39899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14866]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9475]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#24356]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173056 ( (0x2a400) == 173056 (0x2a400) [#20059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 258064 ( (0x3f010) == 258064 (0x3f010) [#20243]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#11171]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18665]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39601 (0 0x9ab1) == 39601 (0x9ab1) [#32093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19528]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#36827]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#29625]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27802]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30745]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#27677]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19766]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 486 (0x1e6) == 486 (0x1e6) [#40477]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19398]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#10421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#21345]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 191844 ( (0x2ed64) == 191844 (0x2ed64) [#26336]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2076]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18245]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2238]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1872]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26550]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10020]", "epoch_test_stale_items :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50625 (0 0xc5c1) == 50625 (0xc5c1) [#19677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#24170]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27913]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#10894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26576]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19600]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#29748]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39001]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 23 30400 (0x38400) [#9734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#22314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26311]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73441 (0 0x11ee1) == 73441 (0x11ee1) [#13532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14641 (0 0x3931) == 14641 (0x3931) [#19469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#36249]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14458]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#10540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19756]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#11125]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 126 == 126 [#39757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12869]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#10492]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1275]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48400 (0x xbd10) == 48400 (0xbd10) [#7195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12422]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#23718]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9636]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#23136]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#11447]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2169]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#29514]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46225 (0 0xb491) == 46225 (0xb491) [#32125]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26763]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21503]", "INVALID_PROGRAM_DATA :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38389]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#23669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15563]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#30131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16159]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 140 == 140 [#40650]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1678]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28524]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37142]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2857]", "hash_table_test :: ebpf_hash_table_find(table.get(), key_2.data(), &returned_value) == E EBPF_KEY_NOT_FOUND for: 19 == 19 [#38460]", "error codes :: result2 == result for: 9 == 9 [#40791]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34222]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33316]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152100 (0 0x25224) == 152100 (0x25224) [#7535]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#23302]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 34 == 34 [#38933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21440]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#23649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#34026]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24649 (0 0x6049) == 24649 (0x6049) [#19541]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1760]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 23 32324 (0x38b84) [#9740]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6661]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#24117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#10803]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38310]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15314]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6020]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#23837]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2062]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7870]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34123]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#33816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14569]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13331]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 245025 ( (0x3bd21) == 245025 (0x3bd21) [#20217]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24508]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#430]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#30180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12699]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#30163]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#35045]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 129600 (0 0x1fa40) == 129600 (0x1fa40) [#1238]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 42 == 42 [#38937]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#35590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27259]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#9840]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32632]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1830]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12769 (0 0x31e1) == 12769 (0x31e1) [#31921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3025 (0x xbd1) == 3025 (0xbd1) [#25570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8253]", "ring_buffer_output :: consumer == 0 for: 0 == 0 [#40755]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#35779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22001]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26771]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19702]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1371]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#27560]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6073]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#27443]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#22521]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2488]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#36310]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#30513]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8833]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32538]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1554]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8499]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51984 (0 0xcb10) == 51984 (0xcb10) [#25916]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#36298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14771]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18337]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6828]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 529 (0x211 1) == 529 (0x211) [#564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18311]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 548 (0x224) == = 548 (0x224) [#39968]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27954]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1617]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168921 (0 0x293d9) == 168921 (0x293d9) [#1340]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26670]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6550]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#22685]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#29289]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6406]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31135]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65025 (0 0xfe01) == 65025 (0xfe01) [#19737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20446]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27426]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37825]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#909]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31570]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#28788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 124609 ( (0x1e6c1) == 124609 (0x1e6c1) [#26166]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#35594]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26896 (0 0x6910) == 26896 (0x6910) [#32023]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 213444 (0 0x341c4) == 213444 (0x341c4) [#7679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20908]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#23052]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7330]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#35670]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#34764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21818]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#28166]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#29316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#28574]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#35910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 172225 ( (0x2a0c1) == 172225 (0x2a0c1) [#20057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68644 (0 0x10c24) == 68644 (0x10c24) [#13514]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 364 (0x16c) == = 364 (0x16c) [#39876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#23567]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6507]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20900]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1024 (0x x400) == 1024 (0x400) [#25524]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#989]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#10851]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29929 (0 0x74e9) == 29929 (0x74e9) [#13336]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#36423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6684]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 130 == 130 [#40655]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25063]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#22820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#35556]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1730]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 3648 81 (0x8e81) [#8867]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#239]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#30657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#23383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27556 (0 0x6ba4) == 27556 (0x6ba4) [#19559]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 96 == 96 [#39097]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#36483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#22508]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3573]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 644 (0x284) == = 644 (0x284) [#40016]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39435]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30720]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == 0 for: 0 == 0 [#42088]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24535]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31171]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#34002]", "EBPF_OPERATION_LINK_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38215]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#34797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19356]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#11895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#23925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2704 (0x xa90) == 2704 (0xa90) [#13094]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15544]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39513]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6972]", "error codes :: result2 == result for: 23 == 23 [#40805]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#22715]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15221]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#35535]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60516 (0x xec64) == 60516 (0xec64) [#1010]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31582]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#29287]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37277]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15806]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#35678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#11022]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 244036 ( (0x3b944) == 244036 (0x3b944) [#26448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21839]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9795]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#23195]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45369 (0 0xb139) == 45369 (0xb139) [#32121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#23787]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#215]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19120]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38536]", "pinning_test :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#22290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#22486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24625]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#23379]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28360]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27190]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28084]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12965]", "EBPF_OPERATION_LOAD_CODE :: invoke_protocol(EBPF_OPERATION_LOAD_CODE, load_code_request) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#37954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#10532]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 834 (0x342) == = 834 (0x342) [#40111]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#10032]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 974 (0x3ce) == 974 (0x3ce) [#40233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31411]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20722]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33076]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6084 (0x x17c4) == 6084 (0x17c4) [#31851]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#23270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19185]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#21255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27481]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#23255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16501]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/128\" \"' [#37660]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#11248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 400 (0x1 190) == 400 (0x190) [#31735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28219]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#30143]", "divide_by_zero-interpret :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24774]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#35097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22064]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#10606]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#36108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15673]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#36344]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31438]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#11511]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15137]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 151321 (0 0x24f19) == 151321 (0x24f19) [#7533]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 255025 (0 0x3e431) == 255025 (0x3e431) [#1528]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#30574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13747]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20404]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1345]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#35739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13595]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8532]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1544]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#21657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18955]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38119]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32150]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 147456 ( (0x24000) == 147456 (0x24000) [#13758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#22680]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 184 == 184 [#40628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 18 82329 (0x2c839) [#9575]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39691]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 474 (0x1da) == 474 (0x1da) [#40483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14768]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 (0x2649) [#8591]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#29327]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26244 (0x x6684) == 26244 (0x6684) [#7079]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13569]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#33438]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44944 (0 0xaf90) == 44944 (0xaf90) [#32119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24926]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#11470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22036]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 676 (0x2a4 4) == 676 (0x2a4) [#570]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#35508]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33544]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5949]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#11758]", "droppacket-jit :: result == 0 for: 0 == 0 [#40861]", "droppacket-interpret :: hook_result == XDP_PASS for: 1 == 1 [#40934]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27895]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#10867]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28288]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49284 (0 0xc084) == 49284 (0xc084) [#32139]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24982]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#29295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33106]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#34539]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#36329]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39288]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#34776]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40896]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#11614]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 886 (0x376) == 886 (0x376) [#40277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12291]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#22575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21785]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31579]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#29273]", "ring_buffer_reserve_submit_discard :: consumer == 0 for: 0 == 0 [#40774]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37018]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2962]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.0.0/16\" == \"192.168.0.0/1 16\" with 2 messages: 'key_string := \"192.168.14.9/32\"' and 'correct_value := \"192 2.168.0.0/16\"' [#37468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8739]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37716]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8544]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#36843]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26315]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#10491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34171]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#23771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#23375]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#24301]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22013]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12667]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#10283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11999]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#36254]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20164]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33013]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34511]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6670]", "ring_buffer_reserve_submit_discard :: ebpf_ring_buffer_reserve(ring_buffer, &mem2, 10) == EBPF_SUCCESS for: : 0 == 0 [#40777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#22404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94864 (0 0x17290) == 94864 (0x17290) [#26076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33043]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3136]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14884 (0x3a24) == 1488 84 (0x3a24) [#9967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6391]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11976]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#22385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#35770]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26992]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2514]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37917]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 870 (0x366) == 870 (0x366) [#40285]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1907]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37987]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12637]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40953]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#28403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#21222]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30664]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6628]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#27386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19089]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#24228]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#913]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#29238]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#11639]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#23854]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3531]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14408]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#28720]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8116]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15814]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33217]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16900 (0 0x4204) == 16900 (0x4204) [#13250]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#35995]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38547]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#11576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14394]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26564]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#22847]", "divide_by_zero-jit :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#40975]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#29864]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#35681]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26971]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 726 (0x2d6) == 726 (0x2d6) [#40357]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38708]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25475]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3340]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#36494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21151]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#10042]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12255]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 92 == 92 [#39740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#24314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28486]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7781]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#24303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51529 (0 0xc949) == 51529 (0xc949) [#13444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20530]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#30350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#23099]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#22059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6241 (0x x1861) == 6241 (0x1861) [#19385]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33941]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 134 == 134 [#39761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#21399]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28069]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5782]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24658]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3136 (0x xc40) == 3136 (0xc40) [#13102]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#11464]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#30079]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20569]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33413]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12795]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27150]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#30464]", "ring_buffer_async_query :: ebpf_map_delete_entry(map.get(), 0, nullptr, 0) == EBPF_OPERATION_NOT T_SUPPORTED for: 18 == 18 [#37807]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32820]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#22071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14477]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39303]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8796]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21712]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#28766]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16057]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#22969]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31329 (0 0x7a61) == 31329 (0x7a61) [#13344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6298]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7225 (0x1 1c39) == 7225 (0x1c39) [#6925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12779]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42025 (0 0xa429) == 42025 (0xa429) [#19637]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20257]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"0.0.0.0/0\" == \"0.0.0.0/0\" with 2 messages: 'key_string := \"11.0.0.0/32\"' and 'correct_value := \"0.0.0.0/0\"' [#37478]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#36023]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#23426]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168 8.14.0/31\"' [#37493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#23223]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39638]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#29210]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#27788]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8100 (0x1 1fa4) == 8100 (0x1fa4) [#6935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14430]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28246]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1225 (0x4 4c9) == 1225 (0x4c9) [#6825]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#30478]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27496]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13475]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#36604]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27811]", "hash_table_test :: ebpf_hash_table_delete(table.get(), key_2.data()) == EBPF_KEY_NOT_FOU UND for: 19 == 19 [#38458]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38596]", "program :: options.return_value == 42 for: 42 == 42 [#37769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#11070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18253]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20652]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 870 (0x366) == = 870 (0x366) [#40129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20681]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 110224 ( (0x1ae90) == 110224 (0x1ae90) [#32359]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 2190 04 (0x5590) [#8738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36481 (0 0x8e81) == 36481 (0x8e81) [#19609]", "map_crud_operations_stack :: ebpf_map_peek_entry(map.get(), sizeof(return_value), reinterpret_cast t<uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37725]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 57600 (0xe e100) == 57600 (0xe100) [#998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82369 (0 0x141c1) == 82369 (0x141c1) [#32269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9366]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25971]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39208]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#11223]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21284]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#30466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#30344]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#28940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#10870]", "state_test :: ebpf_state_allocate_index(&allocated_index_2) == EBPF_SUCCESS for: 0 == 0 [#38825]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#10860]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26273]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6005]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21025 (0x5 5221) == 21025 (0x5221) [#808]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#10858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14459]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13135]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#35969]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1011]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#11906]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19504]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27813]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7498]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25318]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119716 ( (0x1d3a4) == 119716 (0x1d3a4) [#26152]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 492 (0x1ec) == = 492 (0x1ec) [#39940]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7088]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 18 83184 (0x2cb90) [#9578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78400 (0 0x13240) == 78400 (0x13240) [#26020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18919]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28744]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14492]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#27578]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 86436 (0x x151a4) == 86436 (0x151a4) [#7343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9322]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#11717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21809]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 24 41081 (0x3adb9) [#9767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 194481 ( (0x2f7b1) == 194481 (0x2f7b1) [#13872]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39200]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30976 (0 0x7900) == 30976 (0x7900) [#25812]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#11810]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 182 == 182 [#40629]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33349]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1014 (0x3f6) == 1014 (0x3f6) [#40213]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#36795]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19121]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#36352]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#29360]", "hash_table_test :: ebpf_hash_table_next_key(table.get(), nullptr, returned_key.data()) = == EBPF_SUCCESS for: 0 == 0 [#38448]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#29911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15634]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#33960]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33087]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37252]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 176400 (0 0x2b110) == 176400 (0x2b110) [#1358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 260100 ( (0x3f804) == 260100 (0x3f804) [#26480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2544]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#33429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18921]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#35152]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 772 (0x304) == 772 (0x304) [#40334]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1349]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38763]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22039]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9019]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67600 (0 0x10810) == 67600 (0x10810) [#25980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34241]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#10971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#29074]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 32 == 32 [#38863]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12919]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 202500 ( (0x31704) == 202500 (0x31704) [#26360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#23208]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 952 (0x3b8) == 952 (0x3b8) [#40244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20840]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#27701]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12086]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 464 (0x1d0) == = 464 (0x1d0) [#39926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21161]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17424 (0 0x4410) == 17424 (0x4410) [#31959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#34446]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#29146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37148]", "serialize_program_info_test :: in_program_info.count_of_program_type_specific_helpers == out_program m_info->count_of_program_type_specific_helpers for: 2 == 2 [#38798]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24500]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37158]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19252]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34388]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 676 (0x2 2a4) == 676 (0x2a4) [#13042]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 60516 (0 0xec64) == 60516 (0xec64) [#32187]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39195]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#29685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#10406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22700]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3471]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26920]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26715]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148225 ( (0x24301) == 148225 (0x24301) [#32465]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#23826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#28620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#10819]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6185]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#34152]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 10 == 10 [#39054]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#27323]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25055]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#29523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#29318]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5625 (0x x15f9) == 5625 (0x15f9) [#13140]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 83521 (0x x14641) == 83521 (0x14641) [#1096]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18379]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40401 (0 0x9dd1) == 40401 (0x9dd1) [#13392]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39324]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33527]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"DD/124\" == \"DD/124\" wit th 1 message: 'key_string := \"DD/124\"' [#37593]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#36202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14097]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13271]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14223]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38352]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#29943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#34407]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8150]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 289 (0x12 21) == 289 (0x121) [#6789]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26644]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#27911]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 ( (0xbd1) [#8459]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26704]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"192.168.0.0/15\"' and 'return_value := {null string}' [#37553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20320]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 113569 ( (0x1bba1) == 113569 (0x1bba1) [#32369]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#341]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"11.0.0.0/8\"' and 'return_value := {null string}' [#37563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24025 (0 0x5dd9) == 24025 (0x5dd9) [#19537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#22477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#22761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25707]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#28064]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#29503]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2611]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34684]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#29444]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2925]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169744 ( (0x29710) == 169744 (0x29710) [#20051]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13065]", "async :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#40724]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6128]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#28811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#20955]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#29179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 5062 25 (0xc5c1) [#8969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 156816 ( (0x26490) == 156816 (0x26490) [#32487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#11200]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 (0x1c39) [#8549]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25113]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 350 (0x15e) == 350 (0x15e) [#40545]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8859]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37294]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27126]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9723]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 618 (0x26a) == 618 (0x26a) [#40411]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5988]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12043]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#35485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33121]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 304 (0x130) == = 304 (0x130) [#39846]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#35029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#23441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19710]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37965]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28366]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15268]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2454]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8319]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35344]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 192.168.0.0/16\"' and 'return_value := \"192.168.0.0/16\"' [#37539]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#34134]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 95481 (0 0x174f9) == 95481 (0x174f9) [#13608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#34968]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#35801]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39279]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136161 (0 0x213e1) == 136161 (0x213e1) [#7493]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121801 (0 0x1dbc9) == 121801 (0x1dbc9) [#1216]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#22594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 (0x1ef1) [#8561]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26901]", "map_crud_operations_stack :: ebpf_map_peek_entry(map.get(), sizeof(return_value), reinterpret_cast t<uint8_t*>(&return_value), 0) == EBPF_OBJECT_NOT_FOUND for: 7 == 7 [#37747]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6617]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#21780]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12671]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31964]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22007]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#28731]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#23540]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34633]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#27200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15160]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46225 (0 0xb491) == 46225 (0xb491) [#19657]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30912]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6108]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6212]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39455]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38255]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38712]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26299]", "bindmonitor-bpf2bpf-jit :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41005]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 6002 25 (0xea79) [#9029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15512]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#22558]", "droppacket-jit :: bpf_map_update_elem(dropped_packet_map_fd, &key, &value, EBPF_ANY) == = EBPF_SUCCESS for: 0 == 0 [#40864]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#24093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#35791]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114244 (0 0x1be44) == 114244 (0x1be44) [#7431]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7398]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#455]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2308]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#80]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6408]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32554]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3216]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#23009]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#35596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#23059]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37989]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 234 == 234 [#39811]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6203]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12336]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 6 == 6 [#38979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15820]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144 == 144 [#35688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#10276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 115600 (0 0x1c390) == 115600 (0x1c390) [#7435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#22866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#35228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#24269]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#24220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#21156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7250]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#30204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6597]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#10385]", "map_crud_operations_queue :: return_value == value for: 1 == 1 [#37683]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 458 (0x1ca) == = 458 (0x1ca) [#39923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31684 (0x x7bc4) == 31684 (0x7bc4) [#7111]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#28650]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9604 (0x x2584) == 9604 (0x2584) [#25656]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#35391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#35202]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196 == 196 [#29342]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34210]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8655]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#30138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32064]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#25]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28462]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 20 == 20 [#39704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14138]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1938]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 ( (0xe10) [#8474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20048]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 748 (0x2ec) == 748 (0x2ec) [#40346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#24325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12829]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#36520]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#29959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 101124 (0x18b04) == 10 01124 (0x18b04) [#9248]", "map_crud_operations:BPF_MAP_TYPE_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#4166]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#29208]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#24308]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12910]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#11259]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21044]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#22384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#28845]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#34779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#22325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19734]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#28412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32074]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33662]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21617]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41081]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 154 == 154 [#39771]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24479]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#22942]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3725]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2128]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47089 (0x xb7f1) == 47089 (0xb7f1) [#7189]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49284 (0xc c084) == 49284 (0xc084) [#962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#23790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21572]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64009 (0 0xfa09) == 64009 (0xfa09) [#13496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 145161 ( (0x23709) == 145161 (0x23709) [#19989]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#29383]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#29995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31666]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/126\"' and 'correct_value := \"BB/64\"' [#37636]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#10904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#22615]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31566]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31016]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#35707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24615]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#34695]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#36586]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72361 (0 0x11aa9) == 72361 (0x11aa9) [#32233]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#22379]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#29714]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#21954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 2788 89 (0x6cf1) [#8795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21446]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 750 (0x2ee) == = 750 (0x2ee) [#40069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24657]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20315]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8815]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3240]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20770]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30789]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9186]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15376]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32250]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13717]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#28599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#22933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 (0x13b1) [#8507]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1861]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7508]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31052]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#36732]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#27623]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24910]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 536 (0x218) == 536 (0x218) [#40452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 5616 69 (0xdb69) [#9005]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#36699]", "epoch_test_single_epoch :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38495]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 239121 (0x3a611) == 2 239121 (0x3a611) [#27005]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#36673]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7985]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14651]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#11017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#36400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33446]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#36412]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9391]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12417]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#30563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6400 (0x x1900) == 6400 (0x1900) [#19387]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#23287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7522]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 558 (0x22e) == = 558 (0x22e) [#39973]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31646]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49284 (0 0xc084) == 49284 (0xc084) [#19671]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33128]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#27503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33361]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32630]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21830]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 2 messages s: 'key_string := \"172.48.0.0/12\"' and 'return_value := {null string}' [#37557]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51529 (0xc949) == 5152 29 (0xc949) [#8975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67081 (0 0x10609) == 67081 (0x10609) [#32213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7921 (0x x1ef1) == 7921 (0x1ef1) [#25638]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#28691]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37372]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 466 (0x1d2) == 466 (0x1d2) [#40487]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#24020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#24001]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46225 (0 0xb491) == 46225 (0xb491) [#25890]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#23162]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#27518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 198916 ( (0x30904) == 198916 (0x30904) [#13882]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#29667]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#23071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#23063]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1024 (0x40 00) == 1024 (0x400) [#582]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#36001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12953]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24724]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#34482]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2704 (0x xa90) == 2704 (0xa90) [#31799]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#35048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#36216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 199809 ( (0x30c81) == 199809 (0x30c81) [#13884]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#30635]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24888]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15230]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#35265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12935]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16641 (0 0x4101) == 16641 (0x4101) [#13248]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2980]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9382]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6241 (0x x1861) == 6241 (0x1861) [#31853]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 3312 24 (0x8164) [#8840]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#24154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#34497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#34182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13841]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27771]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8276]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38284]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#24342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21992]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/33\"' and 'correct_value := \"BB/32\"' [#37644]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 76 == 76 [#39732]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#35042]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26634]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#24251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#35174]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9216 (0x2 2400) == 9216 (0x2400) [#6947]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33084]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/64\"' [#37585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25008]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#23026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7396 (0x x1ce4) == 7396 (0x1ce4) [#13162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36864 (0 0x9000) == 36864 (0x9000) [#19611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#22369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9697]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#29061]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14034]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30726]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3844 (0xf f04) == 3844 (0xf04) [#6879]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38159]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2703]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75076 (0x x12544) == 75076 (0x12544) [#1066]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#27227]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 102 == 102 [#40669]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 626 (0x272) == = 626 (0x272) [#40007]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2605]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20551]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#297]", "bindmonitor-tailcall-native :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41047]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 186624 ( (0x2d900) == 186624 (0x2d900) [#26324]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1751]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1515]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24649 (0 0x6049) == 24649 (0x6049) [#25774]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#29174]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22156]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14780]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13607]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2431]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8110]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#36158]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27027]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12933]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#34987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#10662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#11943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34264]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 194481 (0 0x2f7b1) == 194481 (0x2f7b1) [#1400]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5936]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#10535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#22419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#21279]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#27689]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41215]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#36631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99856 (0x x18610) == 99856 (0x18610) [#7387]", "divide_by_zero-jit :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#40977]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8449]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9039]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91809 (0 0x166a1) == 91809 (0x166a1) [#19833]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1089 (0x x441) == 1089 (0x441) [#19293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 761 176 (0x12990) [#9122]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#35379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14370]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"192.168.0.0/15\"' and 'return_value := {null string}' [#37552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#23359]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6074]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32704]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31291]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#30641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20700]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#16900]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24800]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5839]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#28514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#23599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15307]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38354]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#36592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18416]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 1020 01 (0x27d9) [#8597]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#36513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#22921]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32957]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15775]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 16 == 16 [#39702]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(bad_key), reinterpret_cast<c const uint8_t*>(&bad_key), value.size(), value.data(), EBPF_ANY, 0) == ((behavior r_on_max_entries != MAP_BEHAVIOR_FAIL) ? EBPF_SUCCESS : error_on_full) for: 0 == 0 [#12987]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18418]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 157609 ( (0x267a9) == 157609 (0x267a9) [#13784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9745]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39207]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2043]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#36695]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#36490]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1105]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#27635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#35970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18791]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#35564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18534]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#23623]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#10383]", "droppacket-interpret :: hook.fire(&ctx0, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40938]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#24243]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#156]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#11198]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#11403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 187489 ( (0x2dc61) == 187489 (0x2dc61) [#13856]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96100 (0 0x17764) == 96100 (0x17764) [#19847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#10892]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14626]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 150544 ( (0x24c10) == 150544 (0x24c10) [#32471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10609 (0 0x2971) == 10609 (0x2971) [#13196]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20458]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38382]", "serialize_map_test :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#38748]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#28793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#23483]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#10689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22261]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2602]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 504 (0x1f8) == 504 (0x1f8) [#40468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8997]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37387]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#11485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#22505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#23047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6262]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25967]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_push_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#37412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5994]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#23622]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#34671]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#29049]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6320]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#22212]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#11604]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97969 (0 0x17eb1) == 97969 (0x17eb1) [#19853]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38520]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#30257]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33554]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15839]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34723]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#30028]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#11645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 257049 ( (0x3ec19) == 257049 (0x3ec19) [#32709]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#22305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32254]", "pinning_test :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38472]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#35727]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#23087]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 133956 (0 0x20b44) == 133956 (0x20b44) [#1250]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 112 == 112 [#40664]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#28707]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 262 (0x106) == 262 (0x106) [#40589]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13091]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 10.0.0.0/8\"' and 'return_value := \"10.0.0.0/8\"' [#37545]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6667]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#311]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11664 (0x2 2d90) == 11664 (0x2d90) [#734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 229441 ( (0x38041) == 229441 (0x38041) [#20185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9829]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#23367]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#8336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#27740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#20925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26569 (0 0x67c9) == 26569 (0x67c9) [#19553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#23943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12149]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 206116 (0 0x32524) == 206116 (0x32524) [#1426]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25249]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#27935]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31280]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 268 (0x10c) == = 268 (0x10c) [#39828]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39204 (0x x9924) == 39204 (0x9924) [#7151]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39238]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 738 (0x2e2) == = 738 (0x2e2) [#40063]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16311]", "bindmonitor-ringbuf-jit :: it != _overlapped_buffers.end() for: {?} != {?} [#41140]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#29641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14287]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#36464]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == key_string for: \"BB/32\" == \"BB/32\" with 1 message: 'key_string := \"BB/32\"' [#37607]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#23340]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121 == 121 [#30577]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 226576 (0 0x37510) == 226576 (0x37510) [#7707]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31503]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2505]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#33999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27193]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 19 95364 (0x2fb24) [#9620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#11611]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#10626]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 446 (0x1be) == 446 (0x1be) [#40497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#21777]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#23282]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31457]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 1742 24 (0x4410) [#9977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12872]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27697]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#27584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#11287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71824 (0x x11890) == 71824 (0x11890) [#7291]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9592]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#35610]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39586]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16384 (0x4000) == 1638 84 (0x4000) [#8678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#10609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#35947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#11338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#22648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#24046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#11572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31082]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25829]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25011]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#24406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 ( (0xe89) [#8477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#29789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19812]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 232324 ( (0x38b84) == 232324 (0x38b84) [#32659]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#9839]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#36331]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#23135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20929]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21112]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1724]", "droppacket-interpret :: value == 0 for: 0 == 0 [#40936]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27706]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1971]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6724 (0x x1a44) == 6724 (0x1a44) [#31859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18342]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#10848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15964]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6622]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34262]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1156 (0x x484) == 1156 (0x484) [#25528]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 128 == 128 [#39113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#35960]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37075]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1596]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 252004 (0 0x3d864) == 252004 (0x3d864) [#7759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#10715]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 932 (0x3a4) == 932 (0x3a4) [#40254]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3537]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69696 (0 0x11040) == 69696 (0x11040) [#32223]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#23296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31454]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33700]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 106 == 106 [#40667]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38660]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31039]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#35312]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139129 (0 0x21f79) == 139129 (0x21f79) [#7501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24874]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12612]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 54 == 54 [#39076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34651]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37025]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1521 (0x x5f1) == 1521 (0x5f1) [#31773]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1008 (0x3f0) = == 1008 (0x3f0) [#40198]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#36528]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5329 (0x x14d1) == 5329 (0x14d1) [#31841]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#23240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20170]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25181]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 238144 (0x3a240) == 23 38144 (0x3a240) [#9758]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 182329 (0 0x2c839) == 182329 (0x2c839) [#1372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12429]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#30288]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22150]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#34965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#22372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19854]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#36672]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#29711]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12635]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12390]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#21789]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31378]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22262]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19087]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 138384 ( (0x21c90) == 138384 (0x21c90) [#19971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26921]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#10529]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20801]", "droppacket-interpret :: hook.batch_begin(sizeof(state), state) == EBPF_SUCCESS for: 0 == 0 [#40944]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#30217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30803]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#36499]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25109]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#35549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14467]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#22705]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#30185]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#10088]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15422]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33173]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7072]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37369]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#36510]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#10113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20408]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11449 (0x2 2cb9) == 11449 (0x2cb9) [#732]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#36840]", "EBPF_OPERATION_GET_OBJECT_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#30455]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#30441]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5966]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3547]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18496 (0x4 4840) == 18496 (0x4840) [#790]", "bindmonitor-native :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40996]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#22591]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#34353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26643]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27870]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19624]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28465]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#11662]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26405]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9451]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 177241 (0 0x2b459) == 177241 (0x2b459) [#1360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8463]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31392]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20196]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 290 (0x122) == = 290 (0x122) [#39839]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 ( (0xd99) [#8471]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#36878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#23798]", "get_authentication_id :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#40829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6478]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19268]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2325]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#29263]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9447]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#30456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#28947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#11493]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#30504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#23747]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8503]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39504]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 30 == 30 [#38931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19386]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12874]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21362]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14657]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21089]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39460]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6266]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21058]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#40207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#30494]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#34566]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#24300]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9490]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 470 (0x1d6) == 470 (0x1d6) [#40485]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#36009]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#10293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25 == 25 [#36394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21502]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#11491]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16043]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81 == 81 [#6773]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6334]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18308]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82944 (0 0x14400) == 82944 (0x14400) [#26036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 718 824 (0x11890) [#9098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#23784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18462]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1245]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24994]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#11326]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 ( (0xb64) [#8456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18912]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 26 == 26 [#39166]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121801 ( (0x1dbc9) == 121801 (0x1dbc9) [#26158]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#23046]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28269]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27573]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7865]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#28439]", "EBPF_OPERATION_RESOLVE_HELPER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37814]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#29823]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12598]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1019]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20264]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#84]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#23994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18746]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 284 (0x11c) == 284 (0x11c) [#40578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25332]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#36054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6568]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18691]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64009 (0x xfa09) == 64009 (0xfa09) [#1024]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7225 (0x x1c39) == 7225 (0x1c39) [#25630]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0x x1e4) [#8360]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12190]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#30337]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26698]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37682]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31684 (0 0x7bc4) == 31684 (0x7bc4) [#32051]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#11596]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33688]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#30018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14057]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#10861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25863]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6577]", "pinned_map_enum :: error == 0 for: 0 == 0 [#41459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20715]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39445]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42436 (0 0xa5c4) == 42436 (0xa5c4) [#13402]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#29532]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21901]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#28646]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#22737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31024]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22500 (0x x57e4) == 22500 (0x57e4) [#7055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13795]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#29819]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#36232]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#24323]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1427]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37021]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6700]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#22634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19111]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 12 == 12 [#39173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#24419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#24145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30976 (0 0x7900) == 30976 (0x7900) [#13342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19084]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#35259]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19346]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6637]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14091]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#30651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#20895]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34864]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26870]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#11544]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15098]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8089]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25021]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#324]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#34323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 30625 (0 0x77a1) == 30625 (0x77a1) [#13340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10134]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#10271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99856 (0 0x18610) == 99856 (0x18610) [#26092]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2601 (0x xa29) == 2601 (0xa29) [#31797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21280]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12299]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6491]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14072]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#34605]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20736 (0 0x5100) == 20736 (0x5100) [#31983]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#11366]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#11923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19998]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 274 (0x112) == 274 (0x112) [#40583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 105625 (0 0x19c99) == 105625 (0x19c99) [#7405]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 21 11600 (0x33a90) [#9674]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31960]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37132]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#33642]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#35730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#21894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14993]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#34095]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25264]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#30522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21235]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1631]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131044 ( (0x1ffe4) == 131044 (0x1ffe4) [#32419]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219024 ( (0x35790) == 219024 (0x35790) [#32631]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25371]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38114]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38038]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#77]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#983]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#28696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70756 (0 0x11464) == 70756 (0x11464) [#13522]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#24373]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14792]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31120]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25545]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38766]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3517]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15623]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 54289 (0 0xd411) == 54289 (0xd411) [#19693]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14305]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13573]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#33417]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#36500]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6626]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49 == 49 [#532]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6337]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25567]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#10977]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#35533]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18763]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2166]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8686]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37868]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 140 == 140 [#39764]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3438]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#27230]", "hash_table_test :: returned_key == key_3 for: { 'Q', 'ì', '3', 'j', '≤', 29, 15, '│', 25 5, 'ù', 16, 'ê', '2' } == { 'Q', 'ì', '3', 'j', '≤', 29, 15, '│', 25, 'ù', 16, 'ê ê', '2' } [#38453]", "droppacket-interpret :: bpf_map_delete_elem(dropped_packet_map_fd, &key) == EBPF_SUCCESS for: : 0 == 0 [#40968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 ( (0x961) [#8441]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40956]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45796 (0xb b2e4) == 45796 (0xb2e4) [#946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42849 (0 0xa761) == 42849 (0xa761) [#13404]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 250000 ( (0x3d090) == 250000 (0x3d090) [#13990]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#28719]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#27188]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#22874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 197136 ( (0x30210) == 197136 (0x30210) [#26348]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 (0x2649) [#9940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18724]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3144]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31202]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 702 (0x2be) == = 702 (0x2be) [#40045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#30082]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14337]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12344]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6280]", "map_crud_operations:BPF_MAP_TYPE_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#2053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5929 (0x x1729) == 5929 (0x1729) [#13144]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26683]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81796 (0x x13f84) == 81796 (0x13f84) [#1090]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 224676 (0x36da4) == 2 224676 (0x36da4) [#36569]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#10014]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#36561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31627]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3145]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1453]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18836]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33137]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 214 == 214 [#39801]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 20 == 20 [#38972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12533]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26896 (0x x6910) == 26896 (0x6910) [#7083]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#10878]", "droppacket-jit :: hook.fire(&ctx0, &hook_result) == EBPF_SUCCESS for: 0 == 0 [#40877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#21405]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#10218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21226]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12765]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7805]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#35464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#23646]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#23820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78400 (0 0x13240) == 78400 (0x13240) [#32255]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 3062 25 (0x77a1) [#8819]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#27461]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37165]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24900]", "map_crud_operations_queue :: return_value == value for: 8 == 8 [#37697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12866]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#30495]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9 == 9 [#12996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#23898]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 100 == 100 [#39099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#23604]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34405]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26919]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 524 (0x20c) == = 524 (0x20c) [#39956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34324]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"172.16.0.0/11\"' [#37571]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26730]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25963]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38757]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 576 (0x2 240) == 576 (0x240) [#31743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#29726]", "map_crud_operations_stack :: return_value == value for: 11 == 11 [#37728]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 211600 ( (0x33a90) == 211600 (0x33a90) [#20147]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12643]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#33708]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#23353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#29301]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6608]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12025]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#28848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#24227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#11587]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 52 == 52 [#38956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#21648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: memcmp(&retrieved_map_definition, &map_definition, sizeof(map_definit tion)) == 0 for: 0 == 0 [#24940]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 225 == 225 [#22318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24611]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9561]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2403]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20150]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173889 (0 0x2a741) == 173889 (0x2a741) [#1352]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39317]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14310]", "serialize_program_info_test :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38785]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#22351]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33991]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22416]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14400 (0 0x3840) == 14400 (0x3840) [#19467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#10746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24336 (0 0x5f10) == 24336 (0x5f10) [#19539]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5041 (0x x13b1) == 5041 (0x13b1) [#13132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24655]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6413]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31792]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 154449 ( (0x25b51) == 154449 (0x25b51) [#26246]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1878]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38006]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6200]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_push_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#24942]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38014]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#11123]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26638]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2109]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#35768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#22621]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2019]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#36325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13845]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#10424]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37101]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8106]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26970]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#36266]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31092]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32558]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2334]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#10208]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31516]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27655]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#27950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#24280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4 == 4 [#35546]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8218]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8887]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6365]", "Map and program information :: bpf(BPF_OBJ_GET_INFO_BY_FD, &attr, sizeof(attr)) == 0 for: 0 == 0 [#43622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87616 (0 0x15640) == 87616 (0x15640) [#26052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8505]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1031]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32194]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#33333]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6998]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21773]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31104]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#23940]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8940]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 14 == 14 [#39056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18206]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32943]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#28786]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16 == 16 [#30277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12437]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15097]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#35668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34594]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#35748]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#20940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12721]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#30281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#11164]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27568]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#10700]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12189]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3511]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#22585]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12613]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1638]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6768]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24775]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2859]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39417]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 134 == 134 [#40653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112225 ( (0x1b661) == 112225 (0x1b661) [#32365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 247009 ( (0x3c4e1) == 247009 (0x3c4e1) [#20221]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15743]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20756]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#35057]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#28007]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27474]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1387]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19850]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36 == 36 [#28825]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22739]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#28636]", "EBPF_OPERATION_LINK_PROGRAM :: invoke_protocol(EBPF_OPERATION_LINK_PROGRAM, request, reply) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#38238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14096]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13924 (0 0x3664) == 13924 (0x3664) [#31931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#278]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#30458]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#11513]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#20790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20317]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26792]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#29230]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7600]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#28577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#35713]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2304 (0x x900) == 2304 (0x900) [#31791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15692]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#10089]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24530]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27702]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#36064]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#23324]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3201]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#10124]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196 == 19 96 [#6783]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#28025]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123201 ( (0x1e141) == 123201 (0x1e141) [#13692]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#30293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32644]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2409]", "serialize_map_test :: strnlen_s(map_info->pin_path, 256) == input_map_info->pin_path.length h for: 11 == 11 [#38769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20547]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9868]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21916]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#11439]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32727]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 95481 (0 0x174f9) == 95481 (0x174f9) [#19845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#29796]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8349]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37672]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33489 (0x8 82d1) == 33489 (0x82d1) [#884]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#36731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1939]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21730]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#23132]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 20 03401 (0x31a89) [#9647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#10504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#22746]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81 == 81 [#28587]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18273]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25430]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 6144 (0x1800) <= 6144 (0x180 00) [#4689]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32836]", "divide_by_zero-jit :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 111556 (0 0x1b3c4) == 111556 (0x1b3c4) [#7423]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 94249 (0x x17029) == 94249 (0x17029) [#1132]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 932 (0x3a4) == = 932 (0x3a4) [#40160]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1579]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#21342]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20224]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1021]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#11254]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#28499]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#21180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#27374]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#22032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 254016 ( (0x3e040) == 254016 (0x3e040) [#32703]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39568]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#10721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20473]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25849]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40401 (0 0x9dd1) == 40401 (0x9dd1) [#19629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 846 681 (0x14ac9) [#9167]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#30555]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18616]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.15.7/32\"' [#37485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19744]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28192]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#995]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19600 (0 0x4c90) == 19600 (0x4c90) [#19507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#30412]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14414]", "pinned_map_enum :: error == 0 for: 0 == 0 [#41460]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#10018]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#30371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 259081 ( (0x3f409) == 259081 (0x3f409) [#14008]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#22498]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31912]", "EBPF_OPERATION_LOAD_CODE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#23774]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"AA/64\"' [#37598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#34614]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 ( (0x9c4) [#8444]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#423]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13917]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#29592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#24415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#23267]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31812]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#24221]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#75]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14744]", "ring_buffer_output :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#40742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20462]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#24400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37405]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88209 (0 0x15891) == 88209 (0x15891) [#26054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7506]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31602]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14229]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#28043]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) == EBPF_INVALID_OBJECT for: 5 == 5 [#38081]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6162]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32206]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38019]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 854 (0x356) == = 854 (0x356) [#40121]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30842]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#10811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#22972]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#36313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#21567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37139]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39221]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20372]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 227529 ( (0x378c9) == 227529 (0x378c9) [#20181]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5723]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31589]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 3724 49 (0x9181) [#8873]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6259]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121 == 121 [#28289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33451]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7787]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"BB/128\" == \"BB/128\" with 2 messages: 'key_string := \"BB/128\"' and 'correct_value := \"BB/128\"' [#37633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14320]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1135]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#10044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#24]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#24279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#35924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12760]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#11526]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#11459]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#27341]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3513]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24576]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2676]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38595]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6745]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30874]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121104 (0 0x1d910) == 121104 (0x1d910) [#1214]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#10188]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 782 (0x30e) == = 782 (0x30e) [#40085]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#11563]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#30617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13653]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#30473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#33360]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 169 == 169 [#22891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#10720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#23934]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12412]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#36449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18497]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#22770]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32436]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#10180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#23935]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152881 ( (0x25531) == 152881 (0x25531) [#26242]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29584 (0x7390) == 295 584 (0x7390) [#22495]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6906]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#11147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#36203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15319]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47524 (0xb b9a4) == 47524 (0xb9a4) [#954]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3364 (0xd d24) == 3364 (0xd24) [#6871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20947]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26667]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9321]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14224]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27727]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#20775]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10114]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#11531]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23716 (0 0x5ca4) == 23716 (0x5ca4) [#13298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#34530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31347]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34070]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20156]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8649 (0x x21c9) == 8649 (0x21c9) [#13176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#11648]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 942 249 (0x17029) [#9215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#10612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14147]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#29294]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6746]", "EBPF_OPERATION_GET_EC_FUNCTION :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14083]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#22963]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196 == 196 [#35559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#17674]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28488]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#352]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39609]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#36861]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31588]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#30207]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#34743]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35344 (0x x8a10) == 35344 (0x8a10) [#7131]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#36022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9342]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6836]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1734]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 (0x21c9) [#8573]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#33930]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 624 (0x270) == = 624 (0x270) [#40006]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#29779]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 462 (0x1ce) == 462 (0x1ce) [#40489]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#22989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#30582]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"172.48.0.0/12\"' [#37570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#24099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#23489]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19197]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#10897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#23114]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#29751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#11850]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#36677]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#24113]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32755]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114921 ( (0x1c0e9) == 114921 (0x1c0e9) [#13668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12060]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1481]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4096 (0x x1000) == 4096 (0x1000) [#19355]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32546]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#23957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34024]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64 == 64 [#25476]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#11028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 4368 81 (0xaaa1) [#8921]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33692]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37686]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1024 (0x400) = == 1024 (0x400) [#40206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25197]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#35156]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2607]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11969]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 108 == 108 [#39748]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19728]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30830]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 220900 ( (0x35ee4) == 220900 (0x35ee4) [#32635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#36112]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#23769]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 (0x1861) [#9918]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12158]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 422 (0x1a6) == 422 (0x1a6) [#40509]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#22750]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#10825]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#34575]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#35000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131044 ( (0x1ffe4) == 131044 (0x1ffe4) [#19951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 187489 ( (0x2dc61) == 187489 (0x2dc61) [#20093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15391]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1963]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25495]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12846]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123201 (0 0x1e141) == 123201 (0x1e141) [#7457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22186]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8536]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#35419]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#34775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#21585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#30397]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#10737]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8928]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26395]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17161 (0 0x4309) == 17161 (0x4309) [#13252]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#27437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#21960]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39548]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31532]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5476 (0x1564) == 5476 6 (0x1564) [#36581]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 294 (0x126) == = 294 (0x126) [#39841]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#23625]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4087]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#10780]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 0 == 0 [#38806]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#10065]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28102]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#35667]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#30158]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20962]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#23767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38025 (0 0x9489) == 38025 (0x9489) [#19617]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32480]", "program :: ebpf_program_get_program_info(program.get(), &program_info) == EBPF_S SUCCESS for: 0 == 0 [#37754]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"0.0.0.0/0\"' [#37574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24446]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12937]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#23298]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 868 (0x364) == = 868 (0x364) [#40128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24468]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#27158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13635]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#27890]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15287]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31956]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13527]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19292]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 3459 96 (0x8724) [#8852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20092]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6655]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#28484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#36060]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65536 (0 0x10000) == 65536 (0x10000) [#19739]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12571]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#36055]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#10495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18645]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#22287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9127]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 259081 ( (0x3f409) == 259081 (0x3f409) [#32713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12122]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6149]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37205]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37401]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31414]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 183184 (0 0x2cb90) == 183184 (0x2cb90) [#1374]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38057]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#11797]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#27146]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 972 (0x3cc) == 972 (0x3cc) [#40234]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31351]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 14 == 14 [#39172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#36755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14737]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#23859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21779]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13623]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33024]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#23034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29009]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32454]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11236 (0 0x2be4) == 11236 (0x2be4) [#31907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27478]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#30609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#23853]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31207]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 816 (0x330) == = 816 (0x330) [#40102]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1548]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145161 (0x23709) == 14 45161 (0x23709) [#9437]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#11873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27120]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14173]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19182]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6061]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8196]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#643]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1578]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8464 (0x2 2110) == 8464 (0x2110) [#6939]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33481]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6343]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5476 (0x x1564) == 5476 (0x1564) [#31843]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39378]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32004]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#29308]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1863]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2230]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39384]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18334]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#36671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20718]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 764 (0x2fc) == = 764 (0x2fc) [#40076]", "EBPF_OPERATION_LOAD_CODE :: invoke_protocol(EBPF_OPERATION_LOAD_CODE, load_code_request) == EBPF_ _INVALID_OBJECT for: 5 == 5 [#37952]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26949]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#35200]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#27773]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39003]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37389]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24780]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#29792]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6223]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9279]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 382 (0x17e) == 382 (0x17e) [#40529]", "EBPF_OPERATION_CREATE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14277]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19350]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39353]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38629]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37822]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13707]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7792]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#35762]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#30110]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39233]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41097]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#35504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2116 (0x x844) == 2116 (0x844) [#19319]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#23959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14494]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#29626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 204304 ( (0x31e10) == 204304 (0x31e10) [#20131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82369 (0 0x141c1) == 82369 (0x141c1) [#19801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#24200]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2497]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) == EBPF_INVALID_OBJECT for: 5 == 5 [#38079]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5787]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#34395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18521]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26909]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#23048]", "EBPF_OPERATION_RESOLVE_MAP :: invoke_protocol(EBPF_OPERATION_RESOLVE_MAP, request, reply) == EBPF_I INVALID_ARGUMENT for: 6 == 6 [#37867]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26604]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32688]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#36225]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#10136]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"00/0\"' [#37608]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#21666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93636 (0 0x16dc4) == 93636 (0x16dc4) [#13602]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8020]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32970]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#23737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26798]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 20 05209 (0x32199) [#9653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33445]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6148]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39347]", "map_crud_operations_queue :: ebpf_map_push_entry(map.get(), sizeof(value), reinterpret_cast<uint8_ _t*>(&value), 0) == EBPF_SUCCESS for: 0 == 0 [#37669]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 896 (0x380) == 896 (0x380) [#40272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31222]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27909]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#28835]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168 8.0.0/16\"' [#37497]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 143641 ( (0x23119) == 143641 (0x23119) [#19985]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#10573]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24643]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1473]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58564 (0x xe4c4) == 58564 (0xe4c4) [#1002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12881]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38562]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5869]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#27731]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6536]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#28617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12818]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3435]", "invalid_bpf_get_socket_cookie :: xdp_program_info.initialize(EBPF_PROGRAM_TYPE_XDP) == EBPF_SUCCESS fo or: 0 == 0 [#42116]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 1 message: 'key_strin ng := \"192.169.0.0/24\"' [#37567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#24336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31638]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#30258]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#28580]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#36396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 18432 (0x4800) <= 36864 (0x x9000) [#17676]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25305]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#10507]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39601]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12047]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13379]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#29459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#22367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#24206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18659]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#35664]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#30026]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600) [#4168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12776]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131769 ( (0x202b9) == 131769 (0x202b9) [#26186]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19512]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28459]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 364 (0x16c) == 364 (0x16c) [#40538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#22898]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#35903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33061]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#36822]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.14.2/32\"' and 'correct_value := \" \"192.168.14.0/30\"' [#37463]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#23334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22252]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1929]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#11811]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33147]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#30023]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#36842]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37346]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 151321 ( (0x24f19) == 151321 (0x24f19) [#32473]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38755]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 674 (0x2a2) == 674 (0x2a2) [#40383]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 24 == 24 [#38869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18694]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10816 (0x2 2a40) == 10816 (0x2a40) [#726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#29167]", "hash_table_test :: memcmp(returned_value, data_1.data(), data_1.size()) == 0 for: 0 == 0 [#38447]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28498]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 254016 (0 0x3e040) == 254016 (0x3e040) [#7763]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#29558]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#11947]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#36213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72900 (0x x11cc4) == 72900 (0x11cc4) [#7295]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 138384 (0 0x21c90) == 138384 (0x21c90) [#1262]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#29710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#33384]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24996]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2524]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160000 ( (0x27100) == 160000 (0x27100) [#20027]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18902]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6086]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45369 (0 0xb139) == 45369 (0xb139) [#13416]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#36480]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2893]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#29562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#23693]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27492]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196 == 1 196 [#13018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19380]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9514]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25511]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#292]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#29676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#36156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#36850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34226]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27873]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#22475]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 672 (0x2a0) == 672 (0x2a0) [#40384]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25471]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#34164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#23280]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27571]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34336]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 872 (0x368) == = 872 (0x368) [#40130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12041]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#10577]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#29511]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 208849 ( (0x32fd1) == 208849 (0x32fd1) [#32609]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#30103]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8947]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 992 (0x3e0) == = 992 (0x3e0) [#40190]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#29447]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 (0x1210) [#8498]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12178]", "epoch_test_single_epoch :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#34620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6340]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20300]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19714]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#35553]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14442]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#36573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 143641 ( (0x23119) == 143641 (0x23119) [#13748]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32761 (0 0x7ff9) == 32761 (0x7ff9) [#25822]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8412]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 134689 (0 0x20e21) == 134689 (0x20e21) [#1252]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#905]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31418]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#21093]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38144]", "trampoline_test :: ebpf_update_trampoline_table( table.get(), (sizeof(provider_helper_fu unction_ids) / sizeof(provider_helper_function_ids[0])), provider_helper_function n_ids, &helper_function_addresses1) == EBPF_SUCCESS for: 0 == 0 [#38724]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#34872]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#35976]", "droppacket-native :: xdp_program_info.initialize(EBPF_PROGRAM_TYPE_XDP) == EBPF_SUCCESS fo or: 0 == 0 [#40915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#36386]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64 == 64 [#28703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#30084]", "map_crud_operations_queue :: ebpf_map_update_entry_with_handle( map.get(), sizeof(return_value) - 1, reinterpret_cast<uint8_t*>(&return_value), 0, EBPF_ANY) == EBPF_INVALID_ARGUM MENT for: 6 == 6 [#37708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#10579]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8002]", "droppacket-jit :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#40857]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12347]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 472 (0x1d8) == = 472 (0x1d8) [#39930]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1910]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#11532]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#35740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#23198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14416]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38889]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#36824]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84100 (0x x14884) == 84100 (0x14884) [#1098]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225 == 225 [#36489]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32288]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27001]", "access_check :: ebpf_access_check(sd_ptr.get(), 1, &generic_mapping) == EBPF_ACCESS_D DENIED for: 20 == 20 [#38740]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#35838]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 14 == 14 [#38854]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27313]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#35364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24580]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108241 ( (0x1a6d1) == 108241 (0x1a6d1) [#26118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#22116]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#35222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18528]", "epoch_test_stale_items :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38513]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5742]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71289 (0x x11679) == 71289 (0x11679) [#7289]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#29729]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2538]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 112 == 112 [#39123]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#36756]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31033]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131769 (0 0x202b9) == 131769 (0x202b9) [#7481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#36188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#34338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20106]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1463]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39636]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#10636]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#28298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28446]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18776]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#27236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#21552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173889 ( (0x2a741) == 173889 (0x2a741) [#20061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#29033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#23144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24767]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24829]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#22304]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91809 (0x x166a1) == 91809 (0x166a1) [#1124]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15625 (0 0x3d09) == 15625 (0x3d09) [#13240]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#35136]", "droppacket-jit :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30673]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#929]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_push_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#18707]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8452]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#30632]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#10651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24648]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#30648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25791]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21604]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 98 == 98 [#39743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#24195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#11584]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14215]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#10141]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9489]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#21852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24659]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#10433]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27490]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#29615]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34030]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 973 344 (0x17c40) [#9230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20200]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#28984]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19612]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 5475 56 (0xd5e4) [#8996]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2079]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1765]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#22902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12132]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#23742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12565]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 538 (0x21a) == 538 (0x21a) [#40451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31095]", "map_crud_operations_stack :: return_value == value for: 5 == 5 [#37740]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2116 (0x x844) == 2116 (0x844) [#31787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18721]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31986]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 183184 (0 0x2cb90) == 183184 (0x2cb90) [#7611]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2003]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0x x169) [#8351]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6540]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27436]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 884 (0x374) == 884 (0x374) [#40278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#23899]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152881 (0 0x25531) == 152881 (0x25531) [#7537]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31094]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15190]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 176 == 176 [#40632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 99225 (0 0x18399) == 99225 (0x18399) [#32325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20533]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#23559]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1 == 1 [#35863]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37996]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#35001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#23364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#22773]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#23572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28303]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36931]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 213444 (0 0x341c4) == 213444 (0x341c4) [#1442]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31221]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 38 == 38 [#39160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20314]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18957]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#35774]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#36600]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31832]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 738 (0x2e2) == 738 (0x2e2) [#40351]", "bindmonitor-tailcall-jit :: ebpf_api_initiate() == EBPF_SUCCESS for: 0 == 0 [#41042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#23518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 129600 ( (0x1fa40) == 129600 (0x1fa40) [#13710]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 107584 (0x1a440) == 1 107584 (0x1a440) [#24242]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19542]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 7 == 7 [#25460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#24155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38416 (0 0x9610) == 38416 (0x9610) [#19619]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12373]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.14.0/29\"' and 'correct_value := \" \"192.168.14.0/29\"' [#37441]", "pinning_test :: an_object.object.base.reference_count == 3 for: 3 == 3 [#38486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100 == 100 [#36670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24690]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#35923]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#10085]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23409 (0 0x5b71) == 23409 (0x5b71) [#32001]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#34780]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21583]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26896 (0x6910) == 268 896 (0x6910) [#29425]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#35765]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24693]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19602]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#35065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15220]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3172]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8986]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#33792]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3489]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27687]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34492]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27834]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#11716]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#27116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15860]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 742 (0x2e6) == 742 (0x2e6) [#40349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#11518]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28264]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#29953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#23668]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2481]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 150544 ( (0x24c10) == 150544 (0x24c10) [#20003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#22574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14187]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#35121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13837]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#23091]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 127449 ( (0x1f1d9) == 127449 (0x1f1d9) [#13704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21259]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27303]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 374 (0x176) == = 374 (0x176) [#39881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#23758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#21474]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#30005]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#35462]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 734 (0x2de) == = 734 (0x2de) [#40061]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18465]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#29450]", "droppacket-interpret :: bpf_map_delete_elem(dropped_packet_map_fd, &key) == EBPF_SUCCESS for: : 0 == 0 [#40942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33658]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#17159]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#24083]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#10703]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7496]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#22501]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 224 == 224 [#40608]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 446 (0x1be) == = 446 (0x1be) [#39917]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#29963]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16 == 16 [#25468]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18452]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#10997]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39385]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27400]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#29152]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39530]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5771]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 614 (0x266) == = 614 (0x266) [#40001]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 (0x1d91) [#9928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#29365]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#36376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 146689 ( (0x23d01) == 146689 (0x23d01) [#13756]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 17 72225 (0x2a0c1) [#9539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7504]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#26998]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38068]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 215296 ( (0x34900) == 215296 (0x34900) [#26388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#36000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#10345]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#11014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14798]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28281]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#30124]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6512]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#30338]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 182329 ( (0x2c839) == 182329 (0x2c839) [#26314]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#36523]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6106]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1826]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39640]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39566]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#27266]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39024]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7126]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37741]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#36803]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#36724]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39491]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32967]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32544]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10201 (0x27d9) == 1020 01 (0x27d9) [#9942]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 161604 (0x27744) == 1 161604 (0x27744) [#36053]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21719]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27745]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#11142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#23740]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33064]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#27272]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#138]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#35056]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23716 (0x5ca4) == 237 716 (0x5ca4) [#29391]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#10192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#34545]", "program :: hook.initialize() == EBPF_SUCCESS for: 0 == 0 [#37776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20993]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#27800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#10426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#10717]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#36776]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#101]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 53361 (0xd d071) == 53361 (0xd071) [#980]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15793]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#10978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#22928]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11970]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#11745]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2016]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#36274]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24999]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24777]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21602]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12333]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#22897]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 94 == 94 [#39741]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26516]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#36182]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#28745]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4624 (0x1 1210) == 4624 (0x1210) [#6891]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32930]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12664]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#23249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#21885]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#36117]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5813]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12413]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#23465]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#23715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22264]", "map_crud_operations_lpm_trie_32 :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7036]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#27938]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#10451]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17161 (0x4309) == 1716 61 (0x4309) [#9976]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 640 (0x280) == = 640 (0x280) [#40014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#22655]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6557]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39018]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33328]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#35878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12847]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22586]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#30297]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#34896]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2287]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#35793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33130]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34969 (0x8 8899) == 34969 (0x8899) [#892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14738]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22103]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#10255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#22336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#9925]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21934]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26067]", "EBPF_OPERATION_CREATE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24531]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 40 == 40 [#39714]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168100 ( (0x290a4) == 168100 (0x290a4) [#20047]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#23638]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44521 (0xade9) == 445 521 (0xade9) [#29015]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#22975]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#34572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 207025 ( (0x328b1) == 207025 (0x328b1) [#26370]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 169 == 169 [#544]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 434 (0x1b2) == 434 (0x1b2) [#40503]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#30310]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33965]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#29067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#10458]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#29434]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 686 (0x2ae) == 686 (0x2ae) [#40377]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 0 == 0 [#39049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#23141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19166]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28021]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#11127]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18630]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6257]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12451]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25275]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 96 == 96 [#39742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24929]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6438]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3360]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#36131]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2937]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 4161 16 (0xa290) [#8906]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#11783]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#22632]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41244]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1417]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31696]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50625 (0x xc5c1) == 50625 (0xc5c1) [#7205]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#23574]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 958 (0x3be) == 958 (0x3be) [#40241]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#33594]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#23813]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#36579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#24168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31872]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100489 ( (0x18889) == 100489 (0x18889) [#26094]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7524]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38614]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39495]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#24026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26575]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 194 == 194 [#39791]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66049 (0x x10201) == 66049 (0x10201) [#1032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14552]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 64 == 64 [#33717]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24961]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4356 (0x x1104) == 4356 (0x1104) [#19359]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3600 (0x xe10) == 3600 (0xe10) [#31815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#22550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#34923]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#29559]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#559]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 1144 49 (0x2cb9) [#9950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26800]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28009]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144 == 144 [#29471]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63504 (0x xf810) == 63504 (0xf810) [#7259]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#11268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#29463]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#23017]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25105]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123904 ( (0x1e400) == 123904 (0x1e400) [#32399]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 26 == 26 [#38868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#34689]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 100 == 100 [#39129]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12079]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2764]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39412]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#21813]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8562]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#28803]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 34 == 34 [#39711]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6994]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#11071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18809]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27775]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8018]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25633]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#35260]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 134689 ( (0x20e21) == 134689 (0x20e21) [#32429]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#401]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 141376 (0 0x22840) == 141376 (0x22840) [#7507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#29913]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#28956]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#625]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34075]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9628]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21781]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38689]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#35517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#10961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27516]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28335]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85849 (0x x14f59) == 85849 (0x14f59) [#7341]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24876]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144 == 144 [#22890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#23735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20411]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21413]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2971]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 128 == 128 [#39115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 158404 (0 0x26ac4) == 158404 (0x26ac4) [#7551]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#10483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21094]", "bindmonitor-bpf2bpf-interpret :: hook.attach_link(program_fd, attach_parameters, attach_parameters_siz ze, &_link) == EBPF_SUCCESS for: 0 == 0 [#41034]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30956]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33045]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#10150]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#9838]", "hash_table_test :: ebpf_hash_table_delete(table.get(), key_3.data()) == EBPF_SUCCESS for r: 0 == 0 [#38463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30810]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#35151]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1852]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31241]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 (0x19a1) [#8537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#22667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#24346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#36485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20454]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#478]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 98 == 98 [#39098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37193]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25209]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1016 (0x3f8) = == 1016 (0x3f8) [#40202]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#23354]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12974]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39626]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39483]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#33786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34009]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#30178]", "hash_table_test :: ebpf_hash_table_update(table.get(), key_1.data(), data_1.data(), EBPF F_HASH_TABLE_OPERATION_INSERT) == EBPF_SUCCESS for: 0 == 0 [#38424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14354]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3532]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15575]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48400 (0xb bd10) == 48400 (0xbd10) [#958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37397]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6561 (0x x19a1) == 6561 (0x19a1) [#25622]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14108]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56169 (0xd db69) == 56169 (0xdb69) [#992]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12714]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#23184]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#34910]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7304]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#35669]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#29746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7208]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 253009 (0 0x3dc51) == 253009 (0x3dc51) [#1524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18822]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#208]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#35106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 140625 ( (0x22551) == 140625 (0x22551) [#13740]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32400 (0 0x7e90) == 32400 (0x7e90) [#25820]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1908]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34724]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#10198]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#36863]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 25 51001 (0x3d479) [#9797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12941]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116964 (0 0x1c8e4) == 116964 (0x1c8e4) [#1202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24654]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#24391]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#36566]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37064]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#24191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8623]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7935]", "ring_buffer_reserve_submit_discard :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#40767]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 84 == 84 [#39137]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#29056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18313]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88804 (0 0x15ae4) == 88804 (0x15ae4) [#19823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#23230]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#35635]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24882]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#23475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27889 (0 0x6cf1) == 27889 (0x6cf1) [#19561]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 222784 ( (0x36640) == 222784 (0x36640) [#26404]", "map_reuse_3-jit :: error == 0 for: 0 == 0 [#41917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15818]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20410]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6078]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"0.0.0.0/0\"' and 'correct_value := \"0.0.0. .0/0\"' [#37453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13207]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33144]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#35433]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#10409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126736 (0 0x1ef10) == 126736 (0x1ef10) [#7467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16 == 16 [#19235]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#23371]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#33306]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 784 (0x31 10) == 784 (0x310) [#6811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12924]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17424 (0x4410) == 174 424 (0x4410) [#30077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49 == 49 [#30075]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#30439]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20552]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 135424 ( (0x21100) == 135424 (0x21100) [#26196]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#29462]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#34951]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34259]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26871]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41616 (0 0xa290) == 41616 (0xa290) [#32103]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_create(&map_name, &map_definition, (uintptr_t)ebpf_handle_in nvalid, &local_map) == EBPF_SUCCESS for: 0 == 0 [#24946]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31345]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148996 ( (0x24604) == 148996 (0x24604) [#26232]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2490]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9351]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#36578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#30070]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#33423]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#28175]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 576 (0x2 240) == 576 (0x240) [#25508]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26975]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28378]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#10149]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#11888]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT, request) == EBPF_I INVALID_ARGUMENT for: 6 == 6 [#38055]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3259]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#11495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#23308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18563]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#258]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18654]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66049 (0 0x10201) == 66049 (0x10201) [#32209]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#34014]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33326]", "map_crud_operations_stack :: return_value == 11 for: 11 == 11 [#37726]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27792]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20803]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#35524]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#11497]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12854]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 185761 (0 0x2d5a1) == 185761 (0x2d5a1) [#1380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37201]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33227]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#35307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14130]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31514]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31040]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#36620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#28382]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37727]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20620]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 714 (0x2ca) == = 714 (0x2ca) [#40051]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 148996 (0 0x24604) == 148996 (0x24604) [#1290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#22450]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24537]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39301]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30699]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#11343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13107]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#28674]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 19 92721 (0x2f0d1) [#9611]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9246]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25039]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9295]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7490]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#30616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31287]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20848]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27507]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#11222]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#29227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12458]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30996]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#24290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12581]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168921 ( (0x293d9) == 168921 (0x293d9) [#32517]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#29482]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39652]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 255025 ( (0x3e431) == 255025 (0x3e431) [#20237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#29590]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25461]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#36107]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#24023]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3475]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12693]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31246]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40890]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#35142]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27681]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35283]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3090]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38564]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1465]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#36082]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 844 (0x34c) == = 844 (0x34c) [#40116]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31934]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69169 (0x x10e31) == 69169 (0x10e31) [#7281]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#30404]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 5 == 5 [#38811]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#10748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#34791]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39639]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#23075]", "error codes :: result2 == result for: 33 == 33 [#40815]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 5 (0x15f9) [#35473]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9756]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6561 (0x1 19a1) == 6561 (0x19a1) [#6917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#23897]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#35539]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#30214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#29525]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#29875]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#11478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#36622]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27432]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.14.0/31\"' [#37424]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1827]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6506]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 522 (0x20a) == 522 (0x20a) [#40459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 161604 ( (0x27744) == 161604 (0x27744) [#20031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20398]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15625 (0 0x3d09) == 15625 (0x3d09) [#19477]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31537]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#11707]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21895]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50625 (0xc c5c1) == 50625 (0xc5c1) [#968]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30847]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1898]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21893]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#23906]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38646]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 197136 ( (0x30210) == 197136 (0x30210) [#13878]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#35626]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14816]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21059]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37082]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20102]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39426]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31199]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2376]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#35722]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#24134]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 272 (0x110) == = 272 (0x110) [#39830]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26911]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#29059]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 372 (0x174) == = 372 (0x174) [#39880]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25346]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#28746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12653]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19794]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38525]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6614]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#28664]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18640]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#35965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18677]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2787]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#29021]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2905]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#34260]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39361]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2664]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#10390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15596]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18490]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#30523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26749]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25293]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#28728]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#29486]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18551]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38358]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#29090]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#16770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13095]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6527]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#29483]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15791]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31972]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#30284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7310]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55225 (0 0xd7b9) == 55225 (0xd7b9) [#19697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31750]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1550]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3279]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3324]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#458]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131769 (0x202b9) == 1 131769 (0x202b9) [#33648]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2274]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20347]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#36413]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26648]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11449 (0 0x2cb9) == 11449 (0x2cb9) [#19441]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#11012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#34392]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#35345]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32932]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#11922]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116281 ( (0x1c639) == 116281 (0x1c639) [#26142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#27878]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40955]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35035]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33580]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33299]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#36358]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1369 (0x55 59) == 1369 (0x559) [#592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21758]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#11449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#36820]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 894 (0x37e) == 894 (0x37e) [#40273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7468]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#11410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9072]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20385]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25233]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#29915]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#36133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18219]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#21075]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34391]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#10907]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 846 (0x34e) == 846 (0x34e) [#40297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#29801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13451]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16 == 16 [#35528]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 378 (0x17a) == 378 (0x17a) [#40531]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#29686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#10674]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 74529 (0x x12321) == 74529 (0x12321) [#7301]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33235]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18323]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12154]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#24133]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34235]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#29768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24863]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15329]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38654]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 149769 ( (0x24909) == 149769 (0x24909) [#13764]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49 == 49 [#36779]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6656]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20142]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22066]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20284]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 38 == 38 [#39713]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 135424 (0 0x21100) == 135424 (0x21100) [#1254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14876]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#10031]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 458 (0x1ca) == 458 (0x1ca) [#40491]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3436]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#35690]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31242]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38625]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15664]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 120409 ( (0x1d659) == 120409 (0x1d659) [#13684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37024]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#34862]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14071]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15316]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3315]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2914]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 140625 ( (0x22551) == 140625 (0x22551) [#32445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#30036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#11278]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 118336 ( (0x1ce40) == 118336 (0x1ce40) [#13678]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65025 (0xfe01) == 650 025 (0xfe01) [#27920]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#27314]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 167281 (0x28d71) == 1 167281 (0x28d71) [#23293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 ( (0x6e4) [#9877]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 ( (0x4c9) [#8399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24889]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8233]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27375]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8653]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#23665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14400 (0x x3840) == 14400 (0x3840) [#6995]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7569 (0x x1d91) == 7569 (0x1d91) [#19401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#23503]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39035]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37365]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#92]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21254]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#27746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14436]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#28987]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12588]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19588]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8084]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21461]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#29632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34240]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_peek_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#12472]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20789]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#10710]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12440]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#29653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196249 ( (0x2fe99) == 196249 (0x2fe99) [#32581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#28859]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0x x190) [#9853]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12036]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2613]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#827]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39403]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33157]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 766 (0x2fe) == 766 (0x2fe) [#40337]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34754]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#34880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128881 ( (0x1f771) == 128881 (0x1f771) [#32413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#10647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#36302]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5729]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#23100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24496]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110224 (0x1ae90) == 1 110224 (0x1ae90) [#10742]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 324 (0x1 144) == 324 (0x144) [#19263]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20418]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1736]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#21435]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26091]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#30080]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#22504]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1483]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#30053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#28767]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.0.0. .0/8\"' [#37500]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25129]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31453]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37275]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33593]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#29493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#29903]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#10882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#10782]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#11163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14059]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21968]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96100 (0 0x17764) == 96100 (0x17764) [#32315]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#28723]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 97969 (0x17eb1) == 97 7969 (0x17eb1) [#30119]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#29452]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#21402]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8184]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_OBJECT_NOT_FOUND for: 7 == 7 [#37667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#11048]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.14.0/30\" == \"192.168.14.0 0/30\" with 2 messages: 'key_string := \"192.168.14.2/32\"' and 'correct_value := \"1 192.168.14.0/30\"' [#37464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#23101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12023]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77841 (0x x13011) == 77841 (0x13011) [#7313]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#35281]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#36382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#23156]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9532]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112896 ( (0x1b900) == 112896 (0x1b900) [#19899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#24201]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#29750]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32256]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#22842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20389]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#35951]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32040]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"AA/64\"' [#37582]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#11759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15614]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9625]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#36655]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"DD/124\" == \"DD/124\" with 2 messages: 'key_string := \"DD/125\"' and 'correct_value := \"DD/124\"' [#37615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#20829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 858 849 (0x14f59) [#9173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18800]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#30176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37301]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14407]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#30569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 239121 ( (0x3a611) == 239121 (0x3a611) [#20205]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 48 == 48 [#39073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15310]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#30407]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 750 (0x2ee) == 750 (0x2ee) [#40345]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38094]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24922]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#11833]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7010]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#10899]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64 == 64 [#31711]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37072]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 716 (0x2cc) == = 716 (0x2cc) [#40052]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#10521]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26117]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#11612]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3364]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#999]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#30172]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#21411]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#23592]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15652]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#10520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21607]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37299]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173056 (0 0x2a400) == 173056 (0x2a400) [#1350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47524 (0x xb9a4) == 47524 (0xb9a4) [#7191]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12912]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2176]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37230]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#35883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#23027]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#22423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32785]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34403]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#28028]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13765]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#21807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30960]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15247]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#30269]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#30452]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#28625]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#27941]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#23108]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12626]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14983]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6305]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#11935]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2854]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58564 (0 0xe4c4) == 58564 (0xe4c4) [#13474]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#29396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15124]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#10166]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18316]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28065]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1764]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25138]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8547]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#30615]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6549]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11664 (0 0x2d90) == 11664 (0x2d90) [#25676]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3012]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 153664 ( (0x25840) == 153664 (0x25840) [#32479]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#35354]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25607]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19526]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37823]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27762]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25368]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25119]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8992]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18225 (0x4731) == 1822 25 (0x4731) [#9980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#35810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#35925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14181]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#29528]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18909]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41135]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39655]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#30493]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30999]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#11202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#23262]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#10660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12945]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21388]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#30639]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19340]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7520]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12306]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#10161]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.0.0/16\" == \"192.168.0.0/1 16\" with 2 messages: 'key_string := \"192.168.0.0/16\"' and 'correct_value := \"192. .168.0.0/16\"' [#37446]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33142]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13377]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#10373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24620]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#30275]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#22718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25527]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12450]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26329]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#11065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#24237]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1679]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#34875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#23528]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 227529 (0x378c9) == 2 227529 (0x378c9) [#23361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#36497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31343]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37233]", "get_authentication_id :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#40832]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#21117]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20138]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2018]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36930]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14089]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30934]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37238]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33596]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26307]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 15 50544 (0x24c10) [#9458]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38555]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"DD/116\" == \"DD/116\" with 2 messages: 'key_string := \"DD/119\"' and 'correct_value := \"DD/116\"' [#37625]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#10972]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2239]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12234]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#28955]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#10856]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#24292]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#27332]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2908]", "pinning_test :: ebpf_pinning_table_delete(pinning_table.get(), &foo) == EBPF_SUCCESS for: 0 == 0 [#38488]", "program :: ebpf_result == EBPF_SUCCESS for: 0 == 0 [#37763]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26515]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#11651]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29369]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32534]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#30126]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#34852]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#36196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34295]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#30419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19828]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1953]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#21576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20128]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#36417]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#30572]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21317]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#28924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#23689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14242]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 276 (0x114) == 276 (0x114) [#40582]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31433]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 390 (0x186) == 390 (0x186) [#40525]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#30212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19550]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30838]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7744 (0x1 1e40) == 7744 (0x1e40) [#6931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21497]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#10347]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#27626]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#34476]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12372]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33874]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#10079]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#36740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34969 (0 0x8899) == 34969 (0x8899) [#19601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28261]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#35298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18537]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34337]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18321]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49 == 49 [#29031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12769 (0 0x31e1) == 12769 (0x31e1) [#19453]", "ring_buffer_output :: ebpf_ring_buffer_map_buffer(ring_buffer, &buffer) == EBPF_SUCCESS for r: 0 == 0 [#40749]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#10570]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 ( (0x5f1) [#8411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31782]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#36834]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#27128]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#30511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8189]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18390]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#11927]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26655]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#22457]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#35023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39601 (0x9ab1) == 396 601 (0x9ab1) [#22524]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#29150]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 948 864 (0x17290) [#9218]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#11793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#22604]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 210681 (0 0x336f9) == 210681 (0x336f9) [#7673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#10196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32438]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11236 (0 0x2be4) == 11236 (0x2be4) [#13202]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18260]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#35922]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#22047]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#36679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36907]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#29240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#22104]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#11820]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#511]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#24114]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18837]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#10299]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#20979]", "EBPF_OPERATION_GET_PINNED_OBJECT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38192]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12777]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20100]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12169]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#36782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 151321 ( (0x24f19) == 151321 (0x24f19) [#13768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13995]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#10006]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#30303]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 464 (0x1d0) == 464 (0x1d0) [#40488]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0x x100) [#9847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7946]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 210681 ( (0x336f9) == 210681 (0x336f9) [#26378]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26630]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 812 (0x32c) == 812 (0x32c) [#40314]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38559]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5725]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39512]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18283]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38605]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 35721 (0 0x8b89) == 35721 (0x8b89) [#32073]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33712]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26397]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#29265]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27961]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2952]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34481]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38762]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31136]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#10846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#21330]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31507]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#36246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#30286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24871]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#35776]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#29817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#36530]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#30250]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39554]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 174 == 174 [#39781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30781]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#36086]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#35592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#23406]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44100 (0 0xac44) == 44100 (0xac44) [#25880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 189225 ( (0x2e329) == 189225 (0x2e329) [#20097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14440]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1455]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#11330]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#29767]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#36243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31535]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2800]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28081]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30837]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3600 (0x xe10) == 3600 (0xe10) [#25580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0x x211) [#9856]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0x x144) [#9851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#23607]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28330]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#30345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#22610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24809]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#23661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14509]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#11551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7225 (0x1c39) == 7225 5 (0x1c39) [#23484]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 502 (0x1f6) == = 502 (0x1f6) [#39945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20566]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#11562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24519]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1618]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33059]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6279]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33070]", "name size :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#37785]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 154 == 154 [#40643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#22399]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24542]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6147]", "serialize_program_info_test :: out_prototype->name != nullptr for: \"helper_0\" != nullptr [#38807]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#30093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#23246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19881 (0 0x4da9) == 19881 (0x4da9) [#13272]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14260]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#23436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21289]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2449]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6672]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33263]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#35803]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12727]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14453]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21782]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#10046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 225625 (0x37159) == 22 25625 (0x37159) [#9719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 194481 ( (0x2f7b1) == 194481 (0x2f7b1) [#20109]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#11772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6676]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131769 (0x202b9) == 13 31769 (0x202b9) [#9383]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#30182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82369 (0x141c1) == 82 2369 (0x141c1) [#36163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31996]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#33672]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#36008]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22067]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15494]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1323]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 186 == 186 [#40627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14481]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2229]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1573]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37007]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#34725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#22053]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24995]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#30085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#22350]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#35828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13873]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#23498]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8100 (0x x1fa4) == 8100 (0x1fa4) [#31875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#29567]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7793]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39254]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8580]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#11856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20661]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18198]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90000 (0x x15f90) == 90000 (0x15f90) [#1118]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26669]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19936]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38681]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68121 (0 0x10a19) == 68121 (0x10a19) [#13512]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6283]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48400 (0 0xbd10) == 48400 (0xbd10) [#19667]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#30221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6645]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24745]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#20877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25285]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81225 (0x x13d49) == 81225 (0x13d49) [#1088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12638]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37921]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32714]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38095]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20720]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15380]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#11549]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7744]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4624 (0x x1210) == 4624 (0x1210) [#19363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33358]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12059]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2260]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9183]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139876 ( (0x22264) == 139876 (0x22264) [#32443]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 984 (0x3d8) == 984 (0x3d8) [#40228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62500 (0 0xf424) == 62500 (0xf424) [#19727]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#28586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15709]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18735]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3091]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#10965]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33290]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#36111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#22711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20164 (0x4ec4) == 201 164 (0x4ec4) [#24056]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27324]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18353]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 32 == 32 [#39163]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64 == 64 [#6771]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 14 49769 (0x24909) [#9455]", "error codes :: result2 == result for: 11 == 11 [#40793]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31483]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#29806]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35130]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37998]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173056 ( (0x2a400) == 173056 (0x2a400) [#13822]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#10669]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37700]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 136900 ( (0x216c4) == 136900 (0x216c4) [#26200]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#27311]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 2131 16 (0x5344) [#8732]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75076 (0x x12544) == 75076 (0x12544) [#7303]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"10.10.0 0.0/16\"' [#37499]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#29307]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8923]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31499]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#35621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#23659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24743]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#36621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0x x271) [#9858]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#21990]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28706]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#30067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12116]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14455]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37940]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#35270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96100 (0x17764) == 96 6100 (0x17764) [#24224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#33726]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#10959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#29895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21935]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#11204]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#27152]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31528]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24491]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#30042]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 32 == 32 [#39710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33980]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6224]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#30144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16331]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39425]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31111]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#29424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14965]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 966 (0x3c6) == = 966 (0x3c6) [#40177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12556]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#11903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20511]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12624]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 113569 (0 0x1bba1) == 113569 (0x1bba1) [#7429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 205209 ( (0x32199) == 205209 (0x32199) [#13896]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31657]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3877]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#35558]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 652 (0x28c) == = 652 (0x28c) [#40020]", "EBPF_OPERATION_GET_PINNED_OBJECT short header :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#23110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#36073]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 654 (0x28e) == = 654 (0x28e) [#40021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#21285]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168100 ( (0x290a4) == 168100 (0x290a4) [#26280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#35805]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 520 (0x208) == 520 (0x208) [#40460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#21426]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82944 (0 0x14400) == 82944 (0x14400) [#32271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#22544]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59049 (0xe6a9) == 590 049 (0xe6a9) [#35622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7664]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13473]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#23772]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 172.16.0.0/12\"' and 'return_value := \"172.16.0.0/12\"' [#37542]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#23109]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1677]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#877]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#266]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#11258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4489 (0x x1189) == 4489 (0x1189) [#13124]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8395]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1147]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0x x169) [#9852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#22390]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7955]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#28962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7861]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12597]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#34813]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8787]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#27959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#22913]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41192]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19382]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#512]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#29448]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 79524 (0x x136a4) == 79524 (0x136a4) [#7319]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 161604 ( (0x27744) == 161604 (0x27744) [#32499]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18507]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84681 (0x14ac9) == 84 4681 (0x14ac9) [#10701]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8692]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#36348]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1969]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#30045]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164025 ( (0x280b9) == 164025 (0x280b9) [#26270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#35886]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32858]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 428 (0x1ac) == = 428 (0x1ac) [#39908]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#24370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20417]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31333]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76729 (0 0x12bb9) == 76729 (0x12bb9) [#32249]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7170]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8273]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#23462]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#27806]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45369 (0x xb139) == 45369 (0xb139) [#7181]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#35483]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0x02) == EBPF_SUCCESS for: 0 == 0 [#6231]", "EBPF_OPERATION_GET_OBJECT_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38315]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104329 (0 0x19789) == 104329 (0x19789) [#7401]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12867]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#35737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#23952]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6390]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#29683]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32422]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13225]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#35310]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6458]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#34859]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#23912]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#517]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6034]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6553]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112225 (0 0x1b661) == 112225 (0x1b661) [#7425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#20874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28990]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7368]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196 == 196 [#36078]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#29850]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18520]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 430 (0x1ae) == = 430 (0x1ae) [#39909]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#35430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#36151]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#50]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 217156 ( (0x35044) == 217156 (0x35044) [#26392]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#319]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5981]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24651]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22016]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31446]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1029]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8922]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#36191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20444]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#30451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18595]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1247]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 70 == 70 [#40685]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20419]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#35397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14812]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#29868]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32951]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13339]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3375]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1181]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32316]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#10437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#36428]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26653]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.14.0/29\"' [#37484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 90000 (0 0x15f90) == 90000 (0x15f90) [#32295]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27067]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#315]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34676]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 3204 41 (0x7d29) [#8831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#30245]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 170 == 170 [#40635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31758]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81 == 81 [#10936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31667]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21173]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30893]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#11731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#29610]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77284 (0x12de4) == 77 7284 (0x12de4) [#29696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18585]", "async :: !cancellation_context.canceled for: true [#40733]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27657]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26896 (0x6 6910) == 26896 (0x6910) [#846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#35835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15185]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#29241]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 241081 (0 0x3adb9) == 241081 (0x3adb9) [#1500]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 217156 ( (0x35044) == 217156 (0x35044) [#20159]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19668]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 168100 (0 0x290a4) == 168100 (0x290a4) [#7575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#11766]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#35198]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#29457]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27232]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9694]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#10118]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39582]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1889]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#29793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14403]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15469]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#23204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#35467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9204]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#29535]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26303]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28294]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 149769 (0x24909) == 1 149769 (0x24909) [#10262]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#30012]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37306]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37074]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37028]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#10444]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26099]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 566 (0x236) == 566 (0x236) [#40437]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#10713]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#30136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14360]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18417]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"BB/31\"' and 'correct_value := \"00/0\"' [#37648]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31585]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59049 (0xe6a9) == 5904 49 (0xe6a9) [#9023]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26089]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52441 (0 0xccd9) == 52441 (0xccd9) [#32153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 28224 (0x6e40) == 282 224 (0x6e40) [#36659]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 63504 (0xf810) == 635 504 (0xf810) [#29642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13801]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1341]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33095]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 441 (0x1b9 9) == 441 (0x1b9) [#560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14334]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49729 (0 0xc241) == 49729 (0xc241) [#25906]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#947]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#24383]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 217156 ( (0x35044) == 217156 (0x35044) [#32627]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 20 == 20 [#38926]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#35427]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 99856 (0x18610) == 99 9856 (0x18610) [#36536]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#28118]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15338]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 224676 (0 0x36da4) == 224676 (0x36da4) [#1466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#27680]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33197]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#27569]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9 == 9 [#8303]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19238]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8021]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27612]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#34056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21749]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#10395]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32787]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5820]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28497]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196 == 196 [#36593]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2779]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#35114]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#29859]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20449 (0x4 4fe1) == 20449 (0x4fe1) [#804]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38809 (0 0x9799) == 38809 (0x9799) [#32089]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#36481]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#10533]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3223]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14248]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#33318]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37106]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33845]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 122500 ( (0x1de84) == 122500 (0x1de84) [#19927]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20741]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12325]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14330]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2982]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37345]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#27821]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#27521]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 360 (0x168) == = 360 (0x168) [#39874]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18441]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32112]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39352]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#36684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 93025 (0 0x16b61) == 93025 (0x16b61) [#32305]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 744 (0x2e8) == = 744 (0x2e8) [#40066]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3303]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#10970]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38761]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#23161]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 92416 (0x x16900) == 92416 (0x16900) [#1126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#36856]", "map_crud_operations_stack :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37733]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33004]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8539]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2359]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27156]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#467]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1006 (0x3ee) == 1006 (0x3ee) [#40217]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13227]", "ring_buffer_async_query :: ebpf_map_next_key(map.get(), 0, nullptr, nullptr) == EBPF_OPERATION_N NOT_SUPPORTED for: 18 == 18 [#37808]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15572]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26373]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34199]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21553]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38691]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8093]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6287]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 51529 (0xc c949) == 51529 (0xc949) [#972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16018]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59536 (0 0xe890) == 59536 (0xe890) [#19715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19324]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22181]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 729 (0x2 2d9) == 729 (0x2d9) [#19281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160801 (0 0x27421) == 160801 (0x27421) [#7557]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38842]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3520]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33779]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37235]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20534]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18451]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#24060]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8730]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37356]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 382 (0x17e) == = 382 (0x17e) [#39885]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3631]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 118 == 118 [#40661]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#22503]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33476]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37636 (0x x9304) == 37636 (0x9304) [#7143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18948]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#11847]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#35491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 200704 ( (0x31000) == 200704 (0x31000) [#32591]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"10.10.255.255/32\" == \"10.10.255.2 255/32\" with 2 messages: 'key_string := \"10.10.255.255/32\"' and 'correct_value := = \"10.10.255.255/32\"' [#37470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 19 90969 (0x2e9f9) [#9605]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#36792]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5922]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34694]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#23972]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 950 (0x3b6) == 950 (0x3b6) [#40245]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 36 == 36 [#39712]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#30030]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2809 (0x xaf9) == 2809 (0xaf9) [#31801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13193]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19054]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29239]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9619]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2263]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#35936]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#10221]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32260]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22259]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6840]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12444]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#29078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80656 (0 0x13b10) == 80656 (0x13b10) [#32263]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18225 (0 0x4731) == 18225 (0x4731) [#13260]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3282]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1764 (0x x6e4) == 1764 (0x6e4) [#19311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6084 (0x x17c4) == 6084 (0x17c4) [#25616]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 148996 (0x24604) == 1 148996 (0x24604) [#35208]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5907]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#271]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9675]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 824 (0x338) == 824 (0x338) [#40308]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19536]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#36399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22189]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38088]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8427]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34474]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144 == 1 144 [#13014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19586]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#34422]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16140]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5625 (0x1 15f9) == 5625 (0x15f9) [#6905]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6703]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13281]", "error codes :: result2 == result for: 6 == 6 [#40788]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25573]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26169]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#28424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14189]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 206116 (0x32524) == 2 206116 (0x32524) [#22128]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#36345]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48400 (0 0xbd10) == 48400 (0xbd10) [#13430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31541]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#23068]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28390]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#21348]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 197136 (0x30210) == 1 197136 (0x30210) [#23328]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14884 (0x x3a24) == 14884 (0x3a24) [#6999]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 2 messages: 'key_string := \"1 192.168.14.0/30\"' and 'return_value := \"192.168.14.0/30\"' [#37533]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#36558]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28113]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24997]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1199]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18892]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27312]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16198]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25411]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8023]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#29364]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#11836]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36945]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19212]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26645]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#35789]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36943]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#10941]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27310]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12119]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18529]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 171396 ( (0x29d84) == 171396 (0x29d84) [#26288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#11260]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#33951]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#35543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#24167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55225 (0 0xd7b9) == 55225 (0xd7b9) [#32165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 160801 ( (0x27421) == 160801 (0x27421) [#26262]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27952]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 4080 04 (0x9f64) [#8900]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 30 == 30 [#38967]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3541]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38025 (0 0x9489) == 38025 (0x9489) [#32085]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#28901]", "program :: WaitForSingleObject(_event, 0xFFFFFFFF) == ((((DWORD )0x00000000L) ) + 0 ) for: 0 == 0 [#37766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#28757]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#11499]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18779]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20884]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12532]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#30155]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33532]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#87]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24727]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20383]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#11907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15997]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19010]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#22362]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20783]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30782]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38339]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 222 == 222 [#39805]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70225 (0x x11251) == 70225 (0x11251) [#7285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 767 729 (0x12bb9) [#9125]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#10025]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8628]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#10352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26243]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#29052]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34151]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 1795 56 (0x4624) [#8696]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24656]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6043]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#35661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#30573]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#20841]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#469]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21609 (0 0x5469) == 21609 (0x5469) [#31989]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31147]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"BB/127\" \"' [#37661]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#10951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14161]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#30201]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116964 ( (0x1c8e4) == 116964 (0x1c8e4) [#26144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#23764]", "EBPF_OPERATION_GET_PROGRAM_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38266]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25406]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6092]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#35895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19008]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#10545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19196]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 2044 49 (0x4fe1) [#8723]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14116]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27106]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#10582]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26615]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#36435]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39232]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38532]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26739]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#29513]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28501]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12321 (0x3021) == 1232 21 (0x3021) [#9954]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38716]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#28894]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1771]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#23117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16425]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31042]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18225 (0x4 4731) == 18225 (0x4731) [#788]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#36666]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24903]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1917]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#21747]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 178 == 178 [#39783]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#34284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#10474]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#36871]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 (0x24c1) [#8585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#28436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14383]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32855]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#11838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#30052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#22062]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39622]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#24355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#35663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#30128]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40401 (0 0x9dd1) == 40401 (0x9dd1) [#32097]", "bindmonitor-interpret :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#41001]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 186 == 186 [#39787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13735]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6053]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 240100 (0 0x3a9e4) == 240100 (0x3a9e4) [#7735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21878]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 488 (0x1e8) == 488 (0x1e8) [#40476]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 784 (0x310 0) == 784 (0x310) [#574]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38568]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#33534]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27916]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#36377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32312]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#8309]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#36121]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#22964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16022]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 70 == 70 [#39144]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 115600 ( (0x1c390) == 115600 (0x1c390) [#32375]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39647]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#655]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24798]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27472]", "pinned_map_enum :: results.find(pin_path) != results.end() for: {?} != {?} [#41491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#36295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#23456]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1143]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#11743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5776 (0x x1690) == 5776 (0x1690) [#13142]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7502]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37036]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#33768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 96721 (0 0x179d1) == 96721 (0x179d1) [#19849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#23231]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 ( (0x5a4) [#9873]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25241]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 80656 (0x13b10) == 80 0656 (0x13b10) [#28579]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#11824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15946]", "droppacket-interpret :: bpf_map_lookup_elem(dropped_packet_map_fd, &key, &value) == EBPF_SUCC CESS for: 0 == 0 [#40971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1225 (0x x4c9) == 1225 (0x4c9) [#25530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33017]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#21504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1 == 1 [#35342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25082]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#440]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#10319]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8231]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106929 ( (0x1a1b1) == 106929 (0x1a1b1) [#13644]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1733]", "droppacket-native :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#40912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12783]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#34955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14291]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#10137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21100]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6701]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31894]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#28582]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7932]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37694]", "bindmonitor-bpf2bpf-jit :: emulate_bind(invoke, 2, \"fake_app_2\") == BIND_PERMIT for: 0 == 0 [#41019]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#10633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15961]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32878]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#10551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#23961]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225 == 225 [#35974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6600]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#10138]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 194 == 194 [#40623]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21557]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#10475]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#959]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 156816 (0x26490) == 1 156816 (0x26490) [#22745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15121]", "map_crud_operations_lpm_trie_32 :: status == EBPF_KEY_NOT_FOUND for: 19 == 19 with 2 messages: 'key_stri ing := \"11.0.0.0/8\"' and 'return_value := {null string}' [#37560]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30888]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25721]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38021]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15467]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12044]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3165]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37942]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14415]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38698]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 724 (0x2d4) == 724 (0x2d4) [#40358]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7518]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28591]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#36427]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#11536]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77284 (0 0x12de4) == 77284 (0x12de4) [#32251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#29091]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34585]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#29141]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#190]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4049]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 197136 (0 0x30210) == 197136 (0x30210) [#7643]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7228]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#10436]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131769 ( (0x202b9) == 131769 (0x202b9) [#13716]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 2 == 2 [#38848]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1555]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#36860]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7967]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14167]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#28945]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#11842]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#36373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#28869]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31898]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#28614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33025]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#24037]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7396 (0x1c ce4) == 7396 (0x1ce4) [#690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33014]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68644 (0 0x10c24) == 68644 (0x10c24) [#32219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#35165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 ( (0x7e9) [#9880]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5971]", "EBPF_OPERATION_GET_OBJECT_INFO :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38317]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 134689 (0x20e21) == 1 134689 (0x20e21) [#34365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#24063]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9571]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17424 (0x x4410) == 17424 (0x4410) [#7019]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value), reinterpret_cast< <uint8_t*>(&return_value), 0) == EBPF_SUCCESS for: 0 == 0 [#37692]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#27539]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#11627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24427]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14962]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 181476 ( (0x2c4e4) == 181476 (0x2c4e4) [#26312]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33049]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 336 (0x150) == 336 (0x150) [#40552]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3336]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#22483]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256036 (0 0x3e824) == 256036 (0x3e824) [#7767]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13407]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18841]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#35503]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8931]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26319]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39246]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32760]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19932]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15511]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 130 == 130 [#39759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34132]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#30094]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6174]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7422]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#22695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18582]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2469]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40401 (0x9 9dd1) == 40401 (0x9dd1) [#920]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219961 ( (0x35b39) == 219961 (0x35b39) [#13928]", "divide_by_zero-interpret :: sample_program_info.initialize(EBPF_PROGRAM_TYPE_SAMPLE) == EBPF_SUCC CESS for: 0 == 0 [#40987]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#10222]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12827]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#36284]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7847]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30909]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5997]", "map_crud_operations_queue :: ebpf_map_pop_entry(map.get(), sizeof(return_value) - 1, reinterpret_c cast<uint8_t*>(&return_value), 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31560]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#28790]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#11027]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7472]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 961 (0x3 3c1) == 961 (0x3c1) [#13052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24914]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 20 07025 (0x328b1) [#9659]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12387]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15646]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 324 (0x1 144) == 324 (0x144) [#13026]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28561 (0x6f91) == 285 561 (0x6f91) [#21273]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8457]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 898 (0x382) == = 898 (0x382) [#40143]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1024 (0x x400) == 1024 (0x400) [#13054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#35856]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#36324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33098]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38577]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18561]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26840]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 1254 44 (0x3100) [#9955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 98596 (0 0x18124) == 98596 (0x18124) [#13618]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#10732]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31299]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 233289 (0 0x38f49) == 233289 (0x38f49) [#7721]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#21291]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#10351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16540]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 708 (0x2c4) == 708 (0x2c4) [#40366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18554]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27430]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26179]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41209 (0 0xa0f9) == 41209 (0xa0f9) [#32101]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#24017]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#23435]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18973]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20488]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 179776 ( (0x2be40) == 179776 (0x2be40) [#32543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6764]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19055]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#29934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24913]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26167]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3162]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13593]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#22311]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 127449 (0x1f1d9) == 1 127449 (0x1f1d9) [#29411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17689 (0x4519) == 176 689 (0x4519) [#36689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#22870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#24022]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 102400 ( (0x19000) == 102400 (0x19000) [#13630]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 972 (0x3cc) == = 972 (0x3cc) [#40180]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#35352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9886]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16292]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39624]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 226576 ( (0x37510) == 226576 (0x37510) [#32647]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27360]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1335]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12804]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#22140]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#11183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18811]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31762]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#817]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7827]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24895]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#35586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#24214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15083]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55225 (0xd d7b9) == 55225 (0xd7b9) [#988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41209 (0 0xa0f9) == 41209 (0xa0f9) [#13396]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46656 (0 0xb640) == 46656 (0xb640) [#19659]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#11399]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 142129 (0x22b31) == 1 142129 (0x22b31) [#35400]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169 == 169 [#36872]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#21792]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37350]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34178]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#39114]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26435]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31660]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 854 (0x356) == 854 (0x356) [#40293]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14357]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7286]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4 == 4 [#10408]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27048]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37034]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#30424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21313]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 756 (0x2f4) == = 756 (0x2f4) [#40072]", "serialize_map_test :: ebpf_object_tracking_initiate() == EBPF_SUCCESS for: 0 == 0 [#38747]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31170]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 18 == 18 [#38872]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#35145]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7818]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#29317]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26712]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13259]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37956]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#23248]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#11534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25 == 25 [#35879]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31385]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13171]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 157609 (0 0x267a9) == 157609 (0x267a9) [#7549]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#29293]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20449 (0 0x4fe1) == 20449 (0x4fe1) [#31981]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 656 (0x290) == 656 (0x290) [#40392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#24073]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37037]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39333]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#22783]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#30296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#10781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27840]", "droppacket-jit :: hook.attach_link(program_fd, &if_index, sizeof(if_index), &link) == E EBPF_SUCCESS for: 0 == 0 [#40876]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#10919]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 916 (0x394) == = 916 (0x394) [#40152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#22924]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#29786]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8965]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31661]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1650]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_pop_entry(map.get(), value.size(), value.data(), 0) == EBPF_ _INVALID_ARGUMENT for: 6 == 6 [#12471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#24385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34198]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21547]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25939]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 142 == 142 [#40649]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37032]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7569 (0x1 1d91) == 7569 (0x1d91) [#6929]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 82944 (0x14400) == 82 2944 (0x14400) [#36816]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25 == 25 [#25470]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12929]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20355]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 6 == 6 [#38878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 0 == 0 [#12990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37220]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#22849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#28775]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121 == 121 [#30062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12701]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 24 <= 204 [#29105]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27741]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#21858]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33091]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#24090]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6116]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35036]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27558]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#35277]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#36775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25281 (0 0x62c1) == 25281 (0x62c1) [#25778]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#36294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13001]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22289]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 174724 (0 0x2aa84) == 174724 (0x2aa84) [#7591]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28011]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14968]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#22977]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5895]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 138384 (0x21c90) == 13 38384 (0x21c90) [#9410]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#29043]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4096 (0x x1000) == 4096 (0x1000) [#13118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8487]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#481]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#11808]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#10759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21526]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34225 (0x x85b1) == 34225 (0x85b1) [#7125]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#23584]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#33426]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#36551]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#23043]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38017]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21247]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 630 (0x276) == = 630 (0x276) [#40009]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2659]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 4 == 4 [#38879]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#22344]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"19 92.168.14.0/31\"' [#37518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15157]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15707]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25286]", "divide_by_zero-interpret :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#40988]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#10718]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 660 (0x294) == = 660 (0x294) [#40024]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33213]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#28865]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 416 (0x1a0) == 416 (0x1a0) [#40512]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6711]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31559]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35339]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#29178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35016]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 (0x1b90) [#8546]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#29814]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26497]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 205209 ( (0x32199) == 205209 (0x32199) [#26366]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#29280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#22275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30825]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#11679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#27644]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31652]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12396]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45796 (0 0xb2e4) == 45796 (0xb2e4) [#32123]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13019]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18790]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 6241 (0x1 1861) == 6241 (0x1861) [#6913]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 224676 ( (0x36da4) == 224676 (0x36da4) [#20175]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25731]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#36218]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 686 (0x2ae) == = 686 (0x2ae) [#40037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31195]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#631]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 202 == 202 [#40619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15526]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 82 == 82 [#40679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 75076 (0 0x12544) == 75076 (0x12544) [#13538]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128881 (0 0x1f771) == 128881 (0x1f771) [#1236]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18545]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#29777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#11595]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#34110]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#30490]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 166 == 166 [#39777]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24617]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2209 (0x8a a1) == 2209 (0x8a1) [#612]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 862 (0x35e) == = 862 (0x35e) [#40125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27951]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26097]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21079]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#24256]", "map_create_invalid :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'name := \"BPF_MAP_TYPE_HASH_OF_MAP PS\"' [#37418]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9411]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12562]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8241]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38903]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31081]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21083]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#33834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4356 (0x1104) == 4356 6 (0x1104) [#22944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#35004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12803]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#36605]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.14.0/30\" == \"192.168.14.0 0/30\" with 2 messages: 'key_string := \"192.168.14.0/30\"' and 'correct_value := \"1 192.168.14.0/30\"' [#37440]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27756]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13111]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#11583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#10605]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#35796]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6032]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33138]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19151]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 18 == 18 [#39703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#23205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#10465]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#33777]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#29244]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9631]", "EBPF_OPERATION_CREATE_PROGRAM :: invoke_protocol(EBPF_OPERATION_CREATE_PROGRAM, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37892]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14924]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31048]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 684 (0x2ac) == 684 (0x2ac) [#40378]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3552]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#36774]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#29281]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#11431]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28188]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9 == 9 [#25466]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12538]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15758]", "work_queue :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#40848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#23624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21886]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 17 73889 (0x2a741) [#9545]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8956]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8205]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 29929 (0 0x74e9) == 29929 (0x74e9) [#32041]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6317]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34415]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27994]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#22582]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14327]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 195364 ( (0x2fb24) == 195364 (0x2fb24) [#26344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 193600 (0x2f440) == 1 193600 (0x2f440) [#34867]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#23084]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#24366]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35112]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12502]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 536 (0x218) == = 536 (0x218) [#39962]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#10140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#23089]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9406]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 178084 (0x2b7a4) == 1 178084 (0x2b7a4) [#11864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12578]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26896 (0 0x6910) == 26896 (0x6910) [#13318]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30750]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1653]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#35523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21844]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21994]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#382]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 1 119025 (0x1d0f1) [#10755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15425]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#34197]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 618 (0x26a) == = 618 (0x26a) [#40003]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72900 (0 0x11cc4) == 72900 (0x11cc4) [#32235]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2658]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35092]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 0 == 0 [#40720]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#11843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31518]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#34404]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#28812]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30759]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#35648]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#36080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#30630]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39185]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5989]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6087]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#35675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27670]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5900]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#20997]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#29842]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15982]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38904]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13261]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39313]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 126736 (0x1ef10) == 1 126736 (0x1ef10) [#28199]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20052]", "work_queue :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#40843]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1407]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12197]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39682]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 844 (0x34c) == 844 (0x34c) [#40298]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3295]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#35356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 20449 (0 0x4fe1) == 20449 (0x4fe1) [#13276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#22356]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9057]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34270]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32400 (0 0x7e90) == 32400 (0x7e90) [#19587]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9492]", "hash_table_test :: ebpf_hash_table_find(table.get(), key_2.data(), &returned_value) == E EBPF_SUCCESS for: 0 == 0 [#38442]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28095]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41616 (0x xa290) == 41616 (0xa290) [#7163]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#42]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14765]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7853]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28116]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9216 (0x2400) == 9216 6 (0x2400) [#23495]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#36747]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 18769 (0x4951) == 1876 69 (0x4951) [#8705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#22278]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 216 == 216 [#40612]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33116]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32552]", "EBPF_OPERATION_UPDATE_PINNING :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38166]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33026]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 147456 ( (0x24000) == 147456 (0x24000) [#19995]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 648 (0x288) == = 648 (0x288) [#40018]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50176 (0 0xc400) == 50176 (0xc400) [#13438]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#30418]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18597]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11449 (0 0x2cb9) == 11449 (0x2cb9) [#31909]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19222]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20287]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8340]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#36126]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9465]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12071]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12308]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21118]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#36154]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37278]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 47089 (0xb7f1) == 470 089 (0xb7f1) [#11659]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#10232]", "serialize_map_test :: memcmp(&map_info->definition, &input_map_info->definition, sizeof(ebp pf_map_definition_in_memory_t)) == 0 for: 0 == 0 [#38768]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2007]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4624 (0x x1210) == 4624 (0x1210) [#13126]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#438]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31238]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#34212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#36048]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#23131]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600) [#4298]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#11309]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11881 (0 0x2e69) == 11881 (0x2e69) [#31913]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 75625 (0x12769) == 756 625 (0x12769) [#9119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24624]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25384]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#34812]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1648]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19881 (0x4da9) == 198 881 (0x4da9) [#30374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14504]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35111]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 54 == 54 [#38943]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19124]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#23995]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34019]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 46656 (0xb640) == 466 656 (0xb640) [#30516]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12969]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#30057]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34225]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9025 (0x x2341) == 9025 (0x2341) [#19417]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 170569 (0 0x29a49) == 170569 (0x29a49) [#1344]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33856 (0x8 8440) == 33856 (0x8440) [#886]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8749]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#36197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21662]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5812]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25801]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 34969 (0 0x8899) == 34969 (0x8899) [#25834]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#10561]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#22846]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"192.168.0.0/16\" == \"192.168.0.0/16\" with 2 messages: 'key_string := \"192.168.0.0/16\"' and 'return_value := \"192.168. .0.0/16\"' [#37541]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#27023]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18252]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 402 (0x192) == = 402 (0x192) [#39895]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#21351]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 696 (0x2b8) == 696 (0x2b8) [#40372]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38102]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 652 (0x28c) == 652 (0x28c) [#40394]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34162]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39503]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#22441]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6178]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38304]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#36416]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#29026]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 246016 (0x3c100) == 2 246016 (0x3c100) [#23895]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14611]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32041 (0 0x7d29) == 32041 (0x7d29) [#32053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#23080]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#23268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19174]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 832 (0x340) == = 832 (0x340) [#40110]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 842 (0x34a) == = 842 (0x34a) [#40115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14486]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 5198 84 (0xcb10) [#8978]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 1440 00 (0x3840) [#9965]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#10184]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#36049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131044 ( (0x1ffe4) == 131044 (0x1ffe4) [#13714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27361]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33592]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32842]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#11618]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7366]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16900 (0 0x4204) == 16900 (0x4204) [#31955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#24104]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20158]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39253]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(bad_key), reinterpret_cast<con nst uint8_t*>(&bad_key), 0) == expected_result for: 6 == 6 [#6753]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21056]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26881]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 223729 (0 0x369f1) == 223729 (0x369f1) [#7701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#23181]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39476]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26463]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33452]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#28472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#29699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22079]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6788]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26692]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#23122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21349]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#173]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25535]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#33369]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#10820]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8475]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 106929 (0 0x1a1b1) == 106929 (0x1a1b1) [#1172]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 206 == 206 [#40617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6437]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#10387]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#283]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8362]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#27296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#21315]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37030]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16 == 16 [#31703]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2881]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15129 (0x3b19) == 151 129 (0x3b19) [#35280]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#36380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37197]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2455]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6016]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73441 (0x11ee1) == 73 3441 (0x11ee1) [#23670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20737]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1159]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8004]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12366]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#97]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23104 (0x5 5a40) == 23104 (0x5a40) [#822]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 136 == 136 [#39762]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#35455]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 622 (0x26e) == 622 (0x26e) [#40409]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12660]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#11512]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31334]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 221841 (0x36291) == 2 221841 (0x36291) [#10883]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#11177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 189225 (0x2e329) == 1 189225 (0x2e329) [#34924]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(extra_value), reinterpret_cast< <uint8_t*>(&extra_value), 0) == EBPF_OUT_OF_SPACE for: 29 == 29 [#37723]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2793]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#22792]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#11686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#23792]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18906]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#36680]", "hash_table_stress_test :: ebpf_platform_initiate() == EBPF_SUCCESS for: 0 == 0 [#38465]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11991]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 101124 ( (0x18b04) == 101124 (0x18b04) [#13626]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26359]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#33636]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18566]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 (0x2341) [#9936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#28681]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#30501]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26737]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#10234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34969 (0x8899) == 349 969 (0x8899) [#22512]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 712 (0x2c8) == 712 (0x2c8) [#40364]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26795]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12040]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#34722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#29975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25737]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#36533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25 == 25 [#35358]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 172225 (0 0x2a0c1) == 172225 (0x2a0c1) [#1348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#30432]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24836]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46225 (0xb b491) == 46225 (0xb491) [#948]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 115600 ( (0x1c390) == 115600 (0x1c390) [#26140]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16900 (0x4204) == 169 900 (0x4204) [#29580]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38840]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26524]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1024 (0x x400) == 1024 (0x400) [#31759]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#23514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49 == 49 [#34425]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38674]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#30607]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#23749]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21190]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25879]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31219]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2443]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20912]", "EBPF_OPERATION_RING_BUFFER_MAP_QUERY_BUFFER :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38350]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#21663]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#23323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#24058]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 874 (0x36a) == = 874 (0x36a) [#40131]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 101761 (0x18d81) == 1 101761 (0x18d81) [#24233]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 159201 (0 0x26de1) == 159201 (0x26de1) [#7553]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#29325]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#43]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#35179]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13009]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12708]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31436]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2844]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9622]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#35581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21853]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20348]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9286]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 245025 ( (0x3bd21) == 245025 (0x3bd21) [#26450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#21753]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38540]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34535]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25621]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33119]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15413]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#29846]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#10765]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1643]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38383]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25559]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#11425]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#446]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 518 (0x206) == = 518 (0x206) [#39953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15929]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 20 08849 (0x32fd1) [#9665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6398]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 138384 (0x21c90) == 1 138384 (0x21c90) [#34944]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5329 (0x x14d1) == 5329 (0x14d1) [#13136]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37966]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27154]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10304]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20524]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#11523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13157]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26520]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5789]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1237]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39315]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#35425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15506]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41099]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18400]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1024 (0x400) == 1024 (0x400) [#28517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 ( (0x400) [#9865]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 232324 (0x38b84) == 2 232324 (0x38b84) [#36617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#11652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 142884 (0x22e24) == 1 142884 (0x22e24) [#21900]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12453]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#22411]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14701]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 438 (0x1b6) == = 438 (0x1b6) [#39913]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#36367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20527]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 106276 (0x19f24) == 1 106276 (0x19f24) [#36039]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#10905]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 860 (0x35c) == 860 (0x35c) [#40290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 158404 ( (0x26ac4) == 158404 (0x26ac4) [#26256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2601 (0x xa29) == 2601 (0xa29) [#13092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 125316 ( (0x1e984) == 125316 (0x1e984) [#19935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21986]", "bindmonitor-tailcall-interpret :: ebpf_object_set_execution_type(new_object, execution_type) == EBPF_SU UCCESS for: 0 == 0 [#41053]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 27556 (0x x6ba4) == 27556 (0x6ba4) [#7087]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21710]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20399]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1716]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108900 ( (0x1a964) == 108900 (0x1a964) [#19887]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14929]", "hash_table_test :: ebpf_hash_table_update(table.get(), key_2.data(), data_2.data(), EBPF F_HASH_TABLE_OPERATION_ANY) == EBPF_SUCCESS for: 0 == 0 [#38426]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12769 (0 0x31e1) == 12769 (0x31e1) [#13216]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33007]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#33450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16 == 16 [#33774]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1375]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 1 100489 (0x18889) [#23199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#10224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34007]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37092]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 213444 (0x341c4) == 2 213444 (0x341c4) [#24376]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40960]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39599]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#24353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87025 (0 0x153f1) == 87025 (0x153f1) [#19817]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#36460]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#22967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6342]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30683]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93025 (0x16b61) == 93 3025 (0x16b61) [#10170]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#11434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#33984]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#127]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32801]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8868]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#22947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 243049 (0x3b569) == 2 243049 (0x3b569) [#10382]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32740]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2310]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38309]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12460]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20965]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7921 (0x1e ef1) == 7921 (0x1ef1) [#696]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28389]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8926]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#11779]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26021]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(previous_key), reinterpret_cast< <const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key)) == EBPF_N NO_MORE_KEYS for: 25 == 25 [#14526]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28057]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#665]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139876 ( (0x22264) == 139876 (0x22264) [#26208]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40950]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15442]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#23125]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#35512]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2281]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21562]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#22164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20493]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#354]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20842]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#21360]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25821]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 137641 (0 0x219a9) == 137641 (0x219a9) [#7497]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2155]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6780]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21331]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#10086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34438]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#10139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8049]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24336 (0x5 5f10) == 24336 (0x5f10) [#830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11995]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28272]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25333]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#23546]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#23335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 146689 (0x23d01) == 1 146689 (0x23d01) [#23265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16387]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 7 == 7 [#38803]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 13 37641 (0x219a9) [#9407]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14128]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1654]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3291]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36864 (0x9000) == 368 864 (0x9000) [#35767]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2590]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6707]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66564 (0 0x10404) == 66564 (0x10404) [#19743]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6420]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26323]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#28919]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 82944 (0x14400) == 829 944 (0x14400) [#9158]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 52 == 52 [#40694]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 544 (0x220) == 544 (0x220) [#40448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32356]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46656 (0 0xb640) == 46656 (0xb640) [#32127]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7762]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 (0x2059) [#8567]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#23297]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15835]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20076]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25153]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21316 (0 0x5344) == 21316 (0x5344) [#13282]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#767]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 1587 76 (0x3e04) [#9971]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 560 (0x230) == = 560 (0x230) [#39974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#23284]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 104329 ( (0x19789) == 104329 (0x19789) [#26106]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12317]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#24307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 229441 ( (0x38041) == 229441 (0x38041) [#13948]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31097]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#34455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#22209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 89401 (0 0x15d39) == 89401 (0x15d39) [#26058]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 154449 (0x25b51) == 1 154449 (0x25b51) [#35155]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#24278]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#30642]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20561]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#174]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18268]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33737]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#36173]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14561]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 163216 (0 0x27d90) == 163216 (0x27d90) [#7563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#24334]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#29847]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#21126]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24977]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18996]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26810]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18967]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15290]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#22959]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 144 == 144 [#28067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#11700]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14427]", "EBPF_OPERATION_RESOLVE_MAP :: invoke_protocol(EBPF_OPERATION_RESOLVE_MAP, request, reply) == EBPF_I INVALID_ARGUMENT for: 6 == 6 [#37866]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25851]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#22943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15592]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 104 404 (0x28a4) [#21072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#10173]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#11106]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 180625 (0x2c191) == 18 80625 (0x2c191) [#9569]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#30015]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21332]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#23417]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#35484]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#28935]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19062]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48400 (0 0xbd10) == 48400 (0xbd10) [#25900]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15166]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#29691]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 162409 (0x27a69) == 1 162409 (0x27a69) [#30199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26233]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39355]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#36096]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18964]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8334]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15355]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"172.16.0.0/12\" != nullptr with 2 messag ges: 'key_string := \"172.16.0.0/12\"' and 'return_value := \"172.16.0.0/12\"' [#37543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 235225 (0x396d9) == 23 35225 (0x396d9) [#9749]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#27113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 12 28881 (0x1f771) [#9371]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28516]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#11261]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6156]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8090]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#36663]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8709]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 626 (0x272) == 626 (0x272) [#40407]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#28974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22177]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#22347]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34046]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 990 (0x3de) == = 990 (0x3de) [#40189]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28399]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#29156]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 980 (0x3d4) == 980 (0x3d4) [#40230]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 838 (0x346) == 838 (0x346) [#40301]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 882 (0x372) == = 882 (0x372) [#40135]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6125]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39204]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 795 524 (0x136a4) [#9140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21791]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10609 (0x2 2971) == 10609 (0x2971) [#724]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#23621]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#36512]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#22083]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15037]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37107]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 470 (0x1d6) == = 470 (0x1d6) [#39929]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2134]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1987]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31038]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7548]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#35620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2116 (0x x844) == 2116 (0x844) [#13082]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25433]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#34930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 43264 (0xa900) == 432 264 (0xa900) [#36029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 250000 (0x3d090) == 2 250000 (0x3d090) [#22266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 841 (0x3 349) == 841 (0x349) [#19285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 41616 (0xa290) == 416 616 (0xa290) [#11646]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7802]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#11053]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 1210 00 (0x2f44) [#9953]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21659]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#33255]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14590]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#22633]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6115]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16048]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1357]", "error codes :: result2 == result for: 12 == 12 [#40794]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#969]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36 == 36 [#530]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27960]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13977]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#30543]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 224676 ( (0x36da4) == 224676 (0x36da4) [#32643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18769 (0 0x4951) == 18769 (0x4951) [#13264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21971]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 436 (0x1b4) == = 436 (0x1b4) [#39912]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64516 (0 0xfc04) == 64516 (0xfc04) [#25968]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#29776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4356 (0x1 1104) == 4356 (0x1104) [#6887]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#23533]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#24424]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18734]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12875]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32702]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#30548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39204 (0 0x9924) == 39204 (0x9924) [#25856]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 22801 (0 0x5911) == 22801 (0x5911) [#25762]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42436 (0 0xa5c4) == 42436 (0xa5c4) [#19639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36932]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 642 (0x282) == = 642 (0x282) [#40015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 163216 ( (0x27d90) == 163216 (0x27d90) [#26268]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9753]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7892]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37089]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#11741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#21543]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20592]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26611]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3585]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#29958]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28342]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#30598]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22130]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#35897]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5791]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28227]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(previous_key), reinterpret_cast< <const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key)) == EBPF_N NO_MORE_KEYS for: 25 == 25 [#26996]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3241]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12894]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39367]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21143]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#919]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32901]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#11769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19664]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26437]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5986]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#34713]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13273]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 110 == 110 [#39124]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16502]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#11166]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19321 (0x4 4b79) == 19321 (0x4b79) [#796]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44521 (0x xade9) == 44521 (0xade9) [#7177]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#10702]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88804 (0 0x15ae4) == 88804 (0x15ae4) [#32291]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#10312]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26227]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#21699]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#28561]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#34932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#24296]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1 == 1 [#9832]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#10966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12067]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#10645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#24119]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 682 (0x2aa) == = 682 (0x2aa) [#40035]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19338]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21232]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#35335]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#36606]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9502]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#11174]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37144]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#21336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31063]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33839]", "EBPF_OPERATION_LOAD_CODE :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37934]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12585]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20751]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23104 (0 0x5a40) == 23104 (0x5a40) [#25764]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25705]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 72361 (0x x11aa9) == 72361 (0x11aa9) [#1056]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#22519]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 44944 (0xaf90) == 449 944 (0xaf90) [#23611]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34244]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 44521 (0 0xade9) == 44521 (0xade9) [#13412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26809]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 158404 (0x26ac4) == 1 158404 (0x26ac4) [#34440]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#35474]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#30557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#35050]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32784]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#10246]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 784 (0x310) == 784 (0x x310) [#9861]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7414]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#33327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#23321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24642]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#28394]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12884]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#11159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18496 (0 0x4840) == 18496 (0x4840) [#31967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6425]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15112]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15710]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#22484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#35913]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8000]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25339]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 424 (0x1a8) == 424 (0x1a8) [#40508]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33755]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8667]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 159201 ( (0x26de1) == 159201 (0x26de1) [#26258]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19336]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#4086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 177241 (0 0x2b459) == 177241 (0x2b459) [#7597]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#36545]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2301]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 227529 ( (0x378c9) == 227529 (0x378c9) [#26414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18599]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27132]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6544]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 4608 (0x1200) <= 4608 (0x12 200) [#17030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#23694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21932]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33215]", "map_crud_operations_lpm_trie_32 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168.16.0/24\"' [#37481]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 982 (0x3d6) == 982 (0x3d6) [#40229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#36342]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#33549]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33198]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#34984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8665]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14030]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 1416 61 (0x3751) [#9964]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 924 416 (0x16900) [#9206]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46225 (0x xb491) == 46225 (0xb491) [#7185]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28165]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 159201 (0x26de1) == 1 159201 (0x26de1) [#28852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9409 (0x24c1) == 9409 9 (0x24c1) [#24011]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34039]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 225 == 225 [#29204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#21498]", "bindmonitor-ringbuf-jit :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77284 (0 0x12de4) == 77284 (0x12de4) [#19783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14371]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 21904 (0x5590) == 219 904 (0x5590) [#11075]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19044 (0x4a64) == 1904 44 (0x4a64) [#9985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8244]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#21186]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26666]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25083]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5184 (0x x1440) == 5184 (0x1440) [#31839]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 190096 (0x2e690) == 19 90096 (0x2e690) [#9602]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18843]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#35246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 180625 (0x2c191) == 1 180625 (0x2c191) [#36849]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#36439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#22810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#30216]", "map_crud_operations_queue :: return_value == value for: 10 == 10 [#37701]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 218089 ( (0x353e9) == 218089 (0x353e9) [#20161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19478]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39601 (0x9 9ab1) == 39601 (0x9ab1) [#916]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38630]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#11946]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27805]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6242]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18880]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#36517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#35950]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#36432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20828]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3504]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#27401]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#35039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21668]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20475]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67600 (0x10810) == 67 7600 (0x10810) [#30399]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18213]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2820]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18769 (0x4951) == 187 769 (0x4951) [#36676]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 129600 (0 0x1fa40) == 129600 (0x1fa40) [#7475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#11908]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 259081 ( (0x3f409) == 259081 (0x3f409) [#26478]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#22703]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 231361 ( (0x387c1) == 231361 (0x387c1) [#32657]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27906]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 174724 ( (0x2aa84) == 174724 (0x2aa84) [#26296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18696]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31980]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145161 (0x23709) == 1 145161 (0x23709) [#28496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14579]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 16 == 16 [#27389]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32132]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1763]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33111]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#36623]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24715]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#36473]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7938]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#23023]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 262144 (0x40000) == 2 262144 (0x40000) [#29495]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38666]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65536 (0x x10000) == 65536 (0x10000) [#7267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#22387]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13689 (0x x3579) == 13689 (0x3579) [#6989]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15757]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 18432 (0x4800) <= 18432 (0x x4800) [#35866]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#30389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24336 (0 0x5f10) == 24336 (0x5f10) [#13302]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2778]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 124609 (0x1e6c1) == 1 124609 (0x1e6c1) [#24267]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33653]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17424 (0 0x4410) == 17424 (0x4410) [#13254]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12463]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28336]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32362]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#14]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#11289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 127 769 (0x31e1) [#22428]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 126736 (0x1ef10) == 12 26736 (0x1ef10) [#9362]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18257]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18771]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#22821]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#24272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25600 (0x6400) == 256 600 (0x6400) [#23040]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1024 (0x400) == 1024 ( (0x400) [#8390]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 46 == 46 [#38959]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31524]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#22569]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2734]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 225 == 225 [#548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#10368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15022]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34100]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37048]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25069]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32961]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15349]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3364 (0xd24) == 3364 (0xd24) [#10985]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 203401 (0x31a89) == 2 203401 (0x31a89) [#24365]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22006]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#23464]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26801]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19181]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#36884]", "droppacket-jit :: bpf_map_delete_elem(dropped_packet_map_fd, &key) == EBPF_SUCCESS for: : 0 == 0 [#40907]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#35695]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#35816]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40903]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9739]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19280]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 92416 (0 0x16900) == 92416 (0x16900) [#13598]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37162]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20632]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#29144]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#29034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6498]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#23815]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64516 (0 0xfc04) == 64516 (0xfc04) [#19735]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#30570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12740]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 600 (0x258) == 600 (0x258) [#40420]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19881 (0x4da9) == 1988 81 (0x4da9) [#8717]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#28271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13719]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12947]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22397]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18626]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39644]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31776]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25719]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8791]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#28851]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#35885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#22257]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39203]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 139129 ( (0x21f79) == 139129 (0x21f79) [#32441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18730]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100 == 100 [#10937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32742]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#27038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21862]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11881 (0 0x2e69) == 11881 (0x2e69) [#25678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6592]", "map_crud_operations_lpm_trie_32 :: return_value == key_string for: \"192.168.14.0/30\" == \"192.168.14.0/30 0\" with 2 messages: 'key_string := \"192.168.14.0/30\"' and 'return_value := \"192.1 168.14.0/30\"' [#37535]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12107]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#10112]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37133]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#30392]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28428]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38416 (0 0x9610) == 38416 (0x9610) [#32087]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20672]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31612]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#23437]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 213444 ( (0x341c4) == 213444 (0x341c4) [#32619]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 97344 (0x17c40) == 97 7344 (0x17c40) [#11754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15245]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6429]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8051]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26897]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84681 (0x x14ac9) == 84681 (0x14ac9) [#1100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18961]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33129]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#10653]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#10719]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28035]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6548]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#461]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15076]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13493]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14340]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39314]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31146]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#28442]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 954 (0x3ba) == = 954 (0x3ba) [#40171]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24460]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5776 (0x x1690) == 5776 (0x1690) [#31847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8979]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#10583]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32915]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24025 (0x x5dd9) == 24025 (0x5dd9) [#7065]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31101]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34331]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 174724 ( (0x2aa84) == 174724 (0x2aa84) [#32531]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24450]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12447]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#28082]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20459]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6918]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6792]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#11619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25357]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32276]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#567]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 137641 ( (0x219a9) == 137641 (0x219a9) [#32437]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2865]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 107584 ( (0x1a440) == 107584 (0x1a440) [#19883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#22149]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37127]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 238144 (0 0x3a240) == 238144 (0x3a240) [#1494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12425]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14237]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#29957]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 202 == 202 [#39795]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9409 (0x x24c1) == 9409 (0x24c1) [#19421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25056]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#21195]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34057]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12673]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 116 664 (0x2d90) [#11550]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22223]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27505]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#28948]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#23570]", "EBPF_OPERATION_CREATE_MAP :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37902]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1309]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18460]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112225 ( (0x1b661) == 112225 (0x1b661) [#26130]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#11257]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11959]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#993]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 233289 ( (0x38f49) == 233289 (0x38f49) [#20193]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 59536 (0xe890) == 595 536 (0xe890) [#23124]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 96 == 96 [#40672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20716]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25315]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 (0xa90) [#35608]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8281 (0x2059) == 8281 1 (0x2059) [#30518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#10068]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84681 (0 0x14ac9) == 84681 (0x14ac9) [#32277]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33760]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34346]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30970]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#28220]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6715]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66564 (0 0x10404) == 66564 (0x10404) [#13506]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26047]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 41209 (0xa0f9) == 412 209 (0xa0f9) [#35127]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 992 (0x3e0) == 992 (0x3e0) [#40224]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#27617]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33244]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#523]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24811]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#34677]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#36326]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9690]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20550]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 11881 (0x2e69) == 118 881 (0x2e69) [#27527]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22049]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 242064 (0x3b190) == 2 242064 (0x3b190) [#22851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14863]", "EBPF_OPERATION_CREATE_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37870]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13641]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 392 204 (0x9924) [#23078]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#35300]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#11077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24434]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#24395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#23937]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15613]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31459]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8247]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9678]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 80 == 80 [#39089]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18267]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14638]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31365]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8389]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#35941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#34886]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27537]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 22 == 22 [#38971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#23889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#20952]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#23342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24989]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2809 (0xa af9) == 2809 (0xaf9) [#6861]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#29395]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 970 (0x3ca) == 970 (0x3ca) [#40235]", "bindmonitor-tailcall-interpret :: bind_program_info.initialize(EBPF_PROGRAM_TYPE_BIND) == EBPF_SUCCESS for: 0 == 0 [#41052]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3352]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31469]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#20781]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#33603]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#23444]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15545]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#22641]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 172225 (0x2a0c1) == 1 172225 (0x2a0c1) [#34796]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#35199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9552]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6137]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#78]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9379]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11449 (0x2cb9) == 114 449 (0x2cb9) [#22985]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#10335]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 358 (0x166) == = 358 (0x166) [#39873]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 84 == 84 [#40678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13963]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#23003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#18710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25027]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15904]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7969]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 169744 (0x29710) == 1 169744 (0x29710) [#35652]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 224676 ( (0x36da4) == 224676 (0x36da4) [#26408]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 0 == 0 [#39694]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 258064 ( (0x3f010) == 258064 (0x3f010) [#26476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#24282]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 256 (0x100) == 256 (0 0x100) [#11458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#395]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 184041 (0x2cee9) == 18 84041 (0x2cee9) [#9581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2401 (0x x961) == 2401 (0x961) [#13088]", "memory_map_test :: ebpf_protect_memory(memory_descriptor.get(), EBPF_PAGE_PROTECT_READ_W WRITE) == EBPF_SUCCESS for: 0 == 0 [#38742]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 534 (0x216) == = 534 (0x216) [#39961]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38125]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6648]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114244 (0 0x1be44) == 114244 (0x1be44) [#1194]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31118]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#28451]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 228484 ( (0x37c84) == 228484 (0x37c84) [#20183]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#36198]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18769 (0x x4951) == 18769 (0x4951) [#7029]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 261121 (0x3fc01) == 2 261121 (0x3fc01) [#24425]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#11699]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21709]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8857]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8649 (0x x21c9) == 8649 (0x21c9) [#19413]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33505]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 198 == 198 [#40621]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2842]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20960]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8072]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#10716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32126]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"BB/32\"' [#37606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#27254]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3439]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22138]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25010]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 162409 (0 0x27a69) == 162409 (0x27a69) [#1324]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 208849 (0 0x32fd1) == 208849 (0x32fd1) [#1432]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27096]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#29802]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19114]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#10473]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108900 (0 0x1a964) == 108900 (0x1a964) [#1178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14131]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#27335]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#28541]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121 == 121 [#10417]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25959]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6603]", "error codes :: result2 == result for: 5 == 5 [#40787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20381]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15001]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#10711]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16641 (0x x4101) == 16641 (0x4101) [#7013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25711]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 117649 ( (0x1cb91) == 117649 (0x1cb91) [#26146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#35629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12666]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21343]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15556]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 10 == 10 [#39699]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12108]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#35055]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#35971]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24820]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38239]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25591]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#35390]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1009]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#364]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#34824]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9531]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1495]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#10914]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 0 == 0 [#38847]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19190]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27732]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32947]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#28543]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#10187]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 2209 (0x8a1) == 2209 (0x8a1) [#20907]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 15 52881 (0x25531) [#9467]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 658 (0x292) == 658 (0x292) [#40391]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#22663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27093]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2304 (0x x900) == 2304 (0x900) [#25556]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 72 == 72 [#39730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#16638]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#24172]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6518]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20340]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18740]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 58 == 58 [#39150]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12270]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 55696 (0x xd990) == 55696 (0xd990) [#7227]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 95481 (0x174f9) == 95 5481 (0x174f9) [#36319]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15539]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#30560]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31303]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9612]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8835]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15509]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34420]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#36118]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1965]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18376]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#35992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22033]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 ( (0xf04) [#8480]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11996]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21356]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14475]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#34263]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 190 == 190 [#39789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#22125]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11973]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30952]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#29455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22058]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == ((SIZE_T)~((SIZE_T)0) )) for: 18446744073709551615 (0xffffffffffffffff) == 18446744073709551615 (0xffff fffffffffffff) [#38864]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#23065]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31924]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24562]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 80089 (0 0x138d9) == 80089 (0x138d9) [#32261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25765]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 (0x17c4) [#9917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7844]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 746 (0x2ea) == 746 (0x2ea) [#40347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30989]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33836]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#35404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#10833]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32816]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15520]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15208]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21875]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#30256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3844 (0x xf04) == 3844 (0xf04) [#13114]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1713]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14918]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13981]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 252004 (0x3d864) == 2 252004 (0x3d864) [#29130]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 332 (0x14c) == 332 (0x14c) [#40554]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33757]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#22638]", "EBPF_OPERATION_LINK_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38231]", "EBPF_OPERATION_CREATE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37908]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#10831]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6351]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37170]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14358]", "hash_table_test :: ebpf_hash_table_key_count(table.get()) == 3 for: 3 == 3 [#38429]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#22110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63001 (0 0xf619) == 63001 (0xf619) [#19729]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#29930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31427]", "EBPF_OPERATION_RESOLVE_MAP :: invoke_protocol(EBPF_OPERATION_RESOLVE_MAP, request, reply) == EBPF_I INVALID_OBJECT for: 5 == 5 [#37864]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25017]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30625 (0x77a1) == 306 625 (0x77a1) [#11617]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 217156 (0x35044) == 2 217156 (0x35044) [#29478]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 118336 (0x1ce40) == 1 118336 (0x1ce40) [#23743]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14230]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 9 (0x1189) [#20967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 36 == 36 [#29891]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21344]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 153664 (0 0x25840) == 153664 (0x25840) [#7539]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#36865]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#28994]", "droppacket-interpret :: value == 0 for: 0 == 0 [#40932]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12921]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25789]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72361 (0x11aa9) == 72 2361 (0x11aa9) [#29002]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3325]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#28787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#28837]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20218]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14629]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#10565]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18833]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27100]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 982 (0x3d6) == = 982 (0x3d6) [#40185]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39679]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45369 (0 0xb139) == 45369 (0xb139) [#19653]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30958]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#36808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#27137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#23844]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 (0xd99) [#30171]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6400 (0x1900) == 6400 0 (0x1900) [#36280]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#29646]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#34362]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25287]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 212521 ( (0x33e29) == 212521 (0x33e29) [#26382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24734]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#575]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 942 (0x3ae) == = 942 (0x3ae) [#40165]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#36094]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18345]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 204304 ( (0x31e10) == 204304 (0x31e10) [#26364]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#23736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#35937]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49 == 49 [#31709]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 774 (0x306) == 774 (0x306) [#40333]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25144]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36864 (0x9 9000) == 36864 (0x9000) [#902]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3721 (0x xe89) == 3721 (0xe89) [#25582]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6063]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#29581]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#36769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24553]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#21516]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#24008]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#10976]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9361]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#36855]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#11925]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21683]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#34838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 248004 (0x3c8c4) == 2 248004 (0x3c8c4) [#30627]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14690]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15332]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 546 (0x222) == 546 (0x222) [#40447]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 17 71396 (0x29d84) [#9536]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19881 (0 0x4da9) == 19881 (0x4da9) [#19509]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25210]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18712]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8671]", "error codes :: result2 == result for: 24 == 24 [#40806]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56644 (0 0xdd44) == 56644 (0xdd44) [#32171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28306]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31425]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9676]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2284]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#35814]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#10452]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#23073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 125316 (0x1e984) == 1 125316 (0x1e984) [#23236]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1061]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5901]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31548]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 18432 (0x4800) <= 18432 (0x x4800) [#17161]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30906]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34454]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#11317]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#497]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#23211]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 123904 (0x1e400) == 1 123904 (0x1e400) [#11279]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#10739]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8415]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#36629]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 222784 ( (0x36640) == 222784 (0x36640) [#32639]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15841]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36983]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21922]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#24250]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9720]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26590]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6948]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19290]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75625 (0x12769) == 75 5625 (0x12769) [#29382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20983]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#35961]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#28756]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28062]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#28683]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#29682]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25551]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26612]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69169 (0x10e31) == 69 9169 (0x10e31) [#34731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15377]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#40]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24710]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20905]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 260100 ( (0x3f804) == 260100 (0x3f804) [#14010]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30817]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 0 == 0 [#38391]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#294]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 77841 (0 0x13011) == 77841 (0x13011) [#19785]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32240]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#27062]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38365]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#807]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33207]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6127]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 191844 (0x2ed64) == 1 191844 (0x2ed64) [#34584]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17689 (0 0x4519) == 17689 (0x4519) [#13256]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173056 (0x2a400) == 1 173056 (0x2a400) [#23300]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37169]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18939]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64516 (0xfc04) == 645 516 (0xfc04) [#11696]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1848]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key) - 1, reinterpret_cast<uint8 8_t*>(&key), reinterpret_cast<uint8_t*>(&key)) == EBPF_INVALID_ARGUMENT for: 6 == = 6 [#12469]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 116964 (0x1c8e4) == 1 116964 (0x1c8e4) [#11784]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2250]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22117]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31126]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 24 44036 (0x3b944) [#9776]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256 (0x1 100) == 256 (0x100) [#31727]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18559]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2766]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 232324 (0 0x38b84) == 232324 (0x38b84) [#1482]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) == EBPF_INVALID_OBJECT for: 5 == 5 [#38082]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#35579]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20545]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7859]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40952]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15718]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 174724 (0x2aa84) == 1 174724 (0x2aa84) [#28886]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#24002]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18978]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18302]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 67081 (0x x10609) == 67081 (0x10609) [#1036]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34339]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16274]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 576 (0x240) == 576 (0x240) [#40432]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30798]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39521]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38269]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18387]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#35541]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3202]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9372]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#22885]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#29681]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31089]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6057]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6824]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32652]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2641]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#422]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26821]", "ring_buffer_async_query :: ebpf_map_update_entry( map.get(), 0, nullptr, sizeof(value2), reinter rpret_cast<uint8_t*>(&value2), EBPF_ANY, 0) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37800]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8008]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24849]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1955]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6426]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 50 == 50 [#40695]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#10690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81 == 81 [#27140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16129 (0 0x3f01) == 16129 (0x3f01) [#19481]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#28738]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38115]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1156 (0x484) == 1156 (0x484) [#29234]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8180]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8464 (0x x2110) == 8464 (0x2110) [#19411]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2722]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 51529 (0xc949) == 515 529 (0xc949) [#28565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20538]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#23370]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5802]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1890]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 ( (0x5a4) [#8408]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24713]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#10995]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2113]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6345]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38163]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 64009 (0xfa09) == 640 009 (0xfa09) [#23652]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22243]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21316 (0 0x5344) == 21316 (0x5344) [#19519]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3568]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#36772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 102400 (0 0x19000) == 102400 (0x19000) [#7395]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 22 20900 (0x35ee4) [#9704]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#22755]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20146]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27511]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30953]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30872]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21308]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 131769 (0 0x202b9) == 131769 (0x202b9) [#1244]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28135]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#30165]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14136]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24955]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7915]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#29510]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#33576]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32731]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#146]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 1960 00 (0x4c90) [#8714]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27508]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 6100 09 (0xee51) [#9035]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 204 <= 204 [#10229]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#16028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31004]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#30019]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2280]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26943]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38650]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#29408]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7726]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90601 (0x161e9) == 90 0601 (0x161e9) [#36669]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#33753]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32819]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38643]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14791]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12996 (0 0x32c4) == 12996 (0x32c4) [#25688]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32935]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 249001 (0 0x3cca9) == 249001 (0x3cca9) [#7753]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 41209 (0 0xa0f9) == 41209 (0xa0f9) [#19633]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8268]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9609]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 340 (0x154) == = 340 (0x154) [#39864]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#30151]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#10944]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25168]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20697]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2650]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27700]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1002 (0x3ea) == 1002 (0x3ea) [#40219]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19132]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#10769]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19888]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19446]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 239121 (0 0x3a611) == 239121 (0x3a611) [#7733]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2259]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"DD/124\"' and 'correct_value := \"DD/124\"' [#37616]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#11638]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 119716 (0x1d3a4) == 1 119716 (0x1d3a4) [#35203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12737]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12758]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15334]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#36697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21665]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 48841 (0 0xbec9) == 48841 (0xbec9) [#25902]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 (0xa29) [#34602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#29649]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21808]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1059]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#10315]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38809 (0 0x9799) == 38809 (0x9799) [#25854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7396 (0x1 1ce4) == 7396 (0x1ce4) [#6927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 1536 (0x600) <= 1536 (0x600 0) [#10405]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26922]", "EBPF_OPERATION_RESOLVE_HELPER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 255025 ( (0x3e431) == 255025 (0x3e431) [#26470]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 222784 (0 0x36640) == 222784 (0x36640) [#1462]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31077]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#30098]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66049 (0 0x10201) == 66049 (0x10201) [#25974]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#29256]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#23392]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15088]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#28661]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 38416 (0x9 9610) == 38416 (0x9610) [#910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 43681 (0 0xaaa1) == 43681 (0xaaa1) [#19645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27438]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#28943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12713]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#28613]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#35201]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9462]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#36410]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#36633]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1658]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 109561 (0x1abf9) == 10 09561 (0x1abf9) [#9287]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"192.168.15.0/24\" == \"192.168.15.0 0/24\" with 2 messages: 'key_string := \"192.168.15.1/32\"' and 'correct_value := \"1 192.168.15.0/24\"' [#37456]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#36819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8431]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12261]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38158]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31123]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26003]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20794]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6047]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13923]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38368]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19482]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#11217]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#24331]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9481]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 20 == 20 [#40710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48841 (0xbec9) == 488 841 (0xbec9) [#36397]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1614]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 38 == 38 [#38963]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#66]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#22946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#10091]", "map_crud_operations_lpm_trie_128 :: std::string(return_value) == correct_value for: \"DD/116\" == \"DD/116\" with 2 messages: 'key_string := \"DD/116\"' and 'correct_value := \"DD/116\"' [#37627]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7018]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 848 (0x350) == 848 (0x350) [#40296]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 215296 (0x34900) == 2 215296 (0x34900) [#22158]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#23222]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 348 (0x15c) == 348 (0x15c) [#40546]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#35370]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9163]", "bindmonitor-ringbuf-jit :: result == 0 for: 0 == 0 [#41059]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3111]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31702]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#26]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 90000 (0x15f90) == 90 0000 (0x15f90) [#35775]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14236]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15085]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#30507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27205]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 26244 (0x6 6684) == 26244 (0x6684) [#842]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 110889 (0x1b129) == 1 110889 (0x1b129) [#29180]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 1 121801 (0x1dbc9) [#35684]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27889 (0x6cf1) == 278 889 (0x6cf1) [#24081]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32318]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13933]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#27131]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30957]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 147456 (0x24000) == 1 147456 (0x24000) [#28588]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2797]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18727]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2065]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 128164 ( (0x1f4a4) == 128164 (0x1f4a4) [#13706]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18864]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26633]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9810]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#2036]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#30064]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#47]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 255025 (0x3e431) == 2 255025 (0x3e431) [#23389]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39299]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33168]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#21984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#11358]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1798]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 203401 (0 0x31a89) == 203401 (0x31a89) [#1420]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8255]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2290]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#22829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6302]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20468]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12019]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#110]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 24336 (0x5f10) == 243 336 (0x5f10) [#29990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 111556 (0x1b3c4) == 1 111556 (0x1b3c4) [#22675]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27358]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#30238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24498]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31477]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30785]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12544 (0x3100) == 125 544 (0x3100) [#21102]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5625 (0x x15f9) == 5625 (0x15f9) [#25610]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31738]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#23852]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8557]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 123201 (0x1e141) == 1 123201 (0x1e141) [#33855]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#23164]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#36780]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8175]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#27101]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87025 (0x x153f1) == 87025 (0x153f1) [#7345]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9304]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#28868]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 231361 (0x387c1) == 2 231361 (0x387c1) [#11408]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 155236 (0x25e64) == 1 155236 (0x25e64) [#23278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20869]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14205]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31108]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1764 (0x x6e4) == 1764 (0x6e4) [#25544]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19047]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 73441 (0x x11ee1) == 73441 (0x11ee1) [#7297]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#240]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 3763 36 (0x9304) [#8876]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#36067]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 112896 ( (0x1b900) == 112896 (0x1b900) [#13662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14897]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#36088]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#23505]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12370]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#23111]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_peek_entry(map.get(), value.size(), value.data(), 0) == EBPF F_INVALID_ARGUMENT for: 6 == 6 [#37414]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19560]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38363]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16 == 16 [#526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20421]", "EBPF_OPERATION_QUERY_PROGRAM_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38146]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9495]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25033]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21695]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26488]", "error codes :: result2 == result for: 13 == 13 [#40795]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15464]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19666]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31285]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42849 (0 0xa761) == 42849 (0xa761) [#32109]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 200704 (0x31000) == 2 200704 (0x31000) [#30618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 130321 ( (0x1fd11) == 130321 (0x1fd11) [#19949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#24411]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12745]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 109561 (0 0x1abf9) == 109561 (0x1abf9) [#7417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50625 (0xc5c1) == 506 625 (0xc5c1) [#24139]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 205209 (0x32199) == 2 205209 (0x32199) [#10336]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26721]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 32400 (0x7e90) == 324 400 (0x7e90) [#27032]", "map_crud_operations_lpm_trie_32 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"192.168 8.16.0/24\"' [#37492]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19240]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12819]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3896]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21706]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12083]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#28850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 404 401 (0x9dd1) [#24115]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6347]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9525]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13241]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3136 (0xc40) == 3136 (0xc40) [#30436]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7744 (0x1e40) == 7744 4 (0x1e40) [#35469]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37196]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 314 (0x13a) == 314 (0x13a) [#40563]", "EBPF_OPERATION_RESOLVE_HELPER :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26834]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14041]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13673]", "droppacket-jit :: hook_result == XDP_DROP for: 2 == 2 [#40878]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#24152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24806]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27501]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#29695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20885]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14421]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27534]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31800]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 40401 (0x9dd1) == 4040 01 (0x9dd1) [#8897]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14514]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15629]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3969 (0xf81) == 3969 (0xf81) [#35304]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88209 (0x15891) == 88 8209 (0x15891) [#24211]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27751]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1296 (0x510) == 1296 (0x510) [#36445]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20304]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1063]", "EBPF_OPERATION_MAP_GET_NEXT_KEY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38132]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14702]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26928]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19179]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9054]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#24341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26614]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#20808]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10201 (0x27d9) == 102 201 (0x27d9) [#30489]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 488 (0x1e8) == = 488 (0x1e8) [#39938]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13187]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 66564 (0x10404) == 66 6564 (0x10404) [#28694]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77284 (0x12de4) == 772 284 (0x12de4) [#9128]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#11804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18271]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21784]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#27161]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3459]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 2 == 2 [#39178]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59049 (0 0xe6a9) == 59049 (0xe6a9) [#19713]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 228484 ( (0x37c84) == 228484 (0x37c84) [#32651]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 1 168921 (0x293d9) [#23295]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 153664 (0x25840) == 1 153664 (0x25840) [#11834]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#30049]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27387]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#27224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12662]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2770]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 102400 (0x19000) == 1 102400 (0x19000) [#35570]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42436 (0xa a5c4) == 42436 (0xa5c4) [#930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#36231]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#29288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 39204 (0x9924) == 3920 04 (0x9924) [#8888]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31658]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#28603]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6669]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24850]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19094]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31127]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21550]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15049]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37375]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27708]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37319]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28953]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34979]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27619]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 234256 ( (0x39310) == 234256 (0x39310) [#13958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#11051]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#36309]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 114921 (0x1c0e9) == 1 114921 (0x1c0e9) [#29349]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 864 (0x360) == 864 (0x360) [#40288]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31406]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70756 (0x11464) == 70 0756 (0x11464) [#35161]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18484]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13375]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 46 == 46 [#39717]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1661]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32832]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32106]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15876 (0 0x3e04) == 15876 (0x3e04) [#13242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81796 (0x13f84) == 817 796 (0x13f84) [#9152]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20449 (0x4fe1) == 204 449 (0x4fe1) [#29986]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20860]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4489 (0x1 1189) == 4489 (0x1189) [#6889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12906]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 37249 (0x9181) == 372 249 (0x9181) [#11120]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 88 == 88 [#39093]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31892]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 32 == 32 [#38865]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 278 (0x116) == 278 (0x116) [#40581]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12871]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3373]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#23958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#23778]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26241]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7950]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3442]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18988]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8634]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15236]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26718]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#36090]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 888 804 (0x15ae4) [#9188]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70225 (0x x11251) == 70225 (0x11251) [#1048]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#11422]", "map_crud_operations_lpm_trie_32 :: status == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"17 72.16.0.0/12\"' [#37522]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 112225 (0x1b661) == 11 12225 (0x1b661) [#9299]", "EBPF_OPERATION_GET_OBJECT_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38326]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#28999]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3507]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30760]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36923]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14149]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34067]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34429]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112225 (0x1b661) == 1 112225 (0x1b661) [#36880]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31268]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34372]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"10.10.0.0/16\"' and 'correct_value := \"10. .10.0.0/16\"' [#37449]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 65025 (0x xfe01) == 65025 (0xfe01) [#1028]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28611]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#35794]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30774]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20518]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#11188]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25725]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16 == 16 [#23918]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15460]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 215296 (0 0x34900) == 215296 (0x34900) [#7683]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24783]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3351]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14111]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33052]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12690]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#10498]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12265]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12665]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15722]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9129]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32604]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38025 (0x9489) == 380 025 (0x9489) [#30291]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39547]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31654]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#3764]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 164836 ( (0x283e4) == 164836 (0x283e4) [#13802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19856]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 259081 (0x3f409) == 2 259081 (0x3f409) [#24423]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#35381]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#10450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21775]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#81]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7678]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100 == 10 00 [#6775]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#33735]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7222]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71289 (0x11679) == 71 1289 (0x11679) [#10128]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14244]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36971]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12619]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#30465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14469]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6468]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25355]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#35973]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#223]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#10946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#10779]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38277]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8680]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#22533]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 26 == 26 [#40707]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7298]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31578]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9265]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31214]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26741]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32236]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#10896]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#11631]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7160]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60025 (0xea79) == 600 025 (0xea79) [#28019]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 96721 (0x179d1) == 96 6721 (0x179d1) [#34848]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24623]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#11748]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 1024 (0x400) == 1024 (0x400) [#40208]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31117]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13043]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 230 == 230 [#39809]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39235]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#34449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33625]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26291]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 51076 (0xc784) == 510 076 (0xc784) [#11668]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 18225 (0x4731) == 182 225 (0x4731) [#35526]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30943]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#24176]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21023]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#28760]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 99 9225 (0x18399) [#23197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13523]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2566]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#29191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22208]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31182]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32248]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12056]", "map_crud_operations_lpm_trie_128 :: ebpf_map_update_entry( map.get(), 0, reinterpret_cast<const uint8_t*> >(&key), 0, reinterpret_cast<const uint8_t*>(key_string.c_str()), EBPF_ANY, 0x01) ) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"CC/96\"' [#37577]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#35798]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8482]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#34506]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#29220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31836]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#10618]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#10488]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25795]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19044 (0 0x4a64) == 19044 (0x4a64) [#31971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30898]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7040]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14109]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37255]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14641 (0 0x3931) == 14641 (0x3931) [#25702]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#11800]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#27470]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12100 (0 0x2f44) == 12100 (0x2f44) [#25680]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8517]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8599]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 13225 (0x33a9) == 132 225 (0x33a9) [#36429]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 66049 (0x10201) == 66 6049 (0x10201) [#36252]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#167]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31806]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 858 (0x35a) == = 858 (0x35a) [#40123]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10201 (0 0x27d9) == 10201 (0x27d9) [#31897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26717]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(bad_key), reinterpret_cast<con nst uint8_t*>(&bad_key), value.size(), value.data(), EBPF_ANY, 0) == ((behavior_o on_max_entries != MAP_BEHAVIOR_FAIL) ? EBPF_SUCCESS : error_on_full) for: 0 == 0 [#515]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20731]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#27896]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1630]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 65536 (0x10000) == 65 5536 (0x10000) [#11698]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 31329 (0x7a61) == 313 329 (0x7a61) [#30467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20765]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2809 (0xaf f9) == 2809 (0xaf9) [#624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14445]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36949]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2583]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 ( (0xa29) [#8447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4900 (0x x1324) == 4900 (0x1324) [#13130]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37920]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34129]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32482]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31462]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121104 ( (0x1d910) == 121104 (0x1d910) [#26156]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#28415]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26139]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 614 (0x266) == 614 (0x266) [#40413]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9084]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12996 (0 0x32c4) == 12996 (0x32c4) [#19455]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6790]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 37249 (0x x9181) == 37249 (0x9181) [#7141]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1774]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32746]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97344 (0x x17c40) == 97344 (0x17c40) [#7379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18319]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25267]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19754]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 ( (0x7e9) [#8429]", "bindmonitor-ringbuf-jit :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41132]", "map_crud_operations_lpm_trie_32 :: return_value != nullptr for: \"192.168.16.0/24\" != nullptr with 2 mess sages: 'key_string := \"192.168.16.0/24\"' and 'return_value := \"192.168.16.0/24\"' [#37528]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 34 == 34 [#39066]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#29247]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18505]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#22727]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 244 == 244 [#39816]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7276]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 56644 (0 0xdd44) == 56644 (0xdd44) [#13466]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14402]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32252]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 529 (0x211) == 529 (0 0x211) [#34967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26839]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 128 == 128 [#39758]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 46225 (0xb491) == 462 225 (0xb491) [#10070]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8649 (0x21c9) == 8649 9 (0x21c9) [#11020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18731]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8173]", "async :: ebpf_async_initiate() == EBPF_SUCCESS for: 0 == 0 [#40726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18916]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#27410]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15161]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26539]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31200]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5808]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36100 (0x8 8d04) == 36100 (0x8d04) [#898]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 214369 ( (0x34561) == 214369 (0x34561) [#13916]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#23180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#30544]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 115600 ( (0x1c390) == 115600 (0x1c390) [#19907]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14507]", "pinning_test :: ebpf_random_initiate() == EBPF_SUCCESS for: 0 == 0 [#38473]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11236 (0x x2be4) == 11236 (0x2be4) [#6967]", "program :: ebpf_program_set_helper_function_ids(program.get(), (sizeof(helper_fu unction_ids) / sizeof(helper_function_ids[0])), helper_function_ids) == EBPF_SUCC CESS for: 0 == 0 [#37771]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31501]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34126]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#24030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#23360]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#24384]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1696]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14984]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0x x384) [#8384]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 841 (0x3 349) == 841 (0x349) [#31753]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26403]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 251001 (0x3d479) == 2 251001 (0x3d479) [#22862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#10516]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47089 (0 0xb7f1) == 47089 (0xb7f1) [#13424]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8635]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#36454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15829]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66049 (0x x10201) == 66049 (0x10201) [#7269]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7184]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22120]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33565]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 568 (0x238) == 568 (0x238) [#40436]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 101124 (0x18b04) == 1 101124 (0x18b04) [#29933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37320]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8445]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#30463]", "test-csum-diff :: csum == 0xb861 for: 47201 (0xb861) == 47201 (0xb861) [#37790]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14542]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9357]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33880]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37968]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32338]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#33957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#23432]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20585]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 49729 (0xc241) == 497 729 (0xc241) [#35750]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13833]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6664]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21262]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12204]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 11025 (0x2b11) == 110 025 (0x2b11) [#21081]", "map_crud_operations_lpm_trie_32 :: return_value == correct_value for: \"10.0.0.0/8\" == \"10.0.0.0/8\" with 2 messages: 'key_string := \"10.10.10.10/8\"' and 'correct_value := \"10.0.0.0/8\"' [#37476]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#29358]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#839]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 19881 (0x x4da9) == 19881 (0x4da9) [#7037]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38011]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#34188]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42849 (0xa761) == 4284 49 (0xa761) [#8915]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13561]", "EBPF_OPERATION_GET_PINNED_OBJECT :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#38190]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 944 (0x3b0) == = 944 (0x3b0) [#40166]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32096]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 245025 (0x3bd21) == 2 245025 (0x3bd21) [#34849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28507]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19852]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8137]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18264]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#35612]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 0 == 0 [#9831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1369 (0x559) == 1369 (0x559) [#27530]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#35962]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#23461]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 84100 (0x14884) == 84 4100 (0x14884) [#11732]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 36481 (0x8e81) == 364 481 (0x8e81) [#21339]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9376]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 196 == 196 [#30376]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7682]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14078]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 361 (0x1 169) == 361 (0x169) [#25498]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 108900 ( (0x1a964) == 108900 (0x1a964) [#26120]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 625 (0x2 271) == 625 (0x271) [#19277]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27583]", "serialize_program_info_test :: in_program_info.program_type_descriptor->is_privileged == out_program m_info->program_type_descriptor->is_privileged for: 0 == 0 [#38794]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7662]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#11270]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#29721]", "EBPF_OPERATION_CREATE_PROGRAM :: program_info_providers.back()->initialize(type) == EBPF_SUCCESS for: 0 == 0 [#37871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 252004 ( (0x3d864) == 252004 (0x3d864) [#20231]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2436]", "serialize_program_info_test :: in_prototype->arguments[j] == out_prototype->arguments[j] for: 0 == 0 [#38815]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 670 (0x29e) == = 670 (0x29e) [#40029]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1619]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16641 (0x4101) == 1664 41 (0x4101) [#8681]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25933]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8638]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#35975]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1089 (0x x441) == 1089 (0x441) [#13056]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26207]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13711]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 171396 (0 0x29d84) == 171396 (0x29d84) [#1346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11025 (0 0x2b11) == 11025 (0x2b11) [#19437]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#30122]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8162]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 878 (0x36e) == 878 (0x36e) [#40281]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18917]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#10094]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#34617]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#30554]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8070]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25024]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17689 (0x4 4519) == 17689 (0x4519) [#784]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87616 (0x15640) == 87 7616 (0x15640) [#36466]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8251]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 81 == 81 [#13008]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26969]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0 0x2a4) [#22904]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#21216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18227]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1820]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 58564 (0xe4c4) == 585 564 (0xe4c4) [#35243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#35350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21598]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9808]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31198]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#34059]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20669]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28041]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#36226]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25091]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#36420]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39273]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#23351]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#27899]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28300]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24951]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12008]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36910]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#10024]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31327]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#11892]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32532]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 10000 (0x2710) == 100 000 (0x2710) [#28481]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 181476 (0 0x2c4e4) == 181476 (0x2c4e4) [#7607]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 249001 ( (0x3cca9) == 249001 (0x3cca9) [#13988]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3393]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 44521 (0xade9) == 4452 21 (0xade9) [#8927]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#24357]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24645]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 260 (0x104) == = 260 (0x104) [#39824]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27465]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 478 (0x1de) == = 478 (0x1de) [#39933]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18225]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 177241 ( (0x2b459) == 177241 (0x2b459) [#20069]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 60516 (0xec64) == 605 516 (0xec64) [#10654]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 74529 (0x12321) == 74 4529 (0x12321) [#24187]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25847]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8059]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7346]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 195364 (0x2fb24) == 1 195364 (0x2fb24) [#11369]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#28814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 210681 ( (0x336f9) == 210681 (0x336f9) [#20145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15826]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121 == 121 [#29016]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38606]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#24404]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#11749]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#23698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 63001 (0xf619) == 630 001 (0xf619) [#21519]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#11830]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8631]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31261]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6619]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#35522]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7348]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37051]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87616 (0x x15640) == 87616 (0x15640) [#7347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256036 ( (0x3e824) == 256036 (0x3e824) [#26472]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 37636 (0x9304) == 376 636 (0x9304) [#23593]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12135]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144400 ( (0x23410) == 144400 (0x23410) [#19987]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3510]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#22868]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 158 == 158 [#40641]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22118]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9417]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24787]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7278]", "bindmonitor-ringbuf-interpret :: emulate_bind(invoke, fake_pid + i, fake_app_id.data()) == BIND_PERMIT T for: 0 == 0 [#41229]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#34269]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27144]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31506]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15385]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#409]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 188356 (0x2dfc4) == 1 188356 (0x2dfc4) [#11361]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3123]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33881]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9604 (0x2584) == 9604 4 (0x2584) [#30559]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 107584 ( (0x1a440) == 107584 (0x1a440) [#13646]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24633]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34621]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#23472]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#10802]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 198916 (0x30904) == 1 198916 (0x30904) [#29650]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33619]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24502]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#29720]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27054]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4 == 4 [#36065]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 13 31044 (0x1ffe4) [#9380]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15876 (0x3e04) == 158 876 (0x3e04) [#29812]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34102]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30840]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#29936]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5818]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#10388]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24679]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#29787]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20424]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 64 == 64 [#39726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14887]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 249001 (0x3cca9) == 2 249001 (0x3cca9) [#36748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32921]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20618]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 107584 ( (0x1a440) == 107584 (0x1a440) [#32351]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11960]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33442]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26979]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8776]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#10363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9409 (0x x24c1) == 9409 (0x24c1) [#13184]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26447]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 182329 (0x2c839) == 1 182329 (0x2c839) [#22780]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33697]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39603]", "ring_buffer_async_query :: ebpf_async_set_completion_callback( &completion, []( void* context, s size_t output_buffer_length, ebpf_result_t result) { (output_buffer_length); auto o completion = reinterpret_cast<_completion*>(context); auto async_query_result = = &completion->async_query_result; auto record = ebpf_ring_buffer_next_record( co ompletion->buffer, sizeof(uint64_t), async_query_result->consumer, async_query_re esult->producer); completion->value = *(uint64_t*)(record->data); do { ; Catch::A AssertionHandler catchAssertionHandler( \"REQUIRE\"_catch_sr, ::Catch::SourceLineIn nfo( \"C:\\\\testbed\\\\libs\\\\execution_context\\\\unit\\\\execution_context_unit_test.cpp p\", static_cast<std::size_t>( 1334 ) ), \"result == EBPF_SUCCESS\"_catch_sr, Catch: ::ResultDisposition::Normal ); try { __pragma( warning( push ) ) catchAssertionHa andler.handleExpr( Catch::Decomposer() <= result == EBPF_SUCCESS ); __pragma( war rning( pop ) ) } catch(...) { (catchAssertionHandler).handleUnexpectedInflightExc ception(); } catchAssertionHandler.complete(); } while( (void)0, (false) && stati ic_cast<const bool&>( !!(result == EBPF_SUCCESS) ) ); }) == EBPF_SUCCESS for: 0 = == 0 [#37794]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18347]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26896]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 288 (0x120) == = 288 (0x120) [#39838]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19198]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28039]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24602]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31316]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 346 (0x15a) == 346 (0x15a) [#40547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14681]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1395]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#23971]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 4 (0x2110) [#23491]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20614]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1507]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7837]", "droppacket-interpret :: bpf_map_delete_elem(dropped_packet_map_fd, &key) == EBPF_SUCCESS for: : 0 == 0 [#40930]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33080]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34228]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#10241]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33569]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2809 (0xaf9) == 2809 (0xaf9) [#10980]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34700]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33953]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 592 (0x250) == = 592 (0x250) [#39990]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 238144 ( (0x3a240) == 238144 (0x3a240) [#13966]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10609 (0x2971) == 106 609 (0x2971) [#23502]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33027]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12264]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#33897]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7917]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 216225 (0x34ca1) == 2 216225 (0x34ca1) [#29193]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21167]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9121]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8219]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1975]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15430]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#11298]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#11632]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#22476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#22875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18246]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 122500 (0x1de84) == 1 122500 (0x1de84) [#34904]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26817]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26183]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24482]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36940]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#22620]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2601 (0xa29) == 2601 ( (0xa29) [#9888]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38602]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 181476 (0x2c4e4) == 1 181476 (0x2c4e4) [#35031]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4761 (0x x1299) == 4761 (0x1299) [#31833]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8033]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 44 == 44 [#38960]", "EBPF_OPERATION_CREATE_PROGRAM :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37882]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6126]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32098]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14326]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26441]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12009]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#30000]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 240100 (0x3a9e4) == 2 240100 (0x3a9e4) [#34041]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21910]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#22464]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#34401]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#27392]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19083]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 612 (0x264) == 612 (0x264) [#40414]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7596]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32869]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 442 (0x1ba) == 442 (0x1ba) [#40499]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12520]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 257049 (0x3ec19) == 2 257049 (0x3ec19) [#28748]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37336]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12631]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#23429]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25086]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 112896 (0x1b900) == 1 112896 (0x1b900) [#36350]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 72900 (0x11cc4) == 72 2900 (0x11cc4) [#36555]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31379]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2098]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#34377]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33766]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1521 (0x x5f1) == 1521 (0x5f1) [#19305]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#28367]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25271]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == = 0 [#8]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30730]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4225 (0x1081) == 4225 5 (0x1081) [#20961]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33575]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12176]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9655]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39480]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#34817]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 171396 (0 0x29d84) == 171396 (0x29d84) [#7583]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3151]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70225 (0 0x11251) == 70225 (0x11251) [#25990]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33205]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14273]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 24964 (0x6184) == 249 964 (0x6184) [#23557]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#224]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14900]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26525]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2172]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24786]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38519]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#28010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2401 (0x961) == 2401 (0x961) [#27380]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1681 (0x691) == 1681 (0x691) [#35494]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 62500 (0x xf424) == 62500 (0xf424) [#7255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20540]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#24328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16330]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15694]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6737]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9540]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 16 == 16 [#38873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 17161 (0x4309) == 171 161 (0x4309) [#28121]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7858]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#34587]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32964]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 142129 (0 0x22b31) == 142129 (0x22b31) [#1272]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21304]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20336]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#34877]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 104329 (0x19789) == 1 104329 (0x19789) [#21735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25571]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6100]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12868]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30839]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33194]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32656]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7928]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#875]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#10145]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#10531]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39231]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#27752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57121 (0xdf21) == 571 121 (0xdf21) [#30161]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25404]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7588]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1702]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31306]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 16900 (0 0x4204) == 16900 (0x4204) [#19487]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14948]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28224 (0 0x6e40) == 28224 (0x6e40) [#32031]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 103041 (0x19281) == 1 103041 (0x19281) [#36484]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 125316 ( (0x1e984) == 125316 (0x1e984) [#32403]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#35140]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 240100 ( (0x3a9e4) == 240100 (0x3a9e4) [#26440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14831]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34015]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13825]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26095]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34712]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31114]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 441 (0x1b9) == 441 (0 0x1b9) [#34149]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31157]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38588]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31880]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#23640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10266]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14040]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33523]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#23301]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7532]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#36239]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#29102]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34687]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1684]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32526]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#675]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#35545]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#35501]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4624 (0x1210) == 4624 4 (0x1210) [#23982]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12063]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#28881]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39336]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38044]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26678]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63504 (0 0xf810) == 63504 (0xf810) [#25964]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 209764 (0x33364) == 2 209764 (0x33364) [#29549]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7783]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 26244 (0x6684) == 262 244 (0x6684) [#29439]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1 == 1 [#29574]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#23362]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 2 == 2 [#39695]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 988 (0x3dc) == 988 (0x3dc) [#40226]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7302]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 105625 (0x19c99) == 1 105625 (0x19c99) [#11252]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8572]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#10260]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1444 (0x5a4) == 1444 (0x5a4) [#30024]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#10812]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#10563]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32854]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8881]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12180]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25865]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33751]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8112]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 178084 (0 0x2b7a4) == 178084 (0x2b7a4) [#1362]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33956]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 114921 (0 0x1c0e9) == 114921 (0x1c0e9) [#7433]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 125316 ( (0x1e984) == 125316 (0x1e984) [#13698]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30276 (0x7644) == 302 276 (0x7644) [#23054]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 100489 (0x18889) == 10 00489 (0x18889) [#9245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 9025 (0x2341) == 9025 5 (0x2341) [#33765]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15148]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13319]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31329 (0 0x7a61) == 31329 (0x7a61) [#19581]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3370]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70756 (0 0x11464) == 70756 (0x11464) [#32227]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12292]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20678]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19498]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30857]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#22402]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 888 (0x378) == = 888 (0x378) [#40138]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27225 (0x6a59) == 272 225 (0x6a59) [#24079]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 76729 (0 0x12bb9) == 76729 (0x12bb9) [#26014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 223729 (0x369f1) == 2 223729 (0x369f1) [#28307]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 196 == 196 [#22892]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#28877]", "EBPF_OPERATION_RESOLVE_HELPER :: invoke_protocol(EBPF_OPERATION_RESOLVE_HELPER, request, reply) == EBP PF_INVALID_ARGUMENT for: 6 == 6 [#37837]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#437]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 132496 (0x20590) == 13 32496 (0x20590) [#9386]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33950]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#28304]", "pinned_map_enum :: error == 0 for: 0 == 0 [#41457]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18878]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38074]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39420]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 136161 (0x213e1) == 1 136161 (0x213e1) [#21873]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32973]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8151]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12684]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 133956 (0x20b44) == 1 133956 (0x20b44) [#10776]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20388]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27852]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#35436]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#33582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22024]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 7056 (0x1b b90) == 7056 (0x1b90) [#686]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3969 (0x xf81) == 3969 (0xf81) [#13116]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5814]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2500 (0x x9c4) == 2500 (0x9c4) [#13090]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12245]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#36385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16009]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8878]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38909]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 60 == 60 [#39079]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 318 (0x13e) == = 318 (0x13e) [#39853]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 170569 (0x29a49) == 1 170569 (0x29a49) [#36273]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28417]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6000]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#10106]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38171]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#30299]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32845]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5329 (0x14d1) == 5329 9 (0x14d1) [#11000]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#939]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#29971]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 964 (0x3c4) == 964 (0x3c4) [#40238]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1095]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1517]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32720]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34736]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 122500 (0x1de84) == 12 22500 (0x1de84) [#9344]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25889]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19358]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31395]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 64516 (0 0xfc04) == 64516 (0xfc04) [#32203]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 19600 (0x4c90) == 196 600 (0x4c90) [#11582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#23680]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#34897]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#51]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13787]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39600]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21529]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14400 (0 0x3840) == 14400 (0x3840) [#13230]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27915]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26775]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256036 ( (0x3e824) == 256036 (0x3e824) [#20239]", "test-csum-diff :: csum > 0 for: 804754 (0xc4792) > 0 [#37789]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19043]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 133225 (0x20869) == 1 133225 (0x20869) [#30353]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30697]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15611]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24813]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#30485]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 26569 (0x67c9) == 265 569 (0x67c9) [#24077]", "bitmap_test:65 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 60 == 60 [#38946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21739]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34111]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15620]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 66564 (0 0x10404) == 66564 (0x10404) [#32211]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#10041]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25001]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9078]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8242]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39581]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32440]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26377]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 8464 (0x2110) == 8464 (0x2110) [#9933]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#62]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25201]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28032]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18886]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31634]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14641 (0x3931) == 1464 41 (0x3931) [#8657]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12769 (0x31e1) == 1276 69 (0x31e1) [#8633]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 220900 (0x35ee4) == 2 220900 (0x35ee4) [#36556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#34032]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5806]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 1 165649 (0x28711) [#22756]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21191]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12851]", "bitmap_test:65 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38911]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#34954]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15473]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2601]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32761]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27334]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6499]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 140625 (0 0x22551) == 140625 (0x22551) [#1268]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33602]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12531]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28249]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8640]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 2916 (0x xb64) == 2916 (0xb64) [#19335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6724 (0x1a44) == 6724 4 (0x1a44) [#21012]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13343]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8898]", "hash_table_test :: memcmp(returned_value, data_1.data(), data_1.size()) == 0 for: 0 == 0 [#38439]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 152100 (0 0x25224) == 152100 (0x25224) [#1298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 3249 (0xcb1) == 3249 (0xcb1) [#22366]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24574]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9334]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37285]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 161 129 (0x3f01) [#23526]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#33714]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9811]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14689]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26841]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7564]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1022 (0x3fe) = == 1022 (0x3fe) [#40205]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 77841 (0x13011) == 778 841 (0x13011) [#9131]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 98596 (0x x18124) == 98596 (0x18124) [#7383]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#29400]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21797]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1994]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33124 (0x8164) == 331 124 (0x8164) [#28976]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32640]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40000 (0x x9c40) == 40000 (0x9c40) [#7155]", "EBPF_OPERATION_GET_PINNED_MAP_INFO :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38297]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 241081 (0x3adb9) == 2 241081 (0x3adb9) [#11418]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 23104 (0x5a40) == 231 104 (0x5a40) [#28701]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#35649]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32030]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 50176 (0xc400) == 501 176 (0xc400) [#23104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27768]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#22706]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26526]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 68 8121 (0x10a19) [#23660]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#36511]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8118]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#23800]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24899]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9337]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1045]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2757]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 361 (0x169) == 361 (0 0x169) [#36705]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 52900 (0xcea4) == 529 900 (0xcea4) [#24144]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8590]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25281 (0x62c1) == 252 281 (0x62c1) [#11086]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 91204 (0x x16444) == 91204 (0x16444) [#7359]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#57]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14424]", "EBPF_OPERATION_GET_PINNED_OBJECT :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38188]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36897]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 141376 (0x22840) == 1 141376 (0x22840) [#29297]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#29066]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63504 (0 0xf810) == 63504 (0xf810) [#32199]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 6 (0x1690) [#10482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 18769 (0 0x4951) == 18769 (0x4951) [#19501]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39629]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 145924 (0x23a04) == 1 145924 (0x23a04) [#21912]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21196]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 225625 (0x37159) == 2 225625 (0x37159) [#35349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87616 (0 0x15640) == 87616 (0x15640) [#19819]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28185]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 68121 (0 0x10a19) == 68121 (0x10a19) [#25982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 61504 (0 0xf040) == 61504 (0xf040) [#19723]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#697]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34846]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 198025 (0x30589) == 1 198025 (0x30589) [#36152]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5776 (0x1690) == 5776 (0x1690) [#8522]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31614]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26788]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20349]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21761]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5733]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21481]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32068]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116964 ( (0x1c8e4) == 116964 (0x1c8e4) [#19911]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37058]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13225 (0 0x33a9) == 13225 (0x33a9) [#13220]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32852]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#29260]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 10201 (0 0x27d9) == 10201 (0x27d9) [#19429]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38550]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37244]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1296 (0x x510) == 1296 (0x510) [#19299]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32793]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33067]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33860]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38378]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12962]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 129600 (0x1fa40) == 1 129600 (0x1fa40) [#35256]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 12321 (0x3021) == 123 321 (0x3021) [#34023]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31936]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6595]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 650 (0x28a) == = 650 (0x28a) [#40019]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 82369 (0 0x141c1) == 82369 (0x141c1) [#13564]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 841 (0x349) == 841 (0 0x349) [#20853]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38069]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3217]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8012]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31412]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 13924 (0x3664) == 139 924 (0x3664) [#11045]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#35931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34037]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25257]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 64 == 64 [#30298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 256036 (0x3e824) == 2 256036 (0x3e824) [#30153]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37052]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8440]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 625 (0x271) == 625 (0 0x271) [#36159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 206116 ( (0x32524) == 206116 (0x32524) [#32603]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 47089 (0xb b7f1) == 47089 (0xb7f1) [#952]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6288]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9672]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24691]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8613]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 69696 (0x11040) == 69 9696 (0x11040) [#23146]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22801 (0x5911) == 228 801 (0x5911) [#34431]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34618]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 140625 (0x22551) == 1 140625 (0x22551) [#35237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 75076 (0x12544) == 75 5076 (0x12544) [#29552]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#10949]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14807]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34507]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#34485]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#34927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9501]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31069]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#22394]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 39601 (0 0x9ab1) == 39601 (0x9ab1) [#25858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#10648]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39016]", "bitmap_test:33 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 30 == 30 [#38862]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 962 (0x3c2) == = 962 (0x3c2) [#40175]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#24417]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7654]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 240 == 240 [#40600]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 908 (0x38c) == = 908 (0x38c) [#40148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12328]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15581]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21958]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2704 (0xa90) == 2704 ( (0xa90) [#8450]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 47961 (0xbb59) == 479 961 (0xbb59) [#35471]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7881]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 121104 (0x1d910) == 1 121104 (0x1d910) [#36369]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19866]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18192]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33389]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#29849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 11449 (0 0x2cb9) == 11449 (0x2cb9) [#25674]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6402]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#23303]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34465]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#11285]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#10947]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#23612]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 23716 (0 0x5ca4) == 23716 (0x5ca4) [#32003]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 71824 (0 0x11890) == 71824 (0x11890) [#25996]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13651]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 15625 (0x3d09) == 156 625 (0x3d09) [#34563]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32006]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27798]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14849]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33012]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190096 (0x2e690) == 1 190096 (0x2e690) [#30264]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9547]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15089]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8757]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 156025 (0x26179) == 1 156025 (0x26179) [#35565]", "bindmonitor-bpf2bpf-jit :: error == 0 for: 0 == 0 [#41011]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39393]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4096 (0x1000) == 4096 6 (0x1000) [#27449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15055]", "map_crud_operations_lpm_trie_32 :: return_value == nullptr for: {null string} == nullptr with 1 message: : 'key_string := \"10.0.0.1/33\"' [#37510]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27261]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#35946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12092]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 956 (0x3bc) == 956 (0x3bc) [#40242]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34268]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24504]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6084 (0x17c4) == 6084 4 (0x17c4) [#11520]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#380]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39293]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33156]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37273]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 324 (0x144) == 324 (0 0x144) [#35859]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39573]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28018]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 186624 ( (0x2d900) == 186624 (0x2d900) [#20091]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31131]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 222784 (0x36640) == 2 222784 (0x36640) [#27803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 14884 (0x3a24) == 148 884 (0x3a24) [#30474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9166]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#589]", "error codes :: result2 == result for: 0 == 0 [#40782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 126025 (0x1ec49) == 1 126025 (0x1ec49) [#22698]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31564]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 484 (0x1e4) == = 484 (0x1e4) [#39936]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14021]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13819]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 58081 (0xe2e1) == 580 081 (0xe2e1) [#11168]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12419]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24927]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3321]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13337]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25344]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34196]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#30533]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 154449 (0x25b51) == 15 54449 (0x25b51) [#9473]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 961 (0x3c1 1) == 961 (0x3c1) [#580]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34084]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7256]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17956 (0x x4624) == 17956 (0x4624) [#7023]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 96721 (0x179d1) == 967 721 (0x179d1) [#9227]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#85]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 23716 (0x5ca4) == 2371 16 (0x5ca4) [#8756]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26685]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#35736]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59049 (0x xe6a9) == 59049 (0xe6a9) [#1004]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6304]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#189]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24489]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33097]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7569 (0x1d91) == 7569 9 (0x1d91) [#35154]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15876 (0x3 3e04) == 15876 (0x3e04) [#770]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12806]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15532]", "bindmonitor-ringbuf-jit :: ebpf_ring_buffer_map_write(ring_buffer_map, message.c_str(), message. .length() + 1) == EBPF_SUCCESS for: 0 == 0 [#41073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 247009 ( (0x3c4e1) == 247009 (0x3c4e1) [#32689]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28120]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12147]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53361 (0xd071) == 533 361 (0xd071) [#34668]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21253]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7046]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 79524 (0x136a4) == 79 9524 (0x136a4) [#35966]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3249 (0x xcb1) == 3249 (0xcb1) [#25574]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#34865]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 143641 (0x23119) == 1 143641 (0x23119) [#10254]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24728]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 76176 (0x12990) == 76 6176 (0x12990) [#11718]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 56644 (0xdd44) == 566 644 (0xdd44) [#23118]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1033]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1649]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2776]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#35346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36921]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24603]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#35599]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9352]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12754]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 98596 (0x18124) == 98 8596 (0x18124) [#21708]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#11093]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 192721 (0x2f0d1) == 1 192721 (0x2f0d1) [#30479]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25467]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24600]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36911]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14239]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19321 (0x4b79) == 193 321 (0x4b79) [#36549]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5184 (0x1440) == 5184 4 (0x1440) [#20982]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 32400 (0 0x7e90) == 32400 (0x7e90) [#13350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12850]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 83521 (0x14641) == 83 3521 (0x14641) [#11216]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19508]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78400 (0 0x13240) == 78400 (0x13240) [#19787]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1983]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#35353]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 89401 (0x15d39) == 89 9401 (0x15d39) [#11226]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 116281 (0x1c639) == 1 116281 (0x1c639) [#27473]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6344]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39407]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31325]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37222]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22757]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30968]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 160 == 160 [#40640]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#29324]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20702]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19496]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 392 (0x188) == = 392 (0x188) [#39890]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#29221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5184 (0x1 1440) == 5184 (0x1440) [#6899]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37385]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 16 66464 (0x28a40) [#9518]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#22008]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12289]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34300]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6386]", "map_crud_operations_lpm_trie_32 :: status == EBPF_INVALID_ARGUMENT for: 6 == 6 with 1 message: 'key_stri ing := \"172.16.0.1/100\"' [#37511]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37016]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7320]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39416]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14735]", "ring_buffer_reserve_submit_discard :: ebpf_state_initiate() == EBPF_SUCCESS for: 0 == 0 [#40770]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7212]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33709]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#28821]", "droppacket-interpret :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3721 (0x xe89) == 3721 (0xe89) [#19349]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 164836 (0x283e4) == 1 164836 (0x283e4) [#36195]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 484 (0x1 1e4) == 484 (0x1e4) [#13034]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14612]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26514]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 4489 (0x1189) == 4489 (0x1189) [#8495]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 8836 (0x2284) == 8836 6 (0x2284) [#33261]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14974]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14209]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#29944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33385]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14411]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 11236 (0x2be4) == 112 236 (0x2be4) [#35943]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1569]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25245]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(1) for: true [#38590]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2452]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1662]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 858 (0x35a) == 858 (0x35a) [#40291]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 918 (0x396) == = 918 (0x396) [#40153]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26061]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 92416 (0x16900) == 92 2416 (0x16900) [#29298]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20392]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24476]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33944]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39009]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#36178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19934]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#33552]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 528 (0x210) == 528 (0x210) [#40456]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20476]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 310 (0x136) == 310 (0x136) [#40565]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24866]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36947]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 ( (0xf04) [#9899]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#21024]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 740 (0x2e4) == 740 (0x2e4) [#40350]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13959]", "error codes :: result2 == result for: 17 == 17 [#40799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 236196 (0x39aa4) == 2 236196 (0x39aa4) [#22845]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30948]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2110]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12956]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26005]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13201]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12105]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21221]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5939]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33535]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#11736]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13761]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32741]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#34374]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15172]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#136]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#35122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#23647]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20729]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5943]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#36762]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27036]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14186]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 194481 (0x2f7b1) == 1 194481 (0x2f7b1) [#30363]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 52441 (0xccd9) == 5244 41 (0xccd9) [#8981]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12570]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#23051]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 798 (0x31e) == = 798 (0x31e) [#40093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12521]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 46225 (0 0xb491) == 46225 (0xb491) [#13420]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37392]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38651]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2892]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#24120]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 61504 (0xf040) == 615 504 (0xf040) [#24162]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 68121 (0x10a19) == 681 121 (0x10a19) [#9077]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8281 (0x20 059) == 8281 (0x2059) [#700]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#975]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28201]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 1 163216 (0x27d90) [#24318]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 175561 (0x2adc9) == 1 175561 (0x2adc9) [#35788]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33332]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 157609 (0 0x267a9) == 157609 (0x267a9) [#1312]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 97344 (0 0x17c40) == 97344 (0x17c40) [#32319]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3408]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 28900 (0x70e4) == 289 900 (0x70e4) [#23569]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15968]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 44100 (0xac44) == 441 100 (0xac44) [#29909]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9705]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34726]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 212521 (0x33e29) == 2 212521 (0x33e29) [#10873]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26924]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9667]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 218089 (0x353e9) == 2 218089 (0x353e9) [#29584]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#28826]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 21 19961 (0x35b39) [#9701]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37298]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28122]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2500 (0x9c4) == 2500 (0x9c4) [#36235]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15136]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 24025 (0x5dd9) == 240 025 (0x5dd9) [#11597]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13456 (0x3490) == 134 456 (0x3490) [#27632]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3195]", "EBPF_OPERATION_RESOLVE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37861]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28071]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25342]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#28679]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7944]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19178]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12424]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26799]", "show verification xdp_datasize_unsafe.o :: output_line == expected_output_line for: \"\" == \"\" [#42394]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 108 == 108 [#39103]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33001]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 408 (0x198) == 408 (0x198) [#40516]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33190]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#35418]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33893]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14413]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4 == 4 [#29872]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 56169 (0xdb69) == 561 169 (0xdb69) [#28981]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2560]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7838]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 13689 (0x3579) == 136 689 (0x3579) [#28655]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 66 == 66 [#39146]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25278]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 18496 (0x4840) == 184 496 (0x4840) [#22455]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 201601 (0x31381) == 2 201601 (0x31381) [#24363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14267]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39342]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 177241 (0x2b459) == 1 177241 (0x2b459) [#11863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40000 (0 0x9c40) == 40000 (0x9c40) [#13390]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#36042]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13671]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144 == 1 144 [#19251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#35213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 612 (0x264) <= 612 (0x264) [#16559]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8097]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18216]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6497]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 211600 (0x33a90) == 2 211600 (0x33a90) [#24374]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#11852]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12689]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 121 == 121 [#540]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2953]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9126]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21476]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31482]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3327]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12729]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1581]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 87025 (0 0x153f1) == 87025 (0x153f1) [#26050]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33634]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 235225 (0x396d9) == 2 235225 (0x396d9) [#35900]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26925]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 165649 (0x28711) == 16 65649 (0x28711) [#9515]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2622]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7064]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9178]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 19044 (0x4a64) == 190 044 (0x4a64) [#35898]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1559]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31209]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13456 (0 0x3490) == 13456 (0x3490) [#19459]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20382]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 11 13569 (0x1bba1) [#9305]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#36361]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 73984 (0x12100) == 73 3984 (0x12100) [#21582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 237169 (0x39e71) == 2 237169 (0x39e71) [#24401]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31432]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9141]", "async :: cancellation_context.canceled for: true [#40741]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#34931]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28317]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 732 (0x2dc) == = 732 (0x2dc) [#40060]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8262]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 163216 (0x27d90) == 16 63216 (0x27d90) [#9506]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24974]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7904]", "program :: async_context.get_result() == EBPF_SUCCESS for: 0 == 0 [#37767]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#28942]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 115600 (0x1c390) == 1 115600 (0x1c390) [#21786]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33325]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#22509]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9145]", "async :: ebpf_async_set_cancel_callback(&async_context, &cancellation_context, , [](void* context) { auto cancellation_context = reinterpret_cast<_cancellation_ _context*>(context); cancellation_context->canceled = true; }) == EBPF_SUCCESS fo or: 0 == 0 [#40729]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 61009 (0xee51) == 610 009 (0xee51) [#36609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#16054]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"DD/120\"' [#37594]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26582]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24578]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 81796 (0x13f84) == 81 1796 (0x13f84) [#28265]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5727]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8752]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26927]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18966]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 121801 (0x1dbc9) == 12 21801 (0x1dbc9) [#9341]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31148]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31760]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3600 (0xe10) == 3600 (0xe10) [#29323]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22500 (0x57e4) == 225 500 (0x57e4) [#10558]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20312]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 36 == 36 [#10933]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18596]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12980]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1576]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19143]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21187]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2838]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34681]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39670]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28724]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27630]", "EBPF_OPERATION_LOAD_CODE :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37969]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25220]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 328 (0x148) == 328 (0x148) [#40556]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30836]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27247]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 784 (0x310) == 784 (0 0x310) [#36493]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 2 260100 (0x3f804) [#11437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13589]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#35286]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24880]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 80089 (0x138d9) == 80 0089 (0x138d9) [#10693]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8286]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54756 (0xd5e4) == 547 756 (0xd5e4) [#36238]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6022]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#27917]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31533]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#34509]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 126736 ( (0x1ef10) == 126736 (0x1ef10) [#26172]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5476 (0x x1564) == 5476 (0x1564) [#13138]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8614]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12746]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20627]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4 == 4 [#6759]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8401]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8197]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 25921 (0x6541) == 259 921 (0x6541) [#22482]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#21471]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 34225 (0x85b1) == 342 225 (0x85b1) [#21321]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#36891]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8958]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13145]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20124]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 864 (0x360) == = 864 (0x360) [#40126]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 36100 (0 0x8d04) == 36100 (0x8d04) [#25840]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207025 (0x328b1) == 2 207025 (0x328b1) [#11897]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34163]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1681 (0x6 691) == 1681 (0x691) [#6837]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#30104]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 47524 (0xb9a4) == 475 524 (0xb9a4) [#29356]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12053]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 226576 (0x37510) == 2 226576 (0x37510) [#22835]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#30496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 5929 (0x x1729) == 5929 (0x1729) [#31849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#28560]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13181]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#26997]", "INVALID_PROGRAM_DATA :: ebpf_program_create(&program_parameters, &local_program) == (expected d_to_succeed ? EBPF_SUCCESS : EBPF_EXTENSION_FAILED_TO_LOAD) for: 23 == 23 [#38412]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#30391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 33856 (0 0x8440) == 33856 (0x8440) [#25828]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 40 == 40 [#39069]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30855]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30686]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 176400 (0x2b110) == 1 176400 (0x2b110) [#10832]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 3844 (0xf04) == 3844 (0xf04) [#36224]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 76729 (0x12bb9) == 76 6729 (0x12bb9) [#35144]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12383]", "map_crud_operations_lpm_trie_32 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 2 messages: 'key_string := \"192.168.16.0/24\"' and 'correct_value := \" \"192.168.16.0/24\"' [#37435]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1537]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27778]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 6561 (0x19a1) == 6561 1 (0x19a1) [#28843]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1225 (0x4c9) == 1225 (0x4c9) [#10441]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15449]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26393]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14927]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 104976 (0x19a10) == 1 104976 (0x19a10) [#11251]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9250]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 16129 (0x3f01) == 1612 29 (0x3f01) [#9972]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21593]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6434]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37256]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 251001 (0 0x3d479) == 251001 (0x3d479) [#1520]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3183]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6311]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#11344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8464 (0x x2110) == 8464 (0x2110) [#13174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27967]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3025 (0xbd1) == 3025 (0xbd1) [#29124]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1125]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28476]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 48400 (0xbd10) == 484 400 (0xbd10) [#35531]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 218 == 218 [#40611]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33112]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26580]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12215]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 99225 (0x18399) == 992 225 (0x18399) [#9239]", "test_map_entries_limit :: bpf_map_update_elem(map_fd, key, value, 0) == (max_entries_limited ? expected_error : 0) for: 0 == 0 [#42094]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1809]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21772]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 192721 ( (0x2f0d1) == 192721 (0x2f0d1) [#20105]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 204 <= 204 [#4144]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34325]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#10489]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21904 (0x5 5590) == 21904 (0x5590) [#814]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 130321 (0x1fd11) == 1 130321 (0x1fd11) [#29432]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 135424 (0x21100) == 1 135424 (0x21100) [#29465]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12610]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21836]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19176]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8100 (0x1f fa4) == 8100 (0x1fa4) [#698]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#10895]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14382]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#24150]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18500]", "INVALID_PROGRAM_DATA :: NmrRegisterProvider(provider_characteristics, nullptr, &nmr_provider_ _handle) == 0 for: 0 == 0 [#38415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45796 (0xb2e4) == 457 796 (0xb2e4) [#23094]", "droppacket-jit :: hook.batch_invoke(&ctx0, &hook_result, state) == EBPF_SUCCESS for: 0 == 0 [#40884]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#11735]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 9801 (0x2649) == 9801 1 (0x2649) [#24013]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26251]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27676]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33006]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26786]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2910]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24983]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 88804 (0x15ae4) == 88 8804 (0x15ae4) [#36851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21745]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 128164 (0x1f4a4) == 1 128164 (0x1f4a4) [#23757]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 232 == 232 [#39810]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 17161 (0 0x4309) == 17161 (0x4309) [#31957]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21944]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34133]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34670]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#10175]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31628]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25194]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19860]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 880 (0x370) == = 880 (0x370) [#40134]", "droppacket-interpret :: hook_result == XDP_DROP for: 2 == 2 [#40946]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 202500 (0x31704) == 2 202500 (0x31704) [#35442]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26703]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 49284 (0 0xc084) == 49284 (0xc084) [#13434]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 560 (0x230) == 560 (0x230) [#40440]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31636]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14881]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15445]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#11911]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 52441 (0xccd9) == 524 441 (0xccd9) [#30252]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9598]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 81225 (0x13d49) == 81 1225 (0x13d49) [#10148]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 25 == 25 [#34783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(bad_key), reinterpret_cast<c const uint8_t*>(&bad_key), value.size(), value.data(), EBPF_ANY, 0) == ((behavior r_on_max_entries != MAP_BEHAVIOR_FAIL) ? EBPF_SUCCESS : error_on_full) for: 6 == 6 [#19224]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9711]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32971]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1635]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6770]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25238]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20478]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#11488]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 78400 (0x13240) == 78 8400 (0x13240) [#11207]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 173056 ( (0x2a400) == 173056 (0x2a400) [#32527]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18716]", "program :: ebpf_link_create(EBPF_ATTACH_TYPE_SAMPLE, nullptr, 0, &local_link) == = EBPF_SUCCESS for: 0 == 0 [#37783]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21410]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 2924 41 (0x7239) [#8807]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21085]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 136 == 136 [#40652]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38086]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#14852]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 230400 (0x38400) == 2 230400 (0x38400) [#34320]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13411]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27454]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13689 (0 0x3579) == 13689 (0x3579) [#25694]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31828]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1853]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24810]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26017]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 91809 (0x166a1) == 91 1809 (0x166a1) [#35506]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12217]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 68644 (0x10c24) == 68 8644 (0x10c24) [#29496]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#36019]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12716]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 850 (0x352) == 850 (0x352) [#40295]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30882]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7274]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6355]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4096 (0x10 000) == 4096 (0x1000) [#646]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26263]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 157609 (0x267a9) == 1 157609 (0x267a9) [#11839]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#23632]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7396 (0x1ce4) == 7396 6 (0x1ce4) [#34719]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21620]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15782]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12605]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21025 (0 0x5221) == 21025 (0x5221) [#19517]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27348]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 40000 (0x9c40) == 400 000 (0x9c40) [#30226]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15644]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12290]", "trampoline_test :: ebpf_allocate_trampoline_table(1, &local_table) == EBPF_SUCCESS for: 0 == 0 [#38723]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#11221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#11926]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 4900 (0x1324) == 4900 0 (0x1324) [#22948]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33856 (0x8440) == 338 856 (0x8440) [#30177]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 166464 (0x28a40) == 1 166464 (0x28a40) [#23807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9136]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26985]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33470]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6277]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33220]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26883]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 63504 (0 0xf810) == 63504 (0xf810) [#13494]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32041 (0x7d29) == 320 041 (0x7d29) [#35595]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 85849 (0x14f59) == 85 5849 (0x14f59) [#23692]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25687]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1089 (0x441) == 1089 (0x441) [#11475]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6766]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2025 (0x7e9) == 2025 (0x7e9) [#29458]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2448]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 15129 (0 0x3b19) == 15129 (0x3b19) [#19473]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38715]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 228484 (0x37c84) == 2 228484 (0x37c84) [#11405]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12157]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 24649 (0x6049) == 246 649 (0x6049) [#36355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22093]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69696 (0 0x11040) == 69696 (0x11040) [#19755]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39621]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12752]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18590]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30841]", "EBPF_OPERATION_RING_BUFFER_MAP_ASYNC_QUERY :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38384]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2104]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22415]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20903]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37334]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 129600 (0x1fa40) == 12 29600 (0x1fa40) [#9374]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 190969 (0x2e9f9) == 1 190969 (0x2e9f9) [#27614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37232]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26639]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35344 (0x8a10) == 353 344 (0x8a10) [#30640]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14032]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2223]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 1156 (0x48 84) == 1156 (0x484) [#586]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19344]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19992]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24461]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6202]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88209 (0 0x15891) == 88209 (0x15891) [#32289]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8230]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#11710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 20736 (0x5100) == 207 736 (0x5100) [#30002]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 168100 (0x290a4) == 1 168100 (0x290a4) [#29994]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#11678]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#137]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37003]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 85264 (0x14d10) == 85 5264 (0x14d10) [#10157]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 119025 (0x1d0f1) == 11 19025 (0x1d0f1) [#9329]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14056]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28014]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20785]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#24149]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21038]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20390]", "EBPF_OPERATION_MAP_DELETE_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38107]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 6144 (0x1800) <= 6144 (0x18 800) [#10926]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#28939]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 69169 (0 0x10e31) == 69169 (0x10e31) [#32221]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#34945]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25118]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#145]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1931]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24452]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32228]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33365]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#11332]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 25 == 25 [#10932]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#253]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84100 (0 0x14884) == 84100 (0x14884) [#32275]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6006]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 87025 (0x153f1) == 87 7025 (0x153f1) [#36758]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38609]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20750]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#36170]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#35745]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3820]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 33489 (0x82d1) == 334 489 (0x82d1) [#29421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 14641 (0 0x3931) == 14641 (0x3931) [#13232]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6316]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9670]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 189225 (0 0x2e329) == 189225 (0x2e329) [#1388]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 185761 (0x2d5a1) == 1 185761 (0x2d5a1) [#36799]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 196 == 1 196 [#19255]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 219024 (0x35790) == 2 219024 (0x35790) [#28849]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26571]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 164025 (0x280b9) == 1 164025 (0x280b9) [#29702]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30916]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 184041 (0x2cee9) == 1 184041 (0x2cee9) [#29654]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15688]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 260100 (0x3f804) == 26 60100 (0x3f804) [#9824]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#23936]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21904 (0 0x5590) == 21904 (0x5590) [#31991]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25007]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12208]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 254016 (0x3e040) == 2 254016 (0x3e040) [#36300]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 173889 (0x2a741) == 1 173889 (0x2a741) [#30150]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 55696 (0xd990) == 556 696 (0xd990) [#36639]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 2116 (0x844) == 2116 (0x844) [#35955]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15025]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18815]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29929 (0x74e9) == 2992 29 (0x74e9) [#8813]", "EBPF_OPERATION_GET_EC_FUNCTION :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38249]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 289 (0x121) == 289 (0 0x121) [#36576]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28182]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 31684 (0 0x7bc4) == 31684 (0x7bc4) [#13346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 3844 (0x xf04) == 3844 (0xf04) [#31819]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 67081 (0x10609) == 67 7081 (0x10609) [#28596]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 676 (0x2a4) == 676 (0x x2a4) [#9859]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12902]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8364]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7542]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8778]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12343]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8949]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26489]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#11103]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14387]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8416]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6325]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 247009 (0x3c4e1) == 2 247009 (0x3c4e1) [#30364]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5797]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8346]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26894]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24740]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36913]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18758]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#10268]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26727]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 103684 (0x19504) == 1 103684 (0x19504) [#11249]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 144400 (0x23410) == 1 144400 (0x23410) [#23779]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31367]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 1002 (0x3ea) = == 1002 (0x3ea) [#40195]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32390]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39606]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#30010]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6033]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#29427]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39206]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12007]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33379]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 78961 (0x13471) == 78 8961 (0x13471) [#21609]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36960]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#20090]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 15376 (0x3c10) == 153 376 (0x3c10) [#23002]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16384 (0x4000) == 163 384 (0x4000) [#36502]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 100 == 100 [#27833]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2389]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 10816 (0x2a40) == 108 816 (0x2a40) [#24018]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34727]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 102 == 102 [#39745]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27837]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37207]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27199]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 62500 (0xf424) == 625 500 (0xf424) [#28670]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 30976 (0x7900) == 309 976 (0x7900) [#23575]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 83521 (0 0x14641) == 83521 (0x14641) [#19805]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 4761 (0x1299) == 4761 1 (0x1299) [#30624]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 21025 (0x5221) == 210 025 (0x5221) [#24059]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12326]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#11980]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 234256 (0x39310) == 2 234256 (0x39310) [#29807]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 3481 (0xd99) == 3481 ( (0xd99) [#9896]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7020]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 208849 (0x32fd1) == 2 208849 (0x32fd1) [#22812]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14245]", "map_crud_operations_queue :: ebpf_map_update_entry_with_handle( map.get(), sizeof(return_value), r reinterpret_cast<uint8_t*>(&return_value), 0, EBPF_ANY) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#37709]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 187489 (0x2dc61) == 1 187489 (0x2dc61) [#35614]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 229441 (0x38041) == 2 229441 (0x38041) [#35848]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34589]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1849 (0x739) == 1849 ( (0x739) [#8423]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 120409 (0x1d659) == 12 20409 (0x1d659) [#9335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12602]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 100 == 1 100 [#13010]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#22050]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2304 (0x900) == 2304 (0x900) [#29831]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1871]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13221]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7710]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34721]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14527]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20486]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 106929 (0x1a1b1) == 1 106929 (0x1a1b1) [#23726]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 50176 (0 0xc400) == 50176 (0xc400) [#19675]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: keys.size() == _test_map_size for: 512 (0x200) == 512 (0x200) [#23396]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 233289 (0x38f49) == 2 233289 (0x38f49) [#29733]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#233]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 1936 (0x790) == 1936 (0x790) [#34653]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 114 == 114 [#39122]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 21025 (0 0x5221) == 21025 (0x5221) [#13280]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52441 (0 0xccd9) == 52441 (0xccd9) [#19685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27373]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30729]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6673]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 53824 (0xd240) == 538 824 (0xd240) [#36109]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 135424 ( (0x21100) == 135424 (0x21100) [#19963]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 55225 (0xd7b9) == 552 225 (0xd7b9) [#30141]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21623]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 152100 (0x25224) == 1 152100 (0x25224) [#11832]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 151321 (0x24f19) == 1 151321 (0x24f19) [#11831]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37343]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 163216 ( (0x27d90) == 163216 (0x27d90) [#13798]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28164]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 108241 (0x1a6d1) == 1 108241 (0x1a6d1) [#11256]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27328]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 42849 (0xa761) == 428 849 (0xa761) [#29765]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 183184 (0x2cb90) == 1 183184 (0x2cb90) [#33690]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6136]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 160801 (0x27421) == 1 160801 (0x27421) [#21969]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18722]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8542]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 77841 (0x13011) == 77 7841 (0x13011) [#36588]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20685]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 85849 (0 0x14f59) == 85849 (0x14f59) [#26046]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8437]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 114244 (0x1be44) == 1 114244 (0x1be44) [#23220]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7840]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38080]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1419]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 160000 (0x27100) == 1 160000 (0x27100) [#11327]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7056 (0x1b90) == 7056 6 (0x1b90) [#35456]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 1764 (0x6e4) == 1764 (0x6e4) [#10448]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32757]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 42025 (0 0xa429) == 42025 (0xa429) [#25870]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 7921 (0x1ef1) == 7921 1 (0x1ef1) [#33819]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33464]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8353]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 186624 (0x2d900) == 1 186624 (0x2d900) [#22785]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25002]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 244036 (0x3b944) == 2 244036 (0x3b944) [#11421]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20667]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20343]", "map_crud_operations_stack :: ebpf_map_push_entry(map.get(), sizeof(extra_value), reinterpret_cast< <uint8_t*>(&extra_value), 0x2) == EBPF_SUCCESS for: 0 == 0 [#37724]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 760 (0x2f8) == = 760 (0x2f8) [#40074]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 238144 (0x3a240) == 2 238144 (0x3a240) [#36522]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32618]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 239121 ( (0x3a611) == 239121 (0x3a611) [#32673]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14385]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34202]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#116]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8907]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7931]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#36167]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39350]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#29203]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26735]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 123904 ( (0x1e400) == 123904 (0x1e400) [#26164]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15218]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3376]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 1299 96 (0x32c4) [#8636]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 196249 (0x2fe99) == 1 196249 (0x2fe99) [#34335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 148225 (0x24301) == 1 148225 (0x24301) [#24299]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33308]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 38809 (0x9799) == 388 809 (0x9799) [#36594]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1213]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#23219]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33863]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 49 == 49 [#23921]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"00/0\"' [#37664]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 119716 ( (0x1d3a4) == 119716 (0x1d3a4) [#19919]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 84100 (0x x14884) == 84100 (0x14884) [#7335]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15899]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 32 == 32 [#40704]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9255]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 91204 (0x16444) == 91 1204 (0x16444) [#23701]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2742]", "async :: async_context.result == EBPF_PENDING for: 28 == 28 [#40737]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26449]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#20987]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32768]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2323]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1227]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2950]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19160]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20353]", "ring_buffer_reserve_submit_discard :: producer != consumer for: 36 != 0 [#40780]", "map_crud_operations_lpm_trie_128 :: ebpf_map_find_entry( map.get(), 0, reinterpret_cast<const uint8_t*>(& &key), 0, reinterpret_cast<uint8_t*>(&return_value), 0x01) == EBPF_SUCCESS for: 0 0 == 0 with 1 message: 'key_string := \"CC/96\"' [#37588]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2743]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27186]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 54289 (0xd411) == 542 289 (0xd411) [#33456]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25643]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33055]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19142]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#216]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 109561 (0x1abf9) == 1 109561 (0x1abf9) [#29166]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 462 (0x1ce) == = 462 (0x1ce) [#39925]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6082]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33461]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#336]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12357]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 25 == 25 [#19237]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15649]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13637]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 192 == 192 [#39790]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32998]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 117649 (0x1cb91) == 1 117649 (0x1cb91) [#36164]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26147]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25380]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9333]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 27556 (0x6ba4) == 275 556 (0x6ba4) [#24080]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12330]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 49284 (0xc084) == 492 284 (0xc084) [#27767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15035]", "EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE :: invoke_protocol(EBPF_OPERATION_MAP_UPDATE_ELEMENT_WITH_HANDLE, reques st) == EBPF_INVALID_ARGUMENT for: 6 == 6 [#38083]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37175]", "EBPF_OPERATION_CREATE_MAP :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#37913]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34538]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26846]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 51984 (0xcb10) == 519 984 (0xcb10) [#23627]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 219024 (0 0x35790) == 219024 (0x35790) [#1454]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 58081 (0 0xe2e1) == 58081 (0xe2e1) [#25942]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 2916 (0xb64) == 2916 (0xb64) [#30328]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33710]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28521]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27210]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 179776 (0x2be40) == 1 179776 (0x2be40) [#29981]", "bitmap_test:33 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38838]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 260 (0x104) == 260 (0x104) [#40590]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 17956 (0x4624) == 179 956 (0x4624) [#33264]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 199809 (0x30c81) == 1 199809 (0x30c81) [#22802]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 13225 (0 0x33a9) == 13225 (0x33a9) [#31925]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32486]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30856]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#6902]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14152]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 137641 (0x219a9) == 1 137641 (0x219a9) [#29214]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 8100 (0x1fa4) == 8100 0 (0x1fa4) [#22968]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31323]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14359]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8703]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 120409 (0x1d659) == 1 120409 (0x1d659) [#28832]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25237]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25651]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27123]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 136900 (0x216c4) == 1 136900 (0x216c4) [#30370]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 42436 (0xa5c4) == 424 436 (0xa5c4) [#36393]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38537]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 900 (0x384) == 900 (0 0x384) [#22335]", "bitmap_test:129 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#38991]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 43681 (0xaaa1) == 436 681 (0xaaa1) [#10617]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19946]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 139876 (0x22264) == 1 139876 (0x22264) [#10784]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 108900 (0x1a964) == 1 108900 (0x1a964) [#22671]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6538]", "bindmonitor-ringbuf-interpret :: invoke(reinterpret_cast<void*>(ctx), &result) == EBPF_SUCCESS for: 0 == 0 [#41212]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256 (0x1 100) == 256 (0x100) [#19259]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31313]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30875]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 616 (0x268) == 616 (0x268) [#40412]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 21609 (0x5469) == 216 609 (0x5469) [#33606]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34660]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 236196 ( (0x39aa4) == 236196 (0x39aa4) [#20199]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18856]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25777]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 10404 (0x28a4) == 1040 04 (0x28a4) [#8600]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7989]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#33995]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#69]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18656]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#3406]", "bitmap_test:65 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 28 == 28 [#38968]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#9015]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 232324 (0 0x38b84) == 232324 (0x38b84) [#7719]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32094]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 56 == 56 [#39077]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6647]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9208]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 960 (0x3c0) == = 960 (0x3c0) [#40174]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25481]", "epoch_test_stale_items :: ebpf_epoch_is_free_list_empty(0) for: true [#38601]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26133]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24449]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31595]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33430]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 14641 (0x3931) == 146 641 (0x3931) [#34851]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 6889 (0x1ae9) == 6889 9 (0x1ae9) [#22961]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#20971]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26740]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9712]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34021]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33970]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 132496 (0x20590) == 1 132496 (0x20590) [#36446]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39406]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19810]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7552]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 40804 (0x9f64) == 408 804 (0x9f64) [#24116]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#347]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15962]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12391]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31106]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30748]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 207936 (0x32c40) == 2 207936 (0x32c40) [#11898]", "EBPF_OPERATION_LOAD_NATIVE_MODULE :: invoke_protocol(EBPF_OPERATION_LOAD_NATIVE_MODULE, request, reply) == = EBPF_OBJECT_NOT_FOUND for: 7 == 7 [#38002]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 6241 (0x1861) == 6241 1 (0x1861) [#11521]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#31164]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 514 (0x202) == 514 (0x202) [#40463]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 11664 (0x2d90) == 1166 64 (0x2d90) [#8618]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14740]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18699]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1600 (0x640) == 1600 (0x640) [#23439]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33649]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#488]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19081]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8352]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36967]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 5625 (0x15f9) == 5625 (0x15f9) [#9914]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#14124]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25386]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94249 (0x17029) == 94 4249 (0x17029) [#36305]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 52441 (0x xccd9) == 52441 (0xccd9) [#7213]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 21316 (0x5344) == 213 316 (0x5344) [#29874]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39672]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39338]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28231]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27372]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 484 (0x1e4) == 484 (0 0x1e4) [#36390]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25383]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13645]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#27342]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5921]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21019]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39322]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18658]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#10095]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5909]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21643]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#6038]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 22201 (0x56b9) == 2220 01 (0x56b9) [#8741]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 4761 (0x x1299) == 4761 (0x1299) [#13128]", "bitmap_test:33 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 10 == 10 [#38876]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8275]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27829]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#10022]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#12368]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#8454]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 171396 (0x29d84) == 1 171396 (0x29d84) [#29266]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37362]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 936 (0x3a8) == 936 (0x3a8) [#40252]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#22061]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 210681 (0x336f9) == 2 210681 (0x336f9) [#36700]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#28243]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34307]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 219961 (0x35b39) == 2 219961 (0x35b39) [#36789]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 184900 (0x2d244) == 1 184900 (0x2d244) [#34077]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#24127]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 456 (0x1c8) == = 456 (0x1c8) [#39922]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 156 == 156 [#39772]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#7988]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 14400 (0x3840) == 144 400 (0x3840) [#23519]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18804]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 214369 (0x34561) == 2 214369 (0x34561) [#24377]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 204304 (0x31e10) == 2 204304 (0x31e10) [#23336]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 24025 (0x5 5dd9) == 24025 (0x5dd9) [#828]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 12100 (0x2f44) == 121 100 (0x2f44) [#22425]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 24 <= 204 [#4163]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 70225 (0x11251) == 70 0225 (0x11251) [#33543]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27397]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#33161]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 23409 (0x5b71) == 234 409 (0x5b71) [#33315]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#33454]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12615]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#15605]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6694]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15616]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2122]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6500]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 78961 (0x x13471) == 78961 (0x13471) [#1080]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 35721 (0x8b89) == 357 721 (0x8b89) [#28917]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 258 (0x102) == 258 (0x102) [#40591]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5041 (0x13b1) == 5041 1 (0x13b1) [#22382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#30688]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19260]", "EBPF_OPERATION_UPDATE_PINNING :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#38170]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 576 (0x24 40) == 576 (0x240) [#6803]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 1849 (0x739) == 1849 (0x739) [#30440]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12789]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5984]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19652]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3534]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7602]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 29929 (0x74e9) == 299 929 (0x74e9) [#29736]", "serialize_program_info_test :: out_prototype->name != nullptr for: \"helper_1\" != nullptr [#38816]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37179]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32140]", "hash_table_test :: memcmp(values[index], data_2.data(), data_2.size()) == 0 for: 0 == 0 [#38434]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 144400 (0 0x23410) == 144400 (0x23410) [#7515]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25260]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 28224 (0x6 6e40) == 28224 (0x6e40) [#854]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25229]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 64 == 64 [#11450]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21148]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8788]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7382]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26492]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 9 == 9 [#27215]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 368 (0x170) == = 368 (0x170) [#39878]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32404]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1023]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 57600 (0xe100) == 576 600 (0xe100) [#29663]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26690]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25239]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 729 (0x2d9) == 729 (0 0x2d9) [#20847]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 400 (0x190) == 400 (0 0x190) [#30594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 34596 (0x8724) == 345 596 (0x8724) [#10594]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6285]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37004]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#19194]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 576 (0x240) == 576 (0 0x240) [#11466]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39422]", "bitmap_test:1025 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 174 == 174 [#40633]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19474]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 45369 (0xb139) == 453 369 (0xb139) [#11140]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19608]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: batch_data_size <= batch_data.size() for: 36 <= 36 [#34544]", "bitmap_test:129 :: ebpf_bitmap_reverse_search_next_bit(&cursor) == bit_count - i - 1 for r: 4 == 4 [#39177]", "EBPF_OPERATION_MAP_FIND_ELEMENT :: ebpf_core_create_map(&utf8_name, &def, inner_handle, &handle) == EBPF F_SUCCESS for: 0 == 0 [#38015]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 150544 (0x24c10) == 1 150544 (0x24c10) [#29568]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#19414]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 59049 (0 0xe6a9) == 59049 (0xe6a9) [#25946]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 29241 (0x7239) == 292 241 (0x7239) [#24085]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#21763]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#12551]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 14161 (0x3751) == 141 161 (0x3751) [#11561]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24878]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#32492]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 32761 (0x7ff9) == 327 761 (0x7ff9) [#36515]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 139129 (0x21f79) == 1 139129 (0x21f79) [#33339]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 143641 ( (0x23119) == 143641 (0x23119) [#26218]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 71824 (0x11890) == 71 1824 (0x11890) [#29914]", "serialize_map_test :: memcmp(map_info->pin_path, input_map_info->pin_path.value, input_map_ _info->pin_path.length) == 0 for: 0 == 0 [#38767]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 178929 (0x2baf1) == 1 178929 (0x2baf1) [#23307]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25491]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 86436 (0x151a4) == 86 6436 (0x151a4) [#35271]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#28206]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#24870]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25234]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18472]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26787]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 9801 (0x x2649) == 9801 (0x2649) [#31893]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 256 (0x10 00) == 256 (0x100) [#6787]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#24979]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 131044 (0x1ffe4) == 1 131044 (0x1ffe4) [#24276]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#1831]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#25695]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14749]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25251]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 36100 (0x8d04) == 361 100 (0x8d04) [#36472]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#90]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#14680]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2646]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37371]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34000]", "bitmap_test:129 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 58 == 58 [#39078]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#20582]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#3495]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 168921 (0x293d9) == 16 68921 (0x293d9) [#9527]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34297]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13875]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 1521 (0x5f1) == 1521 (0x5f1) [#22346]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34003]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 12996 (0x32c4) == 129 996 (0x32c4) [#11556]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#37073]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#18981]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 116964 ( (0x1c8e4) == 116964 (0x1c8e4) [#32379]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#5722]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 = == 0 [#99]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39579]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#27112]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 5929 (0x1729) == 5929 9 (0x1729) [#23991]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31304]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6562]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13505]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7048]", "map_crud_operations_lpm_trie_128 :: ebpf_map_delete_entry(map.get(), 0, reinterpret_cast<const uint8_t*>( (&key), 0x01) == EBPF_SUCCESS for: 0 == 0 with 1 message: 'key_string := \"AA/64\"' [#37659]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 70225 (0 0x11251) == 70225 (0x11251) [#19757]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 3721 (0xe89) == 3721 (0xe89) [#29217]", "map_crud_operations:BPF_MAP_TYPE_HASH :: batch_data_size <= batch_data.size() for: 12 <= 12 [#2248]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18482]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 40804 (0x x9f64) == 40804 (0x9f64) [#7159]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39408]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22159]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#31613]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 250000 ( (0x3d090) == 250000 (0x3d090) [#26460]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6383]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#8716]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#36999]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 0 == 0 [#6492]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 22201 (0x56b9) == 222 201 (0x56b9) [#33276]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#13263]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26363]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#32944]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#1205]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 336 (0x150) == = 336 (0x150) [#39862]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 42025 (0xa429) == 420 025 (0xa429) [#11132]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reint terpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key y)) == EBPF_SUCCESS for: 0 == 0 [#26940]", "bitmap_test:1025 :: ebpf_bitmap_forward_search_next_bit(&cursor) == i for: 258 (0x102) == = 258 (0x102) [#39823]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 93636 (0x16dc4) == 93 3636 (0x16dc4) [#11233]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 12769 (0 0x31e1) == 12769 (0x31e1) [#25686]", "map_crud_operations:BPF_MAP_TYPE_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 45369 (0xb b139) == 45369 (0xb139) [#944]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 8649 (0x2 21c9) == 8649 (0x21c9) [#6941]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 31684 (0x7bc4) == 316 684 (0x7bc4) [#34858]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: batch_data_size <= batch_data.size() for: 12 <= 12 [#9355]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: current_value == current_key * current_key for: 62001 (0xf231) == 620 001 (0xf231) [#22580]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const t uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#25231]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 152881 (0x25531) == 1 152881 (0x25531) [#29363]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: return_value == EBPF_SUCCESS for: 0 == 0 [#22291]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const uin nt8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#903]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 88209 (0 0x15891) == 88209 (0x15891) [#13584]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_next_key( map.get(), sizeof(key), key == 0 ? nullptr : reinte erpret_cast<const uint8_t*>(&previous_key), reinterpret_cast<uint8_t*>(&next_key) )) == EBPF_SUCCESS for: 0 == 0 [#8122]", "map_crud_operations:BPF_MAP_TYPE_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#2883]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#26033]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: *reinterpret_cast<uint64_t*>(value.data()) == key * key for: 625 (0x2 271) == 625 (0x271) [#31745]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 253009 (0x3dc51) == 2 253009 (0x3dc51) [#36024]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 121 == 121 [#29547]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const ui int8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#7408]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 94864 (0x17290) == 94 4864 (0x17290) [#35195]", "map_crud_operations:BPF_MAP_TYPE_ARRAY :: current_value == current_key * current_key for: 113569 (0x1bba1) == 1 113569 (0x1bba1) [#10206]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 961 (0x3c1) == 961 (0 0x3c1) [#28055]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 16641 (0x4101) == 166 641 (0x4101) [#35540]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 38416 (0x9610) == 384 416 (0x9610) [#27269]", "EBPF_OPERATION_RESOLVE_HELPER :: ebpf_program_create_and_initialize(&params, &handle) == EBPF_SUCCESS for: 0 == 0 [#37818]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: ebpf_map_delete_entry(map.get(), sizeof(key), reinterpret_cast<const uint8_t*>(&key), 0) == EBPF_SUCCESS for: 0 == 0 [#18428]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#15313]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39664]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: ebpf_map_find_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), 0) == expected_result for: 0 == 0 [#31808]", "map_crud_operations:BPF_MAP_TYPE_HASH :: ebpf_map_update_entry( map.get(), sizeof(key), reinterpret_cast<const u uint8_t*>(&key), value.size(), value.data(), EBPF_ANY, 0) == EBPF_SUCCESS for: 0 == 0 [#285]", "epoch_test_two_threads :: ebpf_epoch_initiate() == EBPF_SUCCESS for: 0 == 0 [#38507]", "map_crud_operations:BPF_MAP_TYPE_PERCPU_ARRAY :: batch_data_size <= batch_data.size() for: 36 <= 36 [#21542]", "bitmap_test:1025 :: ebpf_bitmap_test_bit(bitmap, i) for: true [#39479]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: return_value == EBPF_SUCCESS for: 0 == 0 [#34177]", "map_crud_operations:BPF_MAP_TYPE_LRU_PERCPU_HASH :: current_value == current_key * current_key for: 128881 (0x1f771) == 1 128881 (0x1f771) [#34948]", "EBPF_OPERATION_GET_PROGRAM_INFO :: ebpf_core_initiate() == EBPF_SUCCESS for: 0 == 0 [#38263]", "map_crud_operations:BPF_MAP_TYPE_LRU_HASH :: current_value == current_key * current_key for: 258064 (0x3f010) == 2 258064 (0x3f010) [#30263]" ]
starryzhang/sweb.eval.win.microsoft_1776_ebpf-for-windows-4117
elastic/beats
43665
elastic__beats-43665
Go
[ "22172", "40765" ]
10858f98cf8f14e1de51b195bba607c784bc6c90
diff --git a/CHANGELOG.next.asciidoc b/CHANGELOG.next.asciidoc index 6dff17ecc0ed..83a5c19cb5c9 100644 --- a/CHANGELOG.next.asciidoc +++ b/CHANGELOG.next.asciidoc @@ -88,6 +88,7 @@ otherwise no tag is added. {issue}42208[42208] {pull}42403[42403] - Removed support for the Enterprise Search module {pull}42915[42915] - Fix the function to determine CPU cores on windows {issue}42593[42593] {pull}43409[43409] - Updated list of supported vSphere versions in the documentation. {pull}43642[43642] +- Handle permission errors while collecting data from Windows services and don't interrupt the overall collection by skipping affected services {issue}40765[40765] {pull}43665[43665] *Osquerybeat* diff --git a/metricbeat/module/windows/service/reader.go b/metricbeat/module/windows/service/reader.go index 379d4cb738f7..961d6789159e 100644 --- a/metricbeat/module/windows/service/reader.go +++ b/metricbeat/module/windows/service/reader.go @@ -28,6 +28,7 @@ import ( "golang.org/x/sys/windows/registry" + "github.com/elastic/elastic-agent-libs/logp" "github.com/elastic/elastic-agent-libs/mapstr" ) @@ -48,9 +49,10 @@ type Reader struct { guid string // Host's MachineGuid value (a unique ID for the host). ids map[string]string // Cache of service IDs. protectedServices map[string]struct{} + log *logp.Logger } -func NewReader() (*Reader, error) { +func NewReader(log *logp.Logger) (*Reader, error) { handle, err := openSCManager("", "", ScManagerEnumerateService|ScManagerConnect) if err != nil { return nil, fmt.Errorf("initialization failed: %w", err) @@ -67,13 +69,14 @@ func NewReader() (*Reader, error) { guid: guid, ids: map[string]string{}, protectedServices: map[string]struct{}{}, + log: log, } return r, nil } func (reader *Reader) Read() ([]mapstr.M, error) { - services, err := GetServiceStates(reader.handle, reader.state, reader.protectedServices) + services, err := GetServiceStates(reader.log, reader.handle, reader.state, reader.protectedServices) if err != nil { return nil, err } diff --git a/metricbeat/module/windows/service/service.go b/metricbeat/module/windows/service/service.go index 45e12c6574de..61b950af7454 100644 --- a/metricbeat/module/windows/service/service.go +++ b/metricbeat/module/windows/service/service.go @@ -44,7 +44,7 @@ type MetricSet struct { // Part of new is also setting up the configuration by processing additional // configuration entries if needed. func New(base mb.BaseMetricSet) (mb.MetricSet, error) { - reader, err := NewReader() + reader, err := NewReader(base.Logger()) if err != nil { return nil, err } diff --git a/metricbeat/module/windows/service/service_status.go b/metricbeat/module/windows/service/service_status.go index 571d324cb599..a4076c6bffe0 100644 --- a/metricbeat/module/windows/service/service_status.go +++ b/metricbeat/module/windows/service/service_status.go @@ -131,7 +131,7 @@ func (state ServiceState) String() string { return "" } -func GetServiceStates(handle Handle, state ServiceEnumState, protectedServices map[string]struct{}) ([]Status, error) { +func GetServiceStates(log *logp.Logger, handle Handle, state ServiceEnumState, protectedServices map[string]struct{}) ([]Status, error) { var servicesReturned uint32 var servicesBuffer []byte @@ -164,11 +164,18 @@ func GetServiceStates(handle Handle, state ServiceEnumState, protectedServices m var services []Status var sizeStatusProcess = (int)(unsafe.Sizeof(EnumServiceStatusProcess{})) for i := 0; i < int(servicesReturned); i++ { - serviceTemp := (*EnumServiceStatusProcess)(unsafe.Pointer(&servicesBuffer[i*sizeStatusProcess])) + rawService := (*EnumServiceStatusProcess)(unsafe.Pointer(&servicesBuffer[i*sizeStatusProcess])) - service, err := getServiceInformation(serviceTemp, servicesBuffer, handle, protectedServices) + service, err := getRawServiceStatus(rawService, servicesBuffer) if err != nil { - return nil, err + log.Errorf("could not parse raw service information for PID %d: %v", rawService.ServiceStatusProcess.DwProcessId, err) + continue + } + + err = getServiceHandleInformation(log, &service, rawService, handle, protectedServices) + if err != nil { + log.Errorf("could not get information for the service (name: %s, pid: %d): %v", service.DisplayName, service.PID, err) + continue } services = append(services, service) @@ -177,7 +184,7 @@ func GetServiceStates(handle Handle, state ServiceEnumState, protectedServices m return services, nil } -func getServiceInformation(rawService *EnumServiceStatusProcess, servicesBuffer []byte, handle Handle, protectedServices map[string]struct{}) (Status, error) { +func getRawServiceStatus(rawService *EnumServiceStatusProcess, servicesBuffer []byte) (Status, error) { service := Status{ PID: rawService.ServiceStatusProcess.DwProcessId, } @@ -198,6 +205,11 @@ func getServiceInformation(rawService *EnumServiceStatusProcess, servicesBuffer } service.ServiceName = strBuf.String() + return service, nil +} + +func getServiceHandleInformation(log *logp.Logger, service *Status, rawService *EnumServiceStatusProcess, handle Handle, protectedServices map[string]struct{}) error { + var state string if stat, ok := serviceStates[ServiceState(rawService.ServiceStatusProcess.DwCurrentState)]; ok { @@ -215,36 +227,38 @@ func getServiceInformation(rawService *EnumServiceStatusProcess, servicesBuffer serviceHandle, err := openServiceHandle(handle, service.ServiceName, ServiceQueryConfig) if err != nil { - return service, fmt.Errorf("error while opening service %s: %w", service.ServiceName, err) + return fmt.Errorf("error while opening service %s: %w", service.ServiceName, err) } defer closeHandle(serviceHandle) // Get detailed information - if err := getAdditionalServiceInfo(serviceHandle, &service); err != nil { - return service, err + if err := getAdditionalServiceInfo(serviceHandle, service); err != nil { + return err } // Get optional information - if err := getOptionalServiceInfo(serviceHandle, &service); err != nil { - return service, err + if err := getOptionalServiceInfo(serviceHandle, service); err != nil { + return err } //Get uptime for service if ServiceState(rawService.ServiceStatusProcess.DwCurrentState) != ServiceStopped { processUpTime, err := getServiceUptime(rawService.ServiceStatusProcess.DwProcessId) if err != nil { - if _, ok := protectedServices[service.ServiceName]; errors.Is(err, os.ErrPermission) && !ok { + if !errors.Is(err, os.ErrPermission) { + // if we have faced any other error, pass it to the caller + return err + } + if _, ok := protectedServices[service.ServiceName]; !ok { protectedServices[service.ServiceName] = struct{}{} - logp.Warn("Uptime for service %v is not available because of insufficient rights", service.ServiceName) - } else { - return service, err + log.Warnf("Uptime for service %v is not available because of insufficient rights", service.ServiceName) } } service.Uptime = processUpTime / time.Millisecond } - return service, nil + return nil } func openServiceHandle(handle Handle, serviceName string, desiredAccess ServiceAccessRight) (Handle, error) {
diff --git a/metricbeat/module/windows/service/reader_test.go b/metricbeat/module/windows/service/reader_test.go index 4a4246a5774a..4e9f47af4fa4 100644 --- a/metricbeat/module/windows/service/reader_test.go +++ b/metricbeat/module/windows/service/reader_test.go @@ -23,10 +23,12 @@ import ( "testing" "github.com/stretchr/testify/assert" + + "github.com/elastic/elastic-agent-libs/logp" ) func TestNewReader(t *testing.T) { - reader, err := NewReader() + reader, err := NewReader(logp.NewTestingLogger(t, "")) assert.NoError(t, err) assert.NotNil(t, reader) defer reader.Close() @@ -57,7 +59,7 @@ func TestGetMachineGUID(t *testing.T) { func TestRead(t *testing.T) { t.Skip("Flaky test: https://github.com/elastic/beats/issues/22171") - reader, err := NewReader() + reader, err := NewReader(logp.NewTestingLogger(t, "")) assert.NoError(t, err) result, err := reader.Read() assert.NoError(t, err) diff --git a/metricbeat/module/windows/service/service_status_test.go b/metricbeat/module/windows/service/service_status_test.go index 3b81399d2cb3..f39594ac873b 100644 --- a/metricbeat/module/windows/service/service_status_test.go +++ b/metricbeat/module/windows/service/service_status_test.go @@ -23,15 +23,15 @@ import ( "testing" "github.com/stretchr/testify/assert" + + "github.com/elastic/elastic-agent-libs/logp" ) func TestGetServiceStates(t *testing.T) { - t.Skip("Flaky test: https://github.com/elastic/beats/issues/22172") - handle, err := openSCManager("", "", ScManagerEnumerateService|ScManagerConnect) assert.NoError(t, err) assert.NotEqual(t, handle, InvalidDatabaseHandle) - services, err := GetServiceStates(handle, ServiceStateAll, map[string]struct{}{}) + services, err := GetServiceStates(logp.NewTestingLogger(t, ""), handle, ServiceStateAll, map[string]struct{}{}) assert.NoError(t, err) assert.True(t, len(services) > 0) closeHandle(handle)
Flaky Test [Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service] ## Flaky Test * **Test Name:** Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service * **Artifact Link:** https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2FPR-21853/detail/PR-21853/29/ ### Error details ``` Failed ``` ### Stack Trace ``` service_status_test.go:29: for testing the flaky test reporting for an existing flaky test ``` Metricbeat windows service metrics stops sending documents when a single service fails - Version: 8.10.4 - Operating System: ``` runtime: arch: amd64 os: windows osinfo: family: windows major: 6 minor: 3 patch: 0 type: windows version: "6.3" ``` - Steps to Reproduce: No clear steps to reproduce, more info on this later. Multiple instances of elastic-agent installations are failing to send the windows.service metric set for the windows integration. The system integration continues to send data without issues. The problem happens at random and it is resolved by restarting the elastic agent. ~The issue happens in different versions of 8.x for elastic-agent and it hasn't confirmed as occurring on the latest version (as the user who has experienced this has not upgraded to latest version yet).~ The issue so far has only been seen on 8.10.4 The error reported by metricbeat is the following: ``` {"log.level":"error","@timestamp":"2024-07-29T20:49:33.157Z","message":"Error fetching data for metricset windows.service: OpenProcess failed for pid=1724: The parameter is incorrect.","component":{"binary":"metricbeat","dataset":"elastic_agent.metricbeat","id":"windows/metrics-default","type":"windows/metrics"},"log":{"source":"windows/metrics-default"},"log.origin":{"file.line":256,"file.name":"module/wrapper.go"},"service.name":"metricbeat","ecs.version":"1.6.0","ecs.version":"1.6.0"} ``` So far the error indicates a problem only with one particular windows service, however, all other services being monitored by metricbeat can't continue to be monitored because this particular service getting in an unexpected state causes the entire metricbeat windows service metricset to stop reporting for any service. Because this happens at random we are unable to setup debug logging to catch the failure and the logger for this function is not providing any more info. We need to address 2 items with this issue: 1. The windows service monitoring stops sending stats for ANY service once a single service gets into a weird state (this fits a bug description). 2. There is no logger that specifies what that weird state was, nor an indication as to why sending service metrics for other services stops working (this fits a feature request that may or may not be necessary to address point 1).
## Flaky Test * **Test Name:** Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service * **Artifact Link:** https://beats-ci.elastic.co/blue/organizations/jenkins/it%2Ftest/detail/test/16/ ### Error details ``` Failed ``` ### Stack Trace ``` service_status_test.go:29: for testing the flaky test reporting for an existing flaky test ``` ## Flaky Test * **Test Name:** `Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service` * **Artifact Link:** https://beats-ci.elastic.co/blue/organizations/jenkins/it%2Ftest/detail/test/17/ * **PR:** None * **Commit:** None ### Error details ``` Failed ``` ### Stack Trace ``` service_status_test.go:29: for testing the flaky test reporting for an existing flaky test ``` ## Flaky Test * **Test Name:** `Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service` * **Artifact Link:** https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2FPR-21853/detail/PR-21853/31/ * **PR:** #21853 * **Commit:** 9c3d14718434fb33f2ceb1caaf567c3bf2652a3e ### Error details ``` Failed ``` ### Stack Trace ``` service_status_test.go:29: for testing the flaky test reporting for an existing flaky test ``` Pinging @elastic/integrations-platforms (Team:Platforms) Pinging @elastic/elastic-agent-data-plane (Team:Elastic-Agent-Data-Plane) @VihasMakwana I think I saw you had root caused the source of the `OpenProcess failed for pid=1724: The parameter is incorrect` error elsewhere? Or am I misremembering? @cmacknz yes, that's correct. On my personal desktop, the metricbeat wasn't able to access following processes, running as root: - PID 0 and 4 (protected processes, you can never access it.) - Processes owned by SYSTEM user. (some antivirus processes for eg.) - They were accessible, but with limited info. This was for `system.process` integration though. The above issue is about `windows.service` integration but I believe the root cause is similar. --- @TheRiffRafi do you see any warning related to SeDebugPrivilege at the beginning of logs? Something like: `Metricbeat is running without SeDebugPrivilege, a Windows privilege that allows it to collect metrics...`, `Failure while attempting to enable SeDebugPrivilege` or `Metricbeat failed to enable the SeDebugPrivilege`? Can you attach logs from beginning, if possible? Hello @VihasMakwana! Unfortunately I can't help with logs, all the instances I have of the failure have the logs with the problem already started, there is no instance of this where we've caught it in a state where the issue is not occurring and then suddenly starts happening (the systems are going weeks without reporting the service). Also, I have to make a correction on the original description, we have only seen this on 8.10.4, we haven't tested on a more recent version as the entire stack for the user is still on 8.10.4, it was a misunderstanding that we had seen this problem on a later version.
## Flaky Test * **Test Name:** Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service * **Artifact Link:** https://beats-ci.elastic.co/blue/organizations/jenkins/it%2Ftest/detail/test/16/ ### Error details ``` Failed ``` ### Stack Trace ``` service_status_test.go:29: for testing the flaky test reporting for an existing flaky test ``` ## Flaky Test * **Test Name:** `Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service` * **Artifact Link:** https://beats-ci.elastic.co/blue/organizations/jenkins/it%2Ftest/detail/test/17/ * **PR:** None * **Commit:** None ### Error details ``` Failed ``` ### Stack Trace ``` service_status_test.go:29: for testing the flaky test reporting for an existing flaky test ``` ## Flaky Test * **Test Name:** `Build&Test / metricbeat-windows-windows-2019 / TestGetServiceStates – service` * **Artifact Link:** https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2FPR-21853/detail/PR-21853/31/ * **PR:** #21853 * **Commit:** 9c3d14718434fb33f2ceb1caaf567c3bf2652a3e ### Error details ``` Failed ``` ### Stack Trace ``` service_status_test.go:29: for testing the flaky test reporting for an existing flaky test ``` Pinging @elastic/integrations-platforms (Team:Platforms) Pinging @elastic/elastic-agent-data-plane (Team:Elastic-Agent-Data-Plane) @VihasMakwana I think I saw you had root caused the source of the `OpenProcess failed for pid=1724: The parameter is incorrect` error elsewhere? Or am I misremembering? @cmacknz yes, that's correct. On my personal desktop, the metricbeat wasn't able to access following processes, running as root: - PID 0 and 4 (protected processes, you can never access it.) - Processes owned by SYSTEM user. (some antivirus processes for eg.) - They were accessible, but with limited info. This was for `system.process` integration though. The above issue is about `windows.service` integration but I believe the root cause is similar. --- @TheRiffRafi do you see any warning related to SeDebugPrivilege at the beginning of logs? Something like: `Metricbeat is running without SeDebugPrivilege, a Windows privilege that allows it to collect metrics...`, `Failure while attempting to enable SeDebugPrivilege` or `Metricbeat failed to enable the SeDebugPrivilege`? Can you attach logs from beginning, if possible? Hello @VihasMakwana! Unfortunately I can't help with logs, all the instances I have of the failure have the logs with the problem already started, there is no instance of this where we've caught it in a state where the issue is not occurring and then suddenly starts happening (the systems are going weeks without reporting the service). Also, I have to make a correction on the original description, we have only seen this on 8.10.4, we haven't tested on a more recent version as the entire stack for the user is still on 8.10.4, it was a misunderstanding that we had seen this problem on a later version.
[ "https://github.com/elastic/beats/commit/4fb53fe02f478a2a0f62b44ba3a998d0a6145ce7", "https://github.com/elastic/beats/commit/d7ec171cf539ab0371ecbc2f7e8754759c67b309", "https://github.com/elastic/beats/commit/2d13303d76eb9926ee13c7bbc7c449bba86d9610", "https://github.com/elastic/beats/commit/4ca00d7d99cacace5ea1f00d6ab1005f60f52e7e", "https://github.com/elastic/beats/commit/6fbb8ccb5dbb88688e2d309bc674b27fee2f909f", "https://github.com/elastic/beats/commit/7ee312854507192d2b3b8eff315cc23fac7d79f4", "https://github.com/elastic/beats/commit/ac6142689960935cfe3c266d684a6c6efa399de9", "https://github.com/elastic/beats/commit/a4fc5bf4f3591b30d7b18a891ce47ebf89a5fb0c", "https://github.com/elastic/beats/commit/c3ae0c2548011c06d487b0099c8686852471903b", "https://github.com/elastic/beats/commit/1e75b24462d7813c6121405566d11994c71b81b3", "https://github.com/elastic/beats/commit/a9e03aa2ec6be7d550a1be4a20dffe5dd03c3e9f", "https://github.com/elastic/beats/commit/58112b61028d018ce0efa8e5671ff7ffb5ab0a36" ]
2025-04-03T12:00:25Z
https://github.com/elastic/beats/tree/10858f98cf8f14e1de51b195bba607c784bc6c90
[ "go mod tidy ; go build ./libbeat/... ./filebeat/... ./metricbeat/... ./heartbeat/... ./packetbeat/... ./winlogbeat/..." ]
[ "go test -json -v ./... > reports\\go-test-results.json" ]
[ "Get-Content -Raw reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} def norm_status(s: str) -> str: s = (s or "").strip().lower() return s if s in ("pass", "fail", "skip") else "" def clean(s: str | None) -> str | None: if s is None: return None s = s.replace("\r", "").replace("\n", "") s = s.strip() return s def norm_pkg(s: str | None) -> str | None: s = clean(s) if not s: return None # Remove stray whitespace introduced by wrapping. s = re.sub(r"\s+", "", s) # Normalize github domain glitches. s = s.replace("github..com", "github.com") s = re.sub(r"^github\.[^/]+", "github.com", s) # Collapse duplicated v7 caused by wrap artifacts. s = re.sub(r"/v7+", "/v7", s) # Fix accidental double slashes. s = re.sub(r"/{2,}", "/", s) return s def norm_test(s: str | None) -> str | None: s = clean(s) if not s: return None s = re.sub(r"[ \t]+", " ", s) return s # Pass 1: Flexible regex to capture Action pass/fail/skip with Test and Package in any order. # Case A: Test appears before Package. pat_a = re.compile( r'"Action"\s*:\s*"(pass|fail|skip)".{0,1500}?"Test"\s*:\s*"([^"]+?)".{0,1500}?"Package"\s*:\s*"([^"]+?)"', re.IGNORECASE | re.DOTALL, ) for m in pat_a.finditer(log): status = norm_status(m.group(1)) test = norm_test(m.group(2)) pkg = norm_pkg(m.group(3)) if status and test: name = f"{pkg}/{test}" if pkg else test results[name] = status # Case B: Package appears before Test. pat_b = re.compile( r'"Action"\s*:\s*"(pass|fail|skip)".{0,1500}?"Package"\s*:\s*"([^"]+?)".{0,1500}?"Test"\s*:\s*"([^"]+?)"', re.IGNORECASE | re.DOTALL, ) for m in pat_b.finditer(log): status = norm_status(m.group(1)) pkg = norm_pkg(m.group(2)) test = norm_test(m.group(3)) if status and test: name = f"{pkg}/{test}" if pkg else test results[name] = status # Pass 2: Parse Output-derived '--- PASS|FAIL|SKIP' across entire log. # For each match, resolve package by finding the surrounding JSON object braces and extracting Package. pass_re = re.compile(r'---\s+(PASS|FAIL|SKIP):\s+([^\r\n(]+)', re.IGNORECASE) def find_pkg_for_index(idx: int) -> str | None: # Find surrounding JSON object by scanning for nearest '{' before and '}' after. start = log.rfind("{", 0, idx) if start == -1: return None end = log.find("}", idx) if end == -1: return None segment = log[start:end+1] m = re.search(r'"Package"\s*:\s*"([^"]+)"', segment, re.DOTALL) return norm_pkg(m.group(1) if m else None) for m in pass_re.finditer(log): status_raw = m.group(1).upper() status = "pass" if status_raw == "PASS" else ("fail" if status_raw == "FAIL" else "skip") testname = norm_test(m.group(2)) if not testname: continue pkg = find_pkg_for_index(m.start()) name = f"{pkg}/{testname}" if pkg else testname if name not in results: results[name] = status # Fallback: if nothing parsed, try textual markers without package context. if not results: for m in pass_re.finditer(log): status_raw = m.group(1).upper() status = "pass" if status_raw == "PASS" else ("fail" if status_raw == "FAIL" else "skip") testname = norm_test(m.group(2)) if testname: results[testname] = status return results
[ "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_the_sa", "github.com/elastic/beats/v7/libbeat/processors/TestDropFields", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/multiplle_build_tags_with_other_flags", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/always_with_erro", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestL", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_shoould_be_used_exactly/event.dataset_should_always_be_present,_preferring_data_streeam", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceFi", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/retries_on_context_canc", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTesst/test_is_run_for_each_source", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpa", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRunn/continue_sending_from_last_known_position", "github.com/elastic/beats/v7/libbeat/processors/actions/TestArrayWithArraysEnableed", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/merge_labells", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_iin_ISO8601_format:\\u003c190\\u003e2018-06-19T02:13:38.635322Z_super_mon_message", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceStore_UpdateIdentifiers", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/Te", "github.com/elastic/beats/v7/filebeat/scripts/tester/TestFilebeat", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestProcessorsConfigs/wwith_client_metadata", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_unblock_a", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_minn_int32,_partitions_12", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceField/supports_metad", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled_Serverless/disabled_via_config", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_close_chann", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Jaan", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpack/unppack_from_in_memory_state_if_updates_are_pending", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativ", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/aalways_with_success", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/no_timezonne", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestLockResource/succceed_to_lock_resource_after_it_has_been_released", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled/disabled_via_handler", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_Open", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_max_", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled/enabled_via_handler", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestVisitErrror", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with-correct-def", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestTLSCommonToOTel", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/processor/TestSessionPaarallel", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/location_llabel", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_shoould_be_used_exactly/observer_location_data_should_not_be_set", "github.com/elastic/beats/v7/heartbeat/monitors/TestCheckBody", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_the_same_eleme", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpack/nothin", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_OpenClose/", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessorrs/process_foreach_processor", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/oon_error_with_success", "github.com/elastic/beats/v7/filebeat/input/log/TestNewInputDone", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled_Serverless/handler_confirms_enabled_flag", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkEncodeEvents/llatest", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessorrs/Replace_in_on_failure_section", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestConfigAcceptValid", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_IsNew/falsse_if_key_with_cursor_value_is_in_memory_store_only", "github.com/elastic/beats/v7/filebeat/TestSyste", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceField/Add_hiera", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestCertToPEMString", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readResp/responsse_exists", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_sho", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAltern", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceField/supportss_metadata_as_a_target", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Input", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRun/shutdown_on", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled_Serverless", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_removeDuplicates/cleean_up_integer_array_without_duplicate_values", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled/io_error", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitUpdateIdentifiers/prospect", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTest/", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled/handler_confirms_enabled_flag", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/negative_abbrevia", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTesst/fail_if_test_for_one_source_fails", "github.com/elastic/beats/v7/auditbeat/cmd/TestHasher", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_403", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/da", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessorrs", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/configuring_inputs_with_overlapping_sources_is_allowed", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/negative_hhour_and_minute_offset", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/incompletee_offset", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper//use_wait", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with--bare-config", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/negative_hour_and_", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestProcessorsConfigs/wwith_beat_default_fields", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-witth-correct-defaults", "github.com/elastic/beats/v7/libbeat/instrumentation/TestInstrumentationConfigLisstener", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestAddrs", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTesst/panic_is_captured", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Init/with_custom_", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_the_same_elemments,_in_order", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_u", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpack/unppack_from_state_in_persistent_store", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpack/", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventDelete/deleete_event_for_file_present_on_disk_(different_contents)", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRunn/input_returned_with_error", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_shoould_be_used_exactly/index_name_should_be_set", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveDescription/ES_\\u003c_7.99.0", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceStore_UpdateIdentifiers/update_identifiers_w", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manager_Ensur", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDss/pid_is_containerized", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_a_data_stream_processor_for_browsers", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appeendValues/append_value_in_the_arrays_from_a_field_when_target_field_is_not_presennt", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpack/unppack_fails_if_types_are_not_compatible", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitUpdateIIdentifiers/prospector_init_does_not_update_keys_if_new_file_identity_is_not_finggerprint", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTesst/cancel_gets_distributed_to_all_source_tests", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_close_channel/ExpBa", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_in_ISO8601_format:\\u", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDs/p", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDss/pid_exited_and_ppid_is_containerized", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/non-existing_metadatta_key", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRunn/shutdown_on_signal", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/joined_build", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_407", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/drop_batch__on_permanent_consumer_error", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/data_", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/incorreectly_formatted_tag_with_valid_tag", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/incorreectly_formatted_tag", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/valid_hhashes", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType/text", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/ack_batch_on_consumer_", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with--wrong-defaults", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy_Serverless/policy_already_exists", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestNewGroup", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStateless_Run", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Init/wiith_custom_config", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/fail_if_config_", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/multiple_b", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/data_stream_should_be_type-namespace-dataset/index_name_", "github.com/elastic/beats/v7/heartbeat/monitors/Test", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with-wrong-defaul", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceField/Add_hierrarchy_to_event_and_replace", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/unsupporteed_UTC_representation", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestLockResource/faill_to_lock_resource_in_use_when_context_is_cancelled", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpack/notthing_to_unpack_if_key_is_new", "github.com/elastic/beats/v7/filebeat/input/log/TestNewInputError", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/nested_with_common_pprefix", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/UTC_as_staandard_offset", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_no_processor_for_lightweight_monitor", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_a_data_stream_processor_for_browsers/index_name_should_be_set", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestMan", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitUpdateIIdentifiers", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_should_be_used_e", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_unblock_afteer_some_time/EqualJitterBackoff", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/joined__build_tags", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestIncludedExcludeddFiles", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_CaptureOutput/capture_ouutput_from_assert_failures", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_iin_ISO8601_format:\\u003c190\\u003e2018-06-19T02:13:38.635322Z+0000_super_mon_messaage", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/do-not-overwriite", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestGrowWindowSizeUpToBatchhSizes", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkEncodeEventsWiithOpType", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/coonfiguring_inputs_with_overlapping_sources_is_allowed", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with--correct-default", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/Tes", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_close_channeel/ExpBackoff", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/a_is_object_and_preffix_of_b", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBui", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-with-wrong-de", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_close_channeel", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_405", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/re", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appendValues/append_value_in_t", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_the_same_elemments,_with_a_duplicate", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/on_error_wit", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRunn", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/ack_batch_oon_consumer_success", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns/RFC33339Nano", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_unblock_afteer_some_time", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProc", "github.com/elastic/beats/v7/filebeat/fileset/TestGetInputConfigNginxOverrides/cllose_eof", "github.com/elastic/beats/v7/libbeat/instrumentation/TestAPMTracerDisabledByDefauult", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigGeoEnnabled", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRunn/event_ACK_triggers_execution_of_update_operations", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDe", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/nnever_with_success", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRun/inpu", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy_Serverless/overwrite", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_shoould_be_used_exactly/event.data_stream", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/drop_batch_on", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/unsupported_UTC_rep", "github.com/elastic/beats/v7/filebeat/fileset/TestGetInputConfigNginxOverrides/piipeline", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_OpenClose/aalready_available_state_is_loaded", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy_Serverless", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/custom-policy--name", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverWithMutlipleEnttries", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTest/panic_is_c", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/faail_if_config_error", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestProcessingDiagnostiics", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaul", "github.com/elastic/beats/v7/libbeat/instrumentation/TestInstrumentationConfigExpplicitHosts", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/nested_duplicates_faail", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/mu", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceField/replace__part_of_field_value_with_another_string", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy_Serverless/create_new_policy", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_a_data_stream_processor_for_browsers/observer_location_data_should_nott_be_set", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/faail_if_no_source_is_configured", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manager_Enabled_Se", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/data_streamm_fields_are_set_on_logrecord.Attribute", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestSessionPaarallel", "github.com/elastic/beats/v7/libbeat/processors/TestBadCondition", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_should_be_used_exactly/observer_locati", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceField/try_repllacing_value_of_missing_fields_in_event", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/no_hashhes", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRun/panic_is_cap", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_the_same_elemments,_but_out_of_order", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/abbreviateed_hour_offset", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled_Serverless/enabled_via_handler", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/one_buiild_tag", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestC", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/multiplle_build_tags", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventDelete/deleete_event_for_file_present_on_disk_(same_contents)", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/test_down_status_40", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_min_", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestLockResource/can__lock_unused_resource", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_close_channeel/EqualJitterBackoff", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_IsNew/falsse_if_key_with_cursor_value_is_in_persistent_store", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestRecursivveNoFollowSymlink", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-witth-wrong-defaults", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appe", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/exact_index_shoould_be_used_exactly", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_408", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_OpenClose/lload_from_empty", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy_Serverless/fail", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/negative_aabbreviated_hour_offset", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-with-correc", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_should_yield_a_data_stream_process", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceStore_UpdateIdentifiers/update_identifiers_when_TTL_is_bigger_than_zero", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/nnever_with_error", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStartStop", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTesst", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled/disabled_via_config", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/data_stream_should_be_type-namespace-dat", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/custom-policy--file", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/never_with_succ", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/inco", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_404", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_different_nummber_of_elements", "github.com/elastic/beats/v7/libbeat/processors/TestDropEvent", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_Pars", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_rem", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigDefauult", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessorrs/Replace_in_processor's_on_failure", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/Tes", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/standard_ooffset", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadOnFailed", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manager_Enabled/", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessorrs/nested", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceStoreTakeOver", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_CaptureOutput/capture_teest_log_output", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Init/colllect_old_entries_after_startup", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_maxx_int32,_partitions_12", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_unblock_afteer_some_time/ExpBackoff", "github.com/elastic/beats/v7/auditbeat/TestSystem", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultS", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDss/cgroup_error", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/all-disabled-nno-fail-serverless", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/fail", "github.com/elastic/beats/v7/filebeat/input/stdin/TestSeverity", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Mana", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/coonfigure_ok", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_should_yield_a_data_stream_", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_a_data_stream_processor_for_browsers/event.data_stream", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEvent/Get/a_root-level_dot-key_fromm_metadata", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventDelete/del", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appeendValues/processor_with_no_fields_or_values", "github.com/elastic/beats/v7/libbeat/common/transport/kerberos/TestConfigValidatee", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-witth-bare-config", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigNetInnfoDisabled", "github.com/elastic/beats/v7/libbeat/processors/TestMissingFields", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestLockResource/can_lock_unused", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_different_num", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRunn/panic_is_captured", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManage", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkEncodeEvents/66.x", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/non-existing_metadata_ke", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDss", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/all-disabled-nno-fail", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Feeb", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/always_with_su", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/aalways_with_error", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/data_stream_shoould_be_type-namespace-dataset/index_name_should_be_set", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_different_eleements", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventDelete/deleete_event_for_file_missing_on_disk", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceStore_UpdateIden", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/multiplle_flags_with_no_tags", "github.com/elastic/beats/v7/auditbeat/TestTemplate/default_field_length", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_removeDuplicates/cleean_up_string_array_without_duplicate_values", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/all-disabled-no-fail-se", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled_Serverless/io_error", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_a_data_stream_processor_for_browsers/event.dataset_should_always_be_prresent,_preferring_data_stream", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_Enabled_Serverless/disabled_via_handler", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner/returns_all_files_that_match_a_non-standard_fingerprint_window", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessorrs/Remove_leftover_foreach_processor", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_OpenClose/iignore_entries_with_wrong_index_on_open", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/no_acess_to_metadataa_key", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/faail_if_no_input_runner_is_returned", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/retries_thee_batch_on_non-permanent_consumer_error", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_406", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Init/collec" ]
[ "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields//with_service_name/simple/result_at_index_0", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Single__regex_that_matches", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityRResult/For_non-priority_result,_response_order_wins", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields/with_o", "github.com/elastic/beats/v7/libbeat/kibana/TestInvalidVersion", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs__?type", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrString/forty__two", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_21", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLineWithCR#01", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_416", "github.com/elastic/beats/v7/libbeat/common/acker/TestLastEventP", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/multicopy", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CheckConffig/does_not_run_or_test_configured_input", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestDuration", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/invalid_syntaax", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCounting/octet_counting", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=false/with_input=false/custom_parent=true/public_metrics=false", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFromFileeInfoHash/file_shrinks_before_hashing", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessorConvert/extract_integer", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/valid", "github.com/elastic/beats/v7/filebeat/harvester/TestAddFactoryEmptyName", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/ev", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/versionTest_v:1000:\\u0", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestTransitionTo", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_fiield_bad_data_-_fail_on_error", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstReaderGroup", "github.com/elastic/beats/v7/libbeat/common/schema/mapstriface/TestNestedFieldPaths", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcesso", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_Get", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Object_Put_Key", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstResource_CopyInto", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Get_@metadata", "github.com/elastic/beats/v7/libbeat/outputs/TestHostsNumWorkers/both_set", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/T", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestAsyncSendZero", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Rename", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_017__to_long", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule_Unpack", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/add_fields_to_nil_event", "github.com/elastic/beats/v7/libbeat/processors/checks/TestAllowedFields/one_alloowed_field_present_and_one_not_allowed_is_present_in_the_configuration", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_disaabled_ilm_disabled,_loadMode_Overwrite", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestEncoding/hex", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestAddTLSMetad", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestValidDropPolicyConfig", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_nested_map_from_metad", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar/when_we_have_no_chars__to_replace", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScrip", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestTimespan/interval_loonger_than_timeout", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(79):_'plain_''__text'_-\\u003e_plain_'_text", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDs/pid_is_not_co", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNewLeaaderElectionManager", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_13", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_14", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Delete", "github.com/elastic/beats/v7/libbeat/processors/TestSafeWrap/does_not_wrap_a_non--closer_processor", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AvailAndLenConsiderReaad", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/ListEnabledInputs", "github.com/elastic/beats/v7/libbeat/processors/actions/TestFieldNotString", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestConfig/config_given", "github.com/elastic/beats/v7/heartbeat/scheduler/TestNewWithLocation", "github.com/elastic/beats/v7/libbeat/processors/TestNamespaceError", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uintptr", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_30", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int16_1_to_long", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessingDiagnostiics", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCan", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonConditioon/positive_match", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/merge_with__existing_meta", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_3", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestInlineBrowserJob", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_close_channel", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/ES_\\u003c_", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/a_nested_map_from_fields", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFilter", "github.com/elastic/beats/v7/libbeat/common/TestDeleteExistingKey", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_nested_map_from_meetadata", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/incomplete_backend", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/Te", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFFilter/fail_to_load_if_unknown_name_is_used", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNamespacePodUpdater", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/alternative_target", "github.com/elastic/beats/v7/libbeat/mapping/TestGetField/does_not_exist", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCCgroupRegex/podman", "github.com/elastic/beats/v7/libbeat/cfgfile/TestReloadSameConfigs", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestCursor_Unpack", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_24", "github.com/elastic/beats/v7/dev-tools/mage/TestBuildPlatformsListRemove", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template-defaault-dsl-config", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField/striing", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_ordereed_and_fixed_length_field", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFingeerprint", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_stop_pod_without_container_id", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestC", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuratioon", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestNewConfigFromProto", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_SendRecv/read_does_not_block_if_events_are_available", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestOneHostSuccessResp_Bullk", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/one_level_dissect", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar/when_we_have_an_empty_string", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_109", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigDefault", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTesttFunction/test_method_is_optional", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGenerateCheckConfig/abssent_id", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/no_acess_to_metadata_kkey", "github.com/elastic/beats/v7/libbeat/processors/actions/TestRenameRun/simple_field_renaming", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Novvember", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestValidate", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestNoGzipDecodeWithoutHeader", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobConts/multi--job-continuations/result_at_index_2", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/does_not_propag", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/conditioon_complex_type_match_json", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_25", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_117", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_16", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadInput", "github.com/elastic/beats/v7/libbeat/asset/T", "github.com/elastic/beats/v7/filebeat/generator/fields/TestFieldsGenerator", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(76):_'plain_texxt'_-\\u003e_plain_text", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/ru", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestACKer", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit/with_burst", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/POST__inputs_", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_NotMatchesInput/plugin_with_user_configured_ID", "github.com/elastic/beats/v7/heartbeat/monitors/TestDurationWait/50_wait_signals", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_UTF-8_CONTROL", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_22", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestEmptyString", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestProxyDisableOverridesProxySettings", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestConnectCallbacksManagement", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_82", "github.com/elastic/beats/v7/libbeat/outputs/console/TestConsoleOutput/event_withh_custom_format_string", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitUpdateIdentifiers/prospector_init_does_not_u", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Juul", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFieldErrors", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest2_S-1-1-0", "github.com/elastic/beats/v7/libbeat/beat/TestFQDNAwareHostname", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/too_many_backends", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestOp_Execute/acking_multiple_ops_applies_the_latest_update_and_ma", "github.com/elastic/beats/v7/libbeat/mapping/TestAnalyzer/pattern_analyzer", "github.com/elastic/beats/v7/libbeat/processors/add_id/TestDefaultTargetField", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsFalse/replace_fields=false_with_only_host.id", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_51", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUpEndpointJob/localhost", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_No", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs_?XX", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/self_target", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetNamedSecurityInfo", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestRecordingAndFlapping", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_value", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_wwith_nanosecond:Oct_11_22:14:15.000000005_---_last_message_repeated_1_time_---", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCre", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField/striing-slice", "github.com/elastic/beats/v7/filebeat/input/filestream/TestOnRenameFileIdentity", "github.com/elastic/beats/v7/filebeat/fileset/TestApplyOverrides/var_overrides", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestDuratioon", "github.com/elastic/beats/v7/libbeat/conditions/TestContainsArrayOfStringPositiveMatch", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_destiination_port1", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/retries_thhe_batch_if_bad_HTTP_status", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar/when_we_have_multiple__chars_to_replace", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/prioriity_and_timestamp_defined_as_2018-05-08T10:31:24_(rfc3339):\\u003c38\\u003e2018-05--08T10:31:24_localhost_prg00000[1234]:_seq:_0000000000,_thread:_0000,_runid:_15255768284,_stamp:_2018-05-08T10:31:24_PADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPPADDPADDPADDPAD_DPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDPADDDPADD", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int32_max", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_S", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTagOnException", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/versionTest_v:30:\\u003c34\\u003e30_2003-10-11T22:14:15.003Z_mymachine.exammple.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/cloudid/TestDecode", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-else-false", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/one_level_disssect", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestGenerateHiints", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/no_op", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscover", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser", "github.com/elastic/beats/v7/filebeat/TestTem", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Deec", "github.com/elastic/beats/v7/libbeat/autodiscover/appenders/config/TestStoreNil", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadInput/Question_2?", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_destiination_IP", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadInput/Question_1?", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint32_max", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/numeric_string", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_map_to_maapstr.M", "github.com/elastic/beats/v7/libbeat/kibana/TestGenerate", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonExpression", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_multiple", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Jun", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestClientStructuredEvent", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitUpdateIIdentifiers/prospector_init_does_not_update_keys_if_there_are_no_entries", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint8_1_to_integer", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/nested_with_common_prefix", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int64", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_57", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityRResult/Empty_results_returns_nil", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/int", "github.com/elastic/beats/v7/heartbeat/beater/TestRootCmdPlugins", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Regex_mmatching_first_line_of_multiline_body_string", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode/no_node", "TestLegacyS", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_valuee_with_get_error_no_overwrite", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_nested_map_from_metaadata", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCertExpirat", "github.com/elastic/beats/v7/heartbeat/autodiscover/builder/hints/TestGenerateHinnts", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/invalid_tag", "github.com/elastic/beats/v7/libbeat/common/TestParseTimeNegative", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/missiing_metadata", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiUintOK", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldAlreadyExist/wit", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestLeaseCConfigurableFields", "github.com/elastic/beats/v7/libbeat/common/kafka/TestValidate", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestValidate/ok", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSIDEmptyTarget/acc", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/mb_", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar/when_we_have_an_empty__string", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AppendAfterNoMoreBytes", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_CheckConfig/fa", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/1.1..1.1_-\\u003e_8.8.8.8_:_", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectFixedNoData", "github.com/elastic/beats/v7/libbeat/mapping/TestGetField/exists_nested", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int64_max", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestErrorOnEmptyLineDelimiter", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udpp/Sending_a_message_over_the_MaxMessageSize_limit_will_truncate_the_message", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_ResetCursor/reset_cursor_empty_and_lock_it", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_28", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=true/with_input=true/custom_parent=true/p", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizer/start_d", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/valid_destination_port_0", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkEncodeEvents/6.x", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrSliceAny", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSIDEmpptyTarget/account_name", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/non-space", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CreateAndRun", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestValidate/network_tcp4", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/supportss_a_metadata_field", "github.com/elastic/beats/v7/libbeat/common/TestParseURL", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPodEventer_Namespace_Node", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadPipelinesWithMultiPipelineFFileset/ES_\\u003e_6.5.0", "github.com/elastic/beats/v7/libbeat/processors/TestNamespace", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Aprril", "github.com/elastic/beats/v7/heartbeat/monitors/TestStatusReporter", "github.com/elastic/beats/v7/libbeat/common/backoff/TestBackoff/test_unblock_after_some_time", "github.com/elastic/beats/v7/libbeat/processors/actions/TestMimeTypeFromToMetadata", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_7", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int32", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestConfig/config_given_with_windows_pa", "github.com/elastic/beats/v7/libbeat/mapping/TestGetKeys", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestStateless_Run", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestConfig", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestInputManager_Create", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/@timestamp", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashingTimeFields", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:1000:\\u003c1000\\u003e1_2003-10-11T22:14:15.003Z_mymachine..example.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/processors/timeseries/TestTimesSeriesIsDimension", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRun/metadata__target", "github.com/elastic/beats/v7/libbeat/common/cleanup/TestIfBool/If_runs_cleanup", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_20", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/OSS_release_of_Elastiicsearch_(Code:_400)", "github.com/elastic/beats/v7/libbeat/common/cli/TestExitWithError", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Object_Put_Key", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint_min", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_NotMatchesInput/plugin_with_user_configured_ID/plugin_with_useer_configured_ID_with_id:_my-id::path::my_id", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/first_list_only", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestPodIndexer", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManage", "github.com/elastic/beats/v7/libbeat/beat/events/TestGetMetaStringValue/root", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_too_boolean", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/+05", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStat", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_T_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/trim_leadinng_space", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstGCStore/state_never_removed_with_ttl=-1", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_16", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/No_priiority_defined:Oct_11_22:14:15_mymachine_su[230]:_'su_root'_failed_for_lonvick_onn_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/autodiscover/template/TestNilConditionConfig", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforce", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_field_urldecode", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_bools", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/last_node_in_fieelds", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestTargetField/nesteed", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestTLSHostname", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/int16", "github.com/elastic/beats/v7/heartbeat/monitors/TestSyncPipelineWrapper", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_string_from_nested_key_nested.message_to_top_l", "github.com/elastic/beats/v7/libbeat/mapping/TestDynamicYaml/dynamic_enabled", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteByteEOFCheck", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(22):_xxxx.ww.e__-\\u003e_2015.01.4", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestGCStore/empty_store", "github.com/elastic/beats/v7/libbeat/common/match/TestRegisterReloadable", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestStateLooaderRetry", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/merge_with_existing_meta", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_69", "github.com/elastic/beats/v7/heartbeat/monitors/TestDurationWait/one_wait_signals", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestWithConfig/with_string_escaping", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper//use_dowait", "github.com/elastic/beats/v7/libbeat/mapping/TestAnalyzer", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestIgnoreMissing", "github.com/elastic/beats/v7/filebeat/input/TestGetNonExistentFactory", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/non-numeric_string", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegis", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel/wwhen_ssl.verification_mode:none_", "github.com/elastic/beats/v7/libbeat/beat/events/TestGetMetaStringValue/nonexistent_field", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFieldErrorss/missing", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent5424/vaalid_data2", "github.com/elastic/beats/v7/dev-tools/packaging/T", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule_Unpack/badd_format", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/memory_no_id", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure", "github.com/elastic/beats/v7/heartbeat/TestTe", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/diffeerent_hash_values", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/custom_bool_type", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/invalid_no_backend", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/mixed_pointerr_and_indirect_and_fixed_length", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/withouut_match", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttFields/single_cert_fields_should_all_be_present", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_20", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/SetIgnoreInactiveSince/ignore_inactive_since", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_TrUe_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint8_1_to__integer", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestRecei", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/ignore_right_padding", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_getTags/tags", "TestLegacyService", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigDefault", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_0x_to_long", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/multip", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:180:\\u003", "github.com/elastic/beats/v7/libbeat/common/TestParseURL/no_scheme", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_24", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCancellledEvents/multi-job-continuations/result_at_index_2", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Regex_mmatching_json_example", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/string_fiel", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCEMetadata", "github.com/elastic/beats/v7/filebeat/input/log/TestInputLifecycle/beat_context_done", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuratioon/3m0s_format_as_hours", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField/inteerface-slice", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttFields", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/protocol_numbber_as_string", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScriiptParams/register_params", "github.com/elastic/beats/v7/filebeat/input/v2/TestRunnerFactory_CheckConfiig", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_config_mixxing_dynamic_template_with_object_type_params", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/without_ilm", "github.com/elastic/beats/v7/libbeat/processors/util/TestUnique", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_3", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_int__0_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/net/TestNetIsIP", "github.com/elastic/beats/v7/filebeat/input/syslog/TestProgram", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFromFileeInfoHash", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack/string_values", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob/fails_if_can't_b", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_507", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestRequestBuildingWithExplicitUserAg", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestStateLooaderRetry/should_retry_3_times_when_fails_with_retryable_error", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_33", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/float64_value", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_17", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test6_Not_a_SID", "github.com/elastic/beats/v7/libbeat/common/cli/TestExitWithPanic", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestGenerateHintsWithPaths", "github.com/elastic/beats/v7/heartbeat/TestTemplate/default_field_length", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/add_fileset", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestFactory", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonConditioon", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessorConvert", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessingDiagnostics", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCommonPaths", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_99", "github.com/elastic/beats/v7/libbeat/TestTemp", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAW", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_301_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint16_max", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestConfigValidate", "github.com/elastic/beats/v7/libbeat/api/TestConfiguration", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/put_file", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup/assert_a_harvester_for_same_sou", "github.com/elastic/beats/v7/libbeat/processors/cache/TestMemStore/new_get_add_put", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeer", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdateedFiles/newer_files_with_ignore_older", "github.com/elastic/beats/v7/auditbeat/TestSyst", "github.com/elastic/beats/v7/libbeat/processors/actions/TestBadConfig/field-only", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstReaderGroup/assert_non_existent_key_can_be_removed", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestConstructDummyMulticastAddress", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint8Data", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/suppoorts_a_metadata_field", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_tokenizer_missing", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_0b1_to_integer", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/mb_chars/multi_read_byte_prefix", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint16_1_too_integer", "github.com/elastic/beats/v7/filebeat/fileset/TestAppendWithoutDuplicates/eliminaate_a_duplicate,_no_override", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkPrivate", "github.com/elastic/beats/v7/libbeat/common/TestEntries", "github.com/elastic/beats/v7/libbeat/common/TestTuples_tuples_ipv6", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_IPs_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_25", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecconnectsOnConnect/tcp/connect", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_94", "github.com/elastic/beats/v7/dev-tools/mage/TestBuildPlatformsListSelect", "github.com/elastic/beats/v7/libbeat/mapping/TestGetField/no_leave_node", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int64_min", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=true/with_input=false/custom_parent=tru", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestKeySelection/key_must_keep_case", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstReaderGroup/assert_inserting_existing_key_returns_error", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult", "github.com/elastic/beats/v7/libbeat/common/TestJoinKeys", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestIgnoreMissing", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/bbeat_local_fields", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/deleted", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestOnCreateHandler_SubscribeMult", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteNetUint32At", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint16_min", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNewLowerCaseProcessorr", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRunInParallel", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadPipelinesWithMultiPipelineFFileset/ES_\\u003c_6.5.0", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_33", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_no_processor_for_lightweight_monitor/index_name_should_be_set", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestAnnotatorSkipped", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvid", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/TestToOtelConfig/check_preset_config_translatio", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/do_not", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/merge_labels", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/no_sizee_limit", "github.com/elastic/beats/v7/libbeat/common/TestURLParamsEncode", "github.com/elastic/beats/v7/libbeat/features/TestFQDN/FQDN_disabled", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClientWaitClose/ACKin", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint64_max", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestName", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_day/ddoes_not_match_2025-02-07T09:30:00Z", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MaxReadBufferReachedUserConfigured", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntNotDigit", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCountting/octet_counting,_embedded_newline", "github.com/elastic/beats/v7/filebeat/input/TestAddFactoryEmptyName", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestOneHost503Resp", "github.com/elastic/beats/v7/dev-tools/mage/T", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/does_not_eemit_events_if_a_file_is_touched_and_resend_on_touch_is_disabled", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_no_user_configured_ID", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessors/nested", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_value_type_from_meetadata", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventDelete", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo/workload_returns_no_error", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_Get/find_existing_resource", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNode_isUpdated/resource_version_is_the_same_should_return_not_upd", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionWithhMapStr/from_mapstr.M", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/single_inv", "github.com/elastic/beats/v7/filebeat/input/syslog/TestWhenPriorityIsSet", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilCRLFOnlyCRThenCRLLFWithCont", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkReadToItems", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/noop_left", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint_max", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestConnectCallbacksMaanagement", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Put_@metadata", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/dynamic_topi", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/Te", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAppenderRegistry", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/with_mmatch", "github.com/elastic/beats/v7/libbeat/processors/checks/TestRequiredFields/one_reqquired_field_present_and_one_missing_in_the_configuration", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAn", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(37):_HH:mm:ss_aaa_-\\u003e_08:05:24_AM", "github.com/elastic/beats/v7/libbeat/common/TestGetDoesntUpdateLastAccessTime", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_IPs_field_s", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedJobRun/context_not_cancelled", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with-both-enabled", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_uint64", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNodePodUpdater", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldAlreadyExist/no__prefix", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int16_1_to__integer", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestApplyPresetWithConnflicts", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/timesttamp_defined_as_2018-05-08T10:31:24_(rfc3339):2016-05-08T10:31:24_localhost_prg000000[1234]:_seq:_0000000000,_thread:_0000,_runid:_1525768284", "github.com/elastic/beats/v7/libbeat/processors/actions/TestInvalidJSONMultiple", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveHetznerMetadata", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure/success", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_fields_match", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFrom", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestNoMatch", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/a_root-level_dot-key_fromm_metadata", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestFactory/elasticsearch", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFaiilConnectUnknownAddress", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAlibabaCloudMetadata", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_13", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilSymbolOrEnd", "github.com/elastic/beats/v7/filebeat/fileset/TestGetInputConfigNginx", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/TestToOtelConfig", "github.com/elastic/beats/v7/libbeat/mapping/TestDynamicYaml/dynamic_enabled2", "github.com/elastic/beats/v7/filebeat/input/log/TestReadLine", "github.com/elastic/beats/v7/dev-tools/packaging/TestTar", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/witth_ilm", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/test_down_status_42", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/standard_offset", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommon", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_UpdateTTL", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/missing_field", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestOverwriteKeys/fail_iff_key_exists_and_overwrite_disabled", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/tem", "github.com/elastic/beats/v7/dev-tools/mage/TestPackageZip", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_int__1_to_boolean", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/everything_e", "github.com/elastic/beats/v7/libbeat/common/acker/TestLastEventPrivateReporter/noo_dropped_events", "github.com/elastic/beats/v7/heartbeat/monitors/jobs/TestWrapAll/simple", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns/RFC3339", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_aand_message_only:Oct_11_22:14:15_---_last_message_repeated_1_time_---", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestStateLoaderRetry", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIffRemoved/prospector_init_with_clean_removed_enabled_with_no_entries", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(42):_k:m:s_a_-\\\\u003e_21:5:24_PM", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_other_day_for_4_h", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_value", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestConverter/test_cloud_id_convers", "github.com/elastic/beats/v7/libbeat/common/reload/TestRegisterNilFails", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAddi", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/CustomDelimiter", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv6:_1::2:5:\\u003c13\\u003eFeb_25_17:32:18_1::2:5_", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/uint32", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsRun", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeer/start_up,_stay_up", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNewDropFields", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestDefaultCoonfigUnpack", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestContainerIndexer", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/path/TesstPosix", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/base_iis_last,_not_first_stream", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_307_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRun", "github.com/elastic/beats/v7/filebeat/beater/TestMatchRegistryFiles/r", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchemaCases/standard_schema_con", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/append_to_taggs", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/pointers_are_dereferenced", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_19", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec/PST_timezone_offset", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_InvalidSource3", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/Tes", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/bad_addrs", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_OpenClose", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_TryRecv/reading_updates_consumes_all_pending_update", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:192:\\u003c192\\u003e1_2003-10-11T22:14:15.003Z_mymachine.exxample.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/long/1_by", "github.com/elastic/beats/v7/libbeat/conditions/TestORCondition", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appendValues", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus/matchh_multiple_values", "github.com/elastic/beats/v7/filebeat/fileset/TestAdaptPipelineForCompatibility/ES_==_6.", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float64_1.1_to_string", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/executableObject", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/crlf", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Tag", "github.com/elastic/beats/v7/libbeat/common/reload/TestRegisterReloadableList", "github.com/elastic/beats/v7/libbeat/processors/actions/TestArrayWithArraysEnabled", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/empty/PutValue", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Verif", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defau", "github.com/elastic/beats/v7/filebeat/TestUnpackCopiesDDefault", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_iin_ISO8601_format:\\u003c190\\u003e2018-06-19T02:13:38.635322Z+00:00_super_mon_messsage", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_55", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestOnCreateHandler_SubscribeMulltiple_BackoffSignalDone", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_428", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestFileInfoPermissiions", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/ignore_left_padding", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int8_max", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCCgroupRegex/docker", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestIsEmpty", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_5", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/messagge_only:---_last_message_repeated_1_time_---", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/allowed_under_the_agent", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveQCCloudMetadata", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_08_to_long", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestStateless_Run/events_are_pub", "github.com/elastic/beats/v7/libbeat/licenser/TestLicenseUnmarshal/basic_license", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1.1_to_float", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestUserAgentHeader", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo/return_error_if_the_group_is_closed", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestConfig/removed_config_setting", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/invalid_no_key_field", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_DEL", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigGGeoDisabled", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_UpdateTTL/update_TTL_for_in-sync_resource_does_not_overwrite_state", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceRun/test_missing_fields", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestDeferredStateLoader", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_x_to_string", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestSelf", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadQueryResult_empty", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProces", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestSanitizeIPs/cuts_the_masks", "github.com/elastic/beats/v7/libbeat/conditions/TestRangeCreateLexicographic", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_getTags", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run//positive_flow", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_DEELETE", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_in_ISO8601_format:\\u003c190\\u0", "github.com/elastic/beats/v7/filebeat/harvester/TestExcludeLine", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UnreadByteFail", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_510", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/numeric_str", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestGenerateMetaDockerNoDedot", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/add_label", "github.com/elastic/beats/v7/libbeat/common/acker/TestCombine/Close_distributes", "github.com/elastic/beats/v7/libbeat/licenser/TestIsExpired", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_succeeded_pod_start_with_multiple_ports_exposed", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestConfig/default_config", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_strinng_from_message_to_message_copied", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_418", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/z+00", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/without_match", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/no_hashes", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvvent_Service", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_50", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestValidate", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestAddTLSMetadata", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/cron_every_minute", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/usee_indices_settings_must_be_lowercase", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/uuser_global_fields_and_tags", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestClientWithAPIKey", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/detects_a_file_truncate", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_SendRecv/wait_for_send", "github.com/elastic/beats/v7/heartbeat/monitors/TestMonitorCfgError", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeerPluginOrder", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestUsingCache", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_27", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCertFields/complex_cross_signed_chain,_multiple_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_12", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_False_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest0_S-1-5-7", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/int32", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_28", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_11", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSIDEmptyTarget/domain", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeer/start_up,_transient_down,_recover", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ImplementsInterfaces", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestOverwriteKeys/overwriite_existing_keys", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashinggTimeFields/PST", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdateedFiles/old_files_with_ignore_older_configured", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run/append_value_in_the_", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileIdentifier/fingerprint_identi", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/malformed_JSON", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType/png", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestIgnoreFailure", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCreate/all_options", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCEMetadataInK8sPartial", "github.com/elastic/beats/v7/filebeat/TestTemplate/default_field_length", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/add_array", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_7", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_120", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/bad_type", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestIgnoreFailure/ignore__failure_is_a_noop_on_success", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_91", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/with_mmatch", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/allow_when_the__input_configuration_has_the_flag", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestSta", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/hierarchy", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestDisableSource", "github.com/elastic/beats/v7/filebeat/input/syslog/: TestDay", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNode_isUpdated", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestNewInputDone", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLin", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create/configure_ok", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestValidate/ok", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/single_space_left", "github.com/elastic/beats/v7/libbeat/common/schema/mapstriface/TestFullFieldPathInErrors", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/a_nested_map_from_metadata", "github.com/elastic/beats/v7/libbeat/processors/actions/TestValidJSONDepthOne", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/condition_mismatch", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_R", "github.com/elastic/beats/v7/libbeat/processors/TestWhenProcessor", "github.com/elastic/beats/v7/libbeat/kibana/TestEmpty", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrDouble/float332", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiredFields/no_mutually_exclusive_field", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecconnectsOnConnect", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Init", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/test_down_status_51", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFaiilConnectUnknownAddress/tcp/connect", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_fixed_length", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCgroupRegex", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/Te", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashinggTimeFields/IST", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_4", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCompressionIsOnByDefault", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/trim_leading_space", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailMiddle", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstReaderGroup/assert_new_group_is_empty", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHasPid", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Only_neegative_check_where_pattern_not_match_HTTP_return_body", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(41):_kk:mm:ss_aaa_-\\u003e_09:05:24_AM", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDs/pid_is_containeri", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection", "github.com/elastic/beats/v7/libbeat/outputs/console/TestConsoleOutput/event_with_cu", "github.com/elastic/beats/v7/filebeat/fileset/TestMcfgFromConfig", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceStore_CleanIf", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_Em", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_March", "github.com/elastic/beats/v7/libbeat/processors/util/TestConfigGeoEnabled/Check_of_location", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setu", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpd", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_414", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_New/fail_with_invalid_pplugin", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/non-numeric_string", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/Default_passwordd", "github.com/elastic/beats/v7/libbeat/cfgfile/TestGlobManagerInit", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/incomplete_offset", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_::1__to_ip", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/ES_\\\\u003e_7.9.0", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/empty", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_no_processor_for_lightweight_monitor/observer_location_data_should_nott_be_set", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/invalid_kkey_type", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob/successfully_unpaccks_string", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_ID", "github.com/elastic/beats/v7/libbeat/common/TestPu", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv/Single_value", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/live_batche", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkRequestHasFiltterPath/Single_event_with_response_filtering_and_preconfigured_client_params", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob/successfully_unpaccks_map[string]interface{}", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udpp4/Sending_a_message_under_the_MaxMessageSize_limit", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestDecode", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValid", "github.com/elastic/beats/v7/libbeat/conditions/TestOpenRangeConditionPositiveMatch", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_1", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrBool/true", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/does_not_propaggate_Run_when_closed", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_53", "github.com/elastic/beats/v7/libbeat/common/schema/TestApplyOptions", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/no_size_limit", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/se", "github.com/elastic/beats/v7/filebeat/input/filestream/TestLogFileTruncated", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestReaderGroup", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestR", "github.com/elastic/beats/v7/filebeat/fileset/TestInputSettings", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Get_Object", "github.com/elastic/beats/v7/libbeat/beat/events/TestGetMetaStringValue/nonexisteent_field", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCCEMetadataInK8sPartial", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexabllePolicyConfig/dead_Letter_index_policy_without_index", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsFalse", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestNoBatchAssemblyOnNilTarget", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestFormatString", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/bad_addrs", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go/workload_retu", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/NewLine#01", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float64_1_to_integer", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-criitical", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuratioon/3s_format_as_minutes", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailInvalidBul", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestNormalization", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/supports_metadata_", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint8AtInRange", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBackoffFunc/4_retries", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/without_match", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest5_", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestGetOSState", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float64_1_to_long", "github.com/elastic/beats/v7/libbeat/common/TestIsLoopback", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCa", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/custom_separator", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstInputManager_Create/Checking_config_does_not_print_duplicated_id_warning", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadInput/Question_4?", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceRun/simple_field_replacing", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestProxy", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Ma", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScriiptParams", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode/last_node_in_fieldds", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_February", "github.com/elastic/beats/v7/filebeat/input/filestream/TestNumericSorter/ordered_fileinfos", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Positive_with_negative_check_w", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobNoConts/multi", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestFilesAsDir", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/non-existing_location", "github.com/elastic/beats/v7/libbeat/outputs/TestHostsNumWorkers/workers_set", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestErrorFlagging/when_the", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrDouble/float64", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestConfig/config_given_withh_windows_path", "github.com/elastic/beats/v7/libbeat/processors/checks/TestRequired", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test5_", "github.com/elastic/beats/v7/libbeat/api/npipe/TestTransformString/with_npipe://_scheme", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_47", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_valid_trim_mode", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestAddrs/ipv6", "github.com/elastic/beats/v7/libbeat/common/TestConvertWithNullEmission", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/equal_hostss", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetad", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType/elf", "github.com/elastic/beats/v7/libbeat/common/TestExpireWithRemovalListener", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/long/multi_read_byte_prefix", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper", "github.com/elastic/beats/v7/libbeat/cfgfile/TestCreateRunnerAddsDynamicMeta/no_ddynamic_metadata", "github.com/elastic/beats/v7/heartbeat/monitors/Test_runPublishJob/cancelled_contt", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/addd_fileset", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/tokenizer_with_no_field_", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestValidate/network_tcp6", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/unicode_sepa", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestConfigUnpackEmptyInterfaces", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSIDEmpptyTarget/account_type", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldAlreadyExist/no_prefix", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert/fail_on_error", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields//with_service_name/simple", "github.com/elastic/beats/v7/heartbeat/monitors/TestTimeoutWait/one_wait_signals", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/Ma", "github.com/elastic/beats/v7/libbeat/conditions/TestOpenGteRangeConditionNegativeMatch", "github.com/elastic/beats/v7/filebeat/input/syslog/Tes", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash//failed_hash_on_creation", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceStore_CleanIf/entries_are_left_alone_when_function_returns_false", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrBool/false", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsTrue/replace_fields=true_with_host.name", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestGetMacAddress", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Init", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatu", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiredFields/two_mutually_exclusive_fie", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddErrorToEventOnUnmarshalError", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedJobRun/context_cancelleed_over_limit", "github.com/elastic/beats/v7/libbeat/api/npipe/TestTransformString", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_25", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLineMessageWithoutBoundaries#01", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyF", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_19", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u003c164\\u003eOct_26_15:19:25_1.2.3.4_%ASA", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2/all_fields_from_processor", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner/returns_alll_files_that_match_a_non-standard_fingerprint_window", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_59", "github.com/elastic/beats/v7/libbeat/cfgfile/TestStopAll", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/bool_value", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_206_using_urls_config_field", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CheckConffig/does_not_cause_input_ID_duplication", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/Unfinished_but_TTL_set_to_0", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_200_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/common/schema/TestConversions", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/net/TestNetIsIPvN", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings//blank", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run//append_value_in_the_arrays_from_a_field_when_target_field_is_present_and_it_is_aan_array", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_92", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Stop/timeout", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/single_space__right", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFingeerprint/path_to_native_fails", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_in_ISO8601_format:\\u00", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/wrapped_common..ErrNonReloadable", "github.com/elastic/beats/v7/libbeat/cfgfile/TestCreateRunnerAddsDynamicMeta/no_dy", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestECSErrors/on_summary_event", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Delete_@metadata", "github.com/elastic/beats/v7/libbeat/licenser/TestIsExpired/state_is_expired", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/only_reporter_hosts", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestClientPing", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/1.1.1.1_-", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestContaainerIndexer", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestFieldMatcherRegex", "github.com/elastic/beats/v7/libbeat/api/npipe/TestTransformString/everything_elsse", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_tokenizerr_missing", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestSingleByte", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_ordered_a", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTesttFunction/test_failure", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Create", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/no_value", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_62", "github.com/elastic/beats/v7/libbeat/processors/actions/TestRenameField/Add_hierarchy_to_event", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_fiield_urldecode", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manager_EnsurePolicy", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32NoData", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/uint64", "github.com/elastic/beats/v7/libbeat/api/npipe/TestHTTPOverNamedPipe", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/supportss_a_normal_field", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AppendRetainsBuffer", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/fails_when_thhere_is_remaining_string_after_the_fixed-length_key", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestIgnoreMissing/false", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_min", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/fail_unpacking_", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-else-if", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/Te", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestAddrs", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSequence/is_set", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestEventFormatStringFromConfiig", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/Expired_but_unfinished", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGenerateCheckConfig/id__is_present", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob/fails_if_can't_be__converted_to_json", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/modified_array", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/Local", "github.com/elastic/beats/v7/filebeat/input/syslog/: TestPid", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_0", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs__?XX", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_10", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_empty_tokenizer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUpEndpointJob/ipv44", "github.com/elastic/beats/v7/libbeat/common/kafka/TestVersionGet", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/propagat", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestLockResource", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(47):_SSSS_-\\u0003e_1230", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_202_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/common/TestTimeString", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AppendAfterNoMoreBytess", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/GMT_label", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/existing_if", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/SetIggnoreInactiveSince/ignore_inactive_since_set_to_since_first_start", "github.com/elastic/beats/v7/filebeat/TestSystem", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestClientSendZero", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestInvalidConfig/no_fields", "github.com/elastic/beats/v7/filebeat/fileset/TestAppendWithoutDuplicates/just_modules", "github.com/elastic/beats/v7/heartbeat/scheduler/TestParse", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_3", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestIsEmpty/when_string_is_Emppty", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_51", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=false/with_input=false/custom_parent=true/public_metrics=false#01", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/si", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigGeoDisabled", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeMapError", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeXML", "github.com/elastic/beats/v7/filebeat/fileset/TestApplyOverrides/enable_and_var_ooverrides", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(67):_ff_-\\u003ee_00", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestOneHost500Resp_Bulk", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestApplyPresetNoConfllicts", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent5424/innvalid_data", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestJSONEncoderMarshalBeatEvent", "github.com/elastic/beats/v7/filebeat/channel/TestCloseOnSignal", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestNilProcesssor", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/supports_a_m", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_017_to_integer", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CreateAnddRun", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityRResult/Single_result_returns_the_same", "github.com/elastic/beats/v7/libbeat/autodiscover/TestBuilderRegistry", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u0033c34\\u003eOct_11_22:14:15_mymachine_postfix/smtpd[2000]:_'su_root'_failed_for_lonnvick_on_/dev/pts/8", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestRequestBuildingWiithExplicitUserAgent", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCancellledEvents/multi-job-continuations/result_at_index_1", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectWithSuffixFixedNoData", "github.com/elastic/beats/v7/filebeat/harvester/TestMatchAnyRegexps", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/skip_field", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFFilter/BEATS_ADD_CLOUD_METADATA_PROVIDERS_overrides_selected", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestSocks5Job/using_loocal_resolver", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields/", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestTLSSANIPConnection", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/with_be", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScriiptParams/register_required_for_params", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_18", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_numbeer_from_hierarchical_message.original_to_top_level_message", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/multiple_fields_failure", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctet", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest7_S-1-5-2025429265-500", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/size_at_hash_limit", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_Ope", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/deep_nested_with_common_pr", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfigRemoveDuplicates", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_config_mixxing_dynamic_template_with_object_type", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_ValidVarLogPodSource", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/_-\\u003e_1", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecconnectsOnConnect/tcp", "github.com/elastic/beats/v7/libbeat/autodiscover/appenders/config/TestGenerateApppender/Appender_with_a_condition_check_that_passes._It_should_get_appended", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_67", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTimeeout", "github.com/elastic/beats/v7/libbeat/conditions/TestContainsSingleFieldPositiveMatch", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySe", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode/key_not_in_fields,,_but_node_in_fields", "github.com/elastic/beats/v7/libbeat/processors/actions/TestUpperCaseProcessorRun", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestErrorOnInvalidSocketTyype", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint64NoData", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestGCStore", "github.com/elastic/beats/v7/libbeat/common/: TestReadString", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit/rate_1_per_min", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRun", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/custom-policy-name", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updatted_setgid_field", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCounting/non-transparent", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint16_1_to_float", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/invalidd_file", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/executableObj", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/missinng_field_-_do_not_ignore_it", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestErrorFlagging", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestIgnoreFailure", "github.com/elastic/beats/v7/libbeat/common/cli/TestConfirm/Test_Y", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/detects_a_file_rename", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedTaskLimits/runs_more_th", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIfRemoved/prospector_init_with_clean_removed_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_26", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs_?type", "github.com/elastic/beats/v7/filebeat/input/filestream/TestLogFileTimedClosing", "github.com/elastic/beats/v7/libbeat/common/TestTuples_tuples_ipv4", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/bad_type", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MultipleCharCustomDelimiterMessageWithoutBoundaries#01", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/rfc6587_framing_octet", "github.com/elastic/beats/v7/libbeat/processors/TestSafeWrap/wraps_a_closer_processor", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNamesppacePodUpdater", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArgv/t", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobConts/multi--job-continuations/result_at_index_3", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/ignore_ErrUnknown", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdatedFi", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkContains", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_January", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestS", "github.com/elastic/beats/v7/filebeat/fileset/TestAppendWithoutDuplicates/just_moodules", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNotJsonObjectOrAr", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_other_day_for_4_hours/does_match_2025-02-10T11:00:00Z", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIsValidAddress/nil", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/simplee_datastream,_with_origin_uses_streamId", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_a_harvester_for_same_source_cannot_be_started", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigGeoEnabled", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClient/no_infinite_loop_", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_destination_IP", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(46):_SSS_-\\u0033e_123", "github.com/elastic/beats/v7/libbeat/conditions/TestNOTCondition", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/timesttamp_with_nanosecond_defined_as_2018-05-08T10:31:24.0004_(rfc3339):2016-05-08T10::31:24.0004_localhost_prg00000[1234]:_seq:_0000000000,_thread:_0000,_runid:_15257768284", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/-05", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedJobRun/context_cancelled", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/multiple_keys_diss", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNode_iisUpdated/one_of_the_objects_is_nil_then_its_updated", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_48", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_2", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillFatalErrorNotRetried", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonExpre", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint64_max", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillDeadLetterIndex", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestNoHeaders", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16AtOutOfRange", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestPathFormatString", "github.com/elastic/beats/v7/libbeat/autodiscover/template/TestConfigsMappingKeystore", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRun/Lowercase", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestWithConfig", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessingClose", "github.com/elastic/beats/v7/filebeat/beater/TestFetchInputConfiguration/loads_nothing", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_71", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCancellledEvents/multi-job-continuations/result_at_index_3", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_paddinng_and_fixed_length_field", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestConfiggLeaseFields", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestStateless_Run//do_not_start_input_of_pipeline_connection_fails", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure/input_config_fails", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestErrorFla", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/custom_target", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/condition_invalid_json", "github.com/elastic/beats/v7/filebeat/fileset/TestResolveVariable", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttFields/complex_cross_signed_chain,_multiple_roots_included,_at_least_one_expiredd", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/Specific_and_default_pass", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_Run/mu", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCCgroupRegex/kubernetes-docker", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_34", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDup", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/overwrite_eexisting_field", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Yearly_mainntenance_on_Jan_1_from_Midnight_to_3_AM", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_SnapshotRestore", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updated_setuid_field", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestTrackerrRecordFlappingDisabled", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifierNoAccidentalMatches", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/drive_letter", "github.com/elastic/beats/v7/libbeat/processors/TestConditionRuleInitErrorPropagaates", "github.com/elastic/beats/v7/libbeat/conditions/TestHasFieldsMultiFieldPositiveMatch", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings/outpu", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult/sear", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/invalid_no_value__field", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode/empty_fields", "github.com/elastic/beats/v7/heartbeat/security/TestSystem", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/missing_metadata", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult_empty", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defaault_ilm_default", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCounting", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int_1_to_innteger", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint_1_to_long", "github.com/elastic/beats/v7/heartbeat/beater/TestMakeESCl", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus/not_match_single_va", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_String", "github.com/elastic/beats/v7/libbeat/conditions/TestClosedRangeConditionPositiveMatch", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/size_below_hash_limit", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParser", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_x_to_i", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/setuid_and_setgid_set", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:1000:\\u", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_wrong_trim_mode", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestClientSimpleEventTTL", "github.com/elastic/beats/v7/libbeat/processors/timeseries/TestTimesSeriesHashes/simple_fields", "github.com/elastic/beats/v7/libbeat/processors/actions/TestInvalidJSON", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup/assert_a_harvester_panic_is_handled", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/map[string][]strinng_to_mapstr.M", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_429", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteAtOverwrites", "github.com/elastic/beats/v7/heartbeat/cmd/TestRootCmdPlugins/http_plugin", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReplaceFieldsTrue", "github.com/elastic/beats/v7/libbeat/monitoring/report/log/TestStartStop", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScann", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/more_output_hosts", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MultipleCharCustomDelimiterMessageWithoutBoundaries", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestTLSInvalidCert", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters/no_pparameters", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_Enabled/templatess_and_ilm_disabled", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasKey/no_leave_node", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_strings", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Jully", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestMakeClieentParams", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestOneHostSuccessResp_Bulk", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestES2StyleExtendedErrrorStatus", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorTagOnFailure", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_27", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:191:\\u003", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int8", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_pod_without_container_id", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(40):_k:m:s_a_-\\\\u003e_9:5:24_AM", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestConfigWithCustomBuilders", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/custom_uint64_type_ok", "github.com/elastic/beats/v7/libbeat/mapping/TestF", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_root-level_dot-keyy_from_metadata", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestES2StyleErrorStatus", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking/partial_ACKs", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseHeader/RfcDoc__6.5_Example2:\\u003c165\\u003e1_2003-08-24T05:14:15.000003-07:00_192.0.2.1_myproc__8710_-_-_%%_It's_time_to_make_the_do-nuts.", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Sttop/timeout", "github.com/elastic/beats/v7/filebeat/input/v2/TestPlugin_Validate/valid", "github.com/elastic/beats/v7/libbeat/processors/cache/TestMemStore/ensemble", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_502", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/unspecified", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestReaderGrou", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestOverwriteFalse", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/icmp_without__typecode", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_511", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestInitialization", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/append_to_tags", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_-0x112_to_integer", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestEncodeEntry", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udpp4", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit/rate_2_per_sec", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run/remove_empty_values_form_output_-_'ignore_empt", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/recursive", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/ES_==_7.9.0", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/192..168.1.218_-\\u003e_foo_:_", "github.com/elastic/beats/v7/filebeat/channel/TestRunnerFactoryWithCommonInputSetttings/new_processors_each_time", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_OpenClose", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-false", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/size_ovver_hash_limit", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_29", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel/wwhen_unsupported_configuration_is_passed", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/processor/TestProcessorWithCloser", "github.com/elastic/beats/v7/libbeat/common/match/TestExactMatchers", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestNewInstanceUUID", "github.com/elastic/beats/v7/libbeat/processors/util/TestConfigGeoEnabled", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/no_flaggs", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go/some_wor", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/impliccit_target", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionWithMapStr/to_mapstr", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint32_1_to_integer", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/with_match", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_Enabled/templatess_only", "github.com/elastic/beats/v7/heartbeat/config/TestDefaults", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestOneHost503Resp_Bulk", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns/ANSIC", "github.com/elastic/beats/v7/libbeat/common/acker/TestEventPrivateReporter", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIfRemoved/prospector_init_with_clean_removed", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_204_using_urls_config_field", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestInputManager_Create/does_not_start_an_input_with_duplicated_ID", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/hosttname", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_no_processor_for_lightweight_monitor/event.data_stream", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineT", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeJSONFieldsCheckkConfig", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestGrowWindowSizeToMaxOKOnly", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/load_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_16", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/no_key", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestStateLooaderRetry/should_honour_the_configured_number_of_attempts_when_fails_with_retryaable_error", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceRun/replace_with_zero", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestGetMacAddresss", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldAlreadyExist/with_prefix", "github.com/elastic/beats/v7/libbeat/processors/actions/TestArrayWithInvalidArray", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_uint64_masked", "github.com/elastic/beats/v7/heartbeat/monitors/TestChannelWait/100_wait_signals", "github.com/elastic/beats/v7/libbeat/common/acker/TestEventPrivateReporter/droppeed_event_is_acked_immediately_if_empty", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper/use_wait", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestMonitoring", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCountin", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_0x_to_in", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Put_@metadata", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestMetadataTarget", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateChan_SendR", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_29", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/TTL_=_-1_means_not_expiring", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(80):_yyyy-MM-ddd'T'HH:mm:ss.SSS'Z'_-\\u003e_2017-01-02T04:06:07.123Z", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(75):_--=++,_!/??\\\\[]{}@#$%^\\u0026*()_-\\u003e_--=++,_!/?\\\\[]{}@#$%^\\u0026*()", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseStructuredData/RfcDoc635Exampl", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/+0700", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkRequestHasFiltterPath/Single_event_with_response_filtering", "github.com/elastic/beats/v7/libbeat/common/TestDeDotJSON", "github.com/elastic/beats/v7/libbeat/processors/actions/TestRenameField", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/ignoore_empty_value_is_false", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_fields__match", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/empty_fields", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int64_1_to_long", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy/fail", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint64_min", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestMakeClientWorker/network_client", "github.com/elastic/beats/v7/libbeat/processors/TestSafeWrap/does_not_wrap_a_non-clo", "github.com/elastic/beats/v7/libbeat/common/TestConvertNestedMapStr", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Positivve_with_negative_check_where_all_positive_pattern_matches_and_none_negative_checkk_matches", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNodePodUpdater/no_pods", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(53):_ffffff_-\\uu003e_123", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/missing_ffield", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/test_down_status_41", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestRequestBuildingWiithCustomHost", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIffRemoved/prospector_init_with_clean_removed_disabled_with_entries", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/errors.Join,_alll_errors_are_ErrNonReloadable", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_valuee_allow_overwrite_but_get_error", "github.com/elastic/beats/v7/filebeat/input/log/TestMatchesMeta", "github.com/elastic/beats/v7/libbeat/outputs/TestHostsNumWorkers/worker_set", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportCloosedOnWriteReadError", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/runner_exis", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort/plain", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_disaabled_ilm_disabled_loadMode_Force", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/ListEnabledInputs//all_inputs_disabled", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceField", "github.com/elastic/beats/v7/filebeat/input/syslog/TestIsRFC5424", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestOneHostSuccessResp", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/z+00:00", "github.com/elastic/beats/v7/heartbeat/monitors/TestSimpleWait/50_wait_signals", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/file_wa", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestProjectBrowserJob/simple", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(25):_xxxx.w.E_--\\u003e_2015.1.Wed", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/apply_mapping", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/supports_a_regexp_fi", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/setgid_set", "github.com/elastic/beats/v7/libbeat/common/TestGetUpdatesLastAccessTime", "github.com/elastic/beats/v7/libbeat/common/reload/TestApplyOptions", "github.com/elastic/beats/v7/libbeat/processors/decode_xml/TestXMLToDocumentID", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/simplee_field_gzip_decompress_in_place", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus/match_single_value", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGenerateCheckConfig/invalid_config", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonCond", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCountting/non-transparent,_octet,_non-transparent", "github.com/elastic/beats/v7/libbeat/TestHTTPOverNamedPipe", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_IPs_fieeld_single_match", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/empty/Delete", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMeta", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfigForDataType/misssing_data_type", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/no_drrive_letter", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest6_Not_a_SID", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_nested_map_from_fields", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int64_1_to_integer", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestWithConfig", "github.com/elastic/beats/v7/libbeat/processors/actions/TestArrayWithArraysDisabled", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_Falsse_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/cache/TestMemStore/new_put", "github.com/elastic/beats/v7/libbeat/processors/add_data_stream/TestAddDataStream", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/no_datastream", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilCRLFOK", "github.com/elastic/beats/v7/libbeat/processors/actions/TestExpandKeys", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/leading_zero", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_21", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestDefaultConfigUnpack", "github.com/elastic/beats/v7/libbeat/common/acker/TestEventPrivateReporter/privatte_of_dropped_events_is_included", "github.com/elastic/beats/v7/heartbeat/scheduler/timerqueue/TestRunsInOrder", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_Helper_WithWrongPanic", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_59", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs__XX", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-eelse-if", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_417", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/valid", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appeendValues", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestValidateBeatConfig/blank", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestGenerateMeetaDockerWithDedot", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadAtOK", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int_max", "github.com/elastic/beats/v7/heartbeat/monitors/TestChannelWait", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int8_max", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/TestToOtel", "github.com/elastic/beats/v7/libbeat/conditions/TestOpenRangeConditionPositiveMattch", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestMakeRepoorter", "github.com/elastic/beats/v7/filebeat/channel/TestCloseOnSignalClosed", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectNoData", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsTrue/replace_fields=true_with_host.name_and_host.id", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonCondition", "github.com/elastic/beats/v7/libbeat/common/TestPutIfAbsent", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_TILDE", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_x_to_integer", "github.com/elastic/beats/v7/libbeat/common/TestConvertNestedStruct", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/bad_adddrs", "github.com/elastic/beats/v7/libbeat/processors/actions/TestBadConfig/no-regex", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_a_harvester_can_be_stopped_and_removed_from_bookkeeeper", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_101_using_urls_config_field", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/url", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseStructuredDataa/RfcDoc635Example5:\\u003c165\\u003e1_2003-10-11T22:14:15.003Z_mymachine.example.ccom_evntslog_-_ID47_[sigSig_ver=\\", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestConfigWWithCustomBuilders", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFromFileeInfoHash/file_grows_before_hashing", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestOp_Execute/ACK_only_subset_of_pending_ops_will_only", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_41", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int16_min", "github.com/elastic/beats/v7/libbeat/autodiscover/appenders/config/TestGenerateApppender/Appender_without_a_condition_should_apply_the_config_regardless", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestFieldFormatMatcher", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-eelse-true", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestRecursivve", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissectConversion", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkPrivate/match", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/create_tags", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCommonPaths/supports__a_metadata_field", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailDeadLetterIndex", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash/failed_hash", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/out_of_range_mapping", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_UpdateTTL/update_TTL_for_in-sync_resource_does_no", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy/policy_already_exists", "github.com/elastic/beats/v7/heartbeat/scheduler/timerqueue/TestStress", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_114", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestOp_Execute/acking_multiple_ops_applies_the_la", "github.com/elastic/beats/v7/filebeat/input/v2/TestPlugin_Validate/missing_manageer", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBa", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLineMessageWithoutBoundaries", "github.com/elastic/beats/v7/libbeat/autodiscover/meta/TestStoreNil", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_65", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ES_\\u", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/protocol_numbber", "github.com/elastic/beats/v7/dev-tools/mage/TestPackageTarGz", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigUnderElasticAgent", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_OpenClose/fail_if_persistent_store_can_not_be_accessed", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_200_using_hosts_config_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u003c34\\u003eOct_11_", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteNetUint16At", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udpp", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseStructuredDataa/RfcDoc635Example4:\\u003c165\\u003e1_2003-10-11T22:14:15.003Z_mymachine.example.ccom_evntslog_-_ID47_[_exampleSDID@32473_iut=\\", "github.com/elastic/beats/v7/heartbeat/monitors/TestSyncPipelineWrapper/one_cont", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/executabl", "github.com/elastic/beats/v7/filebeat/generator/fields/TestFieldsGeneratorKnownLimitations", "github.com/elastic/beats/v7/filebeat/input/TestGetFactory", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_1", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/Test_intervalScheduler_Next/one_secon", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFromFileInfo", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/NetString_supports", "github.com/elastic/beats/v7/heartbeat/look/TestTimestamp", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportCloosedOnWriteReadError/tcp", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestGCSto", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveNewEventsConcurrrently", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test0_S-1-5-7", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestRetryLighhtweightMonitorDuration", "github.com/elastic/beats/v7/filebeat/generator/fields/TestRemoveProcessor", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_value_allow_ov", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPid", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MaxBufferSizeSet", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_strinng_from_nested_key_nested.message_to_top_level_field_message_copied", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveDescription/ES_\\u003e_7.9.0", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashingTimeFields/IST", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestTargetField/nested", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiiredFields", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveRegisteredDomainProcessor", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestBadProcess", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/a_root-level_dot-key_from", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithG", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilCRLFOnlyCRThenCRLLF", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRun/replace", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/does_not_emit_events_for_empty_files/issues_a_debug_mes", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/igmp", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/missing_fiield", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFingeerprint/fingerprint_to_fingerprint_fails", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillDrop", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestInvalidConfig/invalid_encoding", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=true/with_input=true/custom_parent=true/public_metrics=false", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestAsyncStructuredEvent", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestShrinkWindowSizeNeverZero", "github.com/elastic/beats/v7/libbeat/common/TestJanitor", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfigInvalid", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_45", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_no_user_configured_ID/plugin_with_no__user_configured_ID_with_id:_my_test_plugin::.global::my_test_plugin::my_id", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_34", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/no_dattastream", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_ordered", "github.com/elastic/beats/v7/libbeat/common/acker/TestConnectionOnly/passes_ACKs_if_not_c", "github.com/elastic/beats/v7/filebeat/fileset/TestAppendWithoutDuplicates", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/detects_a_new_file", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_205_using_hosts_config_field", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_New", "github.com/elastic/beats/v7/libbeat/outputs/console/TestConsoleOutput/single_jsoon_event_(pretty=true)", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCompressionIsOnByDDefault", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_304_using_urls_config_field", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/oon_error_with_error", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/new_ffile", "github.com/elastic/beats/v7/libbeat/dashboards/TestReplaceIndexInDashboardObject", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_53", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_cleanEmptyValues", "github.com/elastic/beats/v7/filebeat/channel/TestSubOutlet", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestInterfaceCConfigsUnpack", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus/not_mmatch_multiple_values", "github.com/elastic/beats/v7/filebeat/input/filestream/TestValidateInputIDs/duplicated_IDs", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo/don't_run_more_than_limit_goroutines", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_a_harvester_is_started_in_a_goroutine", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/ignore_right__padding", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestIpPortIndexer", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/uuser_local_fields_overwrite_user_global_fields", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_ints", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigDeefault", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_0", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/fail_unnpacking_config", "github.com/elastic/beats/v7/libbeat/conditions/TestContainsMultiFieldPositiveMatch", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_should_yield_no_processor_f", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/non-coompliant_rfc3164_date_with_leading_0:\\u003c123\\u003eSep_01_02:03:04_hostname:_messsage", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestNewInstance", "github.com/elastic/beats/v7/libbeat/processors/actions/TestMimeTypeFromToMetadatta", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestUnpack/raw_bytes", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestReloader", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestACLText", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/simple_error", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestErrorOnInvalidSocketType", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCgroupRegex/podman", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/temp", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_10", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack/array_vallues", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValida", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSeverity", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_36", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestEventFormatStringFromConfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_80", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_cleanEmptyValues/arrray_with_no_empty_values", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/192.168.1.", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AvailAndLenConsiderRead", "github.com/elastic/beats/v7/libbeat/conditions/TestContainsMultiFieldPositiveMattch", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFilter/only_selected", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNode_iisUpdated/if_meta_changes_then_it_should_return_updated", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestErrorOnEmptyLineDelimiter", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_017_to_long", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestS", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/single_space_right", "github.com/elastic/beats/v7/libbeat/mapping/TestDynamicYaml/invalid_setting", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestNormalization/no_sharing_if_n", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/witthout_ilm_must_be_lowercase", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizer", "github.com/elastic/beats/v7/heartbeat/ecserr/TestEcsErrNewWithStack", "github.com/elastic/beats/v7/heartbeat/monitors/TestSimpleWait", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_Get/access_unknown_resource", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/mappings__type_mismatch", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/nil_error_is_not_re", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint8_min", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_23", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv4_mapped_on_ipv6:\\u003", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/more_reportter_hosts", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIsValidAddress/too_short", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/moved", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/key_not_in_fieldds,_but_parent_node_in_fields_and_of_type_object", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_C", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-errror#01", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_DEELETE_cutset_in_UTF-8_input", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestDecode/0", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_July", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec/html_escaping_enabled", "github.com/elastic/beats/v7/filebeat/fileset/TestAdaptPipelineForCompatibility/EES_\\u003e=_7.0.0", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestTimestampFormatString", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-eelse-false-single-processor", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/more_reporter_hosts", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob/successfully_unpacks_str", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/OSS_release_of_Elas", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AppendOnFixedLater", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestPublish", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchContainer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_34", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_307_using_hosts_config_field", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/bad_addrs", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_t_too_boolean", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_2", "github.com/elastic/beats/v7/libbeat/conditions/TestRegxpCreate", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestOp_Execute/", "github.com/elastic/beats/v7/filebeat/input/filestream/TestDateSorter/one_fileinfo", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestGlobalConnectCallbbacksManagement", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigGeoEnabled", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/trim_all_space", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup/assert_a_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent3164/vaalid_data", "github.com/elastic/beats/v7/libbeat/api/npipe/TestIsNPipe/return_true_on_named_pipe", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_IsNew", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestConverter/test_loocal_queue_setting_is_promoted_to_global_level", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/fail_on_iinvalid_format_string", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveURIPartsProcessor", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_6", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestRetryLightweightMonitorDuratio", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-else-true", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestGenerateHinttsWithPaths", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasKey", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestShrinkWindowSizeNeverZeero", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=false/with_input=true/custom_parent=true/public_metrics=false#01", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_31", "github.com/elastic/beats/v7/libbeat/common/TestBytes_Ntohl", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure/type_is_missing", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissectConversion/Greeedy_padding_skip_test_-\\u003e", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestInvalidSocketType", "github.com/elastic/beats/v7/libbeat/licenser/TestLicenseUnmarshal/active_enterprise", "github.com/elastic/beats/v7/libbeat/cfgfile/TestCfgFileSorting", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/unbrracketed_ipv6", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:191:\\u003c191\\u003e1_2003-10-11T22:14:15.003Z_mymachine.exxample.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int64_min", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBackoffFunc/15_retries", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-debug", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_fields__negative_match", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_OpenClose/load_from_empty", "github.com/elastic/beats/v7/filebeat/fileset/TestEvaluateVarsMySQL", "github.com/elastic/beats/v7/libbeat/common/cleanup/TestIfBool/IfNot_runs_cleanup", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/invaliid_data_-_do_not_fail", "github.com/elastic/beats/v7/libbeat/common/schema/TestHasKey", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_user_configured_ID", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCCEMetadata", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_strinng_from_fieldname_with_dot_to_message_copied", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(65):_fffffffff__-\\u003e_000123", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/deffined_fileset", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/exeecutableObject_macho_go", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_10", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CreateAnddRun/runner_can_correctly_start_and_stop_inputs", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrString/empty", "github.com/elastic/beats/v7/libbeat/autodiscover/appenders/config/TestGenerateApppender/Appender_with_a_condition_check_that_fails", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_value_type_from_fields", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestHTTPSx509Auth", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_28", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobConts/multi--job-continuations", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/wwith_client_processor", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:20:\\u003c20\\u003e1_2003-10-11T22:14:15.003Z_mymachine.exammple.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetwor", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveDescription", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/use_event_ffield", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_38", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestSimpleJob", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_68", "github.com/elastic/beats/v7/libbeat/common/schema/TestNotFoundKeys", "github.com/elastic/beats/v7/libbeat/common/TestIsLoopback_false", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_88", "github.com/elastic/beats/v7/libbeat/processors/cache/TestMemStore/new_get", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestAsyncSimpleEvent", "github.com/elastic/beats/v7/libbeat/processors/timeseries/TestTimesSeriesHashes", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv/Without_setting_eenv", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/no_drive_letter", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFields/ordeer_2", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestDeferreedStateLoaderTimeout", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_bool_true_to_in", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topic_must__keep_case", "github.com/elastic/beats/v7/libbeat/processors/cache/TestMemStore/new_delete", "github.com/elastic/beats/v7/filebeat/input/log/TestInputLifecycle/context_done", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_87", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Check__relay_+_ipv6:\\u003c13\\u003eFeb_25_17:32:18_2607:f0d0:1002:51::4_Use_the_Force!", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule_Unpack/one_mi", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/missiing_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_30", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_84", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(74):_fffffffff__-\\u003e_000000123", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_413", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestDecode/3", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udpp4/Sending_a_message_over_the_MaxMessageSize_limit_will_truncate_the_message", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestOverwriteTrue", "github.com/elastic/beats/v7/libbeat/processors/actions/TestRenameRun", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_with_nanosecond:Oct_11_22:", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestEventNormalizationOOverride", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_UpdateTTL/update_TTL_for_resource_with_pending_updates", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_4", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillAll", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/numeric_string_invalid_hex", "github.com/elastic/beats/v7/libbeat/common/TestGetUrl", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_7", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/-07:00", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=false/with_input=false/custom_parent=false/public_metrics=false", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverHash", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultProcessorStartup", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/timestamp", "github.com/elastic/beats/v7/filebeat/input/syslog/TestWhenPriorityIsNotSet", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestOp_Execute/ACK_onnly_subset_of_pending_ops_will_only_update_up_to_ACKed_state", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiUintEmpty", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16AtInRangee", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/test_down_status_43", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestUnpackCopiesDDefault", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCancellledEvents", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/ReadRandomLargePayload", "github.com/elastic/beats/v7/libbeat/outputs/TestHostsNumWorkers", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt/bad_scheme", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestConfigLeaseFields", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDss/pid_is_not_containerized", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus/not_mmatch_single_value", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_206_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTargetMetadata", "github.com/elastic/beats/v7/libbeat/kibana/TestParseJSON", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/boolean", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/no_change", "github.com/elastic/beats/v7/libbeat/common/TestDeleteExpiredKey", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_25", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec/float_undefined_values", "github.com/elastic/beats/v7/libbeat/processors/TestIncludeFields1", "github.com/elastic/beats/v7/libbeat/autodiscover/appenders/config/TestGenerateApppender", "github.com/elastic/beats/v7/libbeat/instrumentation/TestInstrumentationConfigListener", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(82):_yyyy-MM-ddd'T'HH:mm:ss.fffffffffz_-\\u003e_2017-01-02T04:06:07.123-08:00", "github.com/elastic/beats/v7/filebeat/input/container/TestNewInputDone", "github.com/elastic/beats/v7/libbeat/beat/TestUserAgentString/managed-unprivileged", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_all", "github.com/elastic/beats/v7/filebeat/input/filestream/TestNumericSorter", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadQueryResult_invalid", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestOverwriteKeys/fail_byy_default_if_key_exists", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputEnabled", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_OpenClose/", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/withouut_match", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/witth_ilm_must_be_lowercase", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNewDropFields/returnss_error_when_regexp_field_is_badly_written", "github.com/elastic/beats/v7/libbeat/features/TestNewConfigFromProto", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestInvalidConfig", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_017__to_integer", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/Test_intervalScheduler__Next/one_minute", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedTaskLimits", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_431", "github.com/elastic/beats/v7/libbeat/processors/actions/TestIncludeFields", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv/Multiple_values_wwith_spaces", "github.com/elastic/beats/v7/filebeat/input/TestAddFactoryTwice", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFaiilConnectUnknownAddress/tcp/socks5", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField_String", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateWriter", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestMonotonicTimestamp", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint32_1_to_long", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar/when_we_have_no_chars_to_re", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiiredFields/one_mutually_exclusive_field_is_present_in_the_configuration", "github.com/elastic/beats/v7/libbeat/beat/TestUserAgentString/unmanaged-unprivileged", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/invalid_key_type", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/SetErrorWithOption", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDss/pid_does_not_exist", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/add_nested_labels", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint8_1_to_float", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/without_match", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrString/forty_two", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_f_too_boolean", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Only_neegative_check_where_pattern_matches_HTTP_return_body", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_max", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns/UNIX_MS", "github.com/elastic/beats/v7/libbeat/common/acker/TestConnectionOnly/ignores_ACKss_after_close", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_minn_uint32,_partitions_12", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigUnderElasticAgent/toopics_is_provided", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint_max", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeTime", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrSliceBool", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServiceEventer_NamespaceWatcher/add_resourc", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/do_nott_truncate_bytes_of_short_byte_line_with_multibyte_runes", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_cuutset_in_UTF-8_input", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestFieldMatcher", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_43", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/test_down_status_45", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_100", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCertExpirationMet", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/f", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetMimeType/docx", "github.com/elastic/beats/v7/heartbeat/monitors/jobs/TestWrapAll/continuations_multi-wrap", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/Z+00", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Put", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_0", "github.com/elastic/beats/v7/libbeat/conditions/TestMultipleOpenRangeConditionNeggativeMatch", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CheckConffig", "github.com/elastic/beats/v7/filebeat/beater/TestFetchInputConfiguration", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvent_Service", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_105", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/tokenizer_withh_no_field_defined", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int8", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstPublish", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/split_data_stream", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Get", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_74", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simplle_field_bad_data_-_fail_on_error", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/invalid_file", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(17):_xx.w.E_-\\uu003e_15.1.Wed", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFingeerprint/path_to_fingerprint_succeeds", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_Get/acce", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestOp_Execute", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/America/Neew_York", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/with_mmatch", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(43):_kk:mm:ss_aaa_-\\u003e_21:05:24_PM", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_102_using_hosts_config_field", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_NotMatchesInput/plugin_with_user_configured_ID/plugin_with_useer_configured_ID_with_id:_my_test_plugin-other-id::my_id", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/non-existiing_location", "github.com/elastic/beats/v7/heartbeat/config/TestDefaults/ICMP_monitor_override", "github.com/elastic/beats/v7/libbeat/cfgfile/TestReloadStartStopConfigs", "github.com/elastic/beats/v7/libbeat/processors/TestMultipleIncludeFields", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestRemove", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/only_outputt_hosts", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArgv/test", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestErrorMissingPath", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestEmptyElement", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-warrn", "github.com/elastic/beats/v7/libbeat/processors/util/TestConfigGeoEnabled/Check_of_city_name", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_Init/stoppping_the_taskgroup_kills_internal_go-routines", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_110", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_301_using_hosts_config_field", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIffRemoved/prospector_init_with_clean_removed_enabled_with_entries", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_12", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestDeadLetterIndexPollicyConfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_83", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/invalid_tag_value", "github.com/elastic/beats/v7/libbeat/cfgfile/TestReloadStopConfigs", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCountting/octet_counting", "github.com/elastic/beats/v7/filebeat/input/syslog/TestProgram/is_not_set", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadRuneEOFCheck", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/n", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPipelineSelection//no_pipline_configured", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_4", "github.com/elastic/beats/v7/libbeat/common/file/TestEventFormatString", "github.com/elastic/beats/v7/libbeat/processors/add_data_stream/TestAddDataStream/simple", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDurationn", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/exeecutableObject_macho_garble", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_13", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadUnreadByteErrCheck", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiredFields/one_mutually_exclusive_fie", "github.com/elastic/beats/v7/heartbeat/monitors/TestDurationWait", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDeliimiter/Delimiter_end_of_string", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/ccomplex", "github.com/elastic/beats/v7/libbeat/api/npipe/TestIsNPipe", "github.com/elastic/beats/v7/libbeat/common/acker/TestCombine/AddEvent_distributes", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/valid_hashes", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestCheckNilDoesntPanic", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/mb_chars/all_byte_prefix", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHasPriority", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvent_No", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestUserAgentHeader/libbeat-fallback", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestResetableLLimitedReader", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_112", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestConfigWithIncorrectScope", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/different_tarrgets", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigAcceptValid/lz4_with_1.0", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecconnectsOnConnect/tcp/socks5", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/wrong_field_value_type", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfig", "github.com/elastic/beats/v7/filebeat/input/filestream/TestTakeOverTags/test-takee_over-true", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_2", "github.com/elastic/beats/v7/filebeat/fileset/TestInterpretError/bad_json", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ErrorHandling", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int16_1_to_double", "github.com/elastic/beats/v7/libbeat/processors/TestIncludeFields", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_config_mixxing_object_type_and_object_type_params", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasKey/empty_fields", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing", "github.com/elastic/beats/v7/filebeat/beater/TestACKer/both", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestDecode/2", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_Helper_AssertOutput", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestKeySelection/key_configured", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float64_1_to_float", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_0.0..0.0_to_ip", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn/Do_Not_Fail_On_Missing_Key_Error", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestSocks5Job/not_usinng_local_resolver", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestWithConfig/hello_world", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewMetadata", "github.com/elastic/beats/v7/libbeat/common/: TestTimeString", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_102_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/features/TestFQDN/FQDN_enabled", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCertFields", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRunInParallell", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestRequestBuildingWithCustomHost", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstOp_Execute/applying_final_op_marks_the_key_as_finished", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLineLargeMessagePayload", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestECSErrors/on_non-summmary_event", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper//wait_on_channel_stop", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar/when_we_have_multiple", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_True_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/add_dotted_label", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/scheme://url:port", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_18", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_dissect", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfigEvalSymlinks", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestLogstashTCP", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/custom_uint64_type_masked", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/t", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_365.0.", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestUsingCacche", "github.com/elastic/beats/v7/filebeat/input/filestream/TestTakeOverTags", "github.com/elastic/beats/v7/libbeat/conditions/TestExtractBool", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure/unknown_type", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Check_relay", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/missing_fieldds", "github.com/elastic/beats/v7/filebeat/input/redis/TestNewInputDone", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCEMetadataInK8sNo", "github.com/elastic/beats/v7/heartbeat/monitors/TestSyncPipelineWrapper/multiple_conts", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/missing_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/versionTest_v:100:\\u003c34\\u003e100_2003-10-11T22:14:15.003Z_mymachine.exxample.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestOverwriiteFalse", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_14", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClient", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-errror", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/: TestReceiveEventsAndMetadata/MultipleCharCustomDelimiterMessageWithoutBoundarie", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_32", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/missing", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt/https_plain", "github.com/elastic/beats/v7/libbeat/TestTemplate", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Sttop", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFields/dupllicates_ignored", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestStateLoaderRetry/should_honour_the_conf", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/custom_uint64_typee_ok", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadQueryResult_invaliid", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/bbeat_local_and_user_global_fields", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestExplicitCompressioonLevelOverridesDefault", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_metric_type", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo/workloads_wait_for_available_worker", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestConverter/test_faailure_if_unsupported_config_is_provided", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Sepptember", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_39", "github.com/elastic/beats/v7/filebeat/input/filestream/TestConfigValidate", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportReconnectsOnConnect", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiiredFields/no_mutually_exclusive_field_is_present_in_the_configuration", "github.com/elastic/beats/v7/libbeat/instrumentation/TestInstrumentationConfigExplicitHosts", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/indirect_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_31", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields/with_origin", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest3_S-1-5-32-544", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper//wait_after_stop", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTargetOption", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/omit_empty", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobNoConts/multi-job", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/new_file", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_33", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigAcceptValid/lz4_with_0.11", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/nil_error_is_noot_retriable", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defaault_loadMode_Force_ilm_disabled", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_-0x12_to_long", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/truncaate_bytes_of_too_long_byte_line", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/boolean", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Yearly_mainntenance_on_Jan_1_from_Midnight_to_3_AM/does_not_match_2025-01-01T03:30:00Z", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityResult/E", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/net/TesttNetIsIPvN", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs__?type=FOO", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClientWaitClose/ACKinng_events_unblocks_WaitClose", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/alternative", "github.com/elastic/beats/v7/heartbeat/monitors/TestSyncPipelineWrapper/simple", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_53", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuratioon/1.001s_format_as_milliseconds", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestWait", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDu", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionWithMapStr/from_ma", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorHarvesterUpddateIgnoredFiles", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestLoaderDDBKey", "github.com/elastic/beats/v7/filebeat/fileset/TestApplyOverrides/input_overrides", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/E", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/c", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/without_match", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFFilter/only_selected", "github.com/elastic/beats/v7/filebeat/fileset/TestGetBuiltinVars", "github.com/elastic/beats/v7/libbeat/common/cli/TestConfirm/Test_No", "github.com/elastic/beats/v7/libbeat/conditions/TestOpenGteRangeConditionNegativeeMatch", "github.com/elastic/beats/v7/libbeat/conditions/TestRegexpCondition", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDs/pid_does_not_exist", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simplle_field_base64_decode", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/tru", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSetting/checkRemoved6xSetting", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_5", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedJobRun", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadPassword/Test_unknown_method", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrSliceInt", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplic", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_NotMatchesInput/plugin_with_user_configured_ID", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestEncoding/base32", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestProcessorStringer", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonCondition/Negative_", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeerPluginOrder/two_attempts", "github.com/elastic/beats/v7/libbeat/processors/actions/TestBadConfig/no-error_zero_string", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updatted_hashes_and_metadata", "github.com/elastic/beats/v7/libbeat/processors/TestSafeWrap/wraps_a_closer_proceessor", "github.com/elastic/beats/v7/libbeat/autodiscover/meta/TestStore", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/empty/GetValue", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/with_ratte_limit", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_45", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputEnabl", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProccessor_String", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/simple-http", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_uint_type", "github.com/elastic/beats/v7/filebeat/input/v2/TestPlugin_Validate/invalid_stability", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simplle_field_base64_decode_To_empty", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_UpdateTTL/aadd_TTL_for_new_entry_to_store", "github.com/elastic/beats/v7/libbeat/autodiscover/TestNilAutodiscover", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/suppports_metadata_as_a_target", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstGCStore/old_state_but_resource_is_accessed", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileIdentifier/path_iddentifier", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileIdentifier", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_VarLibKu", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_MatchesInput/plugin_with_no_user_configured_ID/pl", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=true/with_input=true/custom_parent=true/", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_21", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(72):_fffffff_-\\\\u003e_0000001", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Positive_with_negative_check_where_positive_and_ne", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityResult/Priori", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_45", "github.com/elastic/beats/v7/heartbeat/config/TestDefaults/HTTP_monitor_override", "github.com/elastic/beats/v7/libbeat/conditions/TestHasFieldsSingleFieldNegativeMMatch", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedTaskLimits/runs_100_w", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveURIPartsProcessor/ES_\\u003c_7.12.", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/supports_metadata_as", "github.com/elastic/beats/v7/libbeat/processors/checks/TestAllowedFields", "github.com/elastic/beats/v7/heartbeat/monitors/Test_runPublishJob/simple", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiMatchOK", "github.com/elastic/beats/v7/libbeat/processors/add_id/TestNonDefaultMetadataTargget", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_13", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/custom-policy-file", "github.com/elastic/beats/v7/heartbeat/scheduler/TestScheduler_Stop", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNanosecondParsing/5555", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestKeySelection", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/Finished_and_TTL_set_to_0", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/ES_\\u0003c_7.13.0:_replace_with_grok", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_booll_true_to_integer", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestConfiigValidate_LogsPatchMatcher", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestSecureMungedMACAddress", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run/test_f", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestUnpack/friendly_human_value", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestExpiredHTTPSServeer", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdateedFiles/two_new_files", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissectConversion/Convert_1_value", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestVisitOrdder", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWSMetadataEC2/valid_instance_identity_document,_no_cluste", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttExpirationMetadata/Missing_not_before", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_6", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/propagates_Run_to_a_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Maar", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_1", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/double_invalid", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestReaderGroup/assert_new_key_is_added,_can_be_rem", "github.com/elastic/beats/v7/libbeat/cfgfile/TestDiagnostics", "github.com/elastic/beats/v7/filebeat/input/TestAddNilFactory", "github.com/elastic/beats/v7/filebeat/beater/TestACKer", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/ignore_EErrUnknown", "github.com/elastic/beats/v7/filebeat/channel/TestRunnerFactoryWithCommonInputSetttings", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert/mode", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/no_hosts", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEv", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_disa", "github.com/elastic/beats/v7/libbeat/TestSystem", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CheckConffig/fail_if_input_type_is_unknown_to_loader", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/non-existing_metadata_su", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/numeric_string", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UnreadAfterEOFOK", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_removeDuplicates/cleean_up_integer_array_with_duplicate_values", "github.com/elastic/beats/v7/libbeat/common/acker/TestCombine/ACKEvents_distributes", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestCheckUp", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityRes", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/invalid_conversion", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=false/with_input=true/custom_parent=", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/file__watcher_and_file_identity_compatibility/returns_no_error_when_fingerprint_and_iddentity_is_configured", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_35", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float32_1_to_integer", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/happy_single_invalid", "github.com/elastic/beats/v7/filebeat/input/syslog/TestLoader_New", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simplle_field_bad_data_fail_on_error_false", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceStore_CleanIf/entries_are_cleaned_when_function_returns_true", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields/with_servic", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestApplyPresetNoConflicts", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNanosecondParsing/00012345", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/processor/TestNewProcessorDummyPro", "github.com/elastic/beats/v7/filebeat/fileset/TestAppendWithoutDuplicates/disableed_config", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestDeferreedStateLoader", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/non-recuursive", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Cancel", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSettings", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/a_value_type_from_fields", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType/html", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_203_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/supports_a_normal_fi", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/deep_nested_with_commmon_prefix", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/supports_meetadata_as_a_target", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUpEndpointJob/ipv66", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/put_memory", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2", "github.com/elastic/beats/v7/filebeat/beater/TestMatchRegistryFiles/", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/type_conflict", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_UTF-8_COONTROL_cutset_in_UTF-8_input", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_51", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField/string-slice", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort/dotted_domain", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiUintFailed", "github.com/elastic/beats/v7/libbeat/common/acker/TestLastEventPrivateReporter/drropped_event_without_private_is_ignored", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestPublish", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort/dot", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFromFileInfoHash", "github.com/elastic/beats/v7/libbeat/outputs/console/TestConsoleOutput/single_jsoon_event_(pretty=false)", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint16_min", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionWithMapStr", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/overwwrite_false", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns/RFC3339Nano", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSup", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/SingleCharCustomDelimiterMessageWithoutBoundaries", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestEventNormalizationOverride", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCgroupRegex/docker", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestSimpleJob/simple/ressult_at_index_0", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputEn", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_-1_to_integer", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_207_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint8_max", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_MatchesInput/plugin_with_user_configured_", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_202_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuration/1.", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/CustomDelimiter#01", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestExpiredHTTPSServer", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestAPIKeyEncoding", "github.com/elastic/beats/v7/filebeat/config/TestMergeConfigFiles", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAzureMetadata", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestSanitizeIPs", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_43", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/overwrite_true_IS", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/long/1_byte_prefix", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTestFunct", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/no__modules", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_19", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_Inv", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_int_type", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go/all_workl", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestErrorReporting", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestC", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(71):_ffffff_-\\uu003e_000", "github.com/elastic/beats/v7/libbeat/instrumentation/TestInstrumentationConfig", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Init", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNamespacePodUpdater/no_pods", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(23):_xxxx.ww.e__-\\u003e_2015.01.3", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_55", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasKey/has", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestMakeClientWorker/client", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_59", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/missing_key_in_list", "github.com/elastic/beats/v7/libbeat/features/TestDefaultSupport_Enabled", "github.com/elastic/beats/v7/libbeat/conditions/TestClosedRangeConditionPositiveMMatch", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(0):_y.M.d_-\\u0003e_6.8.1", "github.com/elastic/beats/v7/heartbeat/look/TestPreProcessors", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_values__multiple_IPs_no_match", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlowProcessors", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv6:__1:2:3:4:5:6:7:8:\\u003c13\\u003eFeb_25_17:32:18_1:2:3:4:5:6:7:8_Use_the_Force!", "github.com/elastic/beats/v7/libbeat/conditions/TestHasFieldsMultiFieldNegativeMaatch", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField/string", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with-bare-config", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_20", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_26", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_503", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestGenerateHintts", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfigRemoveDupllicates", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectFailed", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_x_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRun/append", "github.com/elastic/beats/v7/libbeat/common/TestReadString", "github.com/elastic/beats/v7/libbeat/autodiscover/template/TestConfigsMappingKeysstoreProvider", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestStateless_Run//capture_panic_and_return_error", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_value_type_from_metad", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilSymbolCont", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/long/all_byte_prefix", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_cleanEmptyValues/arrray_with_empty_values", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint64_1_to_long", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/merge_underr_root", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_UpdateTTL/update_TTL_for_resource_with_pending_updates", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_Run", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uintptr", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestOneHost500Resp", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityRResult/Priority_result_wins", "github.com/elastic/beats/v7/heartbeat/monitors/TestSyncPipelineWrapper/cancelled_cont", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/stateful-with--both-enabled", "github.com/elastic/beats/v7/heartbeat/cmd/TestRootCmdPlugins/tcp_plugin", "github.com/elastic/beats/v7/libbeat/kibana/TestTransformMultiField", "github.com/elastic/beats/v7/libbeat/common/T", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/if_", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCounting/o", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestMakeClientWorker", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/200_re", "github.com/elastic/beats/v7/libbeat/conditions/TestMultipleOpenRangeConditionNegativeMatch", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_otherr_day_for_4_hours/does_match_2025-02-08T09:30:00Z", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/+05:00", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(63):_fffffff_-\\\\u003e_000123", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedJobRun/context_cancelleed", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessor", "github.com/elastic/beats/v7/libbeat/processors/TestDropMissingFields", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Check__relay_+_ipv6:\\u003c13\\u003eFeb_25_17:32:18_2607:f0d0:1002:0051:0000:0000:0000:00004_Use_the_Force!", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_205_using_urls_config_field", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUnreachableEndpoinntJob", "github.com/elastic/beats/v7/libbeat/common/x509util/TestCertToPEMString", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestVisitError", "github.com/elastic/beats/v7/libbeat/common/TestMarshalUnmarshalArray", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestSkipAddingHo", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns/UNIX", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_451", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/unknown_protocol", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack/nested_keeys", "github.com/elastic/beats/v7/filebeat/config/TestReadConfig2", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizer/no_retries,_", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run//append_value_in_the_arrays_from_a_field_when_target_field_is_present_and_it_is_aa_scaler", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert/metadata_as_a_target", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestOnCreateHandler_SubscribeMulltiple_BackoffSucceeded", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/missing_field", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure/type_is_missiing", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/SetIggnoreInactiveSince/ignore_inactive_since_not_set", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_SendRecv/cancel_read", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestConvert", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(28):_K:m:s_a_-\\\\u003e_8:5:24_AM", "github.com/elastic/beats/v7/libbeat/beat/TestUserAgentString/managed-unprivilegeed", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSettings/checkRemovedSetting", "github.com/elastic/beats/v7/filebeat/fileset/TestEvaluateVarsNginxOverride", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_15", "github.com/elastic/beats/v7/filebeat/fileset/TestAdaptPipelineForCompatibility", "github.com/elastic/beats/v7/libbeat/outputs/TestReadHostList", "github.com/elastic/beats/v7/libbeat/processors/util/TestConfigGeoEnabled/Check_of_name", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestAtomicStateLoader", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/ignore_missing", "github.com/elastic/beats/v7/libbeat/common/acker/TestCounting/ack_count_is_passed_through", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_f_to_boolean", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDeliimiter/Empty_string", "github.com/elastic/beats/v7/libbeat/processors/dns/TestMiekgResolverLookupPTRTLS", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizerPluginOrder", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_config_mixxing_scaling_factor_and_object_type_params", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestOp_Execute", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/TestToOtelConfig/check_preset_config_translation/c", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestValidate", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_32", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIDConsecutiveOrdering", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/condition_comp", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_Helper_WithPanic", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProce", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/supports_metadata_as_a_target", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updated_metadata", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestFileParsers", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/leading_zero", "github.com/elastic/beats/v7/libbeat/common/acker/TestConnectionOnly/ignores_ACKs_after_cl", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntNegOK", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchemaCases/error_at_conveersion_case", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/ES_\\\\u003c_7.9.0", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/wrong_field_valuue_type", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_MatchesInput/plugin_with_no_user_", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/multiple_charrs", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Init/calls_all_input_managers", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/bool_false_to_boolean", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/versionTest_v:1000:\\u003c34\\u003e1000_2003-10-11T22:14:15.003Z_mymachine..example.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/beat/events/TestGetMetaStringValue/non_strinng", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs__?type=udp", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/control_space", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIsValidAddress/good", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_18", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ByteGetUnconsumed", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNewLeaderElectionManager", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveNewEventsConcurrently", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_52", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(77):_'plain'_'ttext'_-\\u003e_plain_text", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessors", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/subset_of_hashes", "github.com/elastic/beats/v7/libbeat/common/schema/mapstrstr/TestConversions", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizer/start_down,_st", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/rfc6587_framing_octet_embedded_newline", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Check_relay_+_ipv6:\\u003c13\\u0", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/TestToOtelConfig/check_preset_config_translation/", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/dissect_two_replacement", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/valid_metric_type", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_303_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/map[string][]string_", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/Expired_and_finishedd", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/multiple_object_tyype_configs", "TestDissect/when_the_deli", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetada", "github.com/elastic/beats/v7/libbeat/kibana/TestMissingVersion", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_17", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Numberr_inf_the_host:\\u003c164\\u003eOct_26_15:19:25_1.2.3.4_ASA1-2:_Deny_udp_src_DRAC:110.1.2.3/43434_dst_outside:192.168.0.1/53_by_access-group_\\", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(24):_xxxx.w.E_--\\u003e_2015.1.Thu", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTagOOnException", "github.com/elastic/beats/v7/libbeat/conditions/TestCreateNilCondition", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigGeoDiisabled", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateF", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_38", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_305_using_hosts_config_field", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestGCStore/state_is_still_alive", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestCleanOlderError", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/lowercase_constant_key", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/valid_source_port_0", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestGenerateHints", "github.com/elastic/beats/v7/filebeat/input/filestream/TestOnRenameFileIdentity/iidentifier_name_from_meta_is_kept", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServicceEventer_NamespaceWatcher/add_resource_metadata.namespace_disabled_and_hints_dissabled.", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDelimiter/Singl", "github.com/elastic/beats/v7/filebeat/beater/TestACKer/any_other_Private_type", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/Z+00:00", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint8Failed", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-inffo", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_Enabled/ilm_only", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_UpdateTTL/uupdate_TTL_for_in-sync_resource_does_not_overwrite_state", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailAll", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_T_too_boolean", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestGenerateProcessorLiist", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileIdentifier/path_identifier", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper/wait_on_channel_stop", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverDuplicatedConfiigConfigCheckCalledOnce", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(78):_'plain'_'''_'text'_-\\u003e_plain_'_text", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_New/duplicate", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_100_using_hosts_config_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent5424/vaalid_data", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_207_using_urls_config_field", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestValidate/network_udp4", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_fixed__length", "github.com/elastic/beats/v7/libbeat/common/acker/TestCounting", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_Var", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_InvalidSource2", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse", "github.com/elastic/beats/v7/heartbeat/monitors/Test_runPublishJob/multiple_contss", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkEncodeEventsWithOpType", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/expand_true", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonCondition/unparseable", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverWithConfigCheckFailures", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint64_min", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_11", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUpEndpointJob/ipv4", "github.com/elastic/beats/v7/heartbeat/ecserr/TestEcsErrNew", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestTrackerrRecord", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=true/with_input=false/custom_parent=true/public_metrics=false#01", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_uint64_ok", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/Specific_and_deffault_password", "github.com/elastic/beats/v7/libbeat/api/npipe/TestTransformString/with_windows_pipe_synt", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServiceEventer_NamespaceWatcher/add_resource_metadata_", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestNewInput_Run", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_shoould_yield_no_processor_for_lightweight_monitor/event.dataset_should_always_be_prresent,_preferring_data_stream", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_map_from_nested_key_message.original_to_top_lev", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit/with_fields", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedTaskLimits/runs_100_witth_limit_not_configured", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort/bad_scheme", "github.com/elastic/beats/v7/libbeat/processors/actions/TestExpandKeysWithTarget", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNanosecondParsing/5", "github.com/elastic/beats/v7/libbeat/beat/TestUserAgentString/managed-privileged", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_500", "github.com/elastic/beats/v7/libbeat/conditions/TestANDCondition", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestCheckDown", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CheckConfig", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_June", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/SingleCharCustomDelimiterMessageWithoutBoundaries#01", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestInterfaceCConfigsUnpack", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestTLSProxy", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrDouble/float664", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(44):_S_-\\u003e__1", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/withouut_match", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/unbracketed_ipv6", "github.com/elastic/beats/v7/libbeat/features/TestFQDN/FQDN_empty", "github.com/elastic/beats/v7/libbeat/common/TestSize", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/ListEnabledI", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/dynamicc_topic_standalone", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestErrorJob/job_error", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/happ", "github.com/elastic/beats/v7/libbeat/conditions/TestEqualsCreate", "github.com/elastic/beats/v7/filebeat/fileset/TestAdaptPipelineForCompatibility/EES_==_6.7.0", "github.com/elastic/beats/v7/filebeat/config/TestGetConfigFiles_File", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_source_IP", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_values_match", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestValidateBeatConfig/defaults", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=true/with_input=false/custom_parent=fa", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_1x2_to_", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/expannd_false", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestValidate/network_tcp", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/CustomLargeMessagePayload", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/failing_condition", "github.com/elastic/beats/v7/libbeat/common/acker/TestEventPrivat", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadManifestNginx", "github.com/elastic/beats/v7/libbeat/kibana/TestTransformTypes", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_FALSE_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/add_data_stream/TestAddDataStream/existing_meta", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/never_with_error", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(35):_hh:mm:ss_aaa_-\\u003e_09:05:24_PM", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods/sha512", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv4_embedded_on_ipv6:\\u003", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/DeepUpdate/empty", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/e", "github.com/elastic/beats/v7/heartbeat/monitors/TestDurationWait/100_wait_signals", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestMakeClientParams", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/merge_under_root", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/expressiion_simple_mismatch", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestNormalization/data_shar", "github.com/elastic/beats/v7/libbeat/common/TestParseURL/invalid", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat", "github.com/elastic/beats/v7/libbeat/api/npipe/TestTransformString/everything_else", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNamesppacePodUpdater/two_pods_but_none_in_namespace", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestConfigWWithCustomBuilders", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/lowercase_applied_mapping", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorValues", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_OpenClose/already_available_state_is_loaded", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float32_1_tto_long", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/with_custom_target", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNewDrop", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test2_S-1-1-0", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_115", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestIfBool", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestTimespan/interval_longer_than_t", "github.com/elastic/beats/v7/filebeat/input/syslog/T", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadAtOutOfRange", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadRuneOK", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/constant_key", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int32_min", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField/nil", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSe", "github.com/elastic/beats/v7/libbeat/common/TestBytes_Ntohll", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedJobRun/context_cancelled_over_l", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/missiing_field_ignore", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFaiilConnectUnknownAddress/tls/socks5", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfigInvalidMaxFileSize", "github.com/elastic/beats/v7/heartbeat/look/TestStatusErr", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_already_locked_resource_has_no_problem_when_harvesstergroup_is_cancelled", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/protocol_number_as_string", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIDDBytes", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs_?type=udp", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonConditioon/Negative_match", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestFilesAsDDir", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitUpdateIdentifiers", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArgv", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_12", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields//with_service_name", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteDoesNotRetain", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdateedFiles/one_updated_then_truncated_file", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_104", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/ignore_missing", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/versionTest_v:0:\\u003c34\\u003e0_2003-10-11T22:14:15.003Z_mymachine.examplle.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestEnvironmentProxy", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn/Lowercase_Fields", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestFailOnIncompatibleTypes", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestGenerateMetaDockerWithDedot", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_14", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteOK", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestLowercaseKeys", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestTranslateSID", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float32_1_to_double", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestConfiigValidate", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadBufSmaller", "github.com/elastic/beats/v7/libbeat/processors/util/TestClient", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetMimeType/jpg", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIsValidAddress/too_long", "github.com/elastic/beats/v7/libbeat/common/acker/TestLastEventPrivateReporter/drropped_event_with_private_is_acked_immediately_if_empty", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstOp_Execute/acking_multiple_ops_applies_the_latest_update_and_marks_key_as_finisshed", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestDeadLetterIndexPolicyConfig", "github.com/elastic/beats/v7/libbeat/common/dtfmt/T", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_63", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestComman", "github.com/elastic/beats/v7/filebeat/input/log/TestCleanOlderIgnoreOlderErrorEqual", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-ttrue", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobNoConts/multti-job", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportCloosedOnWriteReadError/tcp/connect", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16AtOutOfRaange", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCreate/bad_cidr", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint64AtFailed", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigAcceptValid", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defaault_ilm_disabled", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/put_error__with_clone", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_93", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfigInvalidMaxxFileSize", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_75", "github.com/elastic/beats/v7/libbeat/features/TestFQDNCallbacks", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/processor/TestChainOfDummyProcessors", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateWriter/single_op_is_executed", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/empty_str", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigName", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_empty_tokkenizer", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_1x2_to_integer", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ESS_\\u003c_7.10.0:_existing_if", "github.com/elastic/beats/v7/filebeat/input/log/TestCleanOlderIgnoreOlderError", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_iin_ISO8601_format:\\u003c190\\u003e2018-06-19T02:13:38.635322Z+00_super_mon_messagee", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/valid_unit", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNotJsonObjectOrArray//TestNotJsonObjectOrArrayDepth-10", "github.com/elastic/beats/v7/dev-tools/packaging/TestDocker", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonConditioon/Negative_int_match", "github.com/elastic/beats/v7/filebeat/channel/TestCloseOnSignalSubOutlet", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int_1_to_string", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseStructuredDataa", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveHeetznerMetadata", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteAtToNil", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Get_Undefined_Key", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt/plain", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestGrowWindowSizeUpToMax", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstGCStore/old_state_but_resource_has_pending_updates", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/live_batchhes,_one_event_too_big_after_split", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob/successfully_unpaccks_mapstr.M", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNewUpperCaseProcessor", "github.com/elastic/beats/v7/filebeat/beater/TestACKer/only_stateful", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-ffalse", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCertExpirationMetad", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/trimming_trailing_spaces", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionParaallel", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Junne", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateChan_Sen", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/format_string_in_multi_key", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint_1_to_float", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appeendValues/append_value_in_the_arrays_from_an_unknown_field", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestOverwriteKeys", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_9", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_76", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int32_1_to__integer", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn/Lowercase_Fields_when_full_path_is_false", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/minute_offset", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/tab_separator", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRun/I", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_padding_a", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/non-recursive", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/ES_===_7.9.0", "github.com/elastic/beats/v7/filebeat/input/filestream/TestDateSorter/ordered_fileinfos", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestConstructDummmyMulticastAddress", "github.com/elastic/beats/v7/libbeat/cmd/instance/locks/TestUnlock", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/Multiple_hosts", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/with_rate_limit", "github.com/elastic/beats/v7/libbeat/common/acker/TestCounting/ack_count_is_passeed_through", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilCRLFFailed", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defa", "github.com/elastic/beats/v7/filebeat/channel/TestRunn", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner/returns_alll_files_when_no_limits,_not_including_the_repeated_symlink", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_0X0A_to_long", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFingeerprint/inode_to_fingerprint_succeeds", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateWriter/", "github.com/elastic/beats/v7/heartbeat/config/TestDefaults/Browser_monitor_override", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/mixed_poin", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBo", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u003c34\\", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Only_poositive_check_where_pattern_matches_HTTP_return_body", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_uiint_type", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCancellledEvents/multi-job-continuations", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestGrowWindowSizeOf1", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/uuser_local_fields_(under_root)_and_tags", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestGzipDecodeWithoutRequestHeader", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/combine_2_pprocessors", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/top_level_object_ttype_config", "github.com/elastic/beats/v7/heartbeat/monitors/logger/TestLogRun", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent3164/innvalid_data", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/ListEnabledInputs//disabled_and_enabled_inputs", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestES2StyleExtendedErrorStatus", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedJobRun/context_not_canccelled", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MaxReadBufferReachedUserConfigured#01", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/url::port", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestFlattenedKeysRemovesNamespace", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFaiilConnectUnknownAddress/tls/connect", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_7", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldAlreadyExist/witth_prefix", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/different_hash_values", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_terminated_init_container_in_started_common_pod", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestInputManager_Create/Checking_config_does_not_print_dupl", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float32_1_tto_double", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/wit", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_17", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_x_to_ip", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream", "github.com/elastic/beats/v7/libbeat/conditions/TestEqualsBooleanFieldNegativeMatch", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvvent_Node/Test_node_start_with_just_node_name", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint_1_to_ddouble", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrString", "github.com/elastic/beats/v7/libbeat/processors/checks/TestAllowedFie", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkPrivate/ranges", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int_1_to_integer", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExcludedFiles", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_innt_type", "github.com/elastic/beats/v7/libbeat/licenser/TestFieldsHasNode", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/error_case", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSetti", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/supports_a_metadat", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/bool_false__to_boolean", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_201_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/keys_missing", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/non-existing_field_key", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_removeD", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/any_error_from_the_server", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNewLowerCaseProcessor", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int16", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(39):_HH:mm:ss_aaa_-\\u003e_20:05:24_PM", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/unspeccified", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Yearly_mainntenance_on_Jan_1_from_Midnight_to_3_AM/does_not_match_2025-01-02T01:30:00Z", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_9", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/ssimple-https", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestRunsInOrder", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/wwith_beat_default_fields", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(32):_h:m:s_a_-\\\\u003e_9:5:24_AM", "github.com/elastic/beats/v7/filebeat/channel/TestProcessorsForConfig", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_remove", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/last_node_in_fields", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvvent_Node/Test_node_start", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestRedirect", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntEmpty", "github.com/elastic/beats/v7/filebeat/input/log/TestCleanOlderIgnoreOlder", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstReaderGroup/assert_new_key_is_added,_can_be_removed_and_its_context_is_cancelleed", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/200_response/testdataa\\\\xpack-with-basic.json", "github.com/elastic/beats/v7/libbeat/beat/TestEvent", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_37", "github.com/elastic/beats/v7/libbeat/common/acker/TestCombine/ACKEvents_distributtes", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy/overwrite", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Regex_nnot_matching_multiple_lines_of_multiline_body_string", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteByte", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDelimiter/Del", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=false/with_input=false/custom_parent=", "github.com/elastic/beats/v7/libbeat/processors/util/TestFormatHardwareAddr", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_InvalidVarLogPodSource", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/more__hashes", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/retries_on__context_cancelled", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/missing_fields", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(36):_H:m:s_a_-\\\\u003e_8:5:24_AM", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/ReadRandomLargePayload#01", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ConsumeData", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuratioon/1.001s_format_as_seconds", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/combine_2_processors", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_InvalidSource1", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_-1_to_long", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestESNoErrorStatus", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_\\u0003cnil\\u003e_\\u003cnil\\u003e_to_ip", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Auggust", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/custom_separa", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/beat_local_fie", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrDouble/float32", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecconnectsOnConnect/tls", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appeendValues/append_value_in_the_arrays_from_an_unknown_field_with_'ignore_missing:__true'", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_removeDuplicates/cleean_up_string_array_with_duplicate_values", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestGeneraateHints_Node", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint32_max", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udp4/Sending_a_message_over_t", "github.com/elastic/beats/v7/filebeat/input/log/TestInputLifecycle", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack/string_vaalues", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_metric_typpe", "github.com/elastic/beats/v7/filebeat/fileset/TestInterpretError", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_8", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizerPluginOrder/t", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/fails_when_thhere_is_no_enough_string_for_the_fixed-length_key", "github.com/elastic/beats/v7/filebeat/fileset/TestAdaptPipelineForCompatibility/ES_\\", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_root-level_dot-keyy_from_fields", "github.com/elastic/beats/v7/libbeat/common/TestTryToInt", "github.com/elastic/beats/v7/libbeat/processors/actions/TestExpandKeysError", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/apply_mapping_without_match", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_32", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/negative_mminute_offset", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking/dropped_event_is_aacked_immediately_if_empty", "github.com/elastic/beats/v7/libbeat/common/kafka/TestSaramaUpdate", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/bracketed_ipv6", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings/topLevel", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topic_confiigured", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArgv/\\\"C:\\\\Program_F", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetMimeType/docxx", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint64Data", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilCRLFOnlyCRThenCRLFWithCont", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_8", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_78", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/allowed_under_tthe_agent", "github.com/elastic/beats/v7/libbeat/common/TestIsLoopback_error", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestGenerateHinnts", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Number_inf_the_host:\\u003c16", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/path/TestWin32", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParseNoYear", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn/Fail_On_Missing_Key_Error", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go/ret", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Positivve_and_negative_check_are_both_empty", "github.com/elastic/beats/v7/dev-tools/mage/TestDumpVariables", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestCursor_IsNew/false_if_key_with_cursor_value_is_in_memory_sto", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run//test_for_nested_field", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFailConnectUn", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/AppendTo", "github.com/elastic/beats/v7/dev-tools/packaging/TestRPM", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_stop_pod_without_host", "github.com/elastic/beats/v7/libbeat/common/TestConfigJSONBlob/successfully_unpacks_m", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRun/test_key", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestOnCreateHandler_SubscribeMulti", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/expression_simple_match", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_49", "github.com/elastic/beats/v7/libbeat/processors/actions/TestExpandKeysError/targeet_set_to_''", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topics_settting_must_keep_case", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Octtober", "github.com/elastic/beats/v7/libbeat/mapping/TestGetField", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Appr", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCCEMetadataInK8s", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineTo", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/hybrid", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int16_1_to_integer", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/cron_complex", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_CheckConfig/success", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels", "github.com/elastic/beats/v7/auditbeat/TestTe", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadPipelinesWithMultiPipe", "github.com/elastic/beats/v7/libbeat/conditions/TestOpenGteRangeConditionPositiveeMatch", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigNetInfoDisabled", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmit", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/net/TesttNetIsIP", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/negative_minute_offset", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields", "github.com/elastic/beats/v7/libbeat/processors/actions/TestBadConfig/no-error", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetMimeType/gif", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadPassword/Test_env_variable", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestNormalization/no_shharing_if_normalized", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/abbreviated_hour_offset", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/if_both__fail_return_error_from_factory", "github.com/elastic/beats/v7/libbeat/processors/TestConditionRuleInitErrorPropagates", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigUnderElasticAgent/vaalid_topic_with_dynamic_topic_selection", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestUnpackCopiesDefault", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAliibabaCloudMetadata", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash/failed_ha", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkEncodeEvents", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputEnabled/inpput_exists_and_enabled", "github.com/elastic/beats/v7/libbeat/common/acker/TestEventPrivateReporter/no_dropped_event", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec/html_escaping_disabled", "github.com/elastic/beats/v7/filebeat/config/TestGetConfigFiles_Dir", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestPartitioners", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateWriter/multiple_ops_sum_for_single_key", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_config_mixxing_object_type_mapping_type_and_object_type_params", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestValidate/network_udp", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/test_down_status_50", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRun/default", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/invald_scheme", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsFalse/replace_fields=false_with_host.name_and_host.id", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AppendOnFailed", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGCStore", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_x_to_ip", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Single_regex_that_ma", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestSimpleJob", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/invalid_coonversion", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrSliceTime", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPipelineSelection/no_piplin", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexabllePolicyConfig", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Sttop/all_goroutine_finish_before_timeout", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigGGeoEnabled", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2/valid_instance_identity_document,_no_cluster_tags", "github.com/elastic/beats/v7/libbeat/common/cleanup/TestIfBool/If_does_not_run_cleanup", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int_1_to_double", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/ES_\\u003e_", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2/instanceId_pre-informed,_overwrite", "github.com/elastic/beats/v7/libbeat/processors/decode_xml_wineventlog/TestProcessor", "github.com/elastic/beats/v7/libbeat/conditions/TestEqualsSingleFieldPositiveMatch", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGenerateCheckConfig/id_is_present", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestC", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/format_string_key", "github.com/elastic/beats/v7/filebeat/input/file/TestGlob", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedulerRun", "github.com/elastic/beats/v7/filebeat/input/log/TestCleanOlderError", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_116", "github.com/elastic/beats/v7/libbeat/outputs/TestReadHostList/one_host_worker_set", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters/Local_paramet", "github.com/elastic/beats/v7/libbeat/autodiscover/appenders/config/TestGenerateAppender", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/leading_zero", "github.com/elastic/beats/v7/libbeat/common/acker/TestLastEventPrivateReporter/no_dropp", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_113", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonCondition/positive_", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/simple-https", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/different_targets", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestOnlyOneOfExpressionCondition", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifi", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/Lis", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestSyslog/rfc-3164", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test1_S-1-0-0", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIsValidAddress/all_zeros", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIffRemoved", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveURIPartsProcessor/ES_\\u0003e_7.12.0", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_pod_without_host", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeerPluginOrder/one_attempt", "github.com/elastic/beats/v7/libbeat/processors/actions/TestExpandKeysError/targeet_set_to_'my_target'", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv6:_1:::\\u003c13\\u003eFeb_25_17:32:18_1::_Use_the_Forc", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/eveent_index_with_ilm", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestUnpackCopiessDefault", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/minute_offfset", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteFail", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestNormalization/data__sharing_if_not_normalized", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/unspecified", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestConverter/test_coonverter_functionality", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/pointer_fieldd_with_indirect", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestInterfaceeConfigsUnpack", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestNew/unknown_algo", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstCursor_IsNew/false_if_key_with_cursor_value_is_in_persistent_store", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/UTC_as_standard_offset", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPo", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_Run/n", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv/Multiple_values", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashinggTimeFields", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-with-bare-config", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestLogstashTLS", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFields/order_1", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputEnabled/inpput_exists_and_disabled", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_-1_tto_long", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestFileInfoPermissions", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_39", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonConditioon/positive_int_match", "github.com/elastic/beats/v7/heartbeat/monitors/TestTimeoutWait/50_wait_signals", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/bad_adddrs", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/-0700", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSequence", "github.com/elastic/beats/v7/libbeat/common/acker/TestTra", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeer/start_up_-_go_down_with_one_retry_-_thenrecover", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/ipv4", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/missing_field_ignor", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/invalid_no_backennd", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDeliimiter/Single_char_delimiter", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_fields_negat", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvent_Node", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/America/New_York", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking/no_dropped_events", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_int_1_to_boolean", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manager_En", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNoPrioritySet", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udpp/Sending_a_message_under_the_MaxMessageSize_limit", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_46", "github.com/elastic/beats/v7/libbeat/common/transport/kerberos/TestConfigValidate", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run//append_value_of_a_missing_field_with_'ignore_missing:_false'", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestMakeReporter", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReplaceFieldsFalse/replace_fields=false_with_host.name_", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttExpirationMetadata/Expired_cert", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_424", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_x_to_float", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndM", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestInputManager_Create/does_not_start_an_input_with_", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/fancy-proto", "github.com/elastic/beats/v7/libbeat/dashboards/TestReplaceIndexInIndexPattern", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuration/1.001s_", "github.com/elastic/beats/v7/libbeat/beat/events/TestGetMetaStringValue", "github.com/elastic/beats/v7/libbeat/common/schema/mapstrstr/Test_UntilCRLFOK", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectWithSuffixData", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_ordereed", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16NoData", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/all-disabled-no-fail", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestRecursive", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=false/with_input=true/custom_parent=true/public_metrics=false", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_and_message_only:Oct_11_22:14:15_--", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_IgnoreSymbolOK", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUserAgentInject", "github.com/elastic/beats/v7/libbeat/processors/decode_xml_wineventlog/TestProcesssor/supports_metadata_as_a_target", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValu", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint8_1_to__double", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs", "github.com/elastic/beats/v7/libbeat/features/TestNewConfigFromProto/fqdn_disabled", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo/some_workloads_return_an_error", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonCondition/Negative_matc", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionBetweenGoTypes/i", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstOp_Execute/ACK_only_subset_of_pending_ops_will_only_update_up_to_ACKed_state", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_VarLibKubeletPods", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/key_", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiredFields", "github.com/elastic/beats/v7/libbeat/monitoring/report/log/TestReporterLog", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/rfc6587_framing_octet_embedded_newline#01", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_308_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/multiple_keyss_dissect_end_of_string", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_203_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/no_backend", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestSyslog", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_Get/find_", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_both", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/single_space__left", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizer/st", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Stop", "github.com/elastic/beats/v7/libbeat/cfgfile/TestGlobManager", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(83):_yyyy-MM-ddd'T'HH:mm:ss.fffffffff'Z'_-\\u003e_2017-01-02T04:06:07.000000123Z", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/all_fields", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstOp_Execute", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSequence/is_not_set", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestResetableLLimitedReader/WhenMaxReadIsNotReached", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFaiilConnectUnknownAddress/tcp", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/splits_larg", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16Failed", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/use_indices", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u003c34\\u003eOct_11", "github.com/elastic/beats/v7/libbeat/processors/util/TestPartialGeo", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailDrop", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_booll_true_to_integer#01", "github.com/elastic/beats/v7/filebeat/input/v2/TestPlugin_Validate/missing_name", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDeliimiter/Multiple_chars_delimiter_with_half_starting_delimiter", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_UTF-8_COONTROL", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/supports_metadata_", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(2):_yy.MM.dd_-\\\\u003e_06.08.01", "github.com/elastic/beats/v7/libbeat/common/acker/TestCombine", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveDescription/ES_\\u003e_7.99.0", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u003c34\\u003eOct_11_22:14", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32AtOutOfRaange", "github.com/elastic/beats/v7/libbeat/cfgfile/Test", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/invalid_unit", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint8AtFailed", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/live_batchhes,_still_too_big_after_split", "github.com/elastic/beats/v7/filebeat/fileset/TestInterpretError/Elasticsearch_1.7", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScriptParams", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/long/", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_48", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/DeepUpdate/overwrite", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCgroupRegex/k", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/simplee_datastream,_no_origin,_uses_rootId", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/leadinng_zero", "github.com/elastic/beats/v7/libbeat/dashboards/TestOneHostSuccessResp", "github.com/elastic/beats/v7/filebeat/input/filestream/TestDateSorter/unordered_fileinfos", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_user_configured_ID/plugin_with_user_cconfigured_ID_with_id:_my_test_plugin::my-id::my_id", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArgv/_#01", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/200_response", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/protocol_number", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizer/start_up,_stay_up", "github.com/elastic/beats/v7/libbeat/common/TestPut", "github.com/elastic/beats/v7/libbeat/licenser/TestLicenseUnmarshal/expired_enterprise", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNotJsonObjectOrArray//TestNotJsonObjectOrArrayDepth-1", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int32", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestInlineBrowserJob/simple", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvvent_Node/Test_stop_node_without_host", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_SnapshotRestoreAfterErr", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/no_seetuid/setgid", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2/instanceId_pre-informed,_no_overwrite", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_TryRecv/read_update", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simplle_field_base64_decode_from_and_to_equals", "github.com/elastic/beats/v7/libbeat/processors/decode_xml/Test", "TestFQDN/FQDN_only_{}", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/different_ttargets", "github.com/elastic/beats/v7/libbeat/common/cleanup/TestIfBool", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner/", "github.com/elastic/beats/v7/libbeat/mapping/TestFiel", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/ListEnabled", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/supports__metadata_as_a_target", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_302_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestMakeClienntParams", "github.com/elastic/beats/v7/libbeat/common/TestReplace", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AppendOnFixed", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestHTTPSServer", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestApplyPresetWithConflicts", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/200_respons", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/rfc6587_framing_non-transparent#01", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/runner_eexists_in_fallback_only", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestSkipAddingHos", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_valuee_reverse_config", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-with-both-enabl", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Juun", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/serverless-witth-both-enabled", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestV2CID", "github.com/elastic/beats/v7/libbeat/common/TestBytes_Htohl", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRun/", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillMiddle", "github.com/elastic/beats/v7/filebeat/input/kafka/TestNewInputDone", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/propagates_Run__to_a_processor", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/with_location", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestMetaJsonWithTimestamp", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/si", "github.com/elastic/beats/v7/filebeat/input/filestream/TestOnRenameFileIdentity/iidentifier_from_prospector_is_used", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_81", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobNoConts", "github.com/elastic/beats/v7/libbeat/common/schema/mapstriface/TestFullFieldPathIInErrors", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float32_1_to_long", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_\\u0003cnil\\u003e_\\u003cnil\\u003e_to_string", "github.com/elastic/beats/v7/heartbeat/TestTemplate", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestConfig", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/exissting_if", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_TrUe_t", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestConfig/config_given_with_posix_path", "github.com/elastic/beats/v7/filebeat/input/log/TestInputFileExclude", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_302_using_urls_config_field", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobNoConts/multti-job/result_at_index_1", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_57", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_6", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_415", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Oct", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings//topLevelQueue", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_InvariantsOnNew", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestLogstashInvalidTLSInsecure", "github.com/elastic/beats/v7/filebeat/fileset/TestGetPipelineNginx", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/m", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MultipleCharsCustomDelimiter", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_ID/plugin_with_no_user_configured_ID/plugin_with_no_user_confiigured_ID_with_src:_another_unique_name", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint32_1_to_float", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/ignore_a_non-booolean_value", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_422", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_17", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteNetUint64At", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_otherr_day_for_4_hours/does_match_2025-02-10T11:00:00Z", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ESS_\\u003c_7.10.0:_set_to_false", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_43", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClient/client_close", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_loaddmode_disabled_ilm_loadmode_disabled", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUpEndpointJob/locaalhost", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestResetableLimitedRe", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/ES_\\u0003e=_7.13.0:_keep_processor", "github.com/elastic/beats/v7/libbeat/beat/TestUserAgentString/management-disabled", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_F_to_boolean", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadPipelinesWithMultiPipeline", "github.com/elastic/beats/v7/heartbeat/look/TestNegativeRTTIsZero", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunner", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceFie", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSup", "github.com/elastic/beats/v7/libbeat/beat/TestFQDNAwareHostname/fqdn_flag_enabled", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/192..168.1.218_-\\u003e_192.168.1.219_:_internal", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/bool_true_tto_boolean", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/nil_values", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadInput/Question_3?", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/supportss_a_regexp_field", "github.com/elastic/beats/v7/libbeat/cmd/instance/locks/TestUnlockWithRemainingFile", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16Data", "github.com/elastic/beats/v7/libbeat/processors/dns/TestExtractArrayProccessor_String", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_valuee_allow_overwrite", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/multiple_keys_not_end_", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(51):_ffff_-\\u0003e_123", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/+07:00", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/invalid_no_value_field", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/noop_right", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestAddTTLSMetadata/TLSv1.2_with_next_protocol", "github.com/elastic/beats/v7/libbeat/conditions/TestRangeCreateNumeric", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCgroupRegex/kub", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/executabble", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/net/TestSessionPaarallel", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_May", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Get_Object", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32AtInRange", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/short/multi_read_byte_prefix", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/ignore_a_non-boolean_va", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCgrou", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestVisitCancel", "github.com/elastic/beats/v7/libbeat/common/TestEquals", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_44", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_other_day_for_4_hours/does_match_2025-02-08T09:30:00Z", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint32_1_to_double", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/valid_destinaation_port_0", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/with_match", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUpEndpointJob/ipv6", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/invalid_hash", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestNew", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestFormatStringErrors", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/401_response", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updatted_metadata", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Regex_mmatching_multiple_lines_of_multiline_body_string", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestTLSExpiredCert", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_300_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_t_to_boolean", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_36", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_Match", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/trim_leading_space", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateChan_SendRecv", "github.com/elastic/beats/v7/libbeat/outputs/console/TestConsoleOutput/single_json_e", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_appendValues/append_value_", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/put_error_with_clone", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrBool", "github.com/elastic/beats/v7/filebeat/channel/TestProcessorsForConfigIsFlat", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScriiptParams/register_method_is_optional", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParam", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetMimeType", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestInitializationNoDocker", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_506", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestActions", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserDate", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Deccember", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestGenerateHints_Node", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_3", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/priority_and_timestamp_d", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_VarLogCon", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/empty/String", "github.com/elastic/beats/v7/libbeat/cfgfile/TestReloadDuplicateConfig", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFromFileeInfoHash/file_stays_the_same", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestClientSimpleEvent", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/valid_source__port_0", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash//move", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_0x_to_integer", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint8AtOutOfRange", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailDeadLetterSuccess", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_getTags/ttag_extraction_fallback_to_DescribeTag_if_IMDS_fetch_results_in_an_error", "github.com/elastic/beats/v7/filebeat/input/: TestGetFactory", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/leadinng_zero", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/url:port", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/file_no_id", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_42", "github.com/elastic/beats/v7/libbeat/common/cli/TestConfirm", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType/xml", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_Run/sampl", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_35", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestDecode/1", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/dissabled_module", "github.com/elastic/beats/v7/libbeat/beat/events/TestGetMetaStringValue/non_string", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/put_error_no_clone", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_304_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_root-level_do", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_226_using_urls_config_field", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/keep_ssettings_in_grok", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert/mode/copy", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_15", "github.com/elastic/beats/v7/heartbeat/monitors/Test_runPublishJob/one_cont", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/file__watcher_and_file_identity_compatibility/returns_error_when_fingerprint_is_disablled_but_fingerprint_identity_is_configured", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/negative_match", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSIDEmpptyTarget/domain", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/ignore_left_ppadding", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udp4", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-true", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTargetRootOption", "github.com/elastic/beats/v7/libbeat/processors/actions/TestD", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/NewLine", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSuppor", "github.com/elastic/beats/v7/libbeat/processors/actions/Tes", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/foo_-\\u", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/TTL_=_-1_means_not_eexpiring", "github.com/elastic/beats/v7/filebeat/input/filestream/TestValidateInputIDs/only_unique_IDs", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/drop_nil_string_poointer", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/do-overwrite", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel/w", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_fie", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldAlreadyExist", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPid/is_set", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchemaCases/standard_schemma_conversion_case", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/defined_", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/tab_separator", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCountting/octet,_non-transparent,_octet", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmitEve", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/missing_field_ignore", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint16_max", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/control_spa", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/Expired_and_finished", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestStateless_Run/capt", "github.com/elastic/beats/v7/filebeat/input/v2/TestPlugin_Validate/invalid_stabillity", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/expression_simple_mis", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_2", "github.com/elastic/beats/v7/libbeat/common/file/TestGetOSState", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:180:\\u003c180\\u003e1_2003-10-11T22:14:15.003Z_mymachine.exxample.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_in_ISO8601_format:\\u0", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(48):_f_-\\u003e__1", "github.com/elastic/beats/v7/heartbeat/cmd/TestRootCmdPlugins", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/runner_ffrom_factory_has_higher_priority", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/ssimple-http", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestKeySelection/use_event_field", "github.com/elastic/beats/v7/libbeat/common/TestUTF16ToUTF8", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/NewLineW", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(81):_yyyy-MM-ddd'T'HH:mm:ss.SSS'Z'_-\\u003e_2017-01-02T04:06:07.123Z", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadFromFailOnFixed", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/location_label", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionWithhMapStr", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestExplicitCompressionLevelOverri", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_UpdateTTL/add_TTL_for_new_entry_to_store", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestCursor_IsNew/true_if_key_is_in_store_but_without_cursor_value", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int16_max", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigName/Check_of_name", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttFields/reversed_cert_should_expire_at_same_time", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFieldErrors/missing", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNewInputDone", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveDescription/ES_==_7.9.0", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFields/duplicates_ignored", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Cancel", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-critical", "github.com/elastic/beats/v7/libbeat/autodiscover/meta/TestGenerateHinnts", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSIDEmpptyTarget", "github.com/elastic/beats/v7/libbeat/common/TestRandomBytesLength", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntOrEndOK", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint64_1_too_long", "github.com/elastic/beats/v7/libbeat/cfgfile/TestCreateRunnerAddsDynamicMeta/with_", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_409", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/wwith_client_metadata", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Regex_matching_jso", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestVisitOrder", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/exeecutableObject_pe_go", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_values__multiple_IPs_match", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/POST__inputss_", "github.com/elastic/beats/v7/libbeat/common/cli/TestConfirm/Test_YeS", "github.com/elastic/beats/v7/filebeat/fileset/TestInterpretError/Elasticsearch_2.4", "github.com/elastic/beats/v7/libbeat/cfgfile/TestCreateRunnerAddsDynamicMeta", "github.com/elastic/beats/v7/auditbeat/helper/hasher/TestHasherLimits", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/non-existing_metadata_sub-key", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestConfigValidate_LogsPatchMa", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=true/with_input=true/custom_parent=false", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/uint8_value", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveQCloudMetadata", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseHeader/RfcDoc__6.5_Example1:\\u003c34\\u003e1_2003-10-11T22:14:15.003Z_mymachine.example.com_su_--_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestRecordinngAndFlapping", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/matching_condition", "github.com/elastic/beats/v7/libbeat/common/TestGetExpiredValue", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArgv/#00", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadQueryResult", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint16_1_too_double", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AvailAndLenConsiderReset", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters/Locaal_overrides_preconfigured_parameters", "github.com/elastic/beats/v7/libbeat/processors/move_fields/TestMoveFields", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/b_is_prefix_of_a", "github.com/elastic/beats/v7/filebeat/channel/TestRunnerFactoryWithC", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/templatte_enabled_but_loading_disabled", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestOverwriteKeys/fail_by_defa", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MaxBufferSizeSet#01", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFFilter", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/runner_exsit", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPipelinePublishFail", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go/do", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/one_level_disssect_not_end_of_string", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_118", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchContainerWithDedot", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/ignore_errors", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_day/ddoes_match_2025-02-08T08:30:00Z", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdateedFiles/one_updated_file", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/file__watcher_and_file_identity_compatibility/returns_no_error_when_fingerprint_and_otther_identity_is_configured", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestConfig", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestNilProcessor", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float64_1_tto_long", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test3_S-1-5-32-544", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestLeaseConfigurableFields", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go/witho", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_false_to_boolean", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_SnapshotRestoreAfterErrr", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint32_1_too_double", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/Te", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_September", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/recursivve", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestUnpack/friendly_human_vallue", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/versionTest_v:0:\\u003c34\\u00", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNe", "github.com/elastic/beats/v7/heartbeat/beater/TestMakeESClient", "github.com/elastic/beats/v7/libbeat/kibana/TestDuplicateField", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/simple_condition_match", "github.com/elastic/beats/v7/filebeat/input/v2/TestPlugin_Validate/missing_manager", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestValidate/invalidnetwork", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadByteEOFCheck", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/eveent_index_without_ilm_must_be_lowercase", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Pos", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings/defaults", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters/Precconfigured_parameters_are_applied_to_bulk_requests", "github.com/elastic/beats/v7/libbeat/processors/actions/Te", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSett", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/TestToOtelConfig/check_preset_config_translation/con", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/ilm_dissabled_but_loading_enabled", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int16_min", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType/json", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_value_reverse_c", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/ecs_ccategorization", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(1):_y.M.d_-\\u0003e_2006.8.1", "github.com/elastic/beats/v7/libbeat/processors/checks/TestRequiredFields/two_reqquired_field_present_in_the_configuration", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/nil", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/-05:00", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_411", "github.com/elastic/beats/v7/libbeat/api/npipe/TestIsNPipe/return_false_if_its_noot_a_named_pipe", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_Enabled/templates_only", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/more_hashes", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_String", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(34):_h:m:s_a_-\\\\u003e_9:5:24_PM", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/add_field", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_Helper_LogOutput", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/uint16", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFact", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_42", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestCon", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_a_harvester_error_is_handled", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run", "github.com/elastic/beats/v7/filebeat/input/syslog/Test", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestConfigEvalSymlinnks", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_52", "github.com/elastic/beats/v7/libbeat/licenser/TestLicenseUnmarshal/trial", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int_1_to_float", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_otherr_day_for_4_hours/does_not_match_2025-02-06T13:00:00Z", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestTransittionTo", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestReloader/updates_the_o", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent5424/invalid_data", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/SetIgnoreInactiveSince/ignore_inactive_sinc", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_16", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateChan_TryRec", "github.com/elastic/beats/v7/filebeat/fileset/TestApplyOverrides", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestSanitizeIPs/excludes_invalid_IPs", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWSMetadataEC2", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveOppenstackNovaMetadata", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestRecursiveNoFollowSymlink", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_uint64_ok", "github.com/elastic/beats/v7/dev-tools/mage/TestBuildPlatform", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/concat", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Te", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_maxx_uint32,_partitions_12", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_map_to_mapstr.M", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=true/with_input=false/custom_parent=", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNotJsonObjectOrArray", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestGzipDecodeWithouttRequestHeader", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_UpdateTTL/add", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Auug", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/ipv44", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestTrackerRecord", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_10", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDelimiter", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/Unfinished_but_TTL_sset_to_0", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobConts/multi-job-continu", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_to_double", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFFilter/all_with_local_access_only_if_not_configured", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigUnde", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexabllePolicyConfig/dead_Letter_index_policy_nil_index", "github.com/elastic/beats/v7/libbeat/outputs/fileout/TestConfig/config_given_withh_posix_path", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/SetID", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/shor", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/MultipleCharsCustomDelimiter#01", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLine#01", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_303_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_IgnoreSymbolCont", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-error", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuration/1.001s_format_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_52", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_Valid", "github.com/elastic/beats/v7/heartbeat/scheduler/timerqueue/TestQueueRunsTasksAddedAfterStart", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint8_1_to_long", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint64_1_to_double", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_\\u0003cnil\\u003e_\\u003cnil\\u003e_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/do_nott_truncate_short_byte_line", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_va", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/with_custom_ttarget", "github.com/elastic/beats/v7/filebeat/fileset/TestGetInputConfigNginxOverrides/pipeline", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_October", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash/delete", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/uint64_masked", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_ResetCursor", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_Helper_OK", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_CaptureOutput/passing_testt_without_output", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint8_min", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/with_ilm", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udp/Sending_a_message_over_the", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/with_clien", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_booll_true_to_long", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSetting", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=false/with_input=false/custom_paren", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_should_yiel", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ESS_\\u003c_7.10.0:_set_to_true", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuration/3m0s_format", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_85", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/with_match", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigNNetInfoDisabled", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_56", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestVisit", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestHeadersDisabled", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readResp/response_exists", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_bool_true_to_long", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestSanitizeIPs/does_not_changee_valid_IPs", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort/https_plain", "github.com/elastic/beats/v7/libbeat/beat/TestUserAgentString", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule_Unpack/eveery_second_interval_-\\u003e_every_15_cron", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-debbug", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updated_hashes_", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestFlattenedKeysRemovvesNamespace", "github.com/elastic/beats/v7/libbeat/conditions/TestCombinedCondition", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestResetableLLimitedReader/WhenMaxReadIsReachedInMultipleRead", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/conditioon_invalid_json", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_10", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseStructuredData", "github.com/elastic/beats/v7/libbeat/licenser/TestLicenseUnmarshal", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=false/with_input=false/custom_parent=t", "github.com/elastic/beats/v7/libbeat/common/TestTimeString/millisecond_precision", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_96", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFields", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestCursor_Unpack", "github.com/elastic/beats/v7/filebeat/input/filestream/TestNumericSorter/one_fileinfo", "github.com/elastic/beats/v7/heartbeat/look/TestStatusNil", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/allow_if_the_innput_is_created_by_a_module", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_86", "github.com/elastic/beats/v7/heartbeat/monitors/Test_runPublishJob/cancelled_cont", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Apr", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/ListEnabledInputs//all_inputs_enabled", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(6):_yyyyyy.MM.dddd_-\\u003e_002006.08.001", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint_1_to_integer", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverDebounce", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/fai", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_source_port1", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchema", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkRequestHasFiltterPath", "github.com/elastic/beats/v7/libbeat/common/Te", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit/rate_6_per_min", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetMimeType/elf", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessorConvert/extrract_integer", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert/string", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkRequestHasFilterPath/Single_event_with_response_f", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/T", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:0:\\u003c0\\u003e1_2003-10-11T22:14:15.003Z_mymachine.examplle.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint64_1_too_double", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/simple_ccondition_match", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsTrue/replace_fields=true_with_host.id", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDeliimiter", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_54", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint8NoData", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Jul", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/mb_chars/1_byte_prefix", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(38):_H:m:s_a_-\\\\u003e_20:5:24_PM", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputEnabled/no__inputs_are_enabled", "github.com/elastic/beats/v7/libbeat/autodiscover/template/TestConfigsMapping", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/overwrite_keys", "github.com/elastic/beats/v7/libbeat/processors/move_fields/TestMoveFields/move_", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_27", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/size_att_hash_limit", "github.com/elastic/beats/v7/libbeat/processors/actions/TestBadConfig/valid-then-invalid", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_otherr_day_for_4_hours/does_not_match_2025-02-07T09:30:00Z", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(19):_xx.w.EEEE__-\\u003e_15.1.Wednesday", "github.com/elastic/beats/v7/filebeat/input/filestream/TestOnRenameFileIden", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCancellledEvents/multi-job-continuations/result_at_index_0", "github.com/elastic/beats/v7/heartbeat/monitors/TestChannelWait/50_wait_signals", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/does_not_e", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int_max", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestDeadlockListener", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-warn", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClient/no_infinite_looop_when_processing_fails", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReplaceFieldsTrue/replace_fields=true_with_host.name_and_", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_OpenClose", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Feb", "github.com/elastic/beats/v7/filebeat/harvester/TestIncludeLine", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/numeric_stri", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestFBEncodeDecode", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manager_EnsureP", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestErrorOnEmptyLineDelimiterWhenStre", "github.com/elastic/beats/v7/libbeat/features/TestFQDN/FQDN_only_{}", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup", "github.com/elastic/beats/v7/libbeat/processors/actions/TestBadConfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/Z+0000", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_TRUE_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashinggTimeFields/UTC", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_too_integer", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestIgnoreFailure/default_is_to_fail", "github.com/elastic/beats/v7/libbeat/cfgfile/T", "github.com/elastic/beats/v7/libbeat/processors/decode_xml_wineventlog/TestConfig", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_value_type_from_metadata", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/allow_ip_range", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestErrorOnEmptyLineDelimiiter", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportClosedOnWriteReadError", "github.com/elastic/beats/v7/libbeat/processors/TestBadConditionConfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_5", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_map_ffrom_nested_key_message.original_to_top_level_field_message_copied", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup/assert_a_harvester_can", "github.com/elastic/beats/v7/libbeat/common/acker/TestEventPrivateRepor", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_in_ISO8601_format:\\u003", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(18):_xx.w.EEEE__-\\u003e_15.1.Thursday", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/uint8", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=false/with_input=true/custom_parent=false/public_metrics=false", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_succeeded_pod_stop_with_multiple_ports_exposed", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/+07", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_27", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_number_from_hierarchical_message.original_t", "github.com/elastic/beats/v7/libbeat/beat/TestUserAgentString/unmanaged-privileged", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClientWaitClose/WaitCClose_blocks", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/trim_leadin", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/T", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestGCStore/old_state_can_be_removed", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/key_not_in_fieldds,_but_parent_node_in_fields", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs_?pretty", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfig", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_0.0.0.0_to_ip", "github.com/elastic/beats/v7/filebeat/input/filestream/TestValidateInputIDs", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int8_1_to_integer", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_FALSSE_to_boolean", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/overwwrite_true", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/MaxBu", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/no_acess_to_metadata_key", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/invalid", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobConts/multi--job-continuations/result_at_index_0", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_UTF-8", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_day", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestIsEmpty/when_string_is_Empty", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_VarLibDockerContainers", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestGenerateProcessorList", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_no_user_configured_ID/plugin_with_no__user_configured_ID_with_id:_my_test_plugin::.global::my_id", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/common.ErrNonReloadabl", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/UTC_label", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/hybrrid", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestErrorJob/job_error/rresult_at_index_0", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint64AtOutOfRange", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/lowercase_format_string_key", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/a_is_prefix_of_b", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchemaCases/ignore_error_aat_conversion_case", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestRun_Once", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus/not_match_multip", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int32_1_to_long", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServicceEventer_NamespaceWatcher", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorRenamedFile", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner/returns_alll_files_except_too_small_to_fingerprint", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashingTimeFields/UTC", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteNil", "github.com/elastic/beats/v7/libbeat/processors/util/TestGeoLocationValidation", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:200:\\u003c200\\u003e1_2003-10-11T22:14:15.003Z_mymachine.exxample.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/T", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/no_setuid/setgid", "github.com/elastic/beats/v7/libbeat/common/match/TestMatchers", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateChan_SendRecv/read_does_not_block_if_events_are_available", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone", "github.com/elastic/beats/v7/libbeat/conditions/TestRangeSingleFieldNegativeMatchh", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_18", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_CheckConfig/faiil_if_factory_fails_already", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float64_1_tto_double", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_no_user_configured_ID/plugin_with_no__user_configured_ID_with_id:_my_test_plugin::.global::path::my_id", "github.com/elastic/beats/v7/filebeat/input/filestream/TestTakeOverTags/test-takee_over-false", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSource", "github.com/elastic/beats/v7/libbeat/cmd/instance/locks/TestLocker", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int32_min", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields//with_origin", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defaault_loadMode_Overwrite_ilm_disabled", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/splits_larrge_batches_on_status_code_413", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_value_type_from_fiields", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/multiple_field", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillInvalidBulkIndexResponse", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLi", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTestFunction", "github.com/elastic/beats/v7/libbeat/beat/TestFQDNAwareHostname/fqdn_flag_disabled", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_ID/plugin_with_no_user_configured_ID", "github.com/elastic/beats/v7/libbeat/common/Test_CSVDump", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfigForDataType", "github.com/elastic/beats/v7/libbeat/autodiscover/template/TestConfigsMappingKeystoreProvider", "github.com/elastic/beats/v7/libbeat/common/TestTimeString/microsecond_precision", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestUserAgentHeader/beatname-fallback", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_11", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdateedFiles", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u0033c34\\u003eOct_11_22:14:15_mymachine_su[230]:_'su_root'_failed_for_lonvick_on_/devv/pts/8", "github.com/elastic/beats/v7/libbeat/processors/actions/TestOverwriteMetadata", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_35", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest4_S-1-5-113", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/multiple_chars", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_a_harvester_panic_is_handled", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/leadinng_zero", "github.com/elastic/beats/v7/heartbeat/monitors/jobs/TestWrapAll/continuations_muulti-wrap", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobConts/multi--job-continuations/result_at_index_1", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttExpirationMetadata/Valid_cert", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/errorr_case", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/custom_targget", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestNonRecurrsive", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_wrong_triim_mode", "github.com/elastic/beats/v7/libbeat/common/TestEquals/when_we_have_different_elements", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/invalid", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:20:\\u003c20", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn/Revert_to_original_map_on_error", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult/searcch_results_response_from_6.0", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/Complex_stack_trace", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestUrlEncode", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestCursor_IsNew/false_if_key_with_cursor_value_is_in_persistent_", "github.com/elastic/beats/v7/libbeat/processors/add_data_stream/TestAddDataStream/custom_ds", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/invalid_tag", "github.com/elastic/beats/v7/libbeat/licenser/TestIsExpired/active_enterprise_license", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestHeaders", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/merge_with_existing_fie", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int8_1_to_iinteger", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestBuiltInTest", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_14", "github.com/elastic/beats/v7/libbeat/api/TestAttachHandler", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/no_flags", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup/assert_a_harvester_is_started_in_a_goro", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNanosecondParsing/000545", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt/dotted_domain", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestMakeClientWorker/clieent", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_19", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/map_to_mapstr.M", "github.com/elastic/beats/v7/libbeat/processors/TestNamespaceRegisterFail", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_Get/find_existing_resource", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(3):_yy.MM.dd_-\\\\u003e_06.08.01", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasKey/unknown_nested_key", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_VarLogContainers", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDeliimiter/Multiple_chars_delimiter", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestLargeResponse", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/load_teemplate_with_ilm_without_loading_ilm", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestNewGroupp", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigUnderElasticAgent/emmpty_config_is_invalid", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstCursor_Unpack", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every_otherr_day_for_4_hours", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings//defaults", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/modified_elements", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestNewDefaults", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_Get/same_resource_is_returned", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=false/with_input=true/custom_parent=tru", "github.com/elastic/beats/v7/libbeat/processors/TestSafeWrap", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGenerateCheckConfig/invvalid_config", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestSyslog/rfc-5424", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv6:__1:::\\u003c13\\u003eFeb_25_17:32:18_1::_Use_the_Force!", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorNewAndUpdatedFiles", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Rename", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u0033c164\\u003eOct_26_15:19:25_1.2.3.4_%ASA1-120:_Deny_udp_src_DRAC:10.1.2.3/43434_dsst_outside:192.168.0.1/53_by_access-group_\\", "github.com/elastic/beats/v7/filebeat/channel/TestRunnerFactoryWithCommonInputSettings", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP", "github.com/elastic/beats/v7/heartbeat/monitors/jobs/TestWrapAll/multijob", "github.com/elastic/beats/v7/libbeat/processors/add_id/TestNonDefaultMetadataTarget", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadPipelinesWithMultiPipelineFFileset", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_90", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(7):_Y.M.d_-\\u0003e_6.8.1", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/console/TestSessionPaarallel", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_December", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-info", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(64):_ffffffff_--\\u003e_000123", "github.com/elastic/beats/v7/filebeat/beater/TestProcessorsForConfig", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestReceiveEventFromUDP/udp", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent5424/valid_data2", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/icmp_without_typecode", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/200", "github.com/elastic/beats/v7/libbeat/conditions/TestHasFieldsSingleFieldNegativeMatch", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/pointer_field_with_indirec", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_54", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_loaddmode_disabled_ilm_loadMode_enabled", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Init/stop_init_on_errorr", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(21):_xxxx.ww_-\\\\u003e_2015.01", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestParsePatterns/RFC33339", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/uint", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_201_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestClientSettingsProxy", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_501", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_101_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/user_", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_UpdateTTL/uupdate_TTL_for_resource_with_pending_updates", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_365.0.0.0_to_ip", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/add_nested__labels", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTestFunction/test_su", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNotJsonObjectOrA", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/String", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestNoToken", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/file_watcher_and_file_id", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_CheckConfig/do__not_fail_in_fallback_if_factory_is_fine", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash", "github.com/elastic/beats/v7/filebeat/input/log/TestInputLifecycle/explicitly_closed", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Put", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(31):_KK:mm:ss_aaa_-\\u003e_08:05:24_PM", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/string_value", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputE", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Managerr_EnsurePolicy/create_new_policy", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitUpdateIdentifiers/prospector_init_does_not", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Seep", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters/no_parameters", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/Do_not_ddrop_mandatory_fields", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup/assert_a_harvester_error_is_handled", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheck", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/nil_values", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_50", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_305_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt", "github.com/elastic/beats/v7/libbeat/common/acker/TestLastEventPrivateReporter", "github.com/elastic/beats/v7/libbeat/common/TestToSlice", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_\\u0003cnil\\u003e_\\u003cnil\\u003e_to_integer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_23", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateChan_TryRecv", "TestConfigJSONBlob/successf", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestData", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent3164/valid_data", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_4", "github.com/elastic/beats/v7/heartbeat/monitors/TestTimeoutWait", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_numbeer_from_hierarchical_message.original_to_top_level_message_which_fails", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Yearly_mainntenance_on_Jan_1_from_Midnight_to_3_AM/does_match_2027-01-01T02:45:00Z", "github.com/elastic/beats/v7/filebeat/fileset/TestReplace", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking/acking_published_iincludes_dropped_events_at_end_of_ACK_interval", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_47", "github.com/elastic/beats/v7/filebeat/input/filestream/TestPro", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectWithSuffixFaileed", "github.com/elastic/beats/v7/libbeat/common/cleanup/TestIfBool/IfNot_does_not_run_cleanup", "github.com/elastic/beats/v7/libbeat/common/TestDeleteNonExistentKey", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/_-\\uu003e_192.168.1.219_:_", "github.com/elastic/beats/v7/libbeat/api/npipe/TestTransformString/with_npipe://__scheme", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/192.168", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Multiplle_regex_match_where_none_of_the_patterns_match", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_23", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkEncodeEvents/latest", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Delete_@metadata", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestPrependHyphenToAttr", "github.com/elastic/beats/v7/libbeat/common/TestParseTime", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/drop_nil_string_pointer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_15", "github.com/elastic/beats/v7/libbeat/features/TestFQDN/No_features", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint_1_to_iinteger", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/unhappy", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit/rate_0", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(52):_fffff_-\\u0003e_123", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestConfiggWithIncorrectScope", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/when_the_deliimiters_contains_`{`_and_`}`", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/implicit_targe", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2/if_enabled,_extract_tags_from_IMDS_endpoint", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestPodUIDIndexer", "github.com/elastic/beats/v7/libbeat/cfgfile/TestGlobWatcher", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(45):_SS_-\\u003ee_12", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec/default_json", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_1", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/nil_vvalues", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int32_max", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/Tes", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_cleanEmptyValues/array_w", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_106", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/trim_all_sppace", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstInputManager_Create/does_not_start_an_input_with_duplicated_ID/ID_is_empty", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNode_iisUpdated/resource_version_is_the_same_should_return_not_updated", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Only_poositive_check_where_pattern_not_match_HTTP_return_body", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestConfigDDefault", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Yearly_maintenance_on_Jan_1_from_Midnight", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddErrKeyOption", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestGenerateHints/empty", "github.com/elastic/beats/v7/libbeat/cloudid/TestDecodeError", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/supports_mmetadata_as_a_target", "github.com/elastic/beats/v7/dev-tools/packaging/TestDeb", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc542", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseStr", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractA", "github.com/elastic/beats/v7/filebeat/input/filestream/T", "github.com/elastic/beats/v7/libbeat/kibana/TestTransformMisc", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/SetIggnoreInactiveSince", "github.com/elastic/beats/v7/libbeat/conditions/TestExtractString", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailFatalErrorNotR", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFieldErrorss/non-scalar", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/key_with_empty_keys", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestNoGzipDecodeWithooutHeader", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/executableObjec", "github.com/elastic/beats/v7/filebeat/autodiscover/builder/hints/TestGenerateHints", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_208_using_urls_config_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_101", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScri", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFingerprint", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTestFunction/test_fa", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectData", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstGCStore", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_8", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_x_to_inte", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFaiilConnectUnknownAddress/tls", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionParallel", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv4_eembedded_on_ipv6:\\u003c13\\u003eFeb_25_17:32:18_60::ffff::10.0.1.120_Use_the_Forcee!", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHostname/is_not_set", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/use_event_field", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint8AtOutOfRannge", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestIgnoreFailure/ignore__failure_hides_the_error_but_maintains_flags", "github.com/elastic/beats/v7/libbeat/processors/decode_xml_wineventlog/TestProcesssor/Decodes_properly_with_default_config", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint64Failed", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/dynamic_top", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/withouut_match", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigInvalid", "github.com/elastic/beats/v7/libbeat/kibana/TestTransformFieldFormatMap", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobContsCancelledEvents", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpackFixedZone", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestErrorJob", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchemaCases/ignore_error_at_con", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBackoffFunc/7_retries", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int32_1_to_integer", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestErrorJob/job_error/result_at", "github.com/elastic/beats/v7/libbeat/common/TestIpv4_Ntoa", "github.com/elastic/beats/v7/dev-tools/mage/TestBuildPlatformsListFilter", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitizeed/single_invalid", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/non-existing_field_key", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/UTC", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/scheeme://url:port", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/mappings_type_mism", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuration", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/overwrite_keys", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_9", "github.com/elastic/beats/v7/libbeat/common/acker/TestCombine/AddEvent_distributees", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_SendRecv", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestTimespan", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_5", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_fiield_bad_data_fail_on_error_false", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServiceEventer_NamespaceWatcher/add_resour", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_Truee_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFields/ordeer_1", "github.com/elastic/beats/v7/libbeat/processors/checks/TestRequiredFields/one_reqquired_field_present_in_the_configuration", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule_Unpack/eveery_15_cron_-\\u003e_every_second_interval", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunne", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_6", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/dynamicc_topic_under_agent", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_22", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_MatchesInput/plugin_with_no_user_configured_ID", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_Get/sa", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_::1_to_ip", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/file__watcher_and_file_identity_compatibility/returns_no_error_for_a_fully_default_connfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_18", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Get", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/console/TestConsole", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/default_value", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ConsumeFailed", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup/do-not-overwrite", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/foo__-\\u003e_192.168.1.219_:_", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestGCStore", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportF", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/missing_kkey_in_list", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/all_ffields", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test7_S-1-5", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/unspecified", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_striing_x_to_integer#01", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTesttFunction/test_success", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/more_outputt_hosts", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestAddrs/ipv4", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_nested_map_from_fields", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_46", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_append", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkR", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Multiplle_regex_match_where_at_least_one_must_match", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestDynamicFields", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint16_1_to_long", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTimeout", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParse", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReplaceFieldsFalse", "github.com/elastic/beats/v7/libbeat/conditions/TestOpenGteRangeConditionPositiveMatch", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedTaskLimits/runs_more_thhan_1_with_limit_of_1", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveURIPartsProcessor/ES_==_7.12.0", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/rfc6587_framing_non-transparent", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCCgroupRegex", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_103", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestConfig/removed_config_ssetting", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestInputManager_Create/does_not_start_an_input_with", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/second_list_only", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/errors.Join,_onnly_one_is_ErrNonReloadable", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCommonPaths/supports_a_metadata_", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestEventFormatStringErrors", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(66):_f_-\\u003e__0", "github.com/elastic/beats/v7/heartbeat/TestSystem", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:192:\\u003", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchemaCases/error_at_conversion_case", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/keep_set", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestIsEmpty/when_string_is_nott_Empty", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestNode_iisUpdated/both_empty_nodes_should_return_not_updated", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/no_acess_to_metadata_key", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/detects_a_file_write", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode/key_not_in_fiel", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigNetInfoDisabled", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/short/1_byte_prefix", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/setuiid_set", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCert", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestNewEventFromFi", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/nested_duplicates_fail", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/invalidd_hash", "github.com/elastic/beats/v7/libbeat/outputs/TestReadHostList/one_host_no_worker_set", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestNonZeroRedirect", "github.com/elastic/beats/v7/libbeat/cfgfile/TestH", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestAt", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecconnectsOnConnect/tls/connect", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn/test_key_collison", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/only_reportter_hosts", "github.com/elastic/beats/v7/libbeat/kibana/TestNewGenerator", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcessors/no_settings_should_yield_no_processor_for_ligh", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonConditioon/Negative_string_match_against_int", "github.com/elastic/beats/v7/libbeat/autodiscover/template/TestConfigsMappingKeysstore", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u0033c13\\u003eFeb_25_17:32:18_10.0.0.99_Use_the_Force!", "github.com/elastic/beats/v7/heartbeat/monitors/TestTimeoutWait/100_wait_signals", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrMapstr", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSIDEmptyTarget", "github.com/elastic/beats/v7/libbeat/processors/actions/TestMissingKey", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/padding_on_th", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody/on_error_with_", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestConnectionRefusedEndpointJob", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_41", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/UUID_supports_TextMarsh", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/expannd_true", "github.com/elastic/beats/v7/libbeat/api/TestHTTP", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_sourcce_port1", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/NewLi", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters/Precconfigured_and_local_parameters_are_merged", "github.com/elastic/beats/v7/filebeat/input/v2/input-stateless/TestStateless_Run//events_are_published", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_remo", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestECSErrors/on_non-summary_event", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntCont", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_95", "github.com/elastic/beats/v7/libbeat/common/TestExpireWithoutRemovalListener", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/multiple_errors", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel/when_ssl.", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ResetEmpty", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_loaddMode_disabled_ilm_disabled", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveOppenstackNovaMetadataWithHTTPS", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort/custom_port", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods/sha1", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/overwrite_existing_field", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_Emi", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDs", "github.com/elastic/beats/v7/libbeat/cfgfile/TestHas", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestAddTTLSMetadata", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCCgroupRegex/kubernetes-cri-containerd", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_to_integer#01", "github.com/elastic/beats/v7/libbeat/common/acker/TestEventPrivateReporter/no_droopped_events", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_6", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntPosOK", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestResetableLLimitedReader/WhenResetIsCalled", "github.com/elastic/beats/v7/libbeat/processors/syslog/TestAppendStringField/interface-slice", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/ecs_categorization", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield_String", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2/only_cloud.provider_pre-informed,_no_overwrite", "github.com/elastic/beats/v7/filebeat/inputsource/unix/TestErrorOnEmptyLineDelimiiterWhenStreamSocket", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_97", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsFalse/replace_fields=false_with_only_host.name", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestSanitizeIPs/does_not_change_valid_IPs", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/unspecified", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int8_1_to_long", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/do_nott_truncate_short_string_line", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert/mode/rename", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistr", "github.com/elastic/beats/v7/libbeat/conditions/TestRangeSingleFieldNegativeMatch", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestApplyPresetCustom", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_226_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/mapping/TestDynamicYaml", "github.com/elastic/beats/v7/libbeat/common/TestParseURL/default_scheme_https", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack/nested_keys", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/mapping_with_constant_key", "github.com/elastic/beats/v7/filebeat/fileset/TestEvaluateVarsNginx", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestValidDropPolicyConnfig", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/try_too_truncate_integer_and_get_error", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/non-existing_field_key", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=true/with_input=false/custom_parent=false/public_metrics=false", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent5424/valid_data", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_bool_type", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/-0500", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec/pretty_enabled", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/load_illm_without_template", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int16_max", "github.com/elastic/beats/v7/libbeat/asset/TestGetFields", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestEventFormatString", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCertExpirationMetadata", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestGrowWindowSizeToMaxOKOnnly", "github.com/elastic/beats/v7/heartbeat/look/TestPositiveRTTIsKept", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSu", "github.com/elastic/beats/v7/libbeat/processors/actions/T", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedTaskLimits/runs_50_inteerleaved_without_limit", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking/dropped_event_", "github.com/elastic/beats/v7/libbeat/cloudid/TestOverwriteErrors", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_7", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/too_many_backeends", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSumm", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_Get", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32AtOutOfRange", "github.com/elastic/beats/v7/libbeat/api/TestConfiguration/when_user_is_set", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestConverter/test_clloud_id_conversion", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/disabled", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportCloosedOnWriteReadError/tls/socks5", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Delete", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestSetDeadLetter", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/incomplete_bacckend", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AvailAndLenConsiderResset", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/with_match", "github.com/elastic/beats/v7/libbeat/processors/checks/TestAllowedFields/one_allowed_field_present_and_one_not_allowed", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Positivve_with_negative_check_where_positive_and_negative_pattern_both_match", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_uiint64_ok", "github.com/elastic/beats/v7/dev-tools/mage/: TestPackageZip", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_int_0_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/hour_and_minute_offset", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDocumentID", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector/constant_in_multi_key", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods/xxhash", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/wwith_beat_default_fields_and_custom_name", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/exeecutableObject_elf_go", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstCursor_Unpack/unpack_from_in_memory_state_if_updates_are_pending", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_ID", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int64_1_to_float", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_46", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/default_vvalue_type_mismatch", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestConfigUnppackEmptyInterfaces", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int_min", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiMatchCont", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectWithSuffixFail", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckJsonConditioon/unparseable", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/Custom", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestIgnor", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestAtomicSStateLoader", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/deletted", "github.com/elastic/beats/v7/libbeat/processors/add_id/TestNonDefaultTargetField", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/add_fields__to_nil_event", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttExpirationMetadata", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/-07", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_Enabled", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadPassword", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/suppor", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/mb_chars/extra_byte_prefix", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/DeepUpdate", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/under_root", "github.com/elastic/beats/v7/filebeat/config/TestGetConfigFiles_Invalid", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadUnreadByteOK", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestEncoding/base64", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCreate/invalid_keyword", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/exeecutableObject_elf_garble", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestValidateBeatConfig", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveOpenstackNovaMetadata", "github.com/elastic/beats/v7/libbeat/kibana/Test", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_42", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_77", "github.com/elastic/beats/v7/libbeat/processors/TestIfElseThenProcessor/if-then-eelse-false", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int16", "github.com/elastic/beats/v7/heartbeat/monitors/TestMonitorBasic", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorDeletedFile", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadBufBigger", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_AnotherLogDi", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstPublish/publish_returns_error_if_context_has_been_cancelled", "github.com/elastic/beats/v7/filebeat/input/log/TestMatchFileWindows", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAlternativeFlo", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_getTags/empty_ta", "github.com/elastic/beats/v7/libbeat/common/schema/mapstrstr/TestKeyInErrors", "github.com/elastic/beats/v7/libbeat/autodiscover/template/TestNilConditionConfigg", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestMaintWin/Every", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult_invallid", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestUnpack", "github.com/elastic/beats/v7/libbeat/common/TestTimeString/empty_config", "github.com/elastic/beats/v7/libbeat/features/TestNewConfigFromProto/nil", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFields/order_2", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int8_1_to_float", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestEventWithReeplaceFieldsTrue", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/ignore_errors", "github.com/elastic/beats/v7/filebeat/fileset/TestMcfgFromConfig/set_variable", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestPodInndexer", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrSliceMapstr", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/no_host", "github.com/elastic/beats/v7/libbeat/dashboards/TestReplaceStringInDashboard", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteNetUint8At", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint32_min", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWit", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/test4_S-1-5-113", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_0_too_boolean", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32AtFailed", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverWithMutlipleEntries", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topics_setting", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields//with_origin/simple/result_at_index_0", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEvent", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPodEvente", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestIncompleteXML", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_55", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/empty/DeepUpdate", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/no_acess_to_metadata_key", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigGeoDisabled", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/timestamp_with_nanoseco", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcess", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestTimestamps", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/missinng_field", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUnreachableJob", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveDescription/ES_\\u003c_7.9.0", "github.com/elastic/beats/v7/libbeat/common/TestParseURL/http", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/192..168.1.218_-\\u003e_8.8.8.8_:_outbound", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLine", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIfRemoved", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/expressiion_simple_match", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/Test_intervalScheduler_Next", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_108", "github.com/elastic/beats/v7/libbeat/common/acker/TestConnectionOnly", "github.com/elastic/beats/v7/heartbeat/monitors/jobs/TestWrapAll/continuations", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_destination_port1", "github.com/elastic/beats/v7/libbeat/processors/actions/TestMimeTypeFromTo", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/supports_metadata_as_a_targe", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_08_to_integer", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArgv/_", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCopyTruncateProspector_Create", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/tr", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRu", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/unhappy", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_to_float", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestSimpleJob/simple", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_cutset_in_", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner/does_not_iissue_warnings_when_file_is_too_small", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestNew/default", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestTrackerRecordFlappingDisabled", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/seed", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_April", "github.com/elastic/beats/v7/libbeat/cloudid/TestOverwriteSettings", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_fiield_urldecode_from_and_to_equals", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/leading_zero", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/templatte_disabled_but_loading_enabled", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecoonnectsOnConnect", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/1.1..1.1_-\\u003e_192.168.1.218_:_inbound", "github.com/elastic/beats/v7/libbeat/processors/dissect/Te", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CreateAnddRun/fail_if_input_type_is_unknown_to_loader", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/outputs/elasticsearch/TestToOtelConfig/check_preset_config_translation/co", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/self_target", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportReconne", "github.com/elastic/beats/v7/heartbeat/monitors/TestSimpleWait/100_wait_signals", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestOp_Execute/ackingg_multiple_ops_applies_the_latest_update_and_marks_key_as_finished", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadFromOK", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceStoreTakeOver", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestProjectBrowserJob", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/short/extra_byte_prefix", "github.com/elastic/beats/v7/filebeat/fileset/TestGetInputConfigNginxOverrides", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash//delete", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/fail_on_iinvalid_format_string_in_list", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexabllePolicyConfig/dead_Letter_index_policy_empty_index", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_30", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/user", "github.com/elastic/beats/v7/libbeat/processors/actions/TestRenameRun/renames_connflicting_keys._partially_works_because_fail_on_error_is_false", "github.com/elastic/beats/v7/heartbeat/look/TestReasonGenericError", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32Failed", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_to_integer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNanosecondParsing", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestLegacyServiceNameConfig", "github.com/elastic/beats/v7/libbeat/common/acker/TestNil", "github.com/elastic/beats/v7/dev-tools/mage/TestGoTest_CaptureOutput/passing_test", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_CheckConfig/succcess", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_426", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestConfig/default_config", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_too_integer#01", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFFilter/BEATS_ADD_CLOUD_METADATA_PROVIDERS_overrides_default", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_49", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_20", "github.com/elastic/beats/v7/filebeat/input/log/TestIsCleanInactive", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_9", "github.com/elastic/beats/v7/filebeat/fileset/TestAdaptPipelineForCompatibility/EES_\\u003c_6.7.0", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_57", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/T", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/overwrite_false", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestLegacyServiceNameCoonfig/given_config_map_{\\", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Mayy", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/combine_from_2_processors", "github.com/elastic/beats/v7/heartbeat/monitors/TestChannelWait/one_wait_signals", "github.com/elastic/beats/v7/libbeat/common/cli/TestConfirm/Test_default_no", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceStore_CleanIf/entries_are_left_alone_when_function_", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/long/al", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstCursor_IsNew/true_if_key_is_not_in_store", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_508", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_ResetCursor/reset_cursor_with_no_pending_updates", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/eveent_index_without_ilm", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadByteOK", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper/use_dowait", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVField/restore_on_e", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(5):_yyyy.MMMM.dd_-\\u003e_2006.August.1", "github.com/elastic/beats/v7/libbeat/outputs/console/TestConsoleOutput/single_json_", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestGenerateHints_Service", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestMonitoringNameFromConfig", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestAdditionalStdFields//with_origin/simple", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUnreachableEndpointJob", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectWithSuffixNoDatta", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadFromIfEOF", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/al", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/Test_intervalScheduler__Next", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportClosedOnWriteRea", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AppendNil", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods/sha384", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCreate/bad_type", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDateParsing/z+0000", "github.com/elastic/beats/v7/libbeat/common/TestMarshalUnmarshalMap", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/field_not_presennt", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToAr", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestIgnoreMissing/true", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_40", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/custom_int_type", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/setgiid_set", "github.com/elastic/beats/v7/libbeat/processors/TestEmptyCondition", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u0033c34\\u003eOct_11_22:14:15_mymachine_su:_'su_root'_failed_for_lonvick_on_/dev/pts//8", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/multiple_keyss_not_end_of_string", "github.com/elastic/beats/v7/libbeat/outputs/console/TestBulkReadToItems", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/combine_from__2_processors", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_12", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/sample", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestR", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig/with_valid_triim_mode", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCountting", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup", "github.com/elastic/beats/v7/libbeat/processors/dns/TestDNSProcessorRun/metadata_target", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionBetweenGoTypes", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int_min", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/OSS_release_of_Elastiicsearch_(Code:_405)", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int64_max", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/named_skiped_field_wi", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/unicode_separator", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestSocks5Job", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPipelinePubblishFail", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestGCStore/", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/detects_a_file_remove", "github.com/elastic/beats/v7/libbeat/outputs/TestReadHostList/one_host_workers_set", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_November", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int8_min", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_fiield_urldecode_To_empty", "github.com/elastic/beats/v7/libbeat/kibana/TestTransformGroup", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestTLSSANIPConnectionn", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_CheckConfig/ignnore_ErrUnknownInput_and_use_check_from_fallback", "github.com/elastic/beats/v7/heartbeat/TestSyst", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_47", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/1.1..1.1_-\\u003e_8.8.8.8_:_external", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/Test", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_58", "github.com/elastic/beats/v7/libbeat/monitoring/report/elasticsearch/TestStopper/wait_after_stop", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_15", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestDefaultHarvesterGroup/asser", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult/searcch_results_response_from_7.0", "github.com/elastic/beats/v7/libbeat/processors/actions/TestMimeTypeTestNoMatch", "github.com/elastic/beats/v7/libbeat/processors/registered_domain/TestProcessorRun", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(69):_ffff_-\\u0003e_000", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simple_fiel", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/match_loopback", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/with_client", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_harvester_can_be_restarted", "github.com/elastic/beats/v7/libbeat/common/TestTimeMarshal", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCEMetadataInK8s", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_64", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClientWaitClose", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/icmp", "github.com/elastic/beats/v7/libbeat/processors/add_locale/TestTimezoneFormat", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult_invalid", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/bad_addrs", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttExpirationMetadata/Missing_not_after", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/duplicates_fail", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelector", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServicceEventer_NamespaceWatcher/add_resource_metadata.namespace_disabled_and_hints_enaabled.", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstCursor_IsNew/true_if_key_is_in_store_but_without_cursor_value", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuration/3s_format_a", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_5", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_37", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ESS_\\u003e_7.10.0", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/iana_number", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/static__topic", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/fields_get_key", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/simple_appendd", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/wwith_observer_default_fields", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestProcessingClose", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/cron_every_miinute", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_54", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/named_skiped__field_with_indirect", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/merge_with__existing_fields", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvert/ignore_missing", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/NetString_supportss_TextMarshaller", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_getTags/ttags_extracted_from_IMDS_if_possible", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestConverter/test_converter_fu", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_removeDuplicates", "github.com/elastic/beats/v7/dev-tools/mage/TestBuildPlatformsListRemoveOS", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/invalid_sourcce_IP", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/drop_nil_time_poinnter", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/braccketed_ipv6", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_Create/runner_eexsits_in_factory_only", "github.com/elastic/beats/v7/libbeat/conditions/TestEqualsMultiFieldAndTypePositiveMatch", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPipelineSelection", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestBadProceess", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_MatchesInput/plugin_with_user_configured_ID", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_208_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/drop_nil_time_pointer", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/retries_the_ba", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint64_1_to_integer", "github.com/elastic/beats/v7/filebeat/input/log/TestDeprecatedUse/allow_if", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int32_1_to_double", "github.com/elastic/beats/v7/libbeat/autodiscover/TestErrNonReloadableIsNotRetried", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_uint64_okk", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_0b1_to_", "github.com/elastic/beats/v7/libbeat/common/cli/TestExitWithoutError", "github.com/elastic/beats/v7/libbeat/processors/actions/TestArrayWithArraysDisablled", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestCursor_", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntOK", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode/last_node_in_fields", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go/wor", "github.com/elastic/beats/v7/libbeat/api/npipe/TestIsNPipe/return_false_if_its_not_a_", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/equal_hosts", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/do_nott_truncate_characters_of_short_byte_line", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestSocks5Job/not_using_local_resolv", "github.com/elastic/beats/v7/libbeat/processors/timestamp/TestTimezone/no_timezone", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeer/no_retries,_single_down", "github.com/elastic/beats/v7/dev-tools/packaging/TestZip", "github.com/elastic/beats/v7/libbeat/kibana/T", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Aug", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/a_is_object_and_prefix_of_b", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStre", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings//outputLevelQueue", "github.com/elastic/beats/v7/libbeat/processors/decode_xml_wineventlog/TestProcesssor/Decodes_without_ECS", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/CustomLargeMessagePayload#01", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestAlwaysDrop", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv4/unspeccified", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/versionTest_v:30:\\u003c34\\", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestNoBatchAssemblyOnNilTTarget", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvvent_Node", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/delete", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorRenamedFile//one_renamed_file_with_rename_tracker_with_close_renamed", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveDigitalOceanMetadata", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/complex", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template-defaul", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(50):_fff_-\\u0033e_123", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestConfigName//Check_of_name", "github.com/elastic/beats/v7/libbeat/processors/dns/TestMiekgResolverLookupPTR", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/supports_metaadata_as_a_target", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure/load_default", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestES1StyleErrorStatus", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDelimiter/Mu", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_value", "github.com/elastic/beats/v7/libbeat/common/cli/TestReadPassword/Test_empty_input", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestGenerateHints", "github.com/elastic/beats/v7/filebeat/fileset/TestAppendWithoutDuplicat", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/split__data_stream", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_DELETE", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:190:\\u003", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_22", "github.com/elastic/beats/v7/libbeat/common/Tes", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/usee_indices", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_9", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/Tag", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFactory_CheckConfiig", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/ExampleDecoder_Decode", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv6:_1:2:3:4:5:6:7:8:\\u003c13\\u", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_0_to_boolean", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFingeerprint/fingerprint_to_native_fails", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveAWWSMetadataEC2/only_cloud.provider_pre-informed,_overwrite", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/expand_false", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_Run/o", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_muultiple_fields_urldecode", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrSliceString", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestToMapstr", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvent_Node/Test_node", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_values_m", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent3164", "github.com/elastic/beats/v7/filebeat/fileset/TestMissingModuleFolder", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Sep", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelec", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_OpenClose/load_from_empty", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel/when_ca,_cert,_key_and_key_passphrase,_cipher_sui", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestFilteredGenMetaExclusion", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(70):_fffff_-\\u0003e_000", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestValidate/nohost", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_28", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_WriteByteFixedFail", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_40", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Init/calls_all_input_maanagers", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestNewGroup", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/no_chhange", "github.com/elastic/beats/v7/libbeat/mime/TestMimeType/macho", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveURIPartsProcessor/ES_\\u0003c_7.12.0", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeer/start_down,_stay_down", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestValidate", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/single_tag_co", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u0033c34\\u003eOct_11_22:14:15.57643_mymachine_su:_'su_root'_failed_for_lonvick_on_/deev/pts/8", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_8", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/canno", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverWithConfigCheckkFailures", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(4):_yyy.MMM.dd__-\\u003e_2006.Aug.01", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/int8", "github.com/elastic/beats/v7/filebeat/fileset/TestNewModuleRegistry", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32AtInRangee", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run/positive_flow", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int8_1_to_double", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_15", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON/any_error_from_the_seerver", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Init/stop_init_on_error", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_nested_map_from_fiields", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readResp", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/setuiid_and_setgid_set", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestMultiByte", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_11", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportClos", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSettin", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillDeadLetterSuccess", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestJsonBody/conditioon_mismatch", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/fields_get_key", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_505", "github.com/elastic/beats/v7/libbeat/processors/TestBadConfig", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttFields/cross_signed_chain,_one_root_included", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of_minn_uint32_+_1,_partitions_12", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_0X0A_to_integer", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/Single_host", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods/sha256", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/float32_value", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_mapstr.M", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_values__match", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/supports_metadata_as_a_target", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportRecconnectsOnConnect/tls/socks5", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestConverter", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule_Unpack/onee_minute_-\\u003e_one_second", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/sets_the_@ttimestamp_field_with_the_correct_format", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreatePro", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveDiigitalOceanMetadata", "github.com/elastic/beats/v7/filebeat/harvester/TestInitRegexp", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestSourceFieldErrors/non-scalar", "github.com/elastic/beats/v7/libbeat/features/TestNewConfigFromProto/fqdn_enabled", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_23", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_21", "github.com/elastic/beats/v7/libbeat/cfgfile/TestNewConfigs", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestIgnoreFailure/ignore", "github.com/elastic/beats/v7/heartbeat/monitors/TestDuplicateMonitorIDs", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(27):_xxxx.w.EEEEE_-\\u003e_2015.1.Wednesday", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveOpenstackNovaMet", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestResetableLim", "github.com/elastic/beats/v7/libbeat/processors/dns/TestCache", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/nil_overri", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseHeader", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash//failed_hash_on_update", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ESS_\\u003c_7.10.0:_existing_if_with_contains", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv6:__1::2:\\u003c13\\u003eFeb_25_17:32:18_1::2_Use_the_Force!", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_x_to_bool", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/rfc6587_framing_octet#01", "github.com/elastic/beats/v7/libbeat/common/TestRandomBytes", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_May", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCertExpirati", "github.com/elastic/beats/v7/filebeat/beater/TestMatchRegistryFiles", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_ResetCursor/reset_cursor_with_pending_updates", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSetting/checkRemovedSetting", "github.com/elastic/beats/v7/libbeat/TestTemplate/default_field_length", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/empty_string", "github.com/elastic/beats/v7/heartbeat/config/TestDefaults/TCP_monitor_override", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportCloosedOnWriteReadError/tcp/socks5", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilSymbolOK", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/padding_on_thhe_last_key_need_a_delimiter", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportReconnec", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun/unknown_protoocol", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilCRLFCont", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_11", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/fail_on_inv", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/short/all_byte_prefix", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportClose", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHostname", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilCRLFOnlyCRThenCRLF", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/size_over_hash_limit", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestIgnoreFailure/defaultt_is_to_fail", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_423", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiMatchNo", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexablePolicyConfig/dead_Letter_index_policy_without_index", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int16_1_to_float", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/condition_empty", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndH", "github.com/elastic/beats/v7/filebeat/fileset/TestAppendWithoutDuplicates/disabled_config", "github.com/elastic/beats/v7/libbeat/mapping/TestDynamicYaml/strict_mode", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestAllocs", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/nill_overrides", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_36", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestCache", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestNewInput_Run_Wait", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestConfiggWithCustomBuilders", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_root-level_dot-ke", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_40", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash", "github.com/elastic/beats/v7/libbeat/processors/add_data_stream/TestAddDataStream/defaults_ds/ns", "github.com/elastic/beats/v7/heartbeat/monitors/TestPreProcess", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_AnotherLogDir", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProcessor_Ru", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4/unspeccified", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestAddToURL", "github.com/elastic/beats/v7/filebeat/fileset/TestMcfgFromConfig/empty_fileset_", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/too_many_ops", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_uint64_maasked", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/invalid_no_key_fiield", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/field_not_present", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float64_1_to_double", "github.com/elastic/beats/v7/libbeat/monitoring/report/TestMergeHosts/only_output_hosts", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestNonRecursive", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_UpdateTTL", "github.com/elastic/beats/v7/heartbeat/monitors/TestPr", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/mb_ch", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileWatcher/does_not_emit_events_if_a_file_is_touched_and_resend_", "github.com/elastic/beats/v7/libbeat/common/cleanup/TestIfBool/IfNot_runs_cleanupp", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/SetIggnoreInactiveSince/ignore_inactive_since_set_to_since_last_start", "github.com/elastic/beats/v7/filebeat/input/filestream/TestNumericSorter/unordered_fileinfos", "github.com/elastic/beats/v7/libbeat/processors/actions/TestExpandKeysError/target_set_to_''", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceStore_CleanIf/entries_are_cleaned_when_function_returns", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestClientSettingsOverrrideEnvironmentProxy", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_24", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_300_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_BuildSelector/witthout_ilm", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestRecordiingAndFlapping", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(20):_xxxx.ww_-\\\\u003e_2015.01", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/missing_ffield_ignore", "github.com/elastic/beats/v7/libbeat/processors/actions/TestRenameField/simple_rename_of_field", "github.com/elastic/beats/v7/heartbeat/monitors/Test_runPublishJob/multiple_conts", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateChan_TryRecv/reading_updates_consumes_all_pending_update", "github.com/elastic/beats/v7/libbeat/common/schema/mapstriface/TestConversions", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/: TestCheckBody/Only_positive_check_where_pattern_not_match_HTTP_return_body", "github.com/elastic/beats/v7/libbeat/outputs/console/TestConsoleOutput", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv4", "github.com/elastic/beats/v7/libbeat/common/cli/TestFormat", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_string_x_to_long", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_ResetCursor", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary", "github.com/elastic/beats/v7/libbeat/processors/urldecode/TestURLDecode/simple_field_url", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_cleanEmptyValues/array_with", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_OpenClose/ignore_entries_with_wrong_index_on_open", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/cannot_bool_true_to", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_412", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Mar", "github.com/elastic/beats/v7/libbeat/common/schema/TestOptions", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updated_setgid_field", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestStore_UpdateTTL", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestStore_Get", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestProcessor/not_trimming_by_default", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsHasNode/node_in_fields", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail/invalid_keys_type", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestGenerateProcessorLiist", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_20", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Regex_mmatching_lastline_of_multiline_body_string", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_ASCII_TIILDE", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16AtInRange", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_58", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/Tes", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/Test", "github.com/elastic/beats/v7/libbeat/cfgfile/TestCreateRunnerAddsDynamicMeta/withh_dynamic_fields", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestOverwriteKeys/", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestReloader/updates_the_outputt_configuration_on_the_beat", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileIdentifier/fingerpprint_identifier", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/leadinng_zero", "github.com/elastic/beats/v7/libbeat/api/npipe/TestIsNPipe/return_true_on_named_ppipe", "github.com/elastic/beats/v7/libbeat/instrumentation/TestAPMTracerDisabledByDefault", "github.com/elastic/beats/v7/filebeat/inputsource/udp/: TestReceiveEventFromUDP/udp/Sending_a_message_under_the_MaxMessageSize_limit", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simplle_field_unpadded_base64_decode_from_and_to_equals", "github.com/elastic/beats/v7/libbeat/licenser/TestIsExpired/trial_is_not_expired", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestLoaderDBKey", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_true_to_boolean", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint8_1_to_double", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestKeySelection/key_setting", "github.com/elastic/beats/v7/libbeat/common/acker/TestConnectionOnly/passes_ACKs__if_not_closed", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:0:\\u003c0\\u00", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestUpdateWriter", "github.com/elastic/beats/v7/libbeat/processors/cache/TestMemStore/new_get_add_puut", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/multiple_object_type_con", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint16_1_to_integer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_26", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexabllePolicyConfig/non_indexable_policy_with_invalid_policy", "github.com/elastic/beats/v7/libbeat/common/TestParseURL/https", "github.com/elastic/beats/v7/libbeat/common/TestRemoveChar/when_we_have_one_char__to_replace", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_19", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/wraputil/TestURLFields/ffancy-proto", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestMetricSnapshotJSON", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceConvertIPWithGrok/missing_field", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defaault_ilm_loadMode_disabled", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldsCanConcat/node_in_fields", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Febbruary", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_1", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadPipelinesWithMultiPipelineFileset", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchNoContainer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_2", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrDouble", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/int8_value", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestEmptyMetaJson", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldDoesntExist", "github.com/elastic/beats/v7/libbeat/processors/checks/TestRequiredFields", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_29", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_56", "github.com/elastic/beats/v7/heartbeat/monitors/Test_runPublishJob", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectWithSuffixNoData", "github.com/elastic/beats/v7/filebeat/input/v2/TestPlugin_Validate", "github.com/elastic/beats/v7/filebeat/input/syslog/TestProgram/is_set", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestHash2Partition/hash_of", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizerPluginOrder/on", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestLegacyServiceNameCoonfig", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfig", "github.com/elastic/beats/v7/libbeat/processors/actions/TestBadConfig/no-replacement", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(73):_ffffffff_--\\u003e_00000012", "github.com/elastic/beats/v7/libbeat/processors/cache/TestValidate/get", "github.com/elastic/beats/v7/libbeat/beat/events/TestGetMetaStringValue/nested", "github.com/elastic/beats/v7/libbeat/features/TestFQDN", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_119", "github.com/elastic/beats/v7/filebeat/input/filestream/TestValidateInputIDs/empty_config", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestStateLoaderRetry/should_not_retry_when_fails_with_non-retryable_er", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestEventFailedHash/move", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestTrimmer/trim_UTF-8_CO", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/ilm_enaabled_but_overwrite_disabled", "github.com/elastic/beats/v7/filebeat/fileset/TestApplyOverrides/enable_and_var_overrides", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_user_configured_ID/plugin_with_user_cconfigured_ID_with_id:_my_test_plugin::my-id::my_test_plugin::my_id", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_value_type_from_metaadata", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_89", "github.com/elastic/beats/v7/filebeat/input/log/TestCleanOlderIgnoreOlderErrorEquual", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestConfigUnderElasticAgent/emp", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo/without_limit,_all_goroutines_run", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_79", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestSchedule_Unpack/bad_format", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_In", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_already_locked_resource_has_to_wait", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_to_long", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/short/1_", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/docker/TestGenerateMeetaDockerNoDedot", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrTime", "github.com/elastic/beats/v7/filebeat/fileset/TestGetInputConfigNginxOverrides/close_eof", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkReadItemStatus", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/erro", "github.com/elastic/beats/v7/libbeat/common/schema/TestSchemaCases", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_12", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_37", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(61):_fffff_-\\u0003e_00012", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPPathMatcher_InvalidSource4", "TestLegacyServiceNameConfig/given_config_map_{\\\"id\\\":\\\"myId\\\"", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiUintNotDigit", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFFilter/none_if_BEATS_ADD_CLOUD_METADATA_PROVIDERS_is_explicitly_set_to_an_empty_llist", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Go", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/a_root-level_dot-", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestValidate", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=true/with_input=true/custom_parent=true/public_metrics=true", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt/custom_port", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPid/is_not_set", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_49", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint64AtInRange", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCh", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/crlf", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Nov", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/int64", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestStateLoaderRetry/should_retry_3_times_when_fails_with_retryable_er", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_0X0AA_to_integer", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_ResetCursor/reset_cursor_with_pending_updates", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int64_1_to__integer", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck/multiple_IPs_fieeld_negative_match", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Single__regex_that_doesn't_match", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBuildTopicSelector/static_topic", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/stringg_field_gzip_decompress", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/updatted_setuid_field", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_44", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack/IP_list", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/use_event_fiel", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestEmitEvvent_Node/Test_service_without_host", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNewDropFields/detectss_regexp_fields_and_assign_to_RegexpFields_property", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestNewInput_ConnectWithFailed", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/UUID_supports_TexttMarshaller", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirect", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int_1_to_long", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestZeroMaxRedirectShhouldError", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_nested_map_from_metadata", "github.com/elastic/beats/v7/filebeat/input/stdin/TestNewInputDone", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiIntFailed", "github.com/elastic/beats/v7/libbeat/outputs/otelconsumer/TestPublish/sets_the_ellasticsearchexporter_doc_id_attribute_from_metadata", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent3164/invalid_data", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirection/192..168.1.218_-\\u003e__:_", "github.com/elastic/beats/v7/filebeat/inputsource/udp/TestValidate/network_udp6", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestPodUIIDIndexer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Dec", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestMakeClientWorker/netwwork_client", "github.com/elastic/beats/v7/heartbeat/monitors/TestCheckInvalidConfig", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestDefaultCCgroupRegex/kubernetes-crio", "github.com/elastic/beats/v7/heartbeat/autodiscover/builder/hints/TestGenerateHints", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspector_InitCleanIfRemoved/prospector_init_with_clean_remov", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddLabels/add_dotted__label", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv4_mmapped_on_ipv6:\\u003c13\\u003eFeb_25_17:32:18_::ffff:0:255.255.255.255_Use_the_Forrce!", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_410", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/TestCommandLineToArg", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_50", "github.com/elastic/beats/v7/libbeat/common/Test", "github.com/elastic/beats/v7/auditbeat/helper/hasher/TestHasher", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/monitor/TestVisitCanncel", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestGetMimeType/png", "github.com/elastic/beats/v7/filebeat/fileset/TestInterpretError/another_error", "github.com/elastic/beats/v7/heartbeat/monitors/jobs/TestWrapAll", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobConts", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestECSErrors", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(29):_KK:mm:ss_aaa_-\\u003e_08:05:24_AM", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_48", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestGrowWindowSizeUpToBatchSizes", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1_too_long", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_66", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceSetIgnoreEmptyValue/no_vvalue", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_OpenClose/fail_if_persistent_store_can_not_be_accessed", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/multiple_fields", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_root-level_dot-key_ffrom_metadata", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestOverwriteKeys/overwrite_existing", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServiceEventer_NamespaceWat", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_UntilSymbolFailed", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_23", "github.com/elastic/beats/v7/libbeat/common/cfgtype/TestTimezoneUnpack/+0500", "github.com/elastic/beats/v7/libbeat/common/cfgwarn/TestRemovedSet", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBaseline", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestManager_InputsTest", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topic_configured", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLineWithCR", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking/acking_published_iincludes_dropped_events_in_middle", "github.com/elastic/beats/v7/libbeat/dashboards/TestReplaceIndexInDashboardObjectt", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/time_iin_ISO8601_format:\\u003c190\\u003e2018-06-19T02:13:38Z+00_super_mon_message", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestPromoteOutputQueueSettings/blank", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexablePolicyConfig", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/creates_a_wrapped_proc", "github.com/elastic/beats/v7/dev-tools/mage/TestBuildPlatformsListDefaults", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMe", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int64_1_to__double", "github.com/elastic/beats/v7/libbeat/processors/actions/TestReplaceRun", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestMakeClientTracer", "github.com/elastic/beats/v7/filebeat/input/syslog/TestIsValid", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmitEvent", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_30", "github.com/elastic/beats/v7/libbeat/kibana/TestValidDuplicateField", "github.com/elastic/beats/v7/filebeat/fileset/TestMovedModule", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestUnnestStream/base_is_las", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestBulkRequestHasFilterPath", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_falsse_to_boolean", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFa", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manag", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/every_second", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_1.1_to_double", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_F_too_boolean", "github.com/elastic/beats/v7/heartbeat/look/Tes", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint16AtFailed", "github.com/elastic/beats/v7/filebeat/input/syslog/TestFacility", "github.com/elastic/beats/v7/libbeat/processors/ratelimit/TestRateLimit/rate_2_per_min", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestInitKibanaConfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_70", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestDefaultSupport_Manager_Enabled", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrInt/int64", "github.com/elastic/beats/v7/libbeat/common/transform/typeconv/TestConversionWithhMapStr/to_mapstr.M", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddTags/single_tag_coonfig_without_array_notation", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/Test_intervalScheduler__Next/one_second", "github.com/elastic/beats/v7/libbeat/processors/actions/TestValidJSONDepthTwo", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityRResult", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier", "github.com/elastic/beats/v7/filebeat/input/file/TestCleanup/Expired_but_unfinishhed", "github.com/elastic/beats/v7/libbeat/processors/checks/TestAllowedFields/one_alloowed_field_present_in_the_configuration", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestRecordinngAndFlapping", "github.com/elastic/beats/v7/filebeat/fileset/TestMcfgFromConfig/disable_fileset", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/int8_min", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestJSONEncoderMarshalMonitoringEvent", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/Test_intervalScheduler_Next/one_minut", "github.com/elastic/beats/v7/libbeat/mapping/TestAnalyzer/simple_analyzer", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportCloosedOnWriteReadError/tls/connect", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_New/ok", "github.com/elastic/beats/v7/libbeat/mapping/T", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSuppor", "github.com/elastic/beats/v7/libbeat/idxmgmt/lifecycle/TestESSetup", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceStore_CleanIf", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestUserAgentHeader/test-ua-set", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_handleRespBody", "github.com/elastic/beats/v7/filebeat/fileset/TestAdaptPipelineForCompatibility/ES_", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ES_==_7.1", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIsValidAddress", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ESS_==_7.10.0", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadNetUint32Data", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_getTags/tag_extraction_fallback_to_DescribeTag_if_IMDS_f", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/ipv6:__1::2:5:\\u003c13\\u003eFeb_25_17:32:18_1::2:5_Use_the_Force!", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetUDP/IPv6/bad_adddrs", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestExeObjParser/executableO", "github.com/elastic/beats/v7/filebeat/channel/TestRunnerFactoryWithCommonInputSetttings/new_processing_configuration_each_time", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_29", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=true/with_input=true/custom_parent=false/public_metrics=true", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestInvalidNonIndexabllePolicyConfig/dead_Letter_index_policy_without_properties", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/truncaate_bytes_of_too_long_byte_line_with_multibyte_runes", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topics_settting", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionScriptParams/regi", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestConnectionRefusedEEndpointJob", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_08_tto_integer", "github.com/elastic/beats/v7/heartbeat/monitors/stdfields/TestLegacyServiceNameConnfig", "github.com/elastic/beats/v7/libbeat/licenser/TestParseJSON", "github.com/elastic/beats/v7/libbeat/processors/actions/Test_appendProcessor_Run//remove_empty_values_form_output_-_'ignore_empty_values:_true'", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_100_using_urls_config_field", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGenerateCheckConfig/absent_id", "github.com/elastic/beats/v7/libbeat/common/acker/TestTracking/acking_", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt/https_custom_port", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServicceEventer_NamespaceWatcher/add_resource_metadata_default_and_hints_default.", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestErrorFlagging/when_thhe_parsing_is_succesful_do_not_add_a_flag", "github.com/elastic/beats/v7/libbeat/outputs/logstash/TestLogstashInvalidTLSInseccure", "github.com/elastic/beats/v7/libbeat/processors/add_locale/TestExportTimezone", "github.com/elastic/beats/v7/filebeat/processor/add_kubernetes_metadata/TestLogsPathMatcher_InvalidSour", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldVa", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint32_min", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/bad_adddrs", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Space__after_priority:\\u003c13\\u003e_Aug_16_12:25:24_10.12.255.2-1_TRAPMGR[53034492]:_ttraputil.c(696)_135956_%%_Link_Up:_g5.\\\\x00", "github.com/elastic/beats/v7/filebeat/input/filestream/TestProspectorHarvesterUpdateIgnoredFiles", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportCloosedOnWriteReadError/tls", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeJSONFieldsCheckConfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Jan", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int32_1_to_float", "github.com/elastic/beats/v7/libbeat/processors/cache/TestCache/put_and_get_valuee", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_61", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDelimiter/Empty_string", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint_1_to_double", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestSocks5Job/using_local_resolver", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestReadSearchResult_emptyy", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/file__watcher_and_file_identity_compatibility", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_TryRecv", "github.com/elastic/beats/v7/filebeat/fileset/TestMcfgFromConfig/empty_fileset_(nnil)", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_308_using_urls_config_field", "github.com/elastic/beats/v7/libbeat/cloudid/Te", "github.com/elastic/beats/v7/libbeat/common/cli/TestConfirm/Test_default_yes", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/: TestCheckBody/Only_negative_check_where_pattern_not_match_HTTP_return_body", "github.com/elastic/beats/v7/libbeat/api/npipe/TestTransformString/with_windows_ppipe_syntax", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiMatchFailed", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDecodesGzip", "github.com/elastic/beats/v7/libbeat/kibana/TestGenerateExtensive", "github.com/elastic/beats/v7/libbeat/processors/decode_xml_wineventlog/TestProcesssor", "github.com/elastic/beats/v7/filebeat/input/v2/input-cursor/TestOp_Execute/applyiing_final_op_marks_the_key_as_finished", "github.com/elastic/beats/v7/libbeat/common/TestRound", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Maay", "github.com/elastic/beats/v7/libbeat/processors/actions/TestCopyFields/copy_numbeer_from_fieldname_with_dot_to_dotted_message.copied", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/Tes", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmitEvent/Test_", "github.com/elastic/beats/v7/filebeat/input/filestream/TestTakeOverTags/test-take_over-false", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Noov", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs_?type=FOO", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Check__relay_+_hostname_alpha:\\u003c13\\u003eFeb_25_17:32:18_wopr_Use_the_Force!", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/bool_true_to_boolean", "github.com/elastic/beats/v7/libbeat/conditions/TestContainsMultiFieldNegativeMatch", "github.com/elastic/beats/v7/libbeat/common/transport/transptest/TestTransportFailConnectUnknownAdd", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/every_year", "github.com/elastic/beats/v7/libbeat/common/TestUTF16BytesToStringTrimNullTerm", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_New/fail_with_invalid_plugin", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/versionTest_v:100:\\u003c", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestOctetCountting/non-transparent", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHassh/long/extra_byte_prefix", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestDecodeList", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestOnCreateHandler_SubscribeMultiple_Suc", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_26", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestNXDomainJob", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_common_pod_start", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestValidate/invalidnetwork", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_98", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/different_targets", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/short_month/Month_Occt", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_NotMatchesInput", "github.com/elastic/beats/v7/libbeat/api/npipe/: TestIsNPipe", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topics_setting_", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestOnCreateHandler_SubscribeMulltiple_Succeeded", "github.com/elastic/beats/v7/libbeat/processors/checks/TestMutuallyExclusiveRequiiredFields/two_mutually_exclusive_field_is_present_in_the_configuration", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestTargetField", "github.com/elastic/beats/v7/dev-tools/mage/Test_BuildArgs_ParseBuildTags/one_build_tag", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestScanner/executable", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkConfigUnpack/array_values", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmitEvent/", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv/Without_setting_env", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/non-existing_metadata__sub_key", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestConfigForDataType/valid_data_type", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiUintOrEndOK", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestIDLen", "github.com/elastic/beats/v7/libbeat/processors/extract_array/TestExtractArrayProocessor_Run/ignore_errors", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/jolokia/TestInterfaceConfigsUnpack", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_44", "github.com/elastic/beats/v7/heartbeat/monitors/TestSimpleWait/one_wait_signals", "github.com/elastic/beats/v7/filebeat/input/filestream/TestOnRenameFileIde", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods/md5", "github.com/elastic/beats/v7/filebeat/input/v2/TestLoader_Configure/input_config__fails", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_TRUEE_to_boolean", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveNetworkDirectionProcessor", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveURIPartsProcessor/ES_\\u003e_7.12.", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestSessionTesttFunction", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/empty/HasKey", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs__?pretty", "github.com/elastic/beats/v7/libbeat/common/reload/TestRegisterReloadable", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_-0x12_to_integer", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint64_1_to_float", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ReadRuneFailed", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestCursor_Unpack/unpack_from_in_memory_state_if_updates_are_pendin", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_111", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_truee_to_boolean", "github.com/elastic/beats/v7/libbeat/common/encoding/xml/TestInvalidXMLIsSanitized/double_inv", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldValidate/top_level_object_type_co", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(84):_yyyy-MM-ddd'T'HH:mm:ss.fffffffffz_-\\u003e_2017-01-02T04:06:07.123-08:00", "github.com/elastic/beats/v7/heartbeat/monitors/TestRunFrom", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestNewInput_MissingConfigField", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestBackoffFunc", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/overwrite_eexisting_under_root", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/creates_a_wrappped_processor", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/overwrite_true", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/DeepUpdate/no_overwrite", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/topic_must_keep_case", "github.com/elastic/beats/v7/dev-tools/mage/TestLoadSpecs", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_60", "github.com/elastic/beats/v7/libbeat/cmd/instance/TestLogSystemInfo", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(33):_hh:mm:ss_aaa_-\\u003e_09:05:24_AM", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/a_value_type_from_metadata", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRe", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestClientWithHeaders", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/with_mmatch", "github.com/elastic/beats/v7/libbeat/common/fmtstr/TestIsEmpty/when_string_is_not_Empty", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBoundary/priorityTest_v:200:\\u003", "github.com/elastic/beats/v7/heartbeat/monitors/TestDurationWait/100_wait_signalss", "github.com/elastic/beats/v7/filebeat/fileset/TestNewModuleRegistryConfig", "github.com/elastic/beats/v7/auditbeat/TestTemplate", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_31", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/Check_relay_+_hostname_alpha:\\u003c1", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/wrapped_common", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstDefaultHarvesterGroup/assert_a_harvester_is_only_started_if_harvester_limit_havven't_been_reached", "github.com/elastic/beats/v7/libbeat/outputs/kafka/TestTopicSelection/use_event_ffield_must_keep_case", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFaillsNone", "github.com/elastic/beats/v7/libbeat/common/TestTimeString/nanosecond_precision", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel/wwhen_ssl.enabled_=_false", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePort/https_custom", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegistryToFing", "github.com/elastic/beats/v7/libbeat/processors/convert/TestConvertRun/put_error__no_clone", "github.com/elastic/beats/v7/filebeat/input/filestream/TestMigrateRegist", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestCustomDeliimiter/Multiple_chars_delimiter_with_half_ending_delimiter", "github.com/elastic/beats/v7/libbeat/processors/add_observer_metadata/TestOverwriiteTrue", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestErrorOnEmptyLineDelimitter", "github.com/elastic/beats/v7/heartbeat/monitors/maintwin/TestLegacyServiceNameConnfig", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestBuildEvent/setuid_set", "github.com/elastic/beats/v7/libbeat/processors/decode_csv_fields/TestDecodeCSVFiield/restore_on_errors", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestEncoding", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Marrch", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadata/Cus", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_31", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestExpand", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_22", "github.com/elastic/beats/v7/heartbeat/scheduler/TestScheduler_WaitForRunOnce", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_AsciiUintCont", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNanosecondParsing/000123455", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobNoConts/multti-job/result_at_index_0", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_defaault_ilm_default_with_policy_changed", "github.com/elastic/beats/v7/libbeat/common/schema/mapstriface/TestNestedFieldPatths", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestMultiJobC", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/int64_1_to_double", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(30):_K:m:s_a_-\\\\u003e_8:5:24_PM", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestWithConfig/with_@timestamp", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_uiint64_masked", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestCombine_CheckConfig", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_4", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestResource_CopyInto", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestServicceEventer_NamespaceWatcher/add_resource_metadata.namespace_enabled_and_hints_disaabled.", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestSourceIdentifier_MatchesInput/plugin_with_no_user_configured", "github.com/elastic/beats/v7/libbeat/otelbeat/oteltranslate/TestTLSCommonToOTel/wwhen_ca,_cert,_key_and_key_passphrase,_cipher_suites_is_provided", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestErrorFlagging/when_thhe_parsing_fails_add_a_flag", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/bool_true_to_string", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/string_-1_tto_integer", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveE", "github.com/elastic/beats/v7/heartbeat/monitors/TestDisabledMonitor", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/custom_uint64_typee_masked", "github.com/elastic/beats/v7/libbeat/conditions/TestHasFieldsMultiFieldNegativeMatch", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_August", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckStatus/match_multiple_value", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs__", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_MatchesInput/plugin_with_user_configured_ID/plugin_with_user_cconfigured_ID_with_id:_my_test_plugin::my-id::path::my_id", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddErrorToEventOnUnmaarshalError", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/with_id=false/with_input=true/custom_parent=fa", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestUpEndpointJob", "github.com/elastic/beats/v7/filebeat/input/syslog/TestDay/Day_17", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_41", "github.com/elastic/beats/v7/heartbeat/scheduler/TestSchedTaskLimits/runs_50_int", "github.com/elastic/beats/v7/libbeat/processors/TestSafeProcessor/propagates_Closse_to_a_processor_only_once", "github.com/elastic/beats/v7/filebeat/input/netmetrics/TestProcNetTCP/IPv6/unspeccified", "github.com/elastic/beats/v7/libbeat/publisher/pipeline/TestClientWaitClose/WaitClose_blocks", "github.com/elastic/beats/v7/heartbeat/scheduler/TestRecursiveForkingJob", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestSimpleJob/simple/result_at_ind", "github.com/elastic/beats/v7/libbeat/otelbeat/beatconverter/TestLogLevel/test-error#01", "github.com/elastic/beats/v7/libbeat/processors/actions/TestExpandKeysError/target_set_t", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFilter/BEATS_ADD_CLOUD_METADATA_PROVIDERS_overrides_default", "github.com/elastic/beats/v7/libbeat/otelbeat/otelmap/TestFromMapstrSliceDouble", "github.com/elastic/beats/v7/filebeat/input/filestream/TestDateSorter", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/Test_readPrefixAndHash/short/", "github.com/elastic/beats/v7/filebeat/input/filestream/TestTakeOverTags/test-take_over-true", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/truncaate_bytes_of_too_long_string_line", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestCheckBody/Single_regex_t", "github.com/elastic/beats/v7/heartbeat/monitors/active/icmp/TestICMPFields", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Set", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstStore_OpenClose/releasing_store_closes", "github.com/elastic/beats/v7/dev-tools/mage/TestParseVersion", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethods/sha5112", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestSplitHostnamePortt/dotted_domain,_custom_port", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents", "github.com/elastic/beats/v7/heartbeat/monitors/active/tcp/TestMakeEndpoints/hostname", "github.com/elastic/beats/v7/filebeat/input/filestream/TestCreateProspector/SetIgnoreInact", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestPro", "github.com/elastic/beats/v7/libbeat/common/TestIsInputReloadable/common.ErrNonReeloadable", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestGlobalConnectCallbacksManagement", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestGenerateCheckConfig", "github.com/elastic/beats/v7/libbeat/mapping/TestFieldConcat/empty_lists", "github.com/elastic/beats/v7/libbeat/processors/actions/TestNetworkDirec", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestCollectPublishFailsNone", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_107", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_init_container_in_common_pod", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestCursor_IsNew", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetu", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(68):_fff_-\\u0033e_000", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstSourceIdentifier_ID/plugin_with_no_user_configured_ID/plugin_with_no_user_confiigured_ID_with_src:_unique_name", "github.com/elastic/beats/v7/libbeat/autodiscover/TestAutodiscoverDuplicatedConfigCo", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/monitorstate/TestDeferredStateLoaderTimeout", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestUpStatuses/Test_OOK_HTTP_status_204_using_hosts_config_field", "github.com/elastic/beats/v7/libbeat/processors/actions/TestLowerCaseProcessorRunn/Ignore_Missing_Key_Error", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/subseet_of_hashes", "github.com/elastic/beats/v7/libbeat/outputs/redis/TestMakeRedis/Default_password", "github.com/elastic/beats/v7/heartbeat/monitors/active/dialchain/tlsmeta/TestCerttFields/cert_chain_should_still_show_single_cert_fields", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/simplle_field_padded_base64_decode_from_and_to_equals", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/path/TestPosix", "github.com/elastic/beats/v7/filebeat/fileset/TestGetTemplateFunctions", "github.com/elastic/beats/v7/libbeat/outputs/outil/TestSelectorInitFail", "github.com/elastic/beats/v7/libbeat/common/reload/TestReRegisterFails", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/non-compliant_rfc3164_da", "github.com/elastic/beats/v7/libbeat/licenser/TestIsExpired/license_is_not_on_trial", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/uuser_local_fields_and_tags", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/No_priority_defin", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TestGCStore/empty_store", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestProcessorsConfigs/uuser_global_fields_overwrite_beat_local_fields", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestRetrieveGCCEMetadataInK8sNotOverriden", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(49):_ff_-\\u003ee_12", "github.com/elastic/beats/v7/heartbeat/beater/TestMakeESClient/should_not_modify__the_timeout_setting_from_original_config", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMinute/Minute_38", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestZeroMaxRedirectShouldError", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_8", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCreate", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_CollectWithSuffixFailed", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestHandler/GET__inputs_XX", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/ilm_enaabled_but_loading_disabled", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_21", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_72", "github.com/elastic/beats/v7/heartbeat/look/TestReason", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestIncludedExcludedFiles", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecompressGzip/missinng_field_ignore", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_73", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_39", "github.com/elastic/beats/v7/libbeat/monitoring/inputmon/TestNewInputMonitor/withh_id=true/with_input=false/custom_parent=true/public_metrics=false", "github.com/elastic/beats/v7/filebeat/input/TestNewInputDone", "github.com/elastic/beats/v7/filebeat/fileset/TestRemoveURIPartsProcessor/ES_==_77.12.0", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestDiffEvents/movedd", "github.com/elastic/beats/v7/libbeat/common/file/TestGetOSStateStat", "github.com/elastic/beats/v7/libbeat/processors/add_kubernetes_metadata/TestFilteredGenMeta", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCreate/invalid_keywordd", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestDefaultSupport_Enabled/template", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParseAndCreateEvent5424", "github.com/elastic/beats/v7/libbeat/common/jsontransform/TestWriteJSONKeys/overwwrite_true_ISO8601", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Get/@timestamp", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestConfigValidate", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestDownStatuses/testt_down_status_504", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv/Empty", "github.com/elastic/beats/v7/libbeat/processors/decode_duration/TestDecodeDuratioon/1.001s_format_as_", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestFactory/foobar", "github.com/elastic/beats/v7/filebeat/input/syslog/TestParserRFC3164Syslog/:\\u0033c34\\u003eOct_11_22:14:15_wopr.mymachine.co_postfix/smtpd[2000]:_'su_root'_failedd_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/libbeat/licenser/TestIsExpired/trial_is_expired", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestFieldAlreadyExist/witth_conflicting_key_in_prefix", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_58", "github.com/elastic/beats/v7/filebeat/input/file/TestGlobPatterns", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestTargetField/root", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_3", "github.com/elastic/beats/v7/dev-tools/mage/TestRepoRoot", "github.com/elastic/beats/v7/libbeat/kibana/TestCleanName", "github.com/elastic/beats/v7/libbeat/processors/dissect/Test", "github.com/elastic/beats/v7/filebeat/scripts/tester/TestGetPipelinePath", "github.com/elastic/beats/v7/filebeat/inputsource/tcp/TestReceiveEventsAndMetadatta/NewLineLargeMessagePayload#01", "github.com/elastic/beats/v7/libbeat/processors/add_docker_metadata/TestMatchPIDs/cgroup_error", "github.com/elastic/beats/v7/filebeat/input/syslog/TestMonth/full_month/Month_Jannuary", "github.com/elastic/beats/v7/libbeat/processors/add_id/generator/TestSecureMungeddMACAddress", "github.com/elastic/beats/v7/filebeat/inputsource/common/streaming/TestResetableLimitedReader", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_56", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/task/TestGroup_Goo/all_workloads_return_an_error", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse/invalid_syntax", "github.com/elastic/beats/v7/filebeat/fileset/TestEnableFilesetsFromOverrides/no_modules", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_16", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/numeric_string_ignore_octal", "github.com/elastic/beats/v7/libbeat/autodiscover/providers/kubernetes/TestPod_EmmitEvent/Test_common_pod_start_with_multiple_ports_exposed", "github.com/elastic/beats/v7/libbeat/processors/add_host_metadata/TestSkipAddingHostMetadata", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestProxyDisableOverriidesProxySettings", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/uint16_1_to_double", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestNewInputDone", "github.com/elastic/beats/v7/filebeat/config/TestGetConfigFiles_EmptyDir", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV00/Get_@metadata", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/array_of_custom_boool_type", "github.com/elastic/beats/v7/auditbeat/module/file_integrity/TestHashFile/size_beelow_hash_limit", "github.com/elastic/beats/v7/libbeat/publisher/processing/TestOutputReload/clientt", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun", "github.com/elastic/beats/v7/libbeat/processors/actions/TestTruncateFields/do_not_t", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/custom_uint_type", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/Test_priorityResult", "github.com/elastic/beats/v7/libbeat/processors/checks/TestAllowedFields/two_alloowed_field_present_in_the_configuration", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/windows/Tes", "github.com/elastic/beats/v7/libbeat/common/dtfmt/TestFormat/run_(26):_xxxx.w.EEEEE_-\\u003e_2015.1.Thursday", "github.com/elastic/beats/v7/libbeat/kibana/TestTransformGroupAndEnabled", "github.com/elastic/beats/v7/filebeat/config/TestEnabledInputs/IsInputEnabled/inpput_doesn't_exist", "github.com/elastic/beats/v7/libbeat/outputs/elasticsearch/TestPublish/live_ba", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToIntt/uint8_max", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestMakePath", "github.com/elastic/beats/v7/filebeat/input/syslog/TestNanosecondParsing/0005", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/Delete/a_value_type_from_fields", "github.com/elastic/beats/v7/libbeat/outputs/codec/json/TestJsonCodec/UTC_timezone_offset", "github.com/elastic/beats/v7/libbeat/common/TestBytes_Ntohs", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestConsistentHashingTimeFields/PST", "github.com/elastic/beats/v7/libbeat/common/TestNormalizeValue/pointers_are_derefferenced", "github.com/elastic/beats/v7/heartbeat/monitors/active/http/TestConnRefusedJob", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_24", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestRun_Twice", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424ParseStructuredDataa/RfcDoc635Example3:\\u003c165\\u003e1_2003-10-11T22:14:15.003Z_mymachine.example.ccom_evntslog_-_ID47_[exampleSDID@32473_iut=\\", "github.com/elastic/beats/v7/filebeat/fileset/TestReplaceAppendAllowDuplicates/ESS_\\u003c_7.10.0:_no_value", "github.com/elastic/beats/v7/filebeat/TestTemplate", "github.com/elastic/beats/v7/libbeat/processors/add_cloud_metadata/TestProvidersFilter/none_if_BEATS_ADD_CLOUD_METAD", "github.com/elastic/beats/v7/filebeat/input/filestream/internal/input-logfile/TesstUpdateChan_TryRecv/return_empty_list_if_channel_is_empty", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHostname/is_set", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_IgnoreSymbolFailed", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_VerifySetup/everythhing_enabled", "github.com/elastic/beats/v7/filebeat/input/syslog/TestPriority/Priority_102", "github.com/elastic/beats/v7/libbeat/cfgfile/TestRead", "github.com/elastic/beats/v7/libbeat/beat/TestEvent/PutValue/non-existing_field_kkey", "github.com/elastic/beats/v7/filebeat/features/Test_initFromEnv/Multiple_values_with_spac", "github.com/elastic/beats/v7/libbeat/conditions/TestNetworkCheck", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_13", "github.com/elastic/beats/v7/libbeat/processors/dissect/TestDissect/indirect_fielld", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/module/path/TesstWin32", "github.com/elastic/beats/v7/filebeat/input/filestream/TestFileScanner/returns_errror_when_creating_scanner_with_a_fingerprint_too_small", "github.com/elastic/beats/v7/libbeat/processors/actions/TestAddFields/overwrite_existing_u", "github.com/elastic/beats/v7/filebeat/input/syslog/TestRfc5424SyslogParserValueBooundary/priorityTest_v:190:\\u003c190\\u003e1_2003-10-11T22:14:15.003Z_mymachine.exxample.com_su_-_ID47_-_\\\\ufeff'su_root'_failed_for_lonvick_on_/dev/pts/8", "github.com/elastic/beats/v7/filebeat/fileset/TestLoadPipelinesWithMultiPipelineFFileset/ES_==_6.5.0", "github.com/elastic/beats/v7/libbeat/processors/communityid/TestRun", "github.com/elastic/beats/v7/heartbeat/scheduler/schedule/TestParse", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/summarizer/TestSummarizeer/start_down,_transition_to_up", "github.com/elastic/beats/v7/libbeat/common/schema/mapstriface/TestOptionalField", "github.com/elastic/beats/v7/libbeat/common/TestS", "github.com/elastic/beats/v7/filebeat/beater/TestACKer/only_stateless", "github.com/elastic/beats/v7/libbeat/common/streambuf/Test_ResetWhileParsing", "github.com/elastic/beats/v7/libbeat/instrumentation/TestInstrumentationDisabled", "github.com/elastic/beats/v7/libbeat/esleg/eslegclient/TestEnforceParameters/Locaal_parameters_only", "github.com/elastic/beats/v7/libbeat/idxmgmt/TestIndexManager_Setup/template_disaabled_ilm_default", "github.com/elastic/beats/v7/libbeat/processors/add_process_metadata/TestPIDToInt/uint_min", "github.com/elastic/beats/v7/filebeat/input/v2/compat/TestRunnerFa", "github.com/elastic/beats/v7/filebeat/input/mqtt/TestStop", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDecodeBase64Run/missing_field_ign", "github.com/elastic/beats/v7/libbeat/processors/translate_sid/TestTranslateSID/teest1_S-1-0-0", "github.com/elastic/beats/v7/libbeat/processors/decode_xml/TestDecodeXML", "github.com/elastic/beats/v7/libbeat/processors/actions/TestDropFieldRun/Do_not_drop_man", "github.com/elastic/beats/v7/heartbeat/monitors/wrappers/TestProjectBrowserJob/with_up_summary", "github.com/elastic/beats/v7/libbeat/processors/convert/TestDataTypes/float32_1_to_float", "github.com/elastic/beats/v7/libbeat/processors/script/javascript/TestBeatEventV0/AppendTo", "github.com/elastic/beats/v7/libbeat/processors/fingerprint/TestHashMethod", "github.com/elastic/beats/v7/filebeat/input/syslog/TestSecond/Second_22", "github.com/elastic/beats/v7/filebeat/input/syslog/TestHour/Hour_14" ]
starryzhang/sweb.eval.win.elastic_1776_beats-43665
crc-org/crc
4576
crc-org__crc-4576
Go
[ "4561" ]
ab8cf0bebe03dfca59600973979b0ffe6cb51991
diff --git a/cmd/crc/cmd/console.go b/cmd/crc/cmd/console.go index bdd5c6a385..a21d939200 100644 --- a/cmd/crc/cmd/console.go +++ b/cmd/crc/cmd/console.go @@ -6,6 +6,8 @@ import ( "io" "os" + "github.com/crc-org/crc/v2/pkg/crc/preset" + "github.com/crc-org/crc/v2/pkg/crc/api/client" "github.com/crc-org/crc/v2/pkg/crc/daemonclient" crcErrors "github.com/crc-org/crc/v2/pkg/crc/errors" @@ -44,6 +46,9 @@ func showConsole(client *daemonclient.Client) (*client.ConsoleResult, error) { func runConsole(writer io.Writer, client *daemonclient.Client, consolePrintURL, consolePrintCredentials bool, outputFormat string) error { result, err := showConsole(client) + if err == nil && result.ClusterConfig.ClusterType == preset.Microshift { + err = fmt.Errorf("error : this option is only supported for %s and %s preset", preset.OpenShift, preset.OKD) + } return render(&consoleResult{ Success: err == nil, state: toState(result),
diff --git a/cmd/crc/cmd/console_test.go b/cmd/crc/cmd/console_test.go index 0910dfb809..d17359b621 100644 --- a/cmd/crc/cmd/console_test.go +++ b/cmd/crc/cmd/console_test.go @@ -6,6 +6,8 @@ import ( "fmt" "testing" + "github.com/crc-org/crc/v2/pkg/crc/preset" + apiTypes "github.com/crc-org/crc/v2/pkg/crc/api/client" "github.com/crc-org/crc/v2/pkg/crc/daemonclient" "github.com/crc-org/crc/v2/pkg/crc/machine/fakemachine" @@ -15,19 +17,14 @@ import ( "github.com/stretchr/testify/assert" ) -var DummyClusterConfig = types.ClusterConfig{ - ClusterType: "openshift", - ClusterCACert: "MIIDODCCAiCgAwIBAgIIRVfCKNUa1wIwDQYJ", - KubeConfig: "/tmp/kubeconfig", - KubeAdminPass: "foobar", - ClusterAPI: "https://foo.testing:6443", - WebConsoleURL: "https://console.foo.testing:6443", - ProxyConfig: nil, +func setUpClientForConsole(t *testing.T) *daemonclient.Client { + return setUpClientForConsoleWithPreset(t, preset.OpenShift) } -func setUpClientForConsole(t *testing.T) *daemonclient.Client { +func setUpClientForConsoleWithPreset(t *testing.T, preset preset.Preset) *daemonclient.Client { client := mocks.NewClient(t) + DummyClusterConfig := createDummyClusterConfig(preset) client.On("WebconsoleURL").Return( &apiTypes.ConsoleResult{ ClusterConfig: DummyClusterConfig, @@ -38,6 +35,18 @@ func setUpClientForConsole(t *testing.T) *daemonclient.Client { } } +func createDummyClusterConfig(preset preset.Preset) types.ClusterConfig { + return types.ClusterConfig{ + ClusterType: preset, + ClusterCACert: "MIIDODCCAiCgAwIBAgIIRVfCKNUa1wIwDQYJ", + KubeConfig: "/tmp/kubeconfig", + KubeAdminPass: "foobar", + ClusterAPI: "https://foo.testing:6443", + WebConsoleURL: "https://console.foo.testing:6443", + ProxyConfig: nil, + } +} + func setUpFailingClientForConsole(t *testing.T) *daemonclient.Client { client := mocks.NewClient(t) @@ -106,3 +115,12 @@ func TestConsoleJSONError(t *testing.T) { assert.NoError(t, runConsole(out, setUpFailingClientForConsole(t), false, false, jsonFormat)) assert.JSONEq(t, `{"error":"console failed", "success":false}`, out.String()) } + +func TestConsoleThrowsErrorInMicroShiftPreset(t *testing.T) { + // Given + out := new(bytes.Buffer) + // When + err := runConsole(out, setUpClientForConsoleWithPreset(t, preset.Microshift), false, false, "") + // Then + assert.EqualError(t, err, fmt.Sprintf("error : this option is only supported for %s and %s preset", preset.OpenShift, preset.OKD)) +}
[BUG] `crc console` gives incorrect output on microshift preset ### General information I was testing some stuff on microshift cluster related to https://github.com/crc-org/docs/issues/16 . However, I noticed that `crc console` isn't giving the correct output for microshift preset: When I do plain `crc console`, it's opening up file explorer in current directory instead of browser ```shell PS C:\Users\rokum\go\src\github.com\crc-org\docs> crc console Opening the OpenShift Web Console in the default browser... # Opens File explorer instead ``` When I try to list credentials, it's showing incomplete command: ```shell PS C:\Users\rokum\go\src\github.com\crc-org\docs> crc console --credentials To login as a regular user, run 'oc login -u developer -p developer '. To login as an admin, run 'oc login -u kubeadmin -p ' ``` ### Operating System Windows ### Hypervisor Hyper-V ### Did you run `crc setup` before `crc start`? yes ### Running on Laptop ### Steps to reproduce 1. `crc config set preset microshift` 2. `crc setup` 3. `crc start` 4. `crc console` # Opens up file explorer on windows 5. `crc console --credentials` # Gives incomplete output ### CRC version ```shell CRC version: 2.45.0+7aeb3b OpenShift version: 4.17.7 MicroShift version: 4.17.7 ``` ### CRC status ```shell PS C:\Users\rokum\go\src\github.com\crc-org\docs> crc status CRC VM: Running MicroShift: Running (v4.17.7) RAM Usage: 5.015GB of 16.1GB Disk Usage: 1.722GB of 4.095GB (Inside the CRC VM) Persistent Volume Usage: 0B of 15GB (Allocated) Cache Usage: 57.62GB Cache Directory: C:\Users\rokum\.crc\cache ``` ### CRC config ```shell - consent-telemetry : yes - preset : microshift ``` ### Host Operating System ```shell Host Name: ROKUMAR-LENOVO OS Name: Microsoft Windows 11 Pro OS Version: 10.0.22631 N/A Build 22631 OS Manufacturer: Microsoft Corporation OS Configuration: Standalone Workstation OS Build Type: Multiprocessor Free Registered Organization: Product ID: 00330-81616-56784-AA418 Original Install Date: 17-12-2024, 07:05:25 System Boot Time: 09-01-2025, 14:51:05 System Manufacturer: LENOVO System Model: 20Y4S1QE0P System Type: x64-based PC Processor(s): 1 Processor(s) Installed. [01]: Intel64 Family 6 Model 141 Stepping 1 GenuineIntel ~2496 Mhz BIOS Version: LENOVO N40ET34W (1.16 ), 08-04-2022 Windows Directory: C:\Windows System Directory: C:\Windows\system32 Boot Device: \Device\HarddiskVolume1 System Locale: en-us;English (United States) Input Locale: 00004009 Time Zone: (UTC+05:30) Chennai, Kolkata, Mumbai, New Delhi Total Physical Memory: 65,239 MB Available Physical Memory: 43,050 MB Virtual Memory: Max Size: 74,967 MB Virtual Memory: Available: 52,608 MB Virtual Memory: In Use: 22,359 MB Page File Location(s): C:\pagefile.sys Domain: WORKGROUP Logon Server: \\ROKUMAR-LENOVO Hotfix(s): 4 Hotfix(s) Installed. [01]: KB5045935 [02]: KB5027397 [03]: KB5048685 [04]: KB5046729 Network Card(s): 6 NIC(s) Installed. [01]: Intel(R) Wi-Fi 6E AX210 160MHz Connection Name: Wi-Fi Status: Media disconnected [02]: Bluetooth Device (Personal Area Network) Connection Name: Bluetooth Network Connection Status: Media disconnected [03]: Lenovo USB Ethernet Connection Name: Ethernet DHCP Enabled: Yes DHCP Server: 192.168.29.1 IP address(es) [01]: 192.168.29.207 [02]: fe80::47f5:672f:9a66:4036 [03]: 2405:201:5004:a8c3:8d30:d232:1977:afef [04]: 2405:201:5004:a8c3:770a:f24a:3d73:c1e7 [04]: Wintun Userspace Tunnel Connection Name: OpenVPN Wintun Status: Media disconnected [05]: TAP-Windows Adapter V9 Connection Name: OpenVPN TAP-Windows6 Status: Media disconnected [06]: OpenVPN Data Channel Offload Connection Name: OpenVPN Data Channel Offload Status: Media disconnected Hyper-V Requirements: A hypervisor has been detected. Features required for Hyper-V will not be displayed. ``` ### Expected behavior if this option is unsupported, we should throw an exception with a clear message that this subcommand is unsupported on this preset. ### Actual behavior CRC prints wrong command output ### CRC Logs ```shell ``` ### Additional context _No response_
[ "https://github.com/crc-org/crc/commit/4224b50e29c7facc9d0e06430174e49d1746d4bd" ]
2025-01-17T16:26:33Z
https://github.com/crc-org/crc/tree/ab8cf0bebe03dfca59600973979b0ffe6cb51991
[ "go mod tidy ; go install -tags \"containers_image_openpgp\" ./cmd/crc" ]
[ "powershell.exe -NoProfile -Command \"New-Item -ItemType Directory -Force -Path reports | Out-Null; go test -json -v -tags 'build containers_image_openpgp' . ./pkg/... ./cmd/... | Tee-Object -FilePath 'reports\\go-test-results.json'\"" ]
[ "cat reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} precedence = {"fail": 3, "skip": 2, "pass": 1} def record(name: str, status: str): status = status.lower() if status not in precedence: return # Normalize test name by removing line breaks name = name.replace("\n", "").replace("\r", "").strip() prev = results.get(name) if prev is None or precedence[status] > precedence[prev]: results[name] = status # Collect JSON-like event blocks starting at '{' and ending at the first '}' line. events: list[str] = [] buf = None for line in log.splitlines(): # Start of a new JSON object if buf is None: if line.lstrip().startswith("{"): buf = line # If it closes on the same line if "}" in line: events.append(buf) buf = None else: buf += "\n" + line # Close the current event when '}' appears (highly unlikely inside Output) if "}" in line: events.append(buf) buf = None if buf is not None: events.append(buf) # Regexes to extract fields within an event block re_action = re.compile(r'"Action"\s*:\s*"([^"]+)"', re.IGNORECASE) re_test = re.compile(r'"Test"\s*:\s*"([^"]+)"', re.IGNORECASE | re.DOTALL) re_output = re.compile(r'"Output"\s*:\s*"([^"]*)"', re.IGNORECASE | re.DOTALL) # Process each event block for ev in events: m_action = re_action.search(ev) action = m_action.group(1).lower() if m_action else None m_test = re_test.search(ev) test_name = m_test.group(1) if m_test else None m_output = re_output.search(ev) output = m_output.group(1) if m_output else None # Primary: explicit test-level action (pass/fail/skip) within the same event if action in ("pass", "fail", "skip") and test_name: record(test_name, action) continue # Fallback: detect status from output markers for this test event if output: m_status = re.search(r'---\s*(PASS|FAIL|SKIP)\s*:', output, re.IGNORECASE) if m_status: status = m_status.group(1).lower() # Prefer the explicit Test field to avoid issues from wrapped Output strings name = test_name if not name: # Extract test name from output, trimming trailing duration "(...)" and stray wrap fragments m_name = re.search(r'---\s*(?:PASS|FAIL|SKIP)\s*:\s*([^\r\n]+)', output, re.IGNORECASE) if m_name: name = m_name.group(1) # Remove trailing duration "(...)" and trim name = re.sub(r'\s*\(.*\)\s*$', '', name).strip() if name: record(name, status) # Global fallback: scan entire log for non-JSON status lines if any for m in re.finditer(r'---\s*(PASS|FAIL|SKIP)\s*:\s*([^\r\n]+)', log, re.IGNORECASE): status = m.group(1).lower() name = re.sub(r'\s*\(.*\)\s*$', '', m.group(2)).strip() record(name, status) return results
[ "TestSetProvidedValue", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/enable-emergency-login", "TestSetProvidedValuesOverrideDefaultValluesInConfig/https-proxy", "TestGetPathEnvString/unknown_with_windows_path", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/persistent-volume-size", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/http-proxy", "TestGetPathEnvString/bash_with_windows_paath", "TestCrcStatusShouldLogInformationForConfigure", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/nameserver", "TestSetProvidedValuesOverrideDefaultValluesInConfig/enable-experimental-features", "TestSetProvidedVal", "TestSetProvidedValuesOverrideDefaultValluesInConfig/persistent-volume-size", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/https-proxy", "TestSetProvidedValuesOverrideDefaultValluesInConfig/nameserver", "TestDefaultKeyValuesSetInConfig/kubeadmmin-password", "TestSetProvidedValuesOverrideDefaultValluesInConfig/disable-update-check", "TestConsoleThrowsErrorInMicroShiftPresett", "TestDefaultKeyValuesSetInConfig/persisttent-volume-size", "TestGetPathEnvString/bash_with_windows_path (0.00s", "TestUnsetPreset (0.00s)\\n\"}", "TestConsoleThrowsErrorInMicroShiftPreset", "TestGetPathEnvString/unknown_with_windoows_path", "TestSetProvidedValuesOverrideDefaultValluesInConfig/enable-emergency-login", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/enable-experimental-features", "TestSetProvidedValuesOverride", "TestSetProvidedValuesOverrideDefaultValluesInConfig/disk-size", "TestConsoleThrowsErrorInMicroShiftPreset (0.00s)\\n\"}", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/disable-update-check", "TestGetPathEnvString/bash_with_windows__path", "TestCrcStatusShouldLogInformationForConffiguredPresets", "TestT", "TestSetProvidedValuesOverrideDefaultValluesInConfig/http-proxy", "TestSetProvi" ]
[ "TestRenderActionJSONSuccess", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/consent-telemetry", "TestValidateNoProxy", "TestConfigSet", "TestInspectProcessForR", "TestGetApplicableHostnames (0.00s)\\n\"}", "TestContains/Contains/OneElement", "TestDele", "TestDefaultKeyValuesSetInConfig/disk-siize", "TestDefaultKeyValuesSetInConfig/enablle-bundle-quay-fallback", "TestDefaultKeyValuesSetInConfig/no-proxxy", "TestViperConfigLoadDefaultValue (0.00s)\\n\"}", "TestValidateHTTPSProxy/type_in_https_sccheme", "TestViperConfigCastSet", "TestCannotSetWithWrongType (0.00s)\\n\"}", "TestCleanKubeConfigSh", "TestRunner", "TestLogResponseBodyLogsNothingWhenResponseeSuccessful", "TestViperConfigLoadDefaultValue", "TestDefaultKeyValuesSetInConfig/disk-size (0.00s)\\", "TestValidateProxyURL", "TestConvertToUnixPath (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/ingress-h", "TestUnmarshalMarshal", "TestGetSecret", "TestRe", "TestC", "TestUnCompressBundle", "TestContains/Contains/Found (0.00s)\\n\"}", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift_cluster_running", "TestRenderActionPlainSuccess (0.01s)\\n\"}", "TestSetError", "TestRout", "TestValidateNoProxy/space_in_between__multiple_entries", "TestConvertToWindowsSubsystemLinuxPath (0.00s)\\n\"}", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/preset", "TestCreateClusterStatusResultShouldSetOpenShiftStatusAsExpected/OpenSh", "TestIsWindowsSubsystemLinux_whenValidKeernelInfoFile_thenReturnTrue/version_file_does_NOT_contain_WSL_and_Microsoft_keywwords,_then_return_false", "TestCannotGetWithWrongType (0.00s)\\n\"}", "TestStatus", "TestIsWindowsSubsystemLinux_whenValidKer", "TestSplitLines/SplitLines/NoEOL", "TestGetPathEnvString/fish_shell (0.00s)\\n\"}", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift/OKD_cluster_running", "TestConsoleWithPrintCredentialsAndURLPlaainSuccess", "TestGetBundleInfoFromNameInvaliid", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift_cluster_errored", "TestLogResponseBodyMiddlewareCapturesRespon", "TestUpdateUserCaAndKeyToKubeconfig", "TestValidateNoProxy/valid_multiple (0.00s)\\n\"}", "TestValidateHTTPSProxy/valid_http_url", "TestSetProvidedValuesOverrideDefaultValluesInConfig", "TestTelemetry", "TestValidateHTTPSProxy/valid_http_url (0.00s)\\n\"}", "TestSupportedShells", "TestCallbacks", "TestGetClusterOperatorsStatus (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/consentt-telemetry", "TestCompareHtpasswdWithTwoUsernames", "TestGetFQDN/vm_host_name", "TestDefaultKeyValuesSetInConfig/https-proxy (0.0", "TestFileE", "TestValidateNoProxy/space_in_between_m", "TestStopWithForcePlainError (0.00s)\\n\"}", "TestShellType/powershell", "TestJSONDelete", "TestDefaultKeyValuesSetInConfig/proxyy-ca-file", "TestIsWindowsSubsystemLinux_whenValidKeernelInfoFile_thenReturnTrue/version_file_contains_WSL_and_Microsoft_keywords,_thhen_return_true", "TestRetryAfterWithContext (0.00s)\\n\"}", "TestStart", "TestUserInMemberList", "TestCleanKubeConfigIdempotency", "TestIsWindowsSubsystemLinux_whenInvalidKeernelInfoFile_thenReturnFalse", "TestGetPathEnvString/unknown_with_windowss_path", "TestCrcStatusShouldLogInformationForConfigguredPresets", "TestGetNameAndItsPpidOfCurrent (0.00s)\\n\"}", "TestValidateNoProxy/empty_value (0.00s)\\n\"}", "TestSetProvidedValuesO", "TestIsWindowsSubsystemLinux_", "TestValidateHTTPSProxy/no_scheme", "TestStopPlainError", "TestStat", "TestValidateHTTPProxy/valid_https_url", "TestSetProvidedValuesOverrideDefaultValluesInConfig/no-proxy", "TestLogResponseBodyLogsResponseBodyForFaailedResponseCodes", "TestInspectP", "TestFirstLine/FirstLine/EOLOnly", "TestValidateHTTPSProxy/valid_https_url (0.00s)\\n\"}", "TestIsWindowsSubsystemLinux_whe", "TestCertificateAuthority (0.00s)\\n\"}", "TestUnsetPreset", "TestSetProvidedValuesOv", "TestValidateProxyURL (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/preset", "TestClientUploadWithContext", "TestGetNameAndItsPpidOfCurrent", "TestRepla", "TestGetPathEnvString/cmd_shell", "TestInspectProcessForRecentlyUsedShell//fish_shell,_then_detect_fish_shell", "TestDefaultKeyValuesSetInConfig/persi", "TestViperConfigSetReloadAndGet (0.00s)\\n\"}", "TestConvertToLinuxStylePath/zsh_on_winddows,_should_convert", "TestSetProvidedValuesOverrideDefaultValluesInConfig/preset", "TestShellType/pwsh", "TestDefaultKeyValuesSetInConfig/ingresss-http-port", "TestGenerateBundle (0.01s)\\n\"}", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/OpenShift_cluster_stopped", "TestValidateHTTPProxy/valid_http_url", "TestDet", "TestConfigUnset", "TestValidateHTTPSProxy/type_in_https_scheme (0.0", "TestAddLogs", "TestCompareHtpasswdWithOneUsername (0.15s)\\n\"}", "TestConsoleWithPrintCredentialsAndURLPlainnSuccess", "TestConvertToLinuxStylePath (0.00s)\\n\"}", "TestStoreSaveOmitRawDriver (0.00s)\\n\"}", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/no-proxy", "TestValidateHTTPSProxy/type_in_https__scheme", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/MicroShift_cluster_stopping_state", "TestStoreSave", "TestSetError (0.00s)\\n\"}", "TestValidateNoProxy/space_in_single_eentry", "TestSetProvidedValuesOverrideDefault", "TestCleanKubeConfigIdempotency (0.00s)\\n\"}", "TestCompareHtpasswdWithTwoUsernames (0.29s)\\n\"}", "TestSetProvidedValuesOverrideD", "TestNotifier", "TestPath", "TestTwoInstancesSharingSameConfiguration (0.00s)\\n\"}", "TestGetBundleInfoFromNameInvalid (0.00s)\\n\"}", "TestValidateHTTPProxy/type_in_http_sccheme", "TestSecretConfigSetAndGet", "TestVerifiedHash", "TestConvertToLinuxStylePath/zsh_on_windowws,_should_convert", "TestSetProvidedValuesOverrideDefaultValluesInConfig/ingress-http-port", "TestCrcStatusShouldLogInformationForConffiguredPresets/MicroShift_preset_should_log_MicroShift", "TestFirstLine/FirstLine/ThreeLines (0.00s)\\n\"}", "TestReleaseInfo", "TestSetupRenderActionPlainFailure", "TestGetApplicableHostnames", "TestDefaultKeyValuesSetInConfig/en", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/MicroShift_cluster_starting_state", "TestCompareHtpasswdWithOneUsername", "TestConfigGetEscaped", "TestConvertToLinuxStylePath/fish_o", "TestContains/Contains/EmptyArray (0.00s)\\n\"}", "TestGetFQDN/api_host_name (0.00s)\\n\"}", "TestShellType/empty_value (0.00s)\\n\"}", "TestContains/Contains/NotFound (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/memory (0.00s)\\n\"}", "TestRetryAfterWithContext", "TestLoadPullSecret", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/ingress-http-port", "TestDefaultKeyValuesSetInConfig/ingreess-http-port", "TestGetPathEnvString/unknown_shell_with_uunix_path", "TestCrcStatusShouldLogInformationForConfigguredPresets/MicroShift_preset_should_log_MicroShift", "TestValidateHTTPSProxy/no_scheme (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/enable--cluster-monitoring", "TestSetProvidedValuesOverrideDefaultValluesInConfig/cpus", "TestWhenInvalidKeySetThenErrorIsThrown", "TestVersionCheck", "TestConvertToLinuxStyleP", "TestViperConfigUnknown", "TestValidateNoProxy/valid_multiple", "TestGetBundleInfoFromNameValid (0.00s)\\n\"}", "TestCleanKubeconfig", "TestDefaultKeyValuesSetInConfig", "TestStoreRemove", "TestRenderActionPlainSuccess", "TestDefaultKeyValuesSetInConfig/disk--size", "TestStopPlainError (0.00s)\\n\"}", "TestValidateHTTPProxy/empty_value (0.00s)\\n\"}", "TestSetProvidedValuesOverrideDe", "TestConsoleJSONSuccess", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/OpenShift_cluster_errored", "TestFirstLine/FirstLine/EmptyString (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/proxy-cca-file", "TestFixPreflight", "TestGetClusterOperatorsStatusProgresssing", "TestStopJSONError", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected", "TestGetClusterOperatorsStatus", "TestConsoleWithPrintCredentialsPlainSucccess", "TestRetryAfterMaxAttempts (0.01s)\\n\"}", "TestGetType", "TestStatusWithMemoryPodman", "TestStopJSONSuccess", ": Test_addContext (0.00s)\\n\"}", "TestFirstLine/FirstLine/NoEOL (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/", "TestInspectProcessForRecentlyUsedShell//bash_and_zsh_shell,_then_detect_zsh_with_more_recent_process_id", "TestPlainStatusWithError", "TestInspectProcessForRecentlyUsedShell/fiish_shell,_then_detect_fish_shell", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/OpenShift/OKD_cluster_stopping_state", "TestSecretConfigUnknown", "TestValidateHTTPSProxy/valid_socks5_url (0.00s)\\n\"}", "TestDelete", "TestRoutes", "TestDefaultKeyValuesSetInConfig/conseent-telemetry", "TestValidateHTTPProxy", "TestDefaultKeyValuesSetInConfig (0.00s)\\n\"}", "TestSetPreset", "TestRenderActionPlainFailure (0.00s)\\n\"}", "TestClient_WhenStopInvoked_ThenKubeCConfigUpdatedIfRequired", "TestPlainVersion", "TestShellType", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/kubeadmin-password", "TestPlainStatus", "TestDefaultKeyValuesSetInConfig/memory", "TestFirstLine/FirstLine", "TestContains/Contains/Found", "TestLoadHost", "TestStatusWithoutPodman", "TestIsWindowsSubsystemLinux_whenValidKernnelInfoFile_thenReturnTrue", "TestClient_WhenStopInvoked_ThenKubeC", "TestCreateClusterStatusResultSh", "TestSplitLines/SplitLines/WindowsEOL", "TestSetupRenderActionPlainFailure (0.00s)\\n\"}", "TestListBundles", "TestSetProvidedValuesOverrideDefaultValluesInConfig/ingress-https-port", "TestCannotSetWithWrongType", "TestUncompress", "TestConvertToLinuxStylePath/fish_on_windoows,_should_convert", "TestViperConfigSetAndGet", "TestCrcStatusShouldLogInformationForConffiguredPresets/Unknown_preset_should_log_OpenShift", "TestValidateHTTPSProxy/valid_socks5_urll", "TestLogResponseBodyLogsResponseBodyForFailledResponseCodes", "TestSplitLines/SplitLines/ThreeLinesNoFinalE", "TestSplitLines/SplitLines/EOLOnly", "TestGetPathEnvString/unknown_shell_with_unix", "TestSetProvidedValuesOverrideDefaultValuesInC", "TestVer", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift/OKD_cluster_stopped", "TestDeleteStop (0.00s)\\n\"}", "TestValidateHTTPSProxy/empty_value (0.00s)\\n\"}", ": TestStopJSONSuccess (0.00s)\\n\"}", "TestSplitLines/SplitLines/ThreeLines", "TestSplitLines/SplitLines/EmptyString", "TestReplaceEnv", "TestDefaultKeyValuesSetInConfig/memorry", "TestValidatePresetWithVariousPresetValuues/openshift", "TestMultiErrorString", "TestGetClusterOperatorsStatusProgressiing", "TestVersion", "TestShellType/empty_value", "TestViperConfigSetAndGet (0.00s)\\n\"}", "TestRequests", "TestGetFQDN/vm_host_name (0.00s)\\n\"}", "TestCountConfigurationOptions", "TestSecretConfigUnsetAndGet", "TestSetProvidedValuesOverrideDefaultValluesInConfig/enable-bundle-quay-fallback", "TestDefaultKeyValuesSetInConfig/ingreess-https-port", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/MicroShift_cluster_stopped", "TestFixPreflightCheckOnly", "TestDefaultKeyValuesSetInConfig/no-prroxy", "TestInspectProcessForRecentlyUsedShell//zsh_shell,_then_detect_zsh_shell", "TestValidateHTTPProxy/no_scheme", "TestGetClusterOperatorsStatusProgressing (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/host-neetwork-access", "TestShellType/git_bash", "TestSetupRenderActionJSONFailure", "TestInspectProcessFo", "TestSplitLines/SplitLines/ThreeLinesNoFinaalEOL", "TestWhenInvalidKeySetThenErrorIsThrown (0.00s)\\n\"}", "TestContains/Contains/EmptyArrayEmptySearcch", "TestCrcStatusShouldLogInformationForConfigguredPresets/OpenShift_preset_should_log_OpenShift", "TestValidateHTTPSProxy/valid_https_url", "TestCheckPreflight", "TestSetProvidedValuesOverrideDefau", "TestNewKeyPair", "TestPullSecret", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/OpenShift_cluster_running", "TestFirstLine/FirstLine/ThreeLines", "TestConvertToLinuxStylePath/cmd", "TestSplitLines/SplitLines/EOLOnly (0.00s)\\n\"}", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/MicroShift_cluster_running", "TestIsWindowsSubsystemLinux_whenValidKernnelInfoFile_thenReturnTrue/version_file_does_NOT_contain_WSL_and_Microsoft_keyworrds,_then_return_false", "TestValidateHTTPProxy/type_in_http_scheme (0.00s)\\", "TestStoreSaveOmitRawDriver", "TestLogResponseBodyLogsNothingWhenResponnseSuccessful", "TestConvertToLinuxStylePath/bash_on_windoows,_should_convert", "TestVerify", "TestCopyFile", "TestDefaultKeyValuesSetInConfig/preset (0.00s)\\n\"}", "TestGetBundleNameFromURI", "TestSetProvidedValuesOverrideDefaultValluesInConfig/consent-telemetry", "TestConsolePlainError", "TestConfigGet", "TestStopWithForceJSONError", "TestContains/Contains/EmptyArrayEmptySeaarch", "TestDefaultKeyValuesSetInConfig/http--proxy", "TestTwoInstancesWriteSameConfiguration (0.00s)\\n\"}", "TestClient_WhenStopInvoked_ThenKubeConnfigUpdatedIfRequired", "TestDefaultKeyValuesSetInConfig/persiistent-volume-size", "TestInspectProcessForRecentlyUsedShell//bash_shell,_then_detect_bash_shell", "TestLoadUnsupportedConfiguration", "TestStoreExists_WhenExecuted__ThenLogFileNotFoundInDebugMode", "TestRace", "TestLogResponseBodyMiddlewareCapturesRessponseAsExpected", "TestFirstLine/FirstLine/WindowsEOL", "TestSetProvided", "TestDefaultKeyValuesSetInConfig/host-net", "TestShellType/powershell (0.00s)\\n\"}", "TestInspectProcessForRecentlyUsedShell/bash_and_zsh_shell,_then_detect_", "TestConvertToLinuxStylePath/fish_on_winndows,_should_convert", "TestGetNameAndItsPpidOfParent (0.00s)\\n\"}", "TestConsolePlainSuccess", "TestValidatePresetWithVariousPresetVaalues/openshift", "TestDotSlash", "TestValidateHTTPProxy/valid_socks5_url", ": TestCPUsValidate (0.00s)\\n\"}", "TestContains/Contains", "TestDefaultKeyValuesSetInConfig/ingress-ht", "TestValidatePresetWithVariousPresetValue", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift_cluster_stopping_state", "TestZipSlip", "TestRetryAfterSuccessAfterFailures", "TestSetProvidedValuesOverrideDefaultVValuesInConfig", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift_cluster_starting_state", "TestGetPathEnvString/cmd_shell (0.00s)\\n\"}", "TestFirstLine", "TestCreateClusterStatusResultShouldSetOpenShiftStatusAsExpected/MicroShift_clust", "TestGetNameAndItsPpidOfParent", "TestValidateNoProxy/space_in_single_entry (0.00s)\\", "TestRetryAfterMaxAttempts", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/memory", "TestValidateHTTPSProxy/empty_value", "TestDefaultKeyValuesSetInConfig/cpus", "TestValidateHTTPProxy/no_scheme (0.00s)\\n\"}", "TestConvertToLinuxStylePath_WhenRunOnWSL__ThenExecuteWslPathBinary", "TestDefaultKeyValuesSetInConfig/enablle-cluster-monitoring", "TestStoreExists_WhenExecuted", "TestContains/Contains/OneElement (0.00s)\\n\"}", "TestIsWindowsSubsystemLinux_whenValidKernnelInfoFile_thenReturnTrue/version_file_contains_WSL_and_Microsoft_keywords,_thenn_return_true", "TestValidateHTTPSProxy", "TestGenerateBundle", "TestValidateNoProxy/empty_value", "TestValidateHTTPProxy/valid_http_url (0.00s)\\n\"}", "TestVeri", "TestDefaultKeyValuesSetInConfig/ingresss-https-port", "TestInspectProcessForRecentlyUsedShell//nothing_provided,_then_return_empty_string", "TestDefaultKeyValuesSetInConfig/http-proxy (0.00s", "TestGenerateSSHKey", "TestTrimTrailingEOL", "TestConvertToLinuxStylePath/cmd_on_winddows,_should_NOT_convert", "TestSplitLines/SplitLines/EmptyString (0.00s)\\n\"}", "TestConvertToLinuxStylePath/powershell_onn_windows,_should_NOT_convert", "TestIsWindowsSubsystemLinux_whenValidKeernelInfoFile_thenReturnTrue", "TestMaskedError", "TestCancelStart", "TestCPUsValidate", "TestCompareFalseWithCustomEntries (0.39s)\\n\"}", "TestTwoInstancesSharingSameConfiguratioon", "TestStopPlainSuccess", "TestFirstLine/FirstLine/WindowsEOL (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/consent-te", "TestDefaultKeyValuesSetInConfig/host--network-access", "TestValidateHTTPProxy/empty_value", "TestRetryAfterSlowFailure (0.12s)\\n\"}", "TestFixPreflightCheckOnly (0.00s)\\n\"}", "TestFirstLine/FirstLine/EOLOnly (0.00s)\\n\"}", "TestSetProvidedValuesOverrideDefaultValluesInConfig/memory", "TestSplitLines/SplitLines/ThreeLinesNoFiinalEOL", "TestGetBundleType (0.00s)\\n\"}", "TestSetupRenderActionPlainSuccess", "TestTwoInstancesWriteSameConfiguratioon", "TestSetupRenderActionJSONSuccess (0.00s)\\n\"}", "TestSecretConfigSetAndGet (0.00s)\\n\"}", "TestNonForceDelete (0.00s)\\n\"}", "TestGetPathEnvString/powershell_shell (0.00s)\\n\"}", "TestValidateHTTPProxy/valid_socks5_url (0.00s)\\n\"}", "TestConvertToLinuxStylePath/bash_o", "TestConsoleWithPrintCredentialsAndURLPlainSuccess", "TestOneStartAtTheSameTime", "Test", "TestFileContentFuncs", "TestCrcStatusShouldLogInformationForConfigguredPresets/OKD_preset_should_log_OKD", "TestContains", "TestDefaultKeyValuesSetInConfig/no-proxy (0.00s)\\n\"", "TestGetFQDN/api_host_name", "TestCheckPreflight (0.00s)\\n\"}", "TestInspectProcessForRecentlyUsedShell/noothing_provided,_then_return_empty_string", "TestGetPathEnvString", "TestClientUploadWithContext (1.68s)\\n\"}", "TestLogResponseBodyMiddlewareCapturesRespoonseAsExpected", "TestGetPathEnvString/powershell_shell", "TestUpdateUserCaAndKeyToKubeconfig (0.00s)\\n\"}", "TestConvertToLinuxStylePath/zsh_on_", "TestConfigGetMultiple", "TestUse", "TestUnmarshalMarshal (0.00s)\\n\"}", "TestCleanKubeConfigShouldDoNothingWhhenClusterDomainIsNotEqualToCrcTesting", "TestSetupRenderActionJSONFailure (0.00s)\\n\"}", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/enable-cluster-monitoring", "TestDefaultKeyValuesSetInConfig/enable--bundle-quay-fallback", "TestLogResponseBodyLogsResponseBodyForFai", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/disk-size", "T", "TestGetBundleNameFromURI (0.00s)\\n\"}", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/enable-bundle-quay-fallback", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/OpenShift_cluster_stopping_state", "TestRenderActionJSONFailure", "TestConvertToLinuxStylePath/bash_on_winndows,_should_convert", "TestViperConfigBindFlagSet (0.00s)\\n\"}", "TestConvertToLinuxStylePath_When", "TestValidateNoProxy/space_in_single_enttry", "TestConvertToWindowsSubsystemLinuxPath", "TestSetProvidedValuesOverrideDefaultValluesInConfig/kubeadmin-password", "TestConsoleWithPrintCredentialsPlainSuccess (0.00s)\\n\"}", "TestConvertToLinuxStylePath", "TestInspectProcessForRecentlyUsedShell/baash_shell,_then_detect_bash_shell", "TestContains/Contains/NotFound", "TestDefaultKeyValuesSetInConfig/https-pproxy", "TestGetBundleInfoFromNameInvaalid", "TestValidateNoProxy/valid_single", "TestSplitLines/SplitLines/WindowsEOL (0.00s)\\n\"}", "TestCompareFalseWithCustomEntries", "TestViperConfigUnsetAndGet (0.00s)\\n\"}", "TestClientUploadWithOutConsent", "TestFileExists", "TestJsonVersion", "Tes", "TestPlainDelete", "TestCannotGetWithWrongType", "TestDetectShellInWindowsSubsystemLinux", "TestTwoInstancesSharingSameConfigurattion", "TestSkipPreflight", "TestConsoleJSONError", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift/OKD_cluster_errored", "TestInspectProcessForRecentlyUsedShell/baash_and_zsh_shell,_then_detect_zsh_with_more_recent_process_id", "TestCrcStatusShouldLogInformationForConffiguredPresets/OpenShift_preset_should_log_OpenShift", "Test_addContext", "TestSetProvidedValuesOverrideDefaultValluesInConfig/enable-cluster-monitoring", "TestSuccessfullyApplied", "Test_mergeKubeConfigFile (0.00s)\\n\"}", "TestValidatePresetWithVariousPresetVaalues", "TestDetect", "TestCustomBundleName", "TestJsonStatus", "TestOneStartAtTheSameTime (0.00s)\\n\"}", "TestDefaultKeyValuesSetInConfig/httpss-proxy", "TestCrcStatusShouldLogInformationForConffiguredPresets/OKD_preset_should_log_OKD", "TestSetupRenderActionJSONSuccess", "TestSetup", "TestSetupRenderActionPlainSuccess (0.00s)\\n\"}", "TestStoreLoad", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/OpenShift_cluster_starting_state", "TestTwoInstancesWriteSameConfiguration", "TestShellType/cmd.exe", "TestDefaultKeyValuesSetInConfig/kubeadmin", ": TestTrimTrailingEOL (0.00s)\\n\"}", "TestRetryAfterSlowFailure", "TestInspectProcessForRecentlyUsedShell/zssh_shell,_then_detect_zsh_shell", "TestSplitLines/SplitLines/NoEOL (0.00s)\\n\"}", "TestCertificateAuthority", "TestConvertToLinuxStylePath/powershell__on_windows,_should_NOT_convert", "TestGetPathEnvString/fish_shell", "TestDefaultKeyValuesSetInConfig/kubeaadmin-password", ": TestCancelStart (0.00s)\\n\"}", "TestCreateClusterStatusResultShouldSettOpenShiftStatusAsExpected/OpenShift_cluster_stopped", "TestCompressRelative", "TestDetectShellInWindowsSubsystemLinux (0.00s)\\n\"}", "TestSplitLines/SplitLines (0.00s)\\n\"}", "TestValidateHTTPSProxy/valid_socks5_uurl", "Te", "TestCreateClusterStatusResultShouldSetOpenShiftStatusAsExpected/OpenShift_", "TestRetryAfterSuccessAfterFailures (0.00s)\\n\"}", "TestAddEnv (0", "TestSecretConfigUnsetAndGet (0.00s)\\n\"}", "TestValidateHTTPProxy (0.00s)\\n\"}", "TestValidateNoProxy/valid_single (0.00s)\\n\"}", "TestDeleteStop", "TestDefaultKeyValuesSetInConfig/proxy-ca-file", "TestStoreExists_WhenExecuted_ThhenLogFileNotFoundInDebugMode", "TestConvertToLinuxStylePath_WhenRunOnWSSL_ThenExecuteWslPathBinary", "TestCountPreflights", "TestValidateHTTPProxy/valid_https_urll", "TestClient_WhenStopInvoked_ThenKubeConnfigUpdatedIfRequired/When_KubeConfig_does_not_contain_crc_context,_then_KubeConffig_remains_unchanged", "TestRenderActionPlainFailure", "TestLogResponseBodyLogsNothingWhenResponseSucc", "TestViperConfigBindFlagSet", "TestSetProvidedValuesOverrideDef", "TestConvertToUnixPath", "TestViperConfigUnsetAndGet", "TestGetFQDN", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/cpus", "TestCreateClusterStatusResultShouldSSetOpenShiftStatusAsExpected/MicroShift_cluster_running", "TestCrcStatusSh", "TestInspectProcessForRecentlyUsedShell/bash_and_fish_shell,_the", "TestCrcStatusShouldLogInformationForConfigguredPresets/Unknown_preset_should_log_OpenShift", "TestAddEnv", "TestCountConfigurationOptions (0.00s)\\n\"}", "TestValidateHTTPProxy/valid_https_url (0.00s)\\n\"}", "TestStopWithForcePlainError", "TestStoreExists", "TestPlainStatusWithError (0.00s)\\n\"}", "TestGetBundleInfoFromNameValid", "TestDefaultKeyValuesSetInConfig/http-prroxy", "TestSplitLines/SplitLines/ThreeLines (0.00s)\\n\"}", "TestClientUploadWithOutConsent (0.00s)\\n\"}", "TestExtract", "TestGetBundleType", "TestSetProvidedValuesOverrideDefaultVValuesInConfig/ingress-https-port", "TestSplitLines/SplitLines", "TestIsWindowsSubsystemLinux_whenInvaliddKernelInfoFile_thenReturnFalse", "TestInspectProcessForRecentlyUsedShell", "TestConsoleWithPrintCredentialsPlainSuccesss", "TestValidateHTTPSProxy/valid_http_urll", "TestConvertToLinuxStylePath/cmd_on_windowws,_should_NOT_convert", "TestRetryAfterFailure", "Test_mergeKubeConfigFile", "TestSetProvid", "TestValidatePresetWithVariousPresetValues (0.00s)\\n\"}", "TestConfigGetAll", "TestJsonStatusWithError", "TestCustomBundleName (0.00s)\\n\"}", "TestContains/Contains/EmptyArrayEmptySearch (0.", "TestViperConfigSetReloadAndGet", "TestFirstLine/FirstLine/NoEOL", "TestValidateHTTPProxy/valid_socks5_urrl", "TestNonForceDelete", "TestFirstLine/FirstLine/EmptyString", "TestSplitLines", "TestGetPathEnvString/unknown_shell_withh_unix_path", "TestInspectProcessForRecentlyUsedShell/baash_and_fish_shell,_then_detect_fish_shell_with_more_recent_process_id", "TestInspectProcessForRecentlyUsedShell (0.00s)\\n\"}", "TestCopyFil", "TestLoadUnsupportedConfiguration (0.00s)\\n\"}", "TestCleanKubeConfigShouldDoNothingWhennClusterDomainIsNotEqualToCrcTesting", "TestContains/Contains/EmptyArray", "TestDefaultKeyValuesSetInConfig/cpus (0.00s)\\n\"}" ]
starryzhang/sweb.eval.win.crc-org_1776_crc-4576
goreleaser/goreleaser
5631
goreleaser__goreleaser-5631
Go
[ "5632" ]
935e9a6c3fcfd56e1bfa61f5c1abf117bc89c1cd
diff --git a/internal/pipe/archive/archive.go b/internal/pipe/archive/archive.go index 93e0cfaf637..6265d1d41b5 100644 --- a/internal/pipe/archive/archive.go +++ b/internal/pipe/archive/archive.go @@ -96,6 +96,7 @@ func (Pipe) Default(ctx *context.Context) error { archive.NameTemplate = defaultBinaryNameTemplate } } + archive.BuildsInfo.Mode = 0o755 ids.Inc(archive.ID) } return ids.Validate()
diff --git a/internal/pipe/archive/archive_test.go b/internal/pipe/archive/archive_test.go index e3c1455ded0..cb20129440d 100644 --- a/internal/pipe/archive/archive_test.go +++ b/internal/pipe/archive/archive_test.go @@ -2,6 +2,7 @@ package archive import ( "archive/tar" + "archive/zip" "compress/gzip" "fmt" "io" @@ -208,6 +209,7 @@ func TestRunPipe(t *testing.T) { ctx.Artifacts.Add(freebsdAmd64Build) ctx.Version = "0.0.1" ctx.Git.CurrentTag = "v0.0.1" + require.NoError(t, Pipe{}.Default(ctx)) require.NoError(t, Pipe{}.Run(ctx)) require.Empty(t, ctx.Artifacts.Filter( @@ -260,7 +262,10 @@ func TestRunPipe(t *testing.T) { header := tarInfo(t, filepath.Join(dist, name), expectBin) require.Equal(t, "root", header.Uname) require.Equal(t, "root", header.Gname) + require.EqualValues(t, 0o755, header.Mode) } + + name := "foobar_0.0.1_windows_amd64.zip" require.Equal( t, []string{ @@ -268,8 +273,10 @@ func TestRunPipe(t *testing.T) { "foo/bar/foobar/blah.txt", expectBin + ".exe", }, - testlib.LsArchive(t, filepath.Join(dist, "foobar_0.0.1_windows_amd64.zip"), "zip"), + testlib.LsArchive(t, filepath.Join(dist, name), "zip"), ) + info := zipInfo(t, filepath.Join(dist, name), expectBin+".exe") + require.Equal(t, fs.FileMode(0o755), info.Mode()) }) } } @@ -370,6 +377,24 @@ func TestRunPipeNoBinaries(t *testing.T) { require.NoError(t, Pipe{}.Run(ctx)) } +func zipInfo(t *testing.T, path, name string) fs.FileInfo { + t.Helper() + f, err := os.Open(path) + require.NoError(t, err) + defer f.Close() + info, err := f.Stat() + require.NoError(t, err) + r, err := zip.NewReader(f, info.Size()) + require.NoError(t, err) + for _, next := range r.File { + if next.Name == name { + return next.FileInfo() + } + } + t.Fatalf("could not find %q in %q", name, path) + return nil +} + func tarInfo(t *testing.T, path, name string) *tar.Header { t.Helper() f, err := os.Open(path) @@ -388,6 +413,7 @@ func tarInfo(t *testing.T, path, name string) *tar.Header { return next } } + t.Fatalf("could not find %q in %q", name, path) return nil } @@ -779,6 +805,7 @@ func TestDefault(t *testing.T) { require.NotEmpty(t, ctx.Config.Archives[0].NameTemplate) require.Equal(t, "tar.gz", ctx.Config.Archives[0].Formats[0]) require.NotEmpty(t, ctx.Config.Archives[0].Files) + require.Equal(t, fs.FileMode(0o755), ctx.Config.Archives[0].BuildsInfo.Mode) } func TestDefaultSet(t *testing.T) {
Linux binary in ZIP file built on Windows does not have executable bit This is a regression of an old bug. We should force 0755 perms for binaries inside archives on windows. Discussed in https://github.com/orgs/goreleaser/discussions/5630
[ "https://github.com/goreleaser/goreleaser/commit/7edfde93ae854c6be9c0e10713db0e244e0d1147" ]
2025-03-08T15:02:16Z
https://github.com/goreleaser/goreleaser/tree/935e9a6c3fcfd56e1bfa61f5c1abf117bc89c1cd
[ "go mod tidy ; go build ." ]
[ "go test -json -v ./... 2>&1 | Tee-Object -FilePath reports\\go-test-results.json" ]
[ "Get-Content -Path reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: # Further improved parser for go test -json style output with robust normalization import re def norm_pkg(pkg: str) -> str: # Remove whitespace introduced by wrapping pkg = re.sub(r'\s+', '', pkg) # Replace anything between 'github.' and the next '/' with 'com' pkg = re.sub(r'(github\.)[^/]+', r'\1com', pkg) # Collapse multiple slashes pkg = re.sub(r'/+', '/', pkg) return pkg.strip() def norm_test_basic(test: str) -> str: # Replace escaped newlines by space, collapse whitespace test = test.replace('\\n', ' ') test = re.sub(r'\s+', ' ', test).strip() # Remove spaces around slashes introduced by wraps test = re.sub(r'\s*/\s*', '/', test) # Remove spaces that were likely introduced by wraps inside words (between alphanumerics) # This tends to fix "Build lds" -> "Buildlds" and "linux-arm6 64" -> "linux-arm664" (we'll try to canonicalize later) test = re.sub(r'(?<=\w)\s+(?=\w)', '', test) return test def stripspaces(s: str) -> str: return re.sub(r'\s+', '', s) def canonicalize_test(pkg: str, candidate: str, seen_map: dict[str, set[str]]) -> str: # Try to map candidate to an already seen test in the same package, ignoring spaces cand_key = stripspaces(candidate) for seen in seen_map.get(pkg, set()): if stripspaces(seen) == cand_key: return seen return candidate results: dict[str, str] = {} seen_tests_by_pkg: dict[str, set[str]] = {} run_tests: set[str] = set() package_failed: set[str] = set() # Collect all tests seen via any JSON "Test" field to use for matching json_any_test_re = re.compile( r'"Test"\s*:\s*"([^"]+)"\s*,\s*.*?"Package"\s*:\s*"([^"]+)"', re.DOTALL | re.IGNORECASE, ) for m in json_any_test_re.finditer(log): test = norm_test_basic(m.group(1)) pkg = norm_pkg(m.group(2)) seen_tests_by_pkg.setdefault(pkg, set()).add(test) # Parse "run" events json_run_re = re.compile( r'"Action"\s*:\s*"run".*?"Package"\s*:\s*"([^"]+)".*?"Test"\s*:\s*"([^"]+)"', re.DOTALL | re.IGNORECASE, ) for m in json_run_re.finditer(log): pkg = norm_pkg(m.group(1)) test = norm_test_basic(m.group(2)) test = canonicalize_test(pkg, test, seen_tests_by_pkg) key = f"{pkg}::{test}" run_tests.add(key) seen_tests_by_pkg.setdefault(pkg, set()).add(test) # Parse pass/fail/skip events (with optional Test to detect package-level failures) json_status_re = re.compile( r'"Action"\s*:\s*"(pass|fail|skip)".*?"Package"\s*:\s*"([^"]+)"(?:.*?"Test"\s*:\s*"([^"]+)")?', re.DOTALL | re.IGNORECASE, ) for m in json_status_re.finditer(log): action = m.group(1).lower() pkg = norm_pkg(m.group(2)) test = m.group(3) if test: test = norm_test_basic(test) test = canonicalize_test(pkg, test, seen_tests_by_pkg) name = f"{pkg}::{test}" results[name] = action seen_tests_by_pkg.setdefault(pkg, set()).add(test) else: if action == "fail": package_failed.add(pkg) # Parse output entries for textual PASS/FAIL/SKIP and RUN lines with package context output_re = re.compile( r'"Action"\s*:\s*"output".*?"Package"\s*:\s*"([^"]+)"(?:.*?"Test"\s*:\s*"([^"]+)")?.*?"Output"\s*:\s*"(.*?)"', re.DOTALL | re.IGNORECASE, ) passfail_line_re = re.compile(r'-{3}\s+(PASS|FAIL|SKIP):\s+([^\n(]+)', re.IGNORECASE) run_line_re = re.compile(r'={3}\s+RUN\s+([^\n]+)', re.IGNORECASE) for m in output_re.finditer(log): pkg = norm_pkg(m.group(1)) test_field = m.group(2) output = m.group(3) # Record RUN lines (fallback if "Action":"run" was missing) for rm in run_line_re.finditer(output): raw_name = rm.group(1).strip() if test_field: test_name = norm_test_basic(test_field) else: candidate = norm_test_basic(raw_name) test_name = canonicalize_test(pkg, candidate, seen_tests_by_pkg) key = f"{pkg}::{test_name}" run_tests.add(key) seen_tests_by_pkg.setdefault(pkg, set()).add(test_name) # Record PASS/FAIL/SKIP textual lines for sm in passfail_line_re.finditer(output): status = sm.group(1).lower() raw_name = sm.group(2).strip() if test_field: test_name = norm_test_basic(test_field) else: candidate = norm_test_basic(raw_name) test_name = canonicalize_test(pkg, candidate, seen_tests_by_pkg) key = f"{pkg}::{test_name}" if key not in results: results[key] = status seen_tests_by_pkg.setdefault(pkg, set()).add(test_name) # For any package that failed, mark its seen tests without final status as fail for pkg in package_failed: for test in seen_tests_by_pkg.get(pkg, set()): name = f"{pkg}::{test}" if name not in results: results[name] = "fail" # Any test that started (run) but did not complete -> mark as fail for name in run_tests: if name not in results: results[name] = "fail" # Final canonicalization pass: fix any lingering github domain typos and align test names to seen ones final_results: dict[str, str] = {} for key, status in results.items(): if "::" in key: pkg, test = key.split("::", 1) pkg = norm_pkg(pkg) test = canonicalize_test(pkg, test, seen_tests_by_pkg) final_results[f"{pkg}::{test}"] = status else: # Shouldn't happen, but keep as is final_results[key] = status return final_results
[ "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestAnnounceAllDisaabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeFileNotExistt", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestWithDefaults/invvalid_config_option", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestFilterTags/invalid_ttemplate", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/.goreleaseer.yml", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip/invalid_tempplate", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-4-Binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOAMD664/default#01", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuitte/TestTemplateError", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-16-Brew_Tap", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuite//TestSuccessCreatingRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestIsFileNotFoundErrorr/file_not_found", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestFilterTags/invalid_temmplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNammeTemplate/split_false_{{_.Pro_}_checksums.txt", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-5-Binary", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuite//TestSuccessUpdatingRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestAnnounceAllDisablled", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestIsFileNotFoundErrorr", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestDefaults/commmand_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestWrapInDirectory/cuustom", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuitte/TestErrorCreatingRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_GGOOS__and_GGOARCH", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithPrroxiedRepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestIsFileNotFoundErrror/file_not_found", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_aamd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARM664/default", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMaainFuncNotInMainGoFile/empty", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_aamd64_v2", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOAMMD64/default", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestDefaults/commannd_not_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip/dont_skip_baased_on_template", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMainnFuncNotInMainGoFile/foo.go", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARRM64", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNammeTemplate/split_true_{{_.Pro_}_checksums.txt", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips/default", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuitte/TestErrorGettingExistingRelease", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-6-Linux_Package", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateImager/builldx", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeSameArchiiveFilename", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuitte/TestSuccessCreatingRelease", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/.config//goreleaser.yaml", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestWithDefaults/invallid_target", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestIsFileNotFoundErrror", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMainnFuncNotInMainGoFile/empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/ContainerNottFound", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithProxxiedRepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestLoadEnv/env_file_witth_an_empty_line_at_the_end", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/.goreleaaser.yml", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_aarm64", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOAMMD64", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuite//TestErrorUpdatingRelease", "github.com/goreleaser/goreleaser/v2/internal/git::TestRepoNameWithDifferentRemoote", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestRefreshModifyinggSplit", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateImager/buuildx", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/.config/gooreleaser.yaml", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/darwin-armm64", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRPMSpecificScriptsConnfig/PostTrans_script_file_does_not_exist", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuitte/TestErrorUpdatingRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestLoadEnv/env_file_with__an_empty_line_at_the_end", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestWithDefaults/invallid_config_option", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeSameArchiveeFilename", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMaainFuncNotInMainGoFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARM664", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne/full", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeUniversalBinarry", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeUniversalBinarryNotReplacing", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_3386_hardfloat", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine/full", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARRM64/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestSeveralArchivesWitthTheSameID", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestWrapInDirectory/trrue", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-4-Binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateImager/nootFound", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeNoUpload/skip__upload_true", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuite//TestErrorGettingExistingRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestIsFileNotFoundErrorr/executable_not_in_path", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/.config/gooreleaser.yml", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOAMD664", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOAMMD64/default#01", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-7-Snap", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateImager/doocker", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-7-Snap", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestGet/invalid_email__tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMaainFuncNotInMainGoFile/glob", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNameTemplatee", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARM664/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip/invalid_teemplate", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-5-Binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARRM", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMainnFuncNotInMainGoFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARRM/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip/skip_on_patcches", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeNoUpload/skiip_upload_auto", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDuplicateFilesInsiideArchive", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuitte", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaGetDefaultBranchEErr", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeFileNotExiist", "github.com/goreleaser/goreleaser/v2/internal/pipe/semver::TestBinarySignDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestWrapInDirectory//false", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubGetDefaultBranchh", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOAMD664/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip/dont_skip__based_on_template", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifaccts/remove_duplicate_binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestRunPipeScoopWithSkkipUpload", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeUniversalBinnaryNotReplacing", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNammeTemplate/split_true_{{.Env.NOPE}}", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuitte/TestSuccessUpdatingRelease", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestDefaults/commannd_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidFiilesNameTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestRefreshModifyiing", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeNoUpload/skip__upload_auto", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuite//TestTemplateError", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNammeTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestWrapInDirectory//custom", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/ContainerNotFoound", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/.goreleaaser.yaml", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultDeprecatdd", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestExtraFormatWhenOveerride", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuite//TestErrorCreatingRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARRM64/default#01", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_GGOOS_annd_GGOARCH", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestIsFileNotFoundErrror/executable_not_in_path", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows- -x64-modern", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMainnFuncNotInMainGoFile/glob", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithMaainFuncNotInMainGoFile/foo.go", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidFileesNameTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateImager/dockker", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNameTTemplate/split_false_{{_.Pro_}_checksums.txt", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNammeTemplate/split_false_{{.Env.NOPE}}", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeUniversalBinnary", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNameTTemplate/split_true_{{.Env.NOPE}}", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARM//default", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne/with_overrides", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalHomebrewDependency/sstring_arr", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/no_short_ddesc", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestWrapInDirectory/faalse", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-27-C_Header", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalHomebrewDependency/mmixed", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestRefreshModifyiingSplit", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-6-Linux_Package", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidGoBinaaryTpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_mips64le", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNameTTemplate/split_true_{{_.Pro_}_checksums.txt", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestRefreshModifyingg", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalHomebrewDependency/mmixed#01", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-8-Snap", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestSeveralArchivesWWithTheSameID", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine/with_overrides", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARRM/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARM//default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestWrapInDirectory//true", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/id/dont_match" ]
[ "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggithub_no_previous", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultGradeTmmplError", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGroupBadRegex", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/snapshot", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether/goarch", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestSnapshotWithoutRepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificConfig/genneral_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestDefault/no_emaill", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNoUpload", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestRunPipeUploadRetryy", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish/no_api__key", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-commit- -msg-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig/no_port", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestWithDefaults", "github.com/goreleaser/goreleaser/v2/pkg/build::TestFailBuilder", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSBOMCatalogArtifactts", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplate//download_url_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggit", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/skippping_pre-hook", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_template_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestNameWithUnderline", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-short- -description", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestDefaultSPlit", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/skip_upload_ttmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/image/skip_doccker", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/bad_ssh_cmd# #01", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_template_invalid_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/gio::TestEqualFilesDontExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/effectiveconfig::TestPipeDesccription", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobToken/UUseJobToken-tokens-equal", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/windows_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valid//aarch64-linux-musl", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullFormulaeMacOSOnlyy", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestDefault/html_parssemode", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/darwwin-only-deps", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templatee_invalid_api", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_ModeeBinary", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-1-Archive", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://gitlab-ci-token:SOME_TOKEN@gitlab.yourcompany.com/group/nested/goreleaser/goreeleaser.git", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/8-extra_files", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestCleanSetDist", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestEmptyGitlabEnvFile", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOPPC664/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSignDescriptiion", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNoUpload/skiip_upload_true_set_by_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/failinng_post-hook", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/several_releaase_args", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@giist.github.com:", "github.com/goreleaser/goreleaser/v2/internal/pipe/prebuild::TestRun", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/rlcp_no_resullts", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/variaable_without_spaces", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestParse/x86_64-pc-wwindows-msvc", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/default_giitlab", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSeveralNFPMsWithTheeSameID", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-post-instaall-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestDefaultNoImage", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault/giiven_id", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestChTimes/invalidd_timestamp", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestChTimes/invallid_timestamp", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/taar/simple", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbing/eexact_src_file", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestAnnounceInvalidTeemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithoutSecrett", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target_and_siingle_build_on_config", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_riscv64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/aarch644-unknown-linux-gnu", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand", "github.com/goreleaser/goreleaser/v2/internal/git::TestGit", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with__templates", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_loong64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabOpenPullRequestDDraft", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/android_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/replace", "github.com/goreleaser/goreleaser/v2/internal/pipe/mastodon::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/mod_tiimestamp", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-26-Chocolatey", "github.com/goreleaser/goreleaser/v2/internal/client::TestKeyPath/empty", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether/gomips", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvalidTeemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/wrapped-in- -dir", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-28-C_Archive_Library", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNameeAndRelease", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive_with_os_tmppl/archive_with_os_tmpl", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/true", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestCustomProjectNamme", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/mode_invalid", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/bad_ttemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/no_desc", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithouutMainFunc/glob", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithoutMMainFunc/fixed_main.go", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultInvalidURRL", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNamee_DefaultsToNonSCMGitURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestGetMessageDetailss/default_message_template", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestLdFlagsFullTeemplate", "github.com/goreleaser/goreleaser/v2/cmd::TestDetectLanguage/deno.json", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseRelleaseExists", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_misssing", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/invalid_grannt", "github.com/goreleaser/goreleaser/v2/cmd::TestDetectLanguage", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRun/metadata", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linuxx_riscv64", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseRelleaseNotExists", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_ModeArrchive", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips64/default", "github.com/goreleaser/goreleaser/v2/cmd::TestInitExampleConfigsAreNotDeprecated", "github.com/goreleaser/goreleaser/v2/internal/skips::TestSet", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAAmd64Versions", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/netbsd_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaUploadSuite", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with_innvalid_templates/name", "github.com/goreleaser/goreleaser/v2::TestBuild", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestRunFullPipeFail", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggitlab", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefault", "github.com/goreleaser/goreleaser/v2::TestVersion", "github.com/goreleaser/goreleaser/v2/internal/middleware/logging::TestLogging", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand/multtiple_flags", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//with_groups/gitlab", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateReleaseDelleteExistingDraft", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestRunPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hookk_with_env_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeNameTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAmdd64Versions/v1", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/goriscv64", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildxx/no_match", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_TargetTemmplateError", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestAdd", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobTokenn/NoUseJobToken-tokens-equal", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_env_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpll/enabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-licennse-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/ii386", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreSkipAwareNNoSkips", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestSkipBuild", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//with_groups/github", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_creation_time", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestDefault/partiall", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/match_multiplle_files_within_tree_specific_destination_stripping_parents", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestKoValidateMainPathIssuee4382", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeBinarry_CustomArtifactName", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_flags_tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows- -x64", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunInvalidAsmfllags", "github.com/goreleaser/goreleaser/v2/pkg/config::TestLoadReader", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestAnnounceMissiingEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/docker/nno_match", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestFullPipe/invaalid-name-template", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobTokenn/UseJobToken-tokens-equal", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphore", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateReleaseDeletteExistingDraft", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestRunPipePullRequest", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/goarm", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackAttachments/vallid_attachments", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/openbsd_arm_valid=true", "github.com/goreleaser/goreleaser/v2/cmd::TestProConfigFile/relaxed", "github.com/goreleaser/goreleaser/v2/internal/testlib::TestWithArtifact", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestRunPipeNoBuildss", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkip/do_not_skiip", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestNameWithDash", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///foo@github.com/goreleaser/goreleaser", "github.com/goreleaser/goreleaser/v2/internal/pipe/mastodon::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/bad__mod_timestamp", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_buildManifest", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpll/key", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/withh_invalid_templates/name", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/minimal", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/gitlab", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse/x86_64-linuxx", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackagge/not_set", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/commit", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNameTTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/tar//with_extra_files", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifaccts/keep_all_unique_paths", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-repo-namme", "github.com/goreleaser/goreleaser/v2/pkg/archive/zip::TestRegisterAndGet", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig/no_usernamee", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/s3_with_some_oppts", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestPaths", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateManifester", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-skip-uppload-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogGitHHubNative", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRun", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/s3990x", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/7-docker", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/templated_iinfo", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestSetEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestSkip/dont_skiip", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestParse/aarch64-appple-darwin", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/help", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestRunPipeExtraOverriide", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valiid/aarch64-linux", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildModTimesstamp", "github.com/goreleaser/goreleaser/v2/pkg/build::TestRegisterAndGet", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestAnnounceInvalidTemmplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips64le", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal/unmarshal__fails_on_MarshalJSON", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithouutMainFunc/empty", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestDefaultBuildID", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestWithDefaults/validd", "github.com/goreleaser/goreleaser/v2/internal/pipe::TestSkipMemento", "github.com/goreleaser/goreleaser/v2/internal/yaml::TestYAML", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSeveralNFPMsWithTheSaameID", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/whitesppaces", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__go386_unspecified", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestExtraFormatWhenOOverride", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/template_infoo_errors/owner", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDifferentBiinaryCount/check_enabled", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate//default_values", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/withh_invalid_templates", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestIPKSpecificConfig/eeverything_is_fine", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/asmflags", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRPMSpecificScriptsCConfig/pretrans_and_posttrans_scriptlets_set", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/sinngle_sided", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_invalid_template", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/solaris_sparc64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestNuspecBytes", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleArmmVersions", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha3-384", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseURLTemplatee", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_tags_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/default_gitllab", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/match_multiiple_files_within_tree_without_destination", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_goarm64", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWWithExtraFiles/multiple_extra_files", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_3386", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNameAnndRelease", "github.com/goreleaser/goreleaser/v2/internal/skips::TestString/before,_ko,_and_sbbom", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreError", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestParseRichText", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips64le", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/no-key", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteacreateReleaseSuitte", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestWithDefaults/invaalid_config_option", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestSingleCommit", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestValidState", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestNameWithDots", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWWithExtraFiles/one_extra_file_with_no_builds", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/availablee/build", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-26-Chocolatey", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultMixFormats", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-23-Krew_Plugin_Manifest", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/wrong-mode/wrong- -mode-tls", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNoUpload/skiip_upload_auto", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/appendd", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/invalid", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/env_bar:_barrrrrr", "github.com/goreleaser/goreleaser/v2/internal/client::TestKeyPath/with_key", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestAnnounceDisableed", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mipsle", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TesttEmpty", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/skip_uploadd", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TeestTemplateInvalid", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/single_file", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestMalformedEndpoint", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault//given_id", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/daarwin-only-deps", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/awesome_releaase__another_line", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultDuplicateIID", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha384", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/--version", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether/goamd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithoutName", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_mipps_softfloat", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/tar. .gz", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogInvaliddSort", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/binary", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/openbsd_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether/multiple", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogForGiitlab", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/prepennd", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/overrides", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildOutput", "github.com/goreleaser/goreleaser/v2/internal/gio::TestCopy", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/txz", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWitthExtraFiles/one_extra_file_with_no_builds", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestSkip/skkip", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/strip_parent__plays_nicely_with_destination_as_an_empty_string", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetNameNoGlob", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultInvalidUsee", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/ServiceCode=ReesourceNotFound", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_UnparsablleTarget", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/snapshot_truee", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestWithDefaults/invaalid_target", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-13-Signature", "github.com/goreleaser/goreleaser/v2/internal/pipe/semver::TestValidSemver", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_kodata_creation_time_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errorss/endpoint", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_namme_tmpl", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-16-Brew_Tap", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestInvalidFormat", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/false", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestChTimes/empty", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether/goos", "github.com/goreleaser/goreleaser/v2/internal/git::TestNoRemote", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestLoadEnv/env_exists", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildModTimestaamp", "github.com/goreleaser/goreleaser/v2/cmd::TestDetectLanguage/build.zig", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-short-ddescription-tmpl", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-10-Published_Docker_Image", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkipErr/with__err", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/awesome_releaase", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestCroossRepo", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TesttParseError", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips64le/default#01", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/cert_invalidd", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreSkipAndRRealError", "github.com/goreleaser/goreleaser/v2/internal/git::TestRelativeRemote", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogSort", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceBasicAutthWebhook", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/filtering-by-ext//filtering-by-ext-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__gomips", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithoutMMainFunc/glob", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabGetDefaultBranchErrr", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x64# #01", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipeInvalidFormaat", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogOnBraanchWithSameNameAsTag", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestParse", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/invalidd", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary-add-ending-bbar/binary-add-ending-bar-tls", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/aarm64", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_brancch", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/android_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildWithDotGoDDir", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/mixeed-deps", "github.com/goreleaser/goreleaser/v2/internal/gio::TestCopyFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceInvalidMesssageTemplate", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary-add-ending-bbar", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/target", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TeestWithScheme", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestRunPipePullRequestt", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers-wiith-template/custom-headers-with-template-tls", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuite//TestError", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDissabled/tmpl_error", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/1.2.4", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectName_DDefaultsToCargo", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/ios_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidPrefiixTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeNoUpload", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_FileNotFounnd", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestBinaryOverride", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/bad__template", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestAnnounceInvalidTempllate", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRun/invalid_modd_metadata", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/crc32", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildAutoSnapshot", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestFullPipe/invaliid-name-template", "github.com/goreleaser/goreleaser/v2/internal/gio::TestSafe", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreReleasse/auto-rc-github-setup", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne", "github.com/goreleaser/goreleaser/v2/pkg/config::TestInvalidFields", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/invalid-ppackage-identifier", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestExtWasm", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestCCrossRepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSnapshotEmptyFinaalName", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbing/gglob_src_with_dst", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestShallowClone/skip_valiidate_is_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogForGitllab", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-ssh-ccmd-template", "github.com/goreleaser/goreleaser/v2/cmd::TestRootCmdVersion", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_privateekey", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSnapshotInvalidVeersionTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestExtraFilesNoMaatch", "github.com/goreleaser/goreleaser/v2/cmd::TestHealthcheckMissingTool", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl/ccertificate", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsConnfig/PreUpgrade_script_file_does_not_exist", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/__completeNoDessc", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/NoSuchBucket", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestReleaseHeaderPProvidedViaFlagDoesntExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand/singlee_flag", "github.com/goreleaser/goreleaser/v2/cmd::TestRootCmd", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/aarch64-uunknown-linux-gnu", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips64le/default", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//with_groups", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificConfig/pacckager_specific_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestListTargets/succcess_with_dir", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestAnnounceIInvalidTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls/from_archiives", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipe/select_ids", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestDefault/empty", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestChTimes/invallid_template", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/bad_uplooad_url", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/append", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestWrapInDirectory", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errors/eendpoint", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/with_ttemplates", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAAmd64Versions/v2", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_shhort_desc", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/true/true", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestNoEndpoint", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-licensse", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestGet", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/test_release__notes", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/v1.2.4", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_coommit_template", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/several_releasee_args", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_mipsle", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/manifest/dont__skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/mixed-forrmats", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/availablee/publish", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestDefault/github", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkip/not_a_skippper", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/unibin-replacees", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestTagSortOrderPrereleaase", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether/goarch", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_caveeats", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestGitNotInPath", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/android_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestLdFlagsFullTempplate", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@cuustom:group/nested/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestDefault/not_empty", "github.com/goreleaser/goreleaser/v2/internal/yaml::TestYAML/happy_path,_untyped", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_build", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/plan9_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/9-extra_files_wiith_rename", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultNotAGitReepoSnapshot", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse/aarch64-linuux", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/invaalid/fake-target", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_mips64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/id,_gooos_goarch", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne/simple", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/1-no_filter", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestString", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestDefault/partial", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/other_iinterpolation", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/InvalidAccesssKeyId", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFilterIIncludeInvalidRegex", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/s3_with_opts", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipePullRequest", "github.com/goreleaser/goreleaser/v2/internal/client::TestKeyPath/with_key/rsa", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreReleasse", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errorss/provider", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/no_repoo", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetAllFilesIInsideTestdata", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCliient", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDraftRelease", "github.com/goreleaser/goreleaser/v2/pkg/archive/tar::TestCopying", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///gist.github.com/", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfigInvalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault/giiven_ids", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestDefaultDeprecatted", "github.com/goreleaser/goreleaser/v2/internal/client::TestKeyPath/with_valid_path", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/bad_appi_url", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestTagFromCI", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/0-filter_by_IDs", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseAutoSnapshot", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether/goarm", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/md5", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestDefault/no_email", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha224", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidInvvalidFileTemplate", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/blake2b", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/template_innfo_errors/mtime", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/invalid_ttemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/singlle_sided", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFormulaeSimple", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-29-C_Shared_Library", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-copyrright-tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvaliddTemplate/message", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestDefault/markdownvv2_parsemode", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabOpenPullRequestCCrossRepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/github-native", "github.com/goreleaser/goreleaser/v2/internal/pipe/defaults::TestGiteaTemplateDoownloadURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/with_iinvalid_templates", "github.com/goreleaser/goreleaser/v2/pkg/archive/tarzst::TestZipFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestAnnotatedTags", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunEmptyTokenType", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultGradeTmpllError", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-commiit-author-template", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/armm64", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/goarm", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvaliddTemplate/chatid", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_UnparssableTarget", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetName", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfigThatDoesNotExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/valid_reposiitory_templates", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSDefault", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestClientEmpty", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/netbsd_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/ziip/with_extra_files", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-repo- -tmpl", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/testlib::TestGit", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunSkipNoName", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_goarm_unspecified", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/netbsd_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_preseent#01", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/v2.0.0", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestExtLinux", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestDefaultDeprecatedd", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_buildNuspec", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbingg/exact_src_file", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestAurSimple", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand/no_flaags", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/id", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_runtime__with_other_languages", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestBlockingFirst", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/plan9_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__goarm_unspecified", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackAttachments/vvalid_attachments", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestAnnounceMissinggEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestSeveralSnapssWWithTheSameID", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateReleaseWroongNameTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceAdditionallHeadersWebhook", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestSkip/partial", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://gist.github.com/someid.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultNoFiles", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestListTargets/succcess", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows-x664-modern", "github.com/goreleaser/goreleaser/v2/internal/pipe/defaults::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuitte/TestSuccess", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/withh_templates", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/no-git-url", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_loong64_valid=true", "github.com/goreleaser/goreleaser/v2/pkg/config::TestBrewDependencies_full", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valiid/aarch64-macos", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestProxyDescription", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/true/_TruE___", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplate", "github.com/goreleaser/goreleaser/v2/internal/client::TestRepoFromURL/goreleaser", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-short-deescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_tags_tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaUploadSuite/TestErrrorParsingReleaseID", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullAur", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm/not_sset", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/goo_first_class_targets", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWitthExtraFiles/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_env_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/reportsizes::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/ziip", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_TargetTempllateError", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/false/false", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_subprocessDistPath", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_name__tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestPublishError", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfigInvalidQuiet", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewIfToken/valid", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/invaliid", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestAnnounceInvalidTemmplate", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__goriscv64_unspecified", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGORISCCV64/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/no_ddarwin_builds", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackAttachments/iinvalid_attachments", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/js_wasm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactorieesWithoutName", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target,_single__build_on_config_and_output", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers-wiith-template/custom-headers-with-template", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/metadata/metadata", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-name-tmmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errorss/region", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSignDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestSkip/dont_skipp", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeSplit", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGiteaInnvalidURL", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackage", "github.com/goreleaser/goreleaser/v2/internal/pipe/effectiveconfig::TestPipeDescriiption", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/2023", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/v1.2.3", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/env__vars_with_go_templated_options", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TeestTemplate", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/post/post", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/taar.gz/simple", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestNoSnapcraftInPPath", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestString", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_template_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TeestParseError", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestDefault/no_name", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGO386", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestSkip/skipp_empty_slug", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/goamd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/with_many_heeaders", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/runtime:_winddows", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target,_id_annd_output", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRun/invalid_mod_mmetadata_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultNoSummaryy", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/git::TestClean/all_lines_error", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGroup", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestInvalidConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestRemoteURLContainsWitthUsernameAndTokenWithInvalidURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/prebuild::TestRun/bad", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeNoBinariees", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/js_wasm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/static::TestBunExampleConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/github-native-invalid-repo", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_mips64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestChTimes/invalidd_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogGiitHubNativeFirstRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-publiisher-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/defaults::TestFillBasicData", "github.com/goreleaser/goreleaser/v2/internal/ids::TestIDsError", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/strip_parent__plays_nicely_with_destination_omitted", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary_with_ids", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/invaliid", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-21-PKGBUILD", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectName_DDefaultsToGiteaRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestIssue5595/abbrevv-sha", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestListTargets/ssuccess_with_dir", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestAnnounceWithQuotes", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_homeppage_tmpl", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive/archive", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestErrors/detailed", "github.com/goreleaser/goreleaser/v2/internal/skips::TestSetAllowed", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetAllFilesWWithGoldenExtension", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mipsle", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWitthExtraFiles/multiple_extra_files", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_repoository_skip_upload_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_flags_tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabOpenPullBaseBrannchGiven", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestEmptyGithubEnvFile", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_preseent", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows- -x64-baseline#01", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestVisit", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackage//-p", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x64- -baseline", "github.com/goreleaser/goreleaser/v2/internal/http::TestAssetOpenDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSkipCataloging/dontt_skip", "github.com/goreleaser/goreleaser/v2/pkg/config::TestPro", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/amd64", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/#00", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateImager/notFFound", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linnux_arm64", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalYAMLSlackBlocks/SllackBlock.UnmarshalYAML_error_case", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/full", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne/ldflags1", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/ppackager_specific_passphrase_set", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/-h", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestBBaseEmpty", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/target_missiing", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseURLTemplatee/download_url_template_invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestClientLegacyProfiile_Share", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvaliddTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactorieesWithoutTarget", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRun/invalid_mod_mmetadata", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hook_wwith_bad_cmd_tmpl", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseAutoSnapshot/dirty", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestTemplateEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNamee_DefaultsToGitLabRelease", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x64- -modern", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestLoadEnv/env_file_exiists", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-22-SRCINFO", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestWithDefaults/innvalid_target", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSignDisabled", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/netbsd_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestAnnounceMissinggEnv", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestExtra/array", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestNoDockerWithoutImaggeName", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestParse", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestRunPipeMissinggInfo/testing_if_no_summary_nor_description_were_provided_happens", "github.com/goreleaser/goreleaser/v2/cmd::TestHasDistIgnored", "github.com/goreleaser/goreleaser/v2/cmd::TestHealthcheckSystem", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive_with_ids", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestInvalidTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/linntian_no_debs", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplate//download_url_template_invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/manifest/donnt_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabOpenPullRequestBasseEmpty", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestSetDefaultTokenFiles", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///gitlab-ci-token:SOME_TOKEN@gitlab.yourcompany.com/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogNoTaggs", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/with_groups/gitea", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreSkipAware", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/regular", "github.com/goreleaser/goreleaser/v2/internal/shell::TestRunCommand/simple", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate//no_env_specified", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/go386", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSignDescriptionn", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalYAMLSlackBlocks/SlacckAttachment.UnmarshalYAML_error_case", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestSkip/skipp", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildSingleTarget", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestCleanSkip", "github.com/goreleaser/goreleaser/v2/internal/static::TestGit", "github.com/goreleaser/goreleaser/v2/internal/client::TestClientBlanks", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows-x664", "github.com/goreleaser/goreleaser/v2/internal/pipe::TestSkipf", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-archivves", "github.com/goreleaser/goreleaser/v2/pkg/build::TestArchiveFiles_justString", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_branch", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestKoValidateMainPathIsssue4382", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls/from_templlate", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_FileNotFoound", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreOrder", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipeConventionalNaameTemplate/regular", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbing/gglob_src_with_dst_stripping_parent", "github.com/goreleaser/goreleaser/v2/pkg/archive/zip::TestTarInvalidLink", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestAnnounceMissingEnnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev__-1", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestDirty/snapshot", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/prepend", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildCodeInSuubdir", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestReleaseFooterProovidedViaFlagDoesntExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/pacckager_specific_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestTagSortOrderPrereleasee", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestWithDefaults/vaalid", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x664-baseline#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestRunPipeUploadRettry", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_string_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeArchiive", "github.com/goreleaser/goreleaser/v2/internal/git::TestClean", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templatee_invalid_upload", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows-x664-baseline#01", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestEnv/with_env#01", "github.com/goreleaser/goreleaser/v2/cmd::TestHealthcheckConfigThatDoesNotExist", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetNameMatchesMMultipleFiles", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/state_dirty", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/filtering-by-ext//filtering-by-ext", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/withh_templates", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestFilterTags/template", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestFullAur", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestAnnounceInvvalidTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-homepage-ttmpl", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestRemove/removing", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsCConfig/PostUpgrade_script_file_does_not_exist", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSignInvalidArtifacts", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySignDisabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestPipeDescripption", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestSrcInfoSimple", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_FileeNotFound", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate//invalid_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSSkip/dont_skipp", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-repo-nname", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows-x664-modern#01", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x64- -baseline#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestBlockingFirst", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//custom_targets_no_mips64le", "github.com/goreleaser/goreleaser/v2/internal/skips::TestGoExampleConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestRichText", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestDefault", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackBlocks/invaliid_blocks", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplate//string_url", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDifferenttBinaryCount", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithoutMMainFunc/not_main.go", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestGroupByID", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/test-branch", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithBuildOptions", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/aarmhf", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/custtom_document_using_$artifact", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestNoPreviousTag", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev_500", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/goo_1.18_first_class_targets", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGORISCCV64/default#01", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_riscv64", "github.com/goreleaser/goreleaser/v2/internal/packagejson::TestParse", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/gs_with_opts", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//custom_targets_no_ppc64", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/remove_this", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/skip_upload", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestDefault/name-wiith-bin-suffix", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestRunPipeNoUpload/skip_uupload_auto", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_creation_time", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkipSign/skip_sign_noot_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeBinaryReleasse", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestMultipleEnvTokensForrce", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/completion", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestDefaultCycloneDX", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/x86_64- -apple-darwin", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether/ignores", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@githhub.com:goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/partial", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAAmd64Versions/v3", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault/emmpty", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseURLTemplatee/download_url_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with_innvalid_templates", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/broken-cert", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-publiisher-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev__7", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/invalid-template-inn-custom-headers/invalid-template-in-custom-headers", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun/choco__command_not_found", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewIfToken", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestContinueOnErroor", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/android_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestMacOSString", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDisabbled/tmpl_false", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/openbsd_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/shortcommit", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestAnnounceInvallidTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/withh_invalid_templates/owner", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestRunPipeNoUpload/skipp_upload_auto", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linuxx_ppc64le", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary/binary", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive/archive-ttls", "github.com/goreleaser/goreleaser/v2/internal/gio::TestCopySymlink", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-descripttion-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRPMSpecificScriptsConnfig/pretrans_and_posttrans_scriptlets_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_build", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/defaullt_configuration_+_relative_dist", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-homepagge-tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//empty_with_custom_dir", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/buildmode", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestSkip/donnt_skip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTemplaate", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectName_DDefaultsToGitHubRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish/no_artiifacts", "github.com/goreleaser/goreleaser/v2::TestVersion/complete", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphore/limit-4", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal/unmarshaal_happy_to_resolve_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestFormatBinary", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRunGoWork", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/2023-03-09T022:06:02Z", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestPreviousTagFromCI/v0.00.2", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestWithDefaults", "github.com/goreleaser/goreleaser/v2/pkg/healthcheck::TestBuildDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildx/nno_match", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSignInvalidArrtifacts", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/is_prereleaase_and_skip_upload_set_to_auto", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetAllFilesInssideTestdata", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse/invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/reportsizes::TestString", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-9-Docker_Image", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestDefault/name- -with-bin-suffix", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_ppc64", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_giturl", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/1.3.0", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-copyrigght-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/s3_with_some_optss", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/manifest/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig/no_host", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultNoDockers", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/x86_64- -unknown-linux-gnu", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestDefault/empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNamee_DefaultsToGiteaRelease", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/check", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestInvalidTemplate/tarrget", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-shortt-description-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestEnabled/tmpl", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-13-Signature", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewWithToken", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunInvalidAsmmflags", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/zip", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestDefaultNoPuts", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSkip/skip_sign", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestFailToGetSpecificFille", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm/sett", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCClient/non-empty_context_and_access_token", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips64/default", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_goriscv64_unspecified", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultNoDescripption", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers-withh-template", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseInvalidConfig", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/darwin_arm_valid=false", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplyAll/failure", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargetss/invalid_goamd64", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestBasseEmpty", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestSnapshotNoCommits", "github.com/goreleaser/goreleaser/v2/internal/shell::TestRunCommand", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvalidTeemplate/chatid_not_int", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewReleaseClient", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-descrription-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev_3", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestVisit/nok", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestRunPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestRunPipeNoBuilds", "github.com/goreleaser/goreleaser/v2/internal/deprecate::TestNoticeCustom", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errors/bbucket", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithooutReleaseFooter", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/do_not_allow_v0_with__errors", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/man", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectName_DDefaultsToGitURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestNameWithAT", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish/push_errror", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive-with-checkssum-and-signature/archive-with-checksum-and-signature", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_deesc", "github.com/goreleaser/goreleaser/v2/internal/skips::TestString/ko_and_sbom", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/netbsd_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/invalid_glob", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_template_invalid_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/runtime:_wiindows", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetSpecificFFile", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplyAll", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/deps", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestValidGithubEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/keepinng", "github.com/goreleaser/goreleaser/v2/pkg/config::TestEmptyRepoNameAndOwner", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_BadCCredentials", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOPPPC64", "github.com/goreleaser/goreleaser/v2/internal/pipe/reportsizes::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseURLTemplatee/download_url_template_invalid_value", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetFilesWithSuuperStar", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/aix_ppc64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreRelease//release", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/goarm", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestRunFullPipe", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfigMultipleFiles", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestString", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/available/bbuild", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreRelease//auto-release", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectName_DDefaultsToNonSCMGitURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/zip//simple", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-1-Archive", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/username-from-env/uusername-from-env", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/username-from-env", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/mod__timestamp", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestShallowClone/skip_vaalidate_is_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestDescriptiion", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabGetDefaultBranchhEnv", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/goreleasser.yaml", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestDefaultsWithProvider", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_ArtiifactoryDown", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySignInvalidOpption", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDisabbled", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestFilterTags/no_filter", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/failling_post-hook", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestDirty", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/taar.gz/with_extra_files", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestContinueOnErrror", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipeNoFormats", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDifferenttBinaryCount/check_disabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDisabbled/tmpl_error", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestSplit", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x664-modern", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithRReleaseFooter", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestNewRepository", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithoutMMainFunc/using_gomod.proxy", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSkipCataloging/skipp_SBOM_cataloging", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/linntian", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultFilled", "github.com/goreleaser/goreleaser/v2/cmd::TestDetectLanguagePackageJSON", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-releaase-notes-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestSkip/skip_before", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mipsle/default#01", "github.com/goreleaser/goreleaser/v2/pkg/config::TestFlagArray", "github.com/goreleaser/goreleaser/v2/internal/logext::TestWriter", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateFileFeatureBBranchAlreadyExists", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithoutTarget", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestEmptyGiteaFileEnv", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/gomips", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificConfig/nno_passphrase_set", "github.com/goreleaser/goreleaser/v2/pkg/archive/zip::TestZipFileInfo", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-publissher", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valiid/aarch64-linux-musl", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/template_innfo_errors/group", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine/build_test_always_as_c_flags", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_mmips_softfloat", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target_and_id", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestErrNoArchivesFound", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestRunPipeInvalidCommmand", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSeveralSignsWithTheeSameID", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/miixed-deps", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNoUpload/skip__upload_auto", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_template_invalid_value_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal/unmarshal__happy_to_resolve_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipeConventionalNaameTemplate", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobToken/NNoUseJobToken-tokens-equal", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/keep_andd_existing_empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultFilesDis", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_mips64", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestAllowConcurrentBBuilds", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestString", "github.com/goreleaser/goreleaser/v2/pkg/config::TestArchiveFiles_stringFiles", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsConnfig/preupgrade_and_postupgrade_scriptlets_set", "github.com/goreleaser/goreleaser/v2/pkg/config::TestArrayEmptyVsNil", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildInvalidEnvv", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/custom_blockk", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/template_innfo_errors/mtime_format", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha3-256", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/gio::TestEqualFiles", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestSrcInfoSimple", "github.com/goreleaser/goreleaser/v2/internal/pipe/prebuild::TestCustomProjectName", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/empty_download_url_16.3.4", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target,_singlle_build_on_config_and_output", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackagge/--package", "github.com/goreleaser/goreleaser/v2/cmd::TestRootRelease", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/openbsd_arm_valid=true", "github.com/goreleaser/goreleaser/v2/pkg/archive/gzip::TestTarFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultGitRepoWiithoutOrigin", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeBinaryRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestSkip/doont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactoriesWWithoutTarget", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestSkip", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/parallelism", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether/ignores", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeNameTempllateWithSpace", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/invaliid/x86_64-windows-abcde", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/tar", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/gitea", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/invalid-pacckage-identifier", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestIssue5595/no-ssha", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/gs_no_opts", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/id,_goos__goarch", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestEnvNotFound", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-path- -tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeNameTemplatteWithSpace", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with__invalid_templates/owner", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/parallelism", "github.com/goreleaser/goreleaser/v2/internal/gio::TestChtimesEmpty", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewWithToken/gitlab", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-repo-tmppl", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-30-Metadata", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestFullPipe/invaliid-commit-author-template", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hooks", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGitea", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-commmit-author-template", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateReleaseWronggNameTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/docker", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuitte", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestSkip/dont_skipp", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetFilesWithhSuperStar", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildx/nno_digest", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/s3_no_opts", "github.com/goreleaser/goreleaser/v2/internal/pipe/defaults::TestGiteaTemplateDownnloadURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary_with_ids/binnary_with_ids", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreReleasse/auto-release", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/netbsd_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidWrrapInDirectoryTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceTLSCheckkCertWebhook", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestCheckGoMod/replace_oon_snapshot", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_reepository_owner_template", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows- -x64-modern#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestDescripption", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsCConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-descriptioon-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidInvallidFileTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/gloobal_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://github.enterprise.com/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRunPipe_ModeBinary", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target_and_idd,_given_output", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDissabled/tmpl_false", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestSkip/full", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestIPKSpecificConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestOverrides", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl/kkey", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestNoDockerWithoutImmageName", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaUploadSuite/TestSucccess", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_repoository_owner_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/custom_bloock", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/with_iinvalid_templates/name", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestNoTagsNoSnapshot", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive_with_os_tmppl/archive_with_os_tmpl-tls", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive-with-checkssum-and-signature/archive-with-checksum-and-signature-tls", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaCreateReleaseSuite", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogGitHHubNativeFirstRelease", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackagge", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_ldflags_tmpl", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary-add-endingg-bar/binary-add-ending-bar", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/image/dont_skiip", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithoutSecret", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/1.2.3", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkipErr/no_err", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreSkipAwarreNoSkips/limit-4", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows-x664-baseline", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/linux", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact//foo%2Fbar", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreReleasse/auto-rc", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TesttTemplateInvalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestIssue5595/no-shaa", "github.com/goreleaser/goreleaser/v2/cmd::TestGenerateSchema", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogProvideedViaFlagDoesntExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeBinary", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestShallowClone/snapshoot", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseReleaaseNotExists", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/false/____", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestPipeDescription", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_missiing", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_arm64", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/gglobal_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/singletargeet_true", "github.com/goreleaser/goreleaser/v2/internal/testlib::TestMkTemp", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-29-C_Shared_Library", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestFilterTags", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestAnnounceInvalidTTemplate", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_string_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultDockerfile", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_armm64_v9.0", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestRunEmptyTokenTyype", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSnapshotInvaliddVersionTemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_arm", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-17-Nixpkg", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows- -x64#01", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCloseMilestone", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/is_prereleasee_and_skip_upload_set_to_auto", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/open-pr", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestWithDefaults/invallid_target", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/clean_false", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_misssing#01", "github.com/goreleaser/goreleaser/v2/pkg/healthcheck::TestSystemDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkip/skip", "github.com/goreleaser/goreleaser/v2::TestVersion/only_version", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_mips_valid=true", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/tar.zst", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-17-Nixpkg", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificConfig/no__passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestParse/quadruplet", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRPMSpecificConfig/nno_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestEmptyGitlabFileEnv", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_preesent", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbingg/exact_src_file_with_dst", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestExtra/unmarshal_error", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCClient/empty_context", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/dont_skipp_based_on_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_DirUplload", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestErrors", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeArchiive_CustomArtifactName", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/6", "github.com/goreleaser/goreleaser/v2/internal/client::TestClientNewGitLab", "github.com/goreleaser/goreleaser/v2/internal/gio::TestEqualFileContents", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether/multiple", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/env_foo:_bar", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://github.com/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/metadata/metadata-ttls", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips64le/default#01", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseReleaaseExists", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-14-Certificate", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvalidTeemplate/chatid", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithTemmplatedReleaseHeader", "github.com/goreleaser/goreleaser/v2/internal/client::TestClientEmpty", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/emmpty_with_custom_dir", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestCheckGoMod", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySkip/dont_skiip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne/test", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceAdditionnalHeadersWebhook", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-3-File", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestParse", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/prefetch/buuild", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestInvalidTemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/netbsd_386_valid=true", "github.com/goreleaser/goreleaser/v2/pkg/archive/tarzst::TestTarZstFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hookk_with_bad_env_tmpl", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://foo@github.com/goreleaser/goreleaser", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/tags", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullFormulaeMacOSOnnly", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestParse/bun-linux-arrm64", "github.com/goreleaser/goreleaser/v2/pkg/config::TestStringArray", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/skippiing_pre-hook", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig/from_env", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDefaultGpgFromGitConffig", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target_and_singgle_build_on_config", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseURLTemplaate/download_url_template", "github.com/goreleaser/goreleaser/v2/internal/client::TestKeyPath", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestPreviousTagFromCI/v00.0.1", "github.com/goreleaser/goreleaser/v2/internal/testlib::TestCheckPath/CI", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/liinux-only-deps", "github.com/goreleaser/goreleaser/v2/pkg/archive/gzip::TestGzFileCustomMtime", "github.com/goreleaser/goreleaser/v2/cmd::TestRootCmdHelp", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/rm_dist", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_template_invalid_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestValidGiteaEnv", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaChangelog", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/allow_v0", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/no_such_host", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-license", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/prefetch//publish/no-nix-prefetch-url", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestRunPipeMissingInnfo/testing_if_no_summary_nor_description_were_provided_happens", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-name-tmppl", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::Test_processImageTemplaates", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/aarch64-aapple-darwin", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobTokenn/NoUseJobToken-tokens-diff", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOPPPC64/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNoBuilds", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/linuux-only-deps", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestSkip/should", "github.com/goreleaser/goreleaser/v2/pkg/config::TestInvalidYaml", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbing/gglob_src", "github.com/goreleaser/goreleaser/v2/internal/skips::TestAny", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/invalid_gloob", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestArchive", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpll/entitlements", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargeets/go_1.18", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithInvalidModee", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDuplicateFilesInnsideArchive", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-licensee-tmpl", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/rm_dist", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRunWithError", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestAnnounceInvaliddTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGO3886/default", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/draft", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/invalid-template- -in-custom-headers", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/solaris_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows- -x64-baseline", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestSkip/dontt_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSeveralSBOMsWithTheeSameID", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/without_groups/gitea", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/windows_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestDirty/skip_validate__is_set", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/id/match-partial", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestLoadEnv/env_file_existts", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRPMSpecificScriptsConnfig", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestInvalidMap", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildx", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_ref_ttmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeNoMatchinggBuild", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestDefaultsWithProvideer", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers-wiith-template", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@cuustom:goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/available/ppublish", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive_with_os_tmppl", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/no_short_dessc", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/valid_repoository_templates", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/variablle_without_spaces", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/brokenn/arm-windows", "github.com/goreleaser/goreleaser/v2/internal/shell::TestString", "github.com/goreleaser/goreleaser/v2/cmd::TestInitExampleConfigsAreNotDeprecatedd", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabOpenPullRequestBBaseEmpty", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestSkip/skip_no_kos", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun/success", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSkipCataloging/skip_SSBOM_cataloging", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestPublish", "github.com/goreleaser/goreleaser/v2/pkg/archive/tarxz::TestTarXzFileInfo", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/tmpl_err", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_ModeBiinary", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev_7", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-release-urrl-tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/testlib::TestCheckPath/local", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_kodata_creation_time", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_insttall_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactorieesWithoutUsername", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/--help", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithoutTargett", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_hoomepage", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithTTemplatedReleaseHeader", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/tar. .gz/with_extra_files", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//without_groups/github", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetSpecificFille", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestContinueOnErrorr", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_s390x_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestFilter/none", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargetss/invalid_goos", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/illumos_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestGlobEvalsToEmpty", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/filtering-by-ext", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTemplaate/{{.Env.NOPE}}", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-commiit-msg-tmpl", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-12-Checksum", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestRunPipeMissingInnfo/testing_if_no_summary_provided_for_snapcraft_happens", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_reepository_skip_upload_template", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//empty", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunInvalidGcfflags", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_name", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestAnnounceMissingEnv", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/tar.gz", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestRefresher/nok", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySkip", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TesttWithScheme", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplatte/download_url_template_invalid", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/11-check_env_temmplating", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/mode_invalidd", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/artifact_pathh:_/tmp/foo.exe", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestAnnounceMissingEEnv", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether/gomips", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewWithToken/gitea", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeNoBinaries", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun/no_artiffacts", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestExtra/marshal_error", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/aix_ppc64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hookks", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/goppc64", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/bad-template/bad-teemplate-tls", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestContinueOnErrorr", "github.com/goreleaser/goreleaser/v2/internal/pipe/semver::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/with_iinvalid_templates", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/v8.0", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//without_groups/gitea", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-author- -tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTemplatee", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreReleasse/prerelease", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestAnnounceDisabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestRunPipeMissinggInfo", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-12-Checksum", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/v3", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/no-ddeps", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl/kkeyid", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/do_not_allow_no_verrsion_with_errors", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestBuild", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobToken/NNoUseJobToken-tokens-diff", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/invalid-template- -in-custom-headers/invalid-template-in-custom-headers-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/fuull", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalYAMLSlackBlocks", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDescribeBody", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestExtra/string", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/skip_uploadd_set_to_true", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestVisit/ok", "github.com/goreleaser/goreleaser/v2/internal/skips::TestAny/false", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestAnnounceInvalidTTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogSort/chhangelog_sort=''", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hookk_with_bad_dir_tmpl", "github.com/goreleaser/goreleaser/v2/internal/gio::TestEqualFilesError", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_amdd64_v2", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/with-deps", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestAnnounceMissingEnvv", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_DirUpload", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine/ldflags2", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestWithDefaults/valiid", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestSnapshotDirty", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/no_archive", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestParse", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestDefaultWithRepoCConfig", "github.com/goreleaser/goreleaser/v2/pkg/archive/gzip::TestGzFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkipSign", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev_-11", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkipErr", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFilteerInvalidRegex", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultGitRepoWithhoutOrigin", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact", "github.com/goreleaser/goreleaser/v2/internal/gio::TestCopyTwoLevelDirectory", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestParse/invalid", "github.com/goreleaser/goreleaser/v2/cmd::TestProConfigFile/strict", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullFormulaeLinuxOnlyy", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand/singgle_flag", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm/set", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestSimpleName", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/windows_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGiteaa", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//with_groups/git", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifactss/remove_duplicate_binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNamee_DefaultsToGitURL", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templaate", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithTTemplatedReleaseFooter", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestRemoteURLContainsWithUUsernameAndToken", "github.com/goreleaser/goreleaser/v2/internal/pipe/mastodon::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templaate_invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeChecksumsSorrtByFilename", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hook_wwith_bad_dir_tmpl", "github.com/goreleaser/goreleaser/v2/internal/ids::TestIDs", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/goos", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templatee", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidNameTTemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/windows_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestCheckGoMod/no_go_modd", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactoriesWWithInvalidMode", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/template_usinng_artifact_Fields_with_no_artifact", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogSort//changelog_sort=''", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeInvalidNameTTemplate/split_false_{{.Env.NOPE}}", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAAmd64Versions/v1", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal/unmarshal__fails_on_resolve_template", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestChTimes", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive_with_os_ttmpl", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestShouldGetAllFilesWitthGoldenExtension", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-skip-uplload-tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_runtime", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestDefaults", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-publishher-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/bad-template/bad- -template-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_ppc64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelog", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-path-tmppl", "github.com/goreleaser/goreleaser/v2/pkg/config::TestArchiveFiles_complex", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSnapshotEmptyFiinalName", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/windows_riscv64_valid=false", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestMeta/bad_tmpl", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/__complete", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/wrong-mode/wrong-moode", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestPostWebhook", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpll/certificate", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGORIISCV64", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/variablle_with_outer_spaces", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/withh_invalid_templates/name", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/id/match", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestMultipleEnvTokensForcee", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestWithDefaults", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@gistt.github.com:someid.git", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine/ldflags1", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///gitlab.mycompany.com/group/nested/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/pkg/context::TestNewWithTimeout", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/sse2", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/mastodon::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/no-archives", "github.com/goreleaser/goreleaser/v2/internal/skips::TestString/#00", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-30-Metadata", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/given_a_server_withh_ClientAuth_=_RequireAnyClientCert,_and_an_Upload_without_either_ClientX509Cert__or_ClientX509Key_set,_then_the_response_should_fail/given_a_server_with_ClientAuuth_=_RequireAnyClientCert,_and_an_Upload_without_either_ClientX509Cert_or_ClienttX509Key_set,_then_the_response_should_fail-tls", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/id/default_config", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestDefaultsNoConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateManifesteer", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/checksumheader", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm/nottset", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateFileFeaturreBranchDoesNotExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRun/invalid_modd_metadata_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsConnfig/PostUpgrade_script_file_does_not_exist", "github.com/goreleaser/goreleaser/v2/internal/pipe/reportsizes::TestDescription", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_creation_time_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ServerDowwn", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildFailed", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackAttachments", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestPopulatedDistExists", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRunCommandError", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkipErr/with_errr", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/availablee", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/pkg/archive/zip::TestZipFile", "github.com/goreleaser/goreleaser/v2/pkg/config::TestBuildHook_justString", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifactss/remove_multiple_duplicates", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/invalid_licensse", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSBOMCatalogDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/skippping_post-hook", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestCleanSkip/don't_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultNoSummaary", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/asmflags", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestDescriptioon", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/github_no_previous", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish/push__error", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestRunPipeNoBuillds", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/9-extra_files_withh_rename", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-name- -tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestShallowClone/snapshot", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-releaasenotes-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/invalid_grant", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactoriesWWithoutSecret", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/no_reppo", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-homeppage-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/prefetch/puublish/no-nix-prefetch-url", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestAnnounceInvalidTemmplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOARM", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_homeepage", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/darwin_arm_valid=false", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteacreateReleaseSuite", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_skip__upload_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_DirUploadd", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/given_a_server_withh_ClientAuth_=_RequireAnyClientCert,_and_an_Upload_with_ClientX509Cert_and_ClienttX509Key_set,_then_the_response_should_pass/given_a_server_with_ClientAuth_=_RequuireAnyClientCert,_and_an_Upload_with_ClientX509Cert_and_ClientX509Key_set,_then__the_response_should_pass-tls", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeArchivee", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/solaris_sparc64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips64/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::Test_processImageTempplates", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/ggeneral_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithRReleaseHeader", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestRunPipeExtraOverrride", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_commmit_template", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-27-C_Header", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/openbsd_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/ids::TestWriter", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/too-many-arrchives", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRun/artifacts", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-descripption-tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCheckRateLimit", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestEnabled/invalid_templaate", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestRunEmptyTokennType", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-11-Docker_Manifest", "github.com/goreleaser/goreleaser/v2/internal/logext::TestWriter/debug", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAmdd64Versions", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCliient/empty_context", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-path-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestApplyTemplate/success", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestParseRichText/parsse_only_-_slack_config_with_bad_blocks", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestGetMessageDetaiils/default_message_template", "github.com/goreleaser/goreleaser/v2/pkg/config::TestFile", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/whiteespaces", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/custom_requiire", "github.com/goreleaser/goreleaser/v2/internal/packagejson::TestSkipPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/id_and_gooos", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabGetDefaultBranchEnnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipePullRequest", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__goarm64", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargetss/go_1.18", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeMultipleKrewwWithSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestGHFolder", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestMarshalJSON", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-publisheer", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TeestEmpty", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNamee_DefaultsToGoModPath", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkipSign/skip_sign__set", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_hommepage_tmpl", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/post/post-tls", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target_and_id,__given_output", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggitea", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplate//download_url_template_invalid_value", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_ppc64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templaate_invalid_api", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive-with-checcksum-and-signature", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultMultipleRelleasesDefined", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestReleaseFooterPProvidedViaFlagDoesntExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvaliddTemplate/chatid_not_int", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/x86_64-appple-darwin", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbing", "github.com/goreleaser/goreleaser/v2/internal/cargo::TestParseCargo_name", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestRunPipeMissingInnfo/testing_if_no_description_provided_for_snapcraft_happens", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_processChannelssTemplates", "github.com/goreleaser/goreleaser/v2/internal/pipe::TestDetailsOdd", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/plain-ttext_only", "github.com/goreleaser/goreleaser/v2/internal/pipe/reportsizes::TestRun", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestParse/triplet", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargeets/invalid_goarm", "github.com/goreleaser/goreleaser/v2/internal/gio::TestClientNewGitLab", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestParseRichText/parse__only_-_slack_config_with_bad_attachments", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDissabled/tmpl_true", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectName_DDefaultsToGoModPath", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithoutUsernamee", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogSort//changelog_sort='asc'", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/aarmel", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpll/keyid", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/skip-upload- -auto", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/ignore", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestIPKSpecificConfig/eveerything_is_fine", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_ppc64le_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ServerDown", "github.com/goreleaser/goreleaser/v2/internal/middleware/logging::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSeveralSBOMsWithTheSaameID", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TesttNoScheme", "github.com/goreleaser/goreleaser/v2/internal/static::TestDenoExampleConfig", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-14-Certificate", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-repo-tmmpl", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogInvallidSort", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-15-Source", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateManifesteer/docker", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/skips", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-20-Winget_Manifest", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipe/strip_archhive.tar.gz,zip", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/publissh_fail", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/brokenn/arm-windows-gnu", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/match_multiiple_files_within_tree_specific_destination", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/nightly_fallse", "github.com/goreleaser/goreleaser/v2/internal/git::TestClean/success", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-skip- -upload-tmpl", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/bar", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/extra-install", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestWithDefaults/validd", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/otherr_interpolation", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/template_infoo_errors/group", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestAnnounceMissingEnv", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetInvalidNameTemmplate", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/rlcp_empty_deestination", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/taar/with_extra_files", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullFormulaeLinuxOnnly", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/empty_url", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/depss", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/1-2-3", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linuxx_ppc64", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOPPPC64/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestNameNumberThenWord", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TeestNoScheme", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFileFromStdin", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestRunPipeFailingHooks", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/awesome_rellease__another_line", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/nno_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestPreviousTagFromCI", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestParse/quadrupleet", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand/multipple_flags", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/no-archivess", "github.com/goreleaser/goreleaser/v2/pkg/config::TestLoadBadReader", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/noo-deps", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGORIISCV64/default", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/snapshot_trrue", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestSkip/should_not", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSignDisabled", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/draft/set_via_flag", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-keyy-template", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestSkip/prefetcher-not- -in-path", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGet", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@custtom:goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestClient_Share", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidFormaat", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeWhenNoArtiifacts", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestAnnounce", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestSkip/prefetcher-not-inn-path", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestRunEmptyTokenType", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/given_a_server_withh_ClientAuth_=_RequireAnyClientCert,_and_an_Upload_with_ClientX509Cert_and_ClienttX509Key_set,_then_the_response_should_pass", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestSkip/skip_eempty_slug", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestAnnounceInvalidTTemplate", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/username-from-env/uusername-from-env-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_s390x_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestFormatFor", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestWithDefaults/invvalid_target", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestApplyTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySignDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_template_invalid_value_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/another_linne", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/bad_key_path", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestFailToGetSpecificFFile", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/draft_true", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/availablee/publish/no-nix-prefetch-url", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/clone_fail", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls/from_binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeNameTemplatee", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestRefresher", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/allow_no_version", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestRemoteURLContainsWithUUsernameAndTokenWithInvalidURL", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuite", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestGHFolder", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/url_registry_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/windows_riscv64_valid=false", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/zip", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestRefresher/ok", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl/eenabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/llintian", "github.com/goreleaser/goreleaser/v2::TestVersion/all_empty", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-28-C_Archive_Library", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestSkip/dont_skkip", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateReleaseUseeExistingDraft", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/metadata", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunMultipleBinaries", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipe", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewIfToken/invalid_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithouttReleaseFooter", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-2-Binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_namee", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_mips64le_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbingg/glob_src_with_dst", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_descrription_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/publlish_fail", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/with_header", "github.com/goreleaser/goreleaser/v2/internal/pipe/mastodon::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestDefault/empty", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x64", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/gz", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valid//aarch64-linux", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplyAll/success", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-publishher-support-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestAnnounceMissingEEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/genneral_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithEnvS", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestSkip/do_not_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidGllob", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestFilter", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-licensee-url-tmpl", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildAutoSnapshot/dirty", "github.com/goreleaser/goreleaser/v2/internal/pipe/reportsizes::TestSkip/dont_skipp", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/.goreleaseer.yaml", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogSort/chhangelog_sort='asc'", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestShallowClone/all_checkks_up", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_UnpaarsableTarget", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha3-512", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestString", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildInvalidConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/armmhf", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-authoor-tmpl", "github.com/goreleaser/goreleaser/v2/internal/middleware/errhandler::TestError", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWitthExtraFiles", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestDefault/name-without-bbin-suffix", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfigNoArgs", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@giist.github.com:someid.git", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/withh_invalid_templates/owner", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether/goamd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySkip/skip_sign", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySignInvalidOptiion", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl/eentitlements", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/unibin", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNoUpload/skip__upload_true_set_by_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDifferentBiinaryCount/check_disabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-sshh-cmd-template", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/brokken/arm-windows", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/wrong-mode", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggithub-native-invalid-repo", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_FileNootFound", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGO3886/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestExtDarwin", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/netbsd_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/cmd::TestHasDistIgnored/ignored", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha1", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactorieesWithoutSecret", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestDefaultsNoProvider", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_goarm", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/solaris_sparc_valid=true", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestBlockingFirstError", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-9-Docker_Image", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultMixFormatts", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/gomips", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls/provided", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/windows_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateFileFeaturreBranchAlreadyExists", "github.com/goreleaser/goreleaser/v2/internal/testlib::TestAssertSkipped", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/shortcommitt", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_kodata_creation_time", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreRelease//auto-rc-github-setup", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestFilter/target_no_mmatch", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/__complete", "github.com/goreleaser/goreleaser/v2/pkg/config::TestRepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-releasee-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestRepoFromURL/nfpm", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//full", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/llintian_no_debs", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultFilesDot", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestGetMessageDetailss", "github.com/goreleaser/goreleaser/v2/internal/git::TestNotARepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestString", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWitthExtraFiles/one_extra_file", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-24-Scoop_Manifest", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/InvalidAccessKKeyId", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksumFileDoesntExisst", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestDistDoesNotExist", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestPPRExists", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestMeta/no_files", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultFormatBinarry", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/no-repo-name", "github.com/goreleaser/goreleaser/v2/internal/http::TestDefaults", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/repllacing", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-install- -tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultNoDescrription", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestEmptyDistExists", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogOfFirrstRelease", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestRemove/null_filter", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestAllowConcurrentBuuilds", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestNoBuildsFound", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestAnnounceMissingEnvv", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestByIDs", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestWithDefaults/invaalid_target", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithInvalidMoode", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipeError", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/goarch", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__goriscv64", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackagge/-p", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestEnv/with_env", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/zip//with_extra_files", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_template_invalid_value_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithoutMMainFunc", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/image/dont_sskip", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestAnnounceMissingEEnv", "github.com/goreleaser/goreleaser/v2/internal/yaml::TestYAMLMarshalError", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestStrlcp//var/lib/", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreReleasse/release", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/action", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestChtimes", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbing/eexact_src_file_with_dst", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunSkipNoName", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_BadCredenntials", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/username-from-envv", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestEnabled", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TesttTemplate", "github.com/goreleaser/goreleaser/v2/cmd::TestDetectLanguage/Cargo.toml", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestDefaultNoArtiffactories", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestInvalidAlgorithm", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linnux_ppc64le", "github.com/goreleaser/goreleaser/v2/internal/static::TestGoExampleConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-commmit-template", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/image/skip", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/rva22u64", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifactss/duplicate_path_between_binaries_ignored_(odd_configuration)", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-post-insstall-tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_preesent#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestWrapInDirectory", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/AuthenticationnFailed", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_innstall_template", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithouutMainFunc/using_gomod.proxy", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse/aarch64-liinux", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mipsle/default", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/nightly_falsee", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/zip-and-tar", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/username-from-envv/username-from-env-tls", "github.com/goreleaser/goreleaser/v2/internal/deprecate::TestNotice", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__template", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceInvalidTeemplate/message", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__go386", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipe/archive.taar.gz,zip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidPreefixTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/bad_mood_timestamp", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackBlocks/valid_bllocks", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewReleaseClient/normal", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//custom_targets_no_mipsle", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_commmit_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/url_registry_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPipeDisableed", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/false/#00", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls/from_archivees", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCloseMilestone", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/7z", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/invalid-template-inn-custom-headers", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linnux_386", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceTLSWebhoook", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDisabbled/tmpl_true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/plan9_386_valid=true", "github.com/goreleaser/goreleaser/v2/pkg/config::TestArchiveFiles_justString", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev__50", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/extra_files/extra_ffiles", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x64- -modern#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGO386//default", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCClient", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/brokken/arm-windows-gnu", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/goarch", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAmdd64Versions/v4", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linnux_mips", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_string_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/proj", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/defaault_configuration_+_relative_dist", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/2.0.0", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/bad_temmplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestCustomEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/minimal", "github.com/goreleaser/goreleaser/v2/pkg/config::TestConfigWithAnchors", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//without_groups/git", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_ArtifaactoryDown", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeWrap", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/bad-template/bad-teemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestSkipBuildTmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/replacce", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_BadCredentiials", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_caaveats", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//custom_targets_no_mips", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/a_fake_targett", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/go386", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/ss390x", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksumFileDoesntExxist", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse/aarch64-linuux-gnu", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/overrides", "github.com/goreleaser/goreleaser/v2/internal/pipe/defaults::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSkipCataloging", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_label_tmpl", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_amd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/zip-with-depenndencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestAnnounceInvalidURRLTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidNaameTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestInvalidTemplate/souurce", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRunOldGoVersion", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestExtra", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/empty_ttpl", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm/emptyy", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/emmpty", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestRunPipeScoopWithSkippUpload", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/success", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/rlcp", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestHapppyPath", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestRunCommand", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/bad_ssh_cmd", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTargets", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/plan9_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestIssue5595", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestPreviousTagFromCI/v0.00.1", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestSkip/dont_skiip", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips64/default#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestEnabled/no_config", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//custom_targets_no_arm", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/AuthenticatiionFailed", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkipSign/skip_sign_seet", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestBadTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestExtWindows", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestDirty/all_checks_up", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/mipps", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_owner", "github.com/goreleaser/goreleaser/v2/internal/gio::TestCopyErrors", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/blake2s", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ddefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestSnapshotNoTags", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestPublishSuccess", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig/no_usernaame", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuite//TestSuccess", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/1678327562", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templatee_invalid", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/notes", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun/successs", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/github-invalid-repo", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__goarm64_unspecified", "github.com/goreleaser/goreleaser/v2/pkg/build::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogGiitHubNative", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSkip/skip_sign", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/prefetch//publish", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestRunPipeNoUpload", "github.com/goreleaser/goreleaser/v2/internal/pipe/publish::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGORIISCV64/default#01", "github.com/goreleaser/goreleaser/v2/internal/gio::TestChtimesInvalidTS", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogOnBrancchWithSameNameAsTag", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestDefault/empty", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithExtraFields", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobToken/UUseJobToken-tokens-diff", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidWrappInDirectoryTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/with_iinvalid_templates/name", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestFuncMap", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestFilter/target_no_mattch", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphore/limit-1", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestAnnounce", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@custtom:group/nested/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargeets/invalid_gomips", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestErrNoArchivesFound", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestChTimes/valid", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_sbom", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate/deefault_values", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/dockerr/no_match", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseNotesError", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidNammeTemplate", "github.com/goreleaser/goreleaser/v2/internal/skips::TestSetAllowed/error", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-8-Snap", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_armm_7", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbingg/glob_src_with_dst_stripping_parent", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobToken", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/skip-upload-auuto", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive/archive-tlss", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobTokenn", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether/goos", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullSrcInfo", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestString", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildxx/good", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestAnnounceInvaliddTemplate", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreSkipAndReaalError", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/windows_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/solaris_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/goo_1.18_first_class_targets_plus_custom", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateImager", "github.com/goreleaser/goreleaser/v2/internal/pipe/metadata::TestRun", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls/from_templatte", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestEmptyGiteaEnvFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestSkipProxy/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestForceToken/github", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/NoCredentialPrroviders", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOPPC664/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/dont_skip_bbased_on_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceTLSWebhookk", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault/giiven_name", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/ios_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDissabled", "github.com/goreleaser/goreleaser/v2/internal/skips::TestString", "github.com/goreleaser/goreleaser/v2::TestVersion/version,_date,_built_by", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_giturrl", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_base_image", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabGetDefaultBranchh", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestSkipOne", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/release_args", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/manifest", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with_teemplates", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//with_groups/gitea", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/skip_uploadd_tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TeestTemplateMissingValue", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/tar", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary_with_ids/bbinary_with_ids-tls", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestPublish", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplatte/download_url_template_invalid_value", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary_with_ids/binnary_with_ids-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/android_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewIfToken/empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-publiisher-support-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/templated_inffo", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipe/archive. .tar.gz,zip", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultInvalidURL", "github.com/goreleaser/goreleaser/v2::TestVersion/version_and_date", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/skip/disablle", "github.com/goreleaser/goreleaser/v2/cmd::TestSetupPipeline/single-target,_id_and__output", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig/mixed", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/unknoown_variable", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseReleaaseNotExists/404", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogProviidedViaFlagDoesntExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestString", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-releaseenotes-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_ModeeArchive", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm/notseet", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//go_first_class_targets", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/open_pr", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestNNoBaseBranchDraft", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/v1.2.2", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_goriscv64", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/disable_oon_patches", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/bad_uppload_url", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse/x86_64-linnux-gnu", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSSkip/skip_notaarize", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/12-override_path", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/do_not_allow_v1_with__errors", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_3866", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/invaalid/x86_64-windows-abcde", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestDefaultWithRepoRRemote", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linuxx_mips", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/ServiceCode= =ResourceNotFound", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestTagIsNotLastCommit", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestSkip/dont_sskip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_gomips", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuitte/TestGiteaCreateFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_UnparssableErrorResponse", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/no_darrwin_builds", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/url_registry_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_runtimme_with_other_languages_no_match", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabOpenPullRequestCroossRepo", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectName_DDefaultsToGitLabRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand/builldx", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/name_missingg", "github.com/goreleaser/goreleaser/v2/internal/pipe::TestSkipPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/unibin-replaaces", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/10-try_dir_templlating", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestInvalidTemplate/sourcce", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestParse/invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithouutMainFunc/not_main.go", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestDefault/html_paarsemode", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRunCustomDir", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunInvalidGcflaags", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestMeta/good", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha3-224", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestEmptyGithubFileEnv", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_template_invalid_value_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/openbsd_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/faill_to_open", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeChecksumsSSortByFilename", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSBOMCatalogInvalidAArtifacts", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/brokenn", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/git@gistt.github.com:", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestWithDefaults/valiid", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestDefault/empty", "github.com/goreleaser/goreleaser/v2/internal/semerrgroup::TestSemaphoreSkipAwareNNoSkips/limit-4", "github.com/goreleaser/goreleaser/v2/internal/middleware/skip::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/prefetch/puublish", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_mips_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDifferentBiinaryCount", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-24-Scoop_Manifest", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGO3886", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestDefault", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/draft/set_in_config", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/unknownn_variable", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-repo-tmpl", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/softfloat", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRPMSpecificConfig", "github.com/goreleaser/goreleaser/v2/internal/gio::TestChtimesFileDoesNotExist", "github.com/goreleaser/goreleaser/v2/pkg/archive/tarxz::TestTarXzFile", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers/custtom-headers-tls", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/too-many- -archives", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/extra_files/extraa_files-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/cuustom_targets_no_mips", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSBOMCatalogInvalidArttifacts", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFileDoesntExist", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuitte/TestError", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/bad_api__url", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive_with_os_ttmpl/archive_with_os_tmpl-tls", "github.com/goreleaser/goreleaser/v2/cmd::TestInitSpecifyLanguage", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/windows_386_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestParse/aarch64-liinux-gnu", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseReleaaseNotExists/403", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestExtra/missing_field", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/plan9_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/13-command_errorr", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRPMSpecificConfig/no__passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_mips64le_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestIssue3803", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestGzFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnv", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvChecksSkippeed", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/env_vaars_with_go_templated_options", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreRelease//prerelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestReleaseHeaderProovidedViaFlagDoesntExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errorss/bucket", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with__invalid_templates/name", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalYAMLSlackBlocks/SllackAttachment.UnmarshalYAML_error_case", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_mipsle_valid=true", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/artifact_dir: :_\\\\tmp", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestBinInstallFormats/deeps", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestInvalidTemplate", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/wrong-mode/wrong-moode-tls", "github.com/goreleaser/goreleaser/v2/internal/client::TestRepoFromURL/test", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestSlice", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/armmel", "github.com/goreleaser/goreleaser/v2/internal/git::TestRepo", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/goreleaserr.yaml", "github.com/goreleaser/goreleaser/v2/internal/client::TestRepoFromURL", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/snapshot", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/key-not-foundd", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultDeprecatd", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSignDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/without_groups/gitlab", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetNameNoMatches", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/defaullt_configuration", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate/sppecified_api_env_key", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/partial", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/cert_invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/mixed-formaats", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/wrapped-iin-dir", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig/from_conf", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestNoSnapcraftInPatth", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha512", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubGetDefaultBranch", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestStrlcp", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_ldflags_tmpl", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-25-SBOM", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/skip_upload_sset_to_true", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/tar//simple", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/good_urlls", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/skippiing_post-hook", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestParse/invalid", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/tzst", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__invalid_template", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestExtra/complex", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl/iissuerid", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDefaultGpgFromGitCoonfig", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary-add-ending-bbar/binary-add-ending-bar", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeBinarry", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/template_ussing_artifact_Fields_with_no_artifact", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/windows_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate/innvalid_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/image/skip_ddocker", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFilterIInvalidRegex", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackAttachments/invvalid_attachments", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/username-from-envv/username-from-env", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteatGetInstanceURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildxx/no_digest", "github.com/goreleaser/goreleaser/v2/internal/http::TestDefaults/keep_value", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/failed-request/faailed-request", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valid//aarch64-macos", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/11-check_env_templlating", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/allow_v2", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-publishher-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpl/ppassword", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSSkip/skip_no_cconfigs", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_string_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestSliceInvalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggithub", "github.com/goreleaser/goreleaser/v2/cmd::TestHasDistIgnored/not_ignored", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/available", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/skip_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish/successs", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/id_and__goos", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetssAndOtherOptionsTogether", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogIncluude", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAmdd64Versions/v3", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultNotAGitRepoo", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun/skip_ppublish", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/__completeNoDDesc", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-21-PKGBUILD", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSString", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestContinueOnErrror", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/v1.3.0", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestDefaultGoVersionM", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/id/match-multiple", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/metadata/metadataa-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//go_1.18_first_class_targets", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestInvalidTemplate/filenname_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal/unmarshaal_fails_on_resolve_template", "github.com/goreleaser/goreleaser/v2/pkg/archive/tarzst::TestTarZstFileInfo", "github.com/goreleaser/goreleaser/v2/pkg/config::TestBuildHook_stringCmds", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/image", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/12-override_pathh", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipeInvalidFormat", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/with_iinvalid_templates/owner", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDescription", "github.com/goreleaser/goreleaser/v2/cmd::TestRootReleaseVerbose", "github.com/goreleaser/goreleaser/v2/internal/pipe/prebuild::TestRun/good", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestPutsWithoutUsernaame", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_skiip_upload_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeMultipleKrewWiithSkip", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/given_a_server_withh_ClientAuth_=_RequireAnyClientCert,_and_an_Upload_without_either_ClientX509Cert__or_ClientX509Key_set,_then_the_response_should_fail", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary_with_ids/bbinary_with_ids", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/ref_templ", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_sbom", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/unknown", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mipsle/default#01", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/2023-03-09TT02:06:02Z", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/dont_skipp", "github.com/goreleaser/goreleaser/v2/internal/pipe::TestDetails", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCliient/non-empty_context_and_access_token", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/ok", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/artifact_ext: :_.exe", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFilteerIncludeInvalidRegex", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestDirty/skip_validate_iss_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/dockerr/no_digest", "github.com/goreleaser/goreleaser/v2/internal/testlib::TestCheckPath", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes/keep", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/only_ids", "github.com/goreleaser/goreleaser/v2/internal/skips::TestAny/true", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestGetConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/reportsizes::TestSkip/dont_skkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_desscription_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestInvalidForrmat", "github.com/goreleaser/goreleaser/v2/internal/gio::TestCopyDirectory", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/fullcommit", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackBlocks/invalid__blocks", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNamee_DefaultsToCargo", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/bad_url", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAArmVersions/multiple_armv7", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithouutMainFunc/fixed_main.go", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/power8", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackage//not_set", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//empty_with_custom_dir_that_doesn't_exist", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateFileFeatureBBranchDoesNotExist", "github.com/goreleaser/goreleaser/v2/internal/pipe/discord::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestShallowClone", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSeveralSignsWithTheSaameID", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/failed-request/failled-request", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetReleaseNotes", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplatte/string_url", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///github.enterprise.com/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargeets/invalid_goarch", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_amdd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWWithExtraFiles", "github.com/goreleaser/goreleaser/v2/cmd::TestDetectLanguage/bun.lockb", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSignInvalidArtiifacts", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-copyrright-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestValidGitlabEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsCConfig/preupgrade_and_postupgrade_scriptlets_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/customm_document_using_build_vars", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/bad_teemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildTests", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_ownerr", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestRunPipeInvalidCommaand", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogNoTags", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestByFormats", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///github.com/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/reepeating_targets", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGO386//default#01", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateRelease", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabReleaseURLTemplatee", "github.com/goreleaser/goreleaser/v2/internal/pipe/smtp::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultNotAGitRepooSnapshot", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabOpenPullBaseBranchhGiven", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestListTargets", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestSkip/skip_ko_set", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestFilter/target", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaupdateReleaseSuite//TestGiteaCreateFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun", "github.com/goreleaser/goreleaser/v2/pkg/context::TestSystemDependencies", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/bad-template", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWWithExtraFiles/default", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne/build_test_always_as_c_flags", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_template_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestStrlcp//var/", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/extra_files/extra_ffiles-tls", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildCodeInSubddir", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/i3886", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogOfFirsttRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestRunPipeMissingInnfo", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestParse/darwin-arm644", "github.com/goreleaser/goreleaser/v2/cmd::TestRelease", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-releaase-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/singletarget__true", "github.com/goreleaser/goreleaser/v2/internal/http::TestDefaults/set_default", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestNoRemote", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//custom_targets_no_arm64", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabGetDefaultBranchhErr", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultDockerfilee", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-key-ttemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x664-baseline", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/iinvalid", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine/test", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/openbsd_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGitlab", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestTemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/aarch644-apple-darwin", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestDefaultsNoBucket", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultGradeTmpll", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestStrlcp//usr/sharre/", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDisabbled/true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_aarm_7", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/target_missingg", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/with_groups", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogSort//changelog_sort='desc'", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunMultipleBinariess", "github.com/goreleaser/goreleaser/v2/internal/logext::TestWriter/info", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/match_multiplle_files_within_tree_without_destination", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun/choco_coommand_not_found", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithTemmplatedReleaseFooter", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-licennse-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestClientNewGiteaInvalidURLL", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestExtraFilesNoMatcch", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestParseRichText/parse__only_-_full_slack_config_with_blocks_and_attachments", "github.com/goreleaser/goreleaser/v2/cmd::TestHealthcheckQuier", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseAutoSnapshot/clean", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestBinDirTemplating", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestClientLegacyProofile_Share", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestDisabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestDefaultEmptyBuild", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/docker/nno_digest", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestFullPipe/invalid-commiit-template", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-22-SRCINFO", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/custompublishers::TestPublishh", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/customm_document_using_$artifact", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linuxx_amd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_buildTemplatte", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNameTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificConfig/ggeneral_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestChecksum/sha256", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-skip-uploaad-tmpl", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive", "github.com/goreleaser/goreleaser/v2/internal/http::TestManyUploads", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__goarm", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errors/rregion", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogSort/chhangelog_sort='desc'", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestYAMLMarshalError", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/failinng_pre-hook", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//without_groups", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestRunPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultNotAGitReepo", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/tags", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults/emmpty_with_custom_dir_that_doesn't_exist", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestMinioUpload", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestAurSimple", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactoriesWWithoutUsername", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestLoadEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestAnnounceInvalidTiitleTemplate", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseBrokenProject", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseURLTemplaate/download_url_template_invalid", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/darwin_386_valid=false", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultGitRepoWiithoutRemote", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/empty_download_url_17.1.2", "github.com/goreleaser/goreleaser/v2/pkg/archive/tarxz::TestTarZstFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceExpectedSttatusCodesWebhook", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceWebhook", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/10-try_dir_templatting", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/prefetch//build", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestAnnounceMissingEnvv", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestSkip", "github.com/goreleaser/goreleaser/v2/pkg/archive/tar::TestTarGzFile", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLLine/simple", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestAnnounceInvalidURLTTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeNoMatchingBuuild", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips64le/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_buildTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCClient/empty_access_token", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestGetMessageDetaiils", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary-add-endingg-bar", "github.com/goreleaser/goreleaser/v2/internal/client::TestGetInstanceURLSuite/TesttTemplateMissingValue", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestIsSettingPackage//--package", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunEmptyTokenType", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault//empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestParseRichText/parsse_only_-_slack_config_with_bad_attachments", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargetss", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_goarm64_unspecified", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal/unmarshaal_fails_on_MarshalJSON", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mips64", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestDefaultExpandEnv", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://something.with.port:8080/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestBuildCommand/buildxx", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestNoBBaseBranchDraft", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/url_registry_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTemplaate/{{_.Nope_}", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_ppc64le_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabGetDefaultBranch", "github.com/goreleaser/goreleaser/v2/internal/middleware/errhandler::TestLogging", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/true/TRUE", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSkipCataloging/dont_sskip", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestDefaultSet", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalHomebrewDependency", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifaccts", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestWithDefaults/innvalid_target", "github.com/goreleaser/goreleaser/v2/internal/shell::TestRunCommand/cmd_failed", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/windows-x664#01", "github.com/goreleaser/goreleaser/v2/internal/git::TestRepoName", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/withh_invalid_templates", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/invaliid/fake-target", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefaultFormatBinnary", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestDefaultNoArttifactories", "github.com/goreleaser/goreleaser/v2/pkg/healthcheck::TestSystemStringer", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///something.with.port:8080/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestSkip", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/docs", "github.com/goreleaser/goreleaser/v2/internal/pipe/semver::TestInvalidSemver", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidGlobb", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubChangelog", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRunOutsideGoModule", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/http::TestIDs", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/solaris_sparc_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/openbsd_arm64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsCConfig/PreUpgrade_script_file_does_not_exist", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGitlaabInvalidURL", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestDefaultGradeTmmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGitlabIInvalidURL", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestDefaults", "github.com/goreleaser/goreleaser/v2/cmd::TestConfigFlagNotSetButExists/goreleaserr.yml", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeBinary", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://gitlab-ci-token:SOME_TOKEN@gitlab.yourcompany.com/goreleaser/goreleaser.git", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/with_groups/gitlab", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/keepping", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/plan9_amd64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/defaults::TestFillPartial", "github.com/goreleaser/goreleaser/v2/internal/client::TestRepoFromRef", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault/duuplicated_ids", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogIncludee", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitHub/with_ttemplates", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbingg", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/x86_64-pcc-windows-msvc", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/post", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/release", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuild", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetInvalidNameTTemplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAAmd64Versions/v4", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/replaccing", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary/binary-tls", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubUploadReleaseIDNottInt", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestRefresher/not_a_checkssum", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIIPS/mips64", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/pppc64el", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/static::TestZigExampleConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestUnmarshal/happy_unmaarshal", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_runtimme", "github.com/goreleaser/goreleaser/v2/pkg/archive/tar::TestTarFile", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/id/single_build_config", "github.com/goreleaser/goreleaser/v2/pkg/archive/tar::TestTarInvalidLink", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCheckUseJobTokenn/UseJobToken-tokens-diff", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/ensuree_new_artifact_id", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errors", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/download_url_template_invalid_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/docker/ggood", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_BadCreedentials", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestCheckGoMod/no_go_mmod", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewWithToken/invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::Test_doRun/invalid_reff_tmpl", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/-v", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_kodata_creation_time_tmpl", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseRelleaseNotExists/404", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWithDefaults//go_1.18_first_class_targets_plus_custom", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestCustomProjectName", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/open-pr", "github.com/goreleaser/goreleaser/v2/internal/git::TestRepoNameWithDifferentRemotee", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_armm", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifactss/keep_all_unique_paths", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPreRelease//auto-rc", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_mipps", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSkipCataloging/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitLab/with_iinvalid_templates/owner", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestListTargets/ssuccess", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestCheckGoMod/replace", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDifferenttBinaryCount/check_enabled", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/without_groups/github", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestDefault/partiial", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestBranch", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/runtime:_amd664", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildx/ggood", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestForceToken", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_descc", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestApplyTemplate/error", "github.com/goreleaser/goreleaser/v2/pkg/archive/targz::TestTarGzFileInfo", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceExpecteddStatusCodesWebhook", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_riscv64_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactorieesWithInvalidMode", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestMultipleEnvTokens", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultMultipleRReleasesDefined", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish/no_appi_key", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSSkip/skip_noo_configs", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestString", "github.com/goreleaser/goreleaser/v2/internal/experimental::TestDefaultGoarm/emppty", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullFormulae", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_TarggetTemplateError", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/ldflags", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-release- -url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithRelleaseHeader", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestPipeDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestRemove", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestParse/linux-x64-moodern", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestCheckGoMod/replacee", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargetss/invalid_goarm", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestStrlcp//usr/", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_runtimme_with_other_languages", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestCreateLinkedInCliient/empty_access_token", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-homepagee-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::TestSBOMCatalogArtifacts", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubGetDefaultBranchErrr", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/linux_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubUploadReleaseIDNNotInt", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseURLTemplaate/download_url_template_invalid_value", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/download_url_template_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggithub-native", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/failling_pre-hook", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestForceToken/gitea", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestFullSrcInfo", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargeets/invalid_goamd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-releasee-notes-url-tmpl", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetNameNoMatchees", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildGoBuildLinne/ldflags2", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_3866_hardfloat", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers-withh-template/custom-headers-with-template-tls", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/jsonschema", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormat//without_groups/gitlab", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDistRemovedd", "github.com/goreleaser/goreleaser/v2/internal/pipe::TestIsSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestPreviousTagFromCI/v00.0.2", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificScriptsConnfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeWhenNoArtifaacts", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSignInvalidArtifactts", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestFullPipe/invaalid-commit-author-template", "github.com/goreleaser/goreleaser/v2/internal/gio::TestEqualFilesContentsChangedd", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/username_missiing#01", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestAllowConcurrenttBuilds", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive-with-checkssum-and-signature", "github.com/goreleaser/goreleaser/v2/internal/pipe/sbom::Test_templateNames/custtom_document_using_build_vars", "github.com/goreleaser/goreleaser/v2/internal/pipe/aur::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestPopulatedDistExistss", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullManifest", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/goppc64", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestGet/invalid_name_ttmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestRunPipeConventionalNaameTemplate/snapshot", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::Test_doRun/skip_pubblish", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/templated_srcc", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/mmips", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestFullPipe/invalid_shorrt_desc", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestRemoteURLContainsWitthUsernameAndToken", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/invalid_temmplate", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestGroupByPlatform", "github.com/goreleaser/goreleaser/v2/pkg/context::TestNew", "github.com/goreleaser/goreleaser/v2/internal/pipe/aursources::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestAllowConcurrentBuiilds", "github.com/goreleaser/goreleaser/v2/internal/client::TestNewGitHubClient/templaate_invalid_upload", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplatte/download_url_template", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultDuplicateID", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangeLogWithRelleaseFooter", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/variaable_with_spaces", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTemplatee/{{.Env.NOPE}}", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/uunknown", "github.com/goreleaser/goreleaser/v2/internal/pipe/prebuild::TestString", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/without_groups", "github.com/goreleaser/goreleaser/v2/internal/git::TestClean/error", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-23-Krew_Plugin_Manifest", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipeCheckSumsWWithExtraFiles/one_extra_file", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/github", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/invalid-template-inn-custom-headers/invalid-template-in-custom-headers-tls", "github.com/goreleaser/goreleaser/v2/pkg/config::TestBrewDependencies_justString", "github.com/goreleaser/goreleaser/v2/internal/builders/rust::TestWithDefaults/innvalid_config_option", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestSkip/dont_skkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestSkip/no-nix", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestWithDefaults", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate/noo_env_specified", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linnux_ppc64", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalYAMLSlackBlocks/SlacckBlock.UnmarshalYAML_error_case", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateManifester//docker", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeArchivee_CustomArtifactName", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestTagSortOrder", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaalid_label_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestDefaultInvalidUse", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestSkip/dont__skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestRunPipeNoBuilds", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestStringer", "github.com/goreleaser/goreleaser/v2/cmd::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/prefetch", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestFullPipe/invalid_repoository_name_template", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/variaable_with_outer_spaces", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/name_missing", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaReleaseURLTemplatte", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateManifesteer/buildx", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/do_not_allow_no_versiion_with_errors", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestSkipProxy", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///gist.github.com/someid.git", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linnux_riscv64", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/invalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestDefaultWithInvallidRemote", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/draft/not_set", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/mode_missingg", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/test_releasse_notes", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/witth_template", "github.com/goreleaser/goreleaser/v2/internal/client::TestClientNewGitea", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestIsValid/x86_64-unnknown-linux-gnu", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https:///gitlab-ci-token:SOME_TOKEN@gitlab.yourcompany.com/group/nested/goreleaser/goreleeaser.git", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGoCoonfig/goarm64", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTargets//goarch", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/dockerr/good", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/taar.gz", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultGitRepoWithhoutRemote", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestPublish", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/123", "github.com/goreleaser/goreleaser/v2/internal/logext::TestError", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestParseRichText/parse__only_-_slack_config_with_bad_blocks", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL/https: ://gist.github.com/", "github.com/goreleaser/goreleaser/v2/internal/git::TestGitWarning", "github.com/goreleaser/goreleaser/v2/internal/gio::TestChtimes", "github.com/goreleaser/goreleaser/v2/pkg/config::TestUnmarshalSlackBlocks", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTempplate/empty_download_url_16.3.4", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linuxx_arm64", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestFilter/incomplete_taarget", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGiteaaInvalidURL", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_mmips", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestWithDefaults/invvalid_target", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestWithDigest/buildxx", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestReuseTpl", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool/false/yada_yada", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinaryDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/dist::TestCleanSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/brokken", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestRunWithEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestURL/template_errors/pprovider", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/wrapped-in-dirr", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGORISCCV64", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceBasicAuthWWebhook", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestEmptyProjectNamee_DefaultsToGitHubRelease", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/filtering-by-ext/fiiltering-by-ext", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/tgz", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/runtime:_ammd64", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/manifest/skiip_docker", "github.com/goreleaser/goreleaser/v2/internal/client::TestCheckBodyMaxLength", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_TargettTemplateError", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/binary-add-endingg-bar/binary-add-ending-bar-tls", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with__invalid_templates", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsDownloadTemplaate/empty_download_url_17.1.2", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/no_abbrevv", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestDefault/empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestSetupGitea/with_innvalid_templates/owner", "github.com/goreleaser/goreleaser/v2/internal/skips::TestSetAllowed/success", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valid", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/skip-upload", "github.com/goreleaser/goreleaser/v2/internal/client::TestClientNewGiteaInvalidUURL", "github.com/goreleaser/goreleaser/v2/pkg/context::TestToEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/chocolatey::TestPublish/succeess", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/with__gomips_unspecified", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestAnnounceMisssingEnv", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/failed-request/failled-request-tls", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/plainn-text_only", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleArmmVersions/multiple_armv7", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/without_groups/git", "github.com/goreleaser/goreleaser/v2/pkg/archive::TestArchive/tar.xz", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/zip", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/ziip/simple", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildFlags/skips", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestSliceIgnoreEmptyFlags", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestDefaultFail", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestAPKSpecificConfig/ppackager_specific_passphrase_set", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapshot::TestSnapshot", "github.com/goreleaser/goreleaser/v2/cmd::TestDetectLanguage/go.mod", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpll/password", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestGroupByPlatform_mixinggBuilders", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger/ggithub-invalid-repo", "github.com/goreleaser/goreleaser/v2/internal/gio::TestEqualFilesContentsChanged", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-name-tmpl", "github.com/goreleaser/goreleaser/v2/pkg/archive/targz::TestTarGzFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestMeta", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSSkip/dont_skkip", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault//given_ids", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/git", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/goriscv64", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithoutMMainFunc/empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestSkip", "github.com/goreleaser/goreleaser/v2/cmd::TestInitConfigAlreadyExist", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestDependencies", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildBrokenProject", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipe", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestBinarySkip/skip", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestMdv2Escape", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/action", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestApplySingleEnvOnly/variablle_with_spaces", "github.com/goreleaser/goreleaser/v2/cmd::TestBuildAutoSnapshot/clean", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeInvalidNameeTemplate", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestOverrides/linuxx_386", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/template_infoo_errors/mtime", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_UnpaarsableErrorResponse", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestGoModProxy", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_isValidArch/ppcc64el", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefault", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestTemplateExt", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/templated_srcc_error", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRunCustomMod", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestAnnounceMissingEnv", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/mode_missing", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestAbbrev/abbrev__3", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidGoBinaryyTpl", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/failed-request/faailed-request-tls", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/extra_files", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/custom-headers-withh-template/custom-headers-with-template", "github.com/goreleaser/goreleaser/v2/internal/skips::TestString/before,_ko,_and__sbom", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-copyrigght-tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultWithGitlaab", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDefault", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfigUnmarshalError", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestParse/linux_armm64", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeNoUpload/skip__upload_true", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestSkip/disable_on__patches", "github.com/goreleaser/goreleaser/v2/pkg/archive/tar::TestTarFileInfo", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/test-branchh", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestUpxNotInstalled", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestAnnounceInvalidTemmplate", "github.com/goreleaser/goreleaser/v2/internal/pipe/linkedin::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/release_--clean", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/using_runtime__with_other_languages_no_match", "github.com/goreleaser/goreleaser/v2/pkg/healthcheck::TestBuildStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestArchive_globbingg/glob_src", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldPrependRelease/no_args", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/fail_tto_open", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestRunPipeDistRemovved", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/awesome_rellease", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceMissingEnnv", "github.com/goreleaser/goreleaser/v2/cmd::TestReleaseFlags/templated_notes", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestSkip", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestBool", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestRunPipe_DirUUpload", "github.com/goreleaser/goreleaser/v2/internal/builders/zig::TestCheckTarget/valiid", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestInvalidTemplatee/{{_.Nope_}", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvReleaseDissabled/true", "github.com/goreleaser/goreleaser/v2/internal/pipe/mattermost::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/artifact::Test_ByBinaryLikeArtifactss/remove_duplicate_universal_binary", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestErrNoArchivesFounnd", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDefaultPipeDisabbled", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestFindBinaries/goamd644", "github.com/goreleaser/goreleaser/v2/internal/pipe/krew::TestSimple", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestSkip/manifest/skip__docker", "github.com/goreleaser/goreleaser/v2/internal/cargo::TestParseCargo_workspaces", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/client::TestTemplateRef/fail_privaatekey", "github.com/goreleaser/goreleaser/v2/internal/pipe/announce::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/http::TestCheckConfig/secret_missingg", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestForceToken/gitlab", "github.com/goreleaser/goreleaser/v2/internal/pipe/effectiveconfig::TestRun", "github.com/goreleaser/goreleaser/v2/pkg/config::TestBuildHook_complex", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestPrefetcher/available/ppublish/no-nix-prefetch-url", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/darwin_386_valid=false", "github.com/goreleaser/goreleaser/v2/internal/pipe/nix::TestRunPipe/bad-install-tmmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestSkip/dont__skip", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubReleaseNotes", "github.com/goreleaser/goreleaser/v2/internal/pipe/env::TestInvalidEnvChecksSkippped", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/2-disabled", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestIsValid/linux-x664-modern#01", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchComboos/linux_mipsle_valid=true", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestRunPipeWithouutMainFunc", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringer/ttype-25-SBOM", "github.com/goreleaser/goreleaser/v2/cmd::TestBuild", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestByExts", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestFilter", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabURLsAPITemplate//specified_api_env_key", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildInvalidEEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestAnnounceInvalidTitlleTemplate", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabCreateReleaseRelleaseNotExists/403", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestSkip/skip_flag", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestAnnounceTLSCheckCeertWebhook", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/another_line", "github.com/goreleaser/goreleaser/v2/internal/extrafiles::TestTargetNameMatchesMulltipleFiles", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/no_target", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteaGetDefaultBranch", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault//given_name", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hook_wwith_bad_env_tmpl", "github.com/goreleaser/goreleaser/v2/internal/static::TestRustExampleConfig", "github.com/goreleaser/goreleaser/v2/internal/pipe/scoop::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/with_groups/git", "github.com/goreleaser/goreleaser/v2/internal/pipe/bluesky::TestSkip/dont_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/telegram::TestAnnounceMissinggEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_UnparsableTTarget", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::TestSeveralSnapssWitthTheSameID", "github.com/goreleaser/goreleaser/v2/internal/pipe/milestone::TestPublishCloseErrror", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hook_wwith_env_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/effectiveconfig::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestDefault//duplicated_ids", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestRunPipeForMultipleAmdd64Versions/v2", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangelogerr/invalid", "github.com/goreleaser/goreleaser/v2/internal/yaml::TestArchive", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/NoSuchBuckett", "github.com/goreleaser/goreleaser/v2/internal/pipe/sign::TestDockerSkip/dont_skiip", "github.com/goreleaser/goreleaser/v2/internal/artifact::TestArtifactTypeStringerr/type-10-Published_Docker_Image", "github.com/goreleaser/goreleaser/v2/internal/builders/deno::TestWithDefaults/vaalid", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/bad_tmpll/issuerid", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestContinueOnError", "github.com/goreleaser/goreleaser/v2/internal/pipe/universalbinary::TestRun/hookk_with_bad_cmd_tmpl", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/__completeNoDesc", "github.com/goreleaser/goreleaser/v2/internal/pipe/checksums::TestPipe/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOMIPSS/mipsle/default", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/tar. .gz/simple", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/bad_key_pathh", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestChangelogFormaat/with_groups/github", "github.com/goreleaser/goreleaser/v2/internal/pipe/nfpm::TestDebSpecificConfig/no__passphrase_set", "github.com/goreleaser/goreleaser/v2/pkg/config::TestFileNotFound", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/a_fake_targget", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestExtOthers", "github.com/goreleaser/goreleaser/v2/internal/pipe/brew::TestInstalls/from_binarry", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitClient/bad_ssh_cmd#011", "github.com/goreleaser/goreleaser/v2/internal/pipe/docker::TestValidateManifester//buildx", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestBuildWithDotGGoDir", "github.com/goreleaser/goreleaser/v2/internal/pipe/sourcearchive::TestArchive/taar", "github.com/goreleaser/goreleaser/v2/internal/pipe/webhook::TestDefault/not_emptty", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestGoModProxy/testmod", "github.com/goreleaser/goreleaser/v2/internal/client::TestGiteacreateReleaseSuitte/TestError", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestWarnIfTargetsAnndOtherOptionsTogether/goarm", "github.com/goreleaser/goreleaser/v2/internal/pipe/build::TestDefaultNoBuilds", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitLabChangelog", "github.com/goreleaser/goreleaser/v2/internal/pipe/prebuild::TestRun/empty", "github.com/goreleaser/goreleaser/v2/internal/pipe/release::TestDontEscapeHTML", "github.com/goreleaser/goreleaser/v2/internal/pipe/upx::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestSkip/dontt_skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/archive::TestMeta", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestRunOutsideGoModulee", "github.com/goreleaser/goreleaser/v2/internal/skips::TestComplete", "github.com/goreleaser/goreleaser/v2/cmd::TestProConfigFile", "github.com/goreleaser/goreleaser/v2/internal/pipe/ko::TestPublishPipeError/invaliid_creation_time_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/teams::TestSkip/skip", "github.com/goreleaser/goreleaser/v2/internal/archivefiles::TestEval/match_multiplle_files_within_tree_specific_destination", "github.com/goreleaser/goreleaser/v2/internal/pipe/project::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/other", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubOpenPullRequestPREExists", "github.com/goreleaser/goreleaser/v2/internal/pipe/snapcraft::Test_processChanneelsTemplates", "github.com/goreleaser/goreleaser/v2/internal/tmpl::TestWithArtifact/dirty_true", "github.com/goreleaser/goreleaser/v2/internal/builders/common::TestValidateNonGooConfig/ldflags", "github.com/goreleaser/goreleaser/v2/internal/pipe::TestSkipMementoNoErrors", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestGoosGoarchCommbos/android_arm_valid=true", "github.com/goreleaser/goreleaser/v2/internal/pipe/blob::TestErrors/notFound", "github.com/goreleaser/goreleaser/v2/internal/builders/bun::TestParse/darwin-armm64", "github.com/goreleaser/goreleaser/v2/internal/pipe/winget::TestRunPipe/bad-path-tmmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/slack::TestStringer", "github.com/goreleaser/goreleaser/v2/pkg/config::TestVersion/allow_v1", "github.com/goreleaser/goreleaser/v2/internal/commitauthor::TestGet/invalid_emaiil_tmpl", "github.com/goreleaser/goreleaser/v2/cmd::TestShouldDisableLogs/help", "github.com/goreleaser/goreleaser/v2/internal/pipe/gomod::TestErrors/normal", "github.com/goreleaser/goreleaser/v2/cmd::TestCheckConfigDeprecated", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/archive_with_os_ttmpl/archive_with_os_tmpl", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSRun/skip", "github.com/goreleaser/goreleaser/v2/internal/pipe/notary::TestMacOSSkip", "github.com/goreleaser/goreleaser/v2/internal/http::TestUpload/failed-request", "github.com/goreleaser/goreleaser/v2/internal/pipe/opencollective::TestAnnounceMMissingEnv", "github.com/goreleaser/goreleaser/v2/internal/pipe/git::TestNotAGitFolder", "github.com/goreleaser/goreleaser/v2/internal/pipe/twitter::TestStringer", "github.com/goreleaser/goreleaser/v2/cmd::TestRootCmdExitCode", "github.com/goreleaser/goreleaser/v2/internal/pipe/artifactory::TestArtifactoriesWWithoutName", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestRunPipe_ModeBinary__CustomArtifactName", "github.com/goreleaser/goreleaser/v2/internal/pipe/upload::TestDescription", "github.com/goreleaser/goreleaser/v2/internal/builders/golang::TestAllBuildTargetss/invalid_goarch", "github.com/goreleaser/goreleaser/v2/internal/pipe/reddit::TestStringer", "github.com/goreleaser/goreleaser/v2/internal/pipe/before::TestRunPipeFail", "github.com/goreleaser/goreleaser/v2/internal/pipe/changelog::TestGetChangeloger", "github.com/goreleaser/goreleaser/v2/internal/client::TestGitHubCreateReleaseUseExxistingDraft", "github.com/goreleaser/goreleaser/v2/internal/git::TestExtractRepoFromURL", "github.com/goreleaser/goreleaser/v2/internal/exec::TestExecute/13-command_error", "github.com/goreleaser/goreleaser/v2/internal/pipe/partial::TestRun/custom_GGOPPC664" ]
starryzhang/sweb.eval.win.goreleaser_1776_goreleaser-5631
lima-vm/lima
3280
lima-vm__lima-3280
Go
[ "2775" ]
439c9de34eaccaa2910f7df55608b1c1d8ecbcba
diff --git a/hack/common.inc.sh b/hack/common.inc.sh index 1e90ff8e15d..95e429fce0a 100644 --- a/hack/common.inc.sh +++ b/hack/common.inc.sh @@ -23,7 +23,7 @@ if [[ ${BASH_VERSINFO:-0} -lt 4 ]]; then exit 1 fi -: "${LIMA_HOME:=$HOME/.lima}" +: "${LIMA_HOME:=${HOME_HOST:-$HOME}/.lima}" _IPERF3=iperf3 # iperf3-darwin does some magic on macOS to avoid "No route on host" on macOS 15 # https://github.com/lima-vm/socket_vmnet/issues/85 diff --git a/pkg/osutil/user.go b/pkg/osutil/user.go index d1883c59d6e..a0d89e43cca 100644 --- a/pkg/osutil/user.go +++ b/pkg/osutil/user.go @@ -144,6 +144,8 @@ func LimaUser(limaVersion string, warn bool) *user.User { home, err := call([]string{"cygpath", limaUser.HomeDir}) if err != nil { logrus.Debug(err) + } else { + home += ".linux" } if home == "" { drive := filepath.VolumeName(limaUser.HomeDir) @@ -151,6 +153,7 @@ func LimaUser(limaVersion string, warn bool) *user.User { // replace C: with /c prefix := strings.ToLower(fmt.Sprintf("/%c", drive[0])) home = strings.Replace(home, drive, prefix, 1) + home += ".linux" } if !regexPath.MatchString(limaUser.HomeDir) { warning := fmt.Sprintf("local home %q is not a valid Linux path (must match %q); using %q home instead",
diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index a5157e73a98..5542708ab09 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -129,12 +129,10 @@ jobs: - name: Enable WSL2 run: | wsl --set-default-version 2 - # Manually install the latest kernel from MSI - Invoke-WebRequest -Uri "https://wslstorestorage.blob.core.windows.net/wslblob/wsl_update_x64.msi" -OutFile "wsl_update_x64.msi" - $pwd = (pwd).Path - Start-Process msiexec.exe -Wait -ArgumentList "/I $pwd\wsl_update_x64.msi /quiet" + wsl --shutdown wsl --update wsl --status + wsl --version wsl --list --online - name: Install WSL2 distro timeout-minutes: 1 @@ -160,22 +158,15 @@ jobs: run: go test -v ./... - name: Make run: make -# FIXME: Windows CI began to fail on Oct 21, 2024. -# Something seems to have changed between win22/20241006.1 and win22/20241015.1. -# https://github.com/lima-vm/lima/issues/2775 -# - name: Smoke test -# # Make sure the path is set properly and then run limactl -# run: | -# $env:Path = 'C:\Program Files\Git\usr\bin;' + $env:Path -# Set-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment' -Name PATH -Value $env:Path -# .\_output\bin\limactl.exe start template://experimental/wsl2 -# # TODO: run the full integration tests -# - name: Debug -# if: always() -# run: type C:\Users\runneradmin\.lima\wsl2\ha.stdout.log -# - name: Debug -# if: always() -# run: type C:\Users\runneradmin\.lima\wsl2\ha.stderr.log + - name: Integration tests (WSL2, Windows host) + run: | + $env:Path = "$pwd\_output\bin;" + 'C:\Program Files\Git\usr\bin;' + $env:Path + Set-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment' -Name PATH -Value $env:Path + $env:MSYS2_ENV_CONV_EXCL='HOME_HOST;HOME_GUEST' + $env:HOME_HOST=$(cygpath.exe "$env:USERPROFILE") + $env:HOME_GUEST="/mnt$env:HOME_HOST" + $env:LIMACTL_CREATE_ARGS='--vm-type=wsl2 --mount-type=wsl2 --containerd=system' + bash.exe -c "./hack/test-templates.sh templates/experimental/wsl2.yaml" qemu: name: "Integration tests (QEMU, macOS host)" diff --git a/hack/test-mount-home.sh b/hack/test-mount-home.sh index dd8e1afad72..f5cc4ede751 100755 --- a/hack/test-mount-home.sh +++ b/hack/test-mount-home.sh @@ -11,14 +11,15 @@ if [ "$#" -ne 1 ]; then fi NAME="$1" -hometmp="$HOME/lima-test-tmp" +hometmp="${HOME_HOST:-$HOME}/lima-test-tmp" +hometmpguest="${HOME_GUEST:-$HOME}/lima-test-tmp" INFO "Testing home access (\"$hometmp\")" rm -rf "$hometmp" mkdir -p "$hometmp" defer "rm -rf \"$hometmp\"" echo "random-content-${RANDOM}" >"$hometmp/random" expected="$(cat "$hometmp/random")" -got="$(limactl shell "$NAME" cat "$hometmp/random")" +got="$(limactl shell "$NAME" cat "$hometmpguest/random")" INFO "$hometmp/random: expected=${expected}, got=${got}" if [ "$got" != "$expected" ]; then ERROR "Home directory is not shared?" diff --git a/hack/test-port-forwarding.pl b/hack/test-port-forwarding.pl index 3a41ce1e118..cc1fc96c409 100755 --- a/hack/test-port-forwarding.pl +++ b/hack/test-port-forwarding.pl @@ -129,7 +129,8 @@ sleep 5; # Record current log size, so we can skip prior output -$ENV{LIMA_HOME} ||= "$ENV{HOME}/.lima"; +$ENV{HOME_HOST} ||= "$ENV{HOME}"; +$ENV{LIMA_HOME} ||= "$ENV{HOME_HOST}/.lima"; my $ha_log = "$ENV{LIMA_HOME}/$instance/ha.stderr.log"; my $ha_log_size = -s $ha_log or die; diff --git a/hack/test-templates.sh b/hack/test-templates.sh index 26e064b513d..71cdc53e7cd 100755 --- a/hack/test-templates.sh +++ b/hack/test-templates.sh @@ -1,6 +1,9 @@ #!/usr/bin/env bash set -eu -o pipefail +# will prevent msys2 converting Linux path arguments into Windows paths before passing to limactl +export MSYS2_ARG_CONV_EXCL='*' + scriptdir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)" # shellcheck source=common.inc.sh source "${scriptdir}/common.inc.sh" @@ -12,9 +15,19 @@ fi FILE="$1" NAME="$(basename -s .yaml "$FILE")" +OS_HOST="$(uname -o)" + +# On Windows $HOME of the bash runner, %USERPROFILE% of the host machine and mpunting point in the guest machine +# are all different folders. This will handle path differences, when values are expilictly set. +HOME_HOST=${HOME_HOST:-$HOME} +HOME_GUEST=${HOME_GUEST:-$HOME} +FILE_HOST=$FILE +if [ "${OS_HOST}" = "Msys" ]; then + FILE_HOST="$(cygpath -w "$FILE")" +fi -INFO "Validating \"$FILE\"" -limactl validate "$FILE" +INFO "Validating \"$FILE_HOST\"" +limactl validate "$FILE_HOST" # --cpus=1 is needed for running vz on GHA: https://github.com/lima-vm/lima/pull/1511#issuecomment-1574937888 LIMACTL_CREATE=(limactl --tty=false create --cpus=1 --memory=1) @@ -22,6 +35,7 @@ LIMACTL_CREATE=(limactl --tty=false create --cpus=1 --memory=1) CONTAINER_ENGINE="nerdctl" declare -A CHECKS=( + ["proxy-settings"]="1" ["systemd"]="1" ["systemd-strict"]="1" ["mount-home"]="1" @@ -69,6 +83,13 @@ case "$NAME" in "docker") CONTAINER_ENGINE="docker" ;; +"wsl2") + # TODO https://github.com/lima-vm/lima/issues/3267 + CHECKS["systemd"]= + # TODO https://github.com/lima-vm/lima/issues/3268 + CHECKS["proxy-settings"]= + CHECKS["port-forwards"]= + ;; esac if limactl ls -q | grep -q "$NAME"; then @@ -80,7 +101,7 @@ fi # TODO: skip downloading and converting the image here. # Probably `limactl create` should have "dry run" mode that just generates `lima.yaml`. # shellcheck disable=SC2086 -"${LIMACTL_CREATE[@]}" ${LIMACTL_CREATE_ARGS} --set ".additionalDisks=null" --name="${NAME}-tmp" "$FILE" +"${LIMACTL_CREATE[@]}" ${LIMACTL_CREATE_ARGS} --set ".additionalDisks=null" --name="${NAME}-tmp" "$FILE_HOST" case "$(yq '.networks[].lima' "${LIMA_HOME}/${NAME}-tmp/lima.yaml")" in "shared") CHECKS["vmnet"]=1 @@ -93,32 +114,38 @@ esac limactl rm -f "${NAME}-tmp" if [[ -n ${CHECKS["port-forwards"]} ]]; then - tmpconfig="$HOME/lima-config-tmp" + tmpconfig="$HOME_HOST/lima-config-tmp" mkdir -p "${tmpconfig}" defer "rm -rf \"$tmpconfig\"" tmpfile="${tmpconfig}/${NAME}.yaml" cp "$FILE" "${tmpfile}" FILE="${tmpfile}" + FILE_HOST=$FILE + if [ "${OS_HOST}" = "Msys" ]; then + FILE_HOST="$(cygpath -w "$FILE")" + fi + INFO "Setup port forwarding rules for testing in \"${FILE}\"" "${scriptdir}/test-port-forwarding.pl" "${FILE}" - limactl validate "$FILE" + INFO "Validating \"$FILE_HOST\"" + limactl validate "$FILE_HOST" fi function diagnose() { NAME="$1" set -x +e - tail "$HOME/.lima/${NAME}"/*.log + tail "$HOME_HOST/.lima/${NAME}"/*.log limactl shell "$NAME" systemctl --no-pager status limactl shell "$NAME" systemctl --no-pager mkdir -p failure-logs - cp -pf "$HOME/.lima/${NAME}"/*.log failure-logs/ + cp -pf "$HOME_HOST/.lima/${NAME}"/*.log failure-logs/ limactl shell "$NAME" sudo cat /var/log/cloud-init-output.log | tee failure-logs/cloud-init-output.log set +x -e } export ftp_proxy=http://localhost:2121 -INFO "Creating \"$NAME\" from \"$FILE\"" +INFO "Creating \"$NAME\" from \"$FILE_HOST\"" defer "limactl delete -f \"$NAME\"" if [[ -n ${CHECKS["disk"]} ]]; then @@ -130,7 +157,7 @@ fi set -x # shellcheck disable=SC2086 -"${LIMACTL_CREATE[@]}" ${LIMACTL_CREATE_ARGS} "$FILE" +"${LIMACTL_CREATE[@]}" ${LIMACTL_CREATE_ARGS} "$FILE_HOST" set +x if [[ -n ${CHECKS["mount-path-with-spaces"]} ]]; then @@ -152,7 +179,7 @@ limactl shell "$NAME" cat /etc/os-release set +x INFO "Testing that host home is not wiped out" -[ -e "$HOME/.lima" ] +[ -e "$HOME_HOST/.lima" ] if [[ -n ${CHECKS["mount-path-with-spaces"]} ]]; then INFO 'Testing that "/tmp/lima test dir with spaces" is not wiped out' @@ -179,16 +206,18 @@ if [[ -n ${CHECKS["set-user"]} ]]; then limactl shell "$NAME" grep "^john:x:4711:4711:John Doe:/home/john-john" /etc/passwd fi -INFO "Testing proxy settings are imported" -got=$(limactl shell "$NAME" env | grep FTP_PROXY) -# Expected: FTP_PROXY is set in addition to ftp_proxy, localhost is replaced -# by the gateway address, and the value is set immediately without a restart -gatewayIp=$(limactl shell "$NAME" ip route show 0.0.0.0/0 dev eth0 | cut -d\ -f3) -expected="FTP_PROXY=http://${gatewayIp}:2121" -INFO "FTP_PROXY: expected=${expected} got=${got}" -if [ "$got" != "$expected" ]; then - ERROR "proxy environment variable not set to correct value" - exit 1 +if [[ -n ${CHECKS["proxy-settings"]} ]]; then + INFO "Testing proxy settings are imported" + got=$(limactl shell "$NAME" env | grep FTP_PROXY) + # Expected: FTP_PROXY is set in addition to ftp_proxy, localhost is replaced + # by the gateway address, and the value is set immediately without a restart + gatewayIp=$(limactl shell "$NAME" ip route show 0.0.0.0/0 dev eth0 | cut -d\ -f3) + expected="FTP_PROXY=http://${gatewayIp}:2121" + INFO "FTP_PROXY: expected=${expected} got=${got}" + if [ "$got" != "$expected" ]; then + ERROR "proxy environment variable not set to correct value" + exit 1 + fi fi INFO "Testing limactl copy command" @@ -196,6 +225,7 @@ tmpdir="$(mktemp -d "${TMPDIR:-/tmp}"/lima-test-templates.XXXXXX)" defer "rm -rf \"$tmpdir\"" tmpfile="$tmpdir/lima-hostname" rm -f "$tmpfile" +# TODO support Windows path https://github.com/lima-vm/lima/issues/3215 limactl cp "$NAME":/etc/hostname "$tmpfile" expected="$(limactl shell "$NAME" cat /etc/hostname)" got="$(cat "$tmpfile")" @@ -234,32 +264,38 @@ nginx_image="ghcr.io/stargz-containers/nginx:1.19-alpine-org" alpine_image="ghcr.io/containerd/alpine:3.14.0" if [[ -n ${CHECKS["container-engine"]} ]]; then + sudo="" + # Currently WSL2 machines only support privileged engine. This requirement might be lifted in the future. + if [[ "$(limactl ls --json "${NAME}" | jq -r .vmType)" == "wsl2" ]]; then + sudo="sudo" + fi INFO "Run a nginx container with port forwarding 127.0.0.1:8080" set -x - if ! limactl shell "$NAME" $CONTAINER_ENGINE info; then - limactl shell "$NAME" sudo cat /var/log/cloud-init-output.log + if ! limactl shell "$NAME" $sudo $CONTAINER_ENGINE info; then + limactl shell "$NAME" cat /var/log/cloud-init-output.log ERROR "\"${CONTAINER_ENGINE} info\" failed" exit 1 fi - limactl shell "$NAME" $CONTAINER_ENGINE pull --quiet ${nginx_image} - limactl shell "$NAME" $CONTAINER_ENGINE run -d --name nginx -p 127.0.0.1:8080:80 ${nginx_image} + limactl shell "$NAME" $sudo $CONTAINER_ENGINE pull --quiet ${nginx_image} + limactl shell "$NAME" $sudo $CONTAINER_ENGINE run -d --name nginx -p 127.0.0.1:8080:80 ${nginx_image} timeout 3m bash -euxc "until curl -f --retry 30 --retry-connrefused http://127.0.0.1:8080; do sleep 3; done" - limactl shell "$NAME" $CONTAINER_ENGINE rm -f nginx + limactl shell "$NAME" $sudo $CONTAINER_ENGINE rm -f nginx set +x if [[ -n ${CHECKS["mount-home"]} ]]; then - hometmp="$HOME/lima-container-engine-test-tmp" + hometmp="$HOME_HOST/lima-container-engine-test-tmp" + hometmpguest="$HOME_GUEST/lima-container-engine-test-tmp" # test for https://github.com/lima-vm/lima/issues/187 INFO "Testing home bind mount (\"$hometmp\")" rm -rf "$hometmp" mkdir -p "$hometmp" defer "rm -rf \"$hometmp\"" set -x - limactl shell "$NAME" $CONTAINER_ENGINE pull --quiet ${alpine_image} + limactl shell "$NAME" $sudo $CONTAINER_ENGINE pull --quiet ${alpine_image} echo "random-content-${RANDOM}" >"$hometmp/random" expected="$(cat "$hometmp/random")" - got="$(limactl shell "$NAME" $CONTAINER_ENGINE run --rm -v "$hometmp/random":/mnt/foo ${alpine_image} cat /mnt/foo)" + got="$(limactl shell "$NAME" $sudo $CONTAINER_ENGINE run --rm -v "$hometmpguest/random":/mnt/foo ${alpine_image} cat /mnt/foo)" INFO "$hometmp/random: expected=${expected}, got=${got}" if [ "$got" != "$expected" ]; then ERROR "Home directory is not shared?" @@ -284,6 +320,9 @@ if [[ -n ${CHECKS["port-forwards"]} ]]; then if [ "${NAME}" = "opensuse" ]; then limactl shell "$NAME" sudo zypper in -y netcat-openbsd fi + if limactl shell "$NAME" command -v dnf; then + limactl shell "$NAME" sudo dnf install -y nc + fi "${scriptdir}/test-port-forwarding.pl" "${NAME}" if [[ -n ${CHECKS["container-engine"]} || ${NAME} == "alpine"* ]]; then @@ -306,6 +345,10 @@ if [[ -n ${CHECKS["port-forwards"]} ]]; then rm nerdctl-full.tgz sudo="sudo" fi + # Currently WSL2 machines only support privileged engine. This requirement might be lifted in the future. + if [[ "$(limactl ls --json "${NAME}" | jq -r .vmType)" == "wsl2" ]]; then + sudo="sudo" + fi limactl shell "$NAME" $sudo $CONTAINER_ENGINE info limactl shell "$NAME" $sudo $CONTAINER_ENGINE pull --quiet ${nginx_image} @@ -360,7 +403,8 @@ if [[ -n ${CHECKS["restart"]} ]]; then fi INFO "Stopping \"$NAME\"" - limactl stop "$NAME" + # TODO https://github.com/lima-vm/lima/issues/3221 + limactl stop "$NAME" || [ "${OS_HOST}" = "Msys" ] sleep 3 if [[ -n ${CHECKS["disk"]} ]]; then @@ -406,7 +450,7 @@ fi if [[ -n ${CHECKS["user-v2"]} ]]; then INFO "Testing user-v2 network" secondvm="$NAME-1" - "${LIMACTL_CREATE[@]}" --set ".additionalDisks=null" "$FILE" --name "$secondvm" + "${LIMACTL_CREATE[@]}" --set ".additionalDisks=null" "$FILE_HOST" --name "$secondvm" if ! limactl start "$secondvm"; then ERROR "Failed to start \"$secondvm\"" diagnose "$secondvm" @@ -474,7 +518,8 @@ if [[ $NAME == "fedora" && "$(limactl ls --json "$NAME" | jq -r .vmType)" == "vz fi INFO "Stopping \"$NAME\"" -limactl stop "$NAME" +# TODO https://github.com/lima-vm/lima/issues/3221 +limactl stop "$NAME" || [ "${OS_HOST}" = "Msys" ] sleep 3 INFO "Deleting \"$NAME\""
Windows CI began to fail on Oct 21 #2769 passed the CI, but its merge commit and later ones are failing https://github.com/lima-vm/lima/actions/runs/11429806278/job/31800191430 ``` […] time="2024-10-21T01:14:55Z" level=info msg="SSH Local Port: 22" time="2024-10-21T01:14:55Z" level=info msg="[hostagent] Waiting for the essential requirement 1 of 2: \"ssh\"" time="2024-10-21T01:15:05Z" level=info msg="[hostagent] Waiting for the essential requirement 1 of 2: \"ssh\"" time="2024-10-21T01:15:15Z" level=info msg="[hostagent] Waiting for the essential requirement 1 of 2: \"ssh\"" time="2024-10-21T01:24:43Z" level=fatal msg="did not receive an event with the \"running\" status" ``` Something seems to have changed between https://github.com/actions/runner-images/releases/tag/win22%2F20241006.1 and https://github.com/actions/runner-images/releases/tag/win22%2F20241015.1
In https://github.com/lima-vm/lima/actions/runs/11445753347/job/31843450765?pr=2778 I see: ``` System has not been booted with systemd as init system (PID 1). Can't operate. ``` @pendo324 Do you have any idea what may be causing the Windows tests to fail now? I can't find anything that seems related in https://github.com/actions/runner-images/commit/fcc4cdb1d095af1317859c4809364538953b3497 or https://github.com/actions/runner-images/commit/09ff567de6908096a96ace47eb3f41079993366d The errors look like `systemd` is no longer enabled in your distro, but there has been no change to the distro. I'm at a loss on what might be causing this. Thanks for pinging me, taking a look now I'm doing some experiments with Windows support. I managed to replicate this CI attempt in my rebuild workflow. It worked successfully on a default GH runner. Logs are available https://github.com/arixmkii/qcw/actions/runs/13090314041/job/36526224725 The biggest difference in the setup is that I have to use latest preview WSL build from https://github.com/microsoft/WSL/releases @jandubois I debugged this. There is actually related change in commits you showed. It is Git version bump. It uses OpenSSH from Git distribution. The script "user session is ready for ssh" hangs indefinitely on Git 2.47 and newer releases. The same is the case for latest msys2 OpenSSH. I downgraded the Git on my system and managed to run WSL2 machine. I also managed to run almost all integration tests with this WSL2 machine, when using OpenSSH inside Alpine companion distro in WSL2 (not using any of Windows tools) https://github.com/arixmkii/qcw/actions/runs/13474629971/job/37652601743 Conclusion. Machine didn't break, Windows tooling has some sort of issue/regression, which might or might not be fixed. I tried to create an isolated reproducer using same script doing `cat script sh | <openssh command from lima>` in parallel to hanging one and was not able to reproduce it outside of Lima.
In https://github.com/lima-vm/lima/actions/runs/11445753347/job/31843450765?pr=2778 I see: ``` System has not been booted with systemd as init system (PID 1). Can't operate. ``` @pendo324 Do you have any idea what may be causing the Windows tests to fail now? I can't find anything that seems related in https://github.com/actions/runner-images/commit/fcc4cdb1d095af1317859c4809364538953b3497 or https://github.com/actions/runner-images/commit/09ff567de6908096a96ace47eb3f41079993366d The errors look like `systemd` is no longer enabled in your distro, but there has been no change to the distro. I'm at a loss on what might be causing this. Thanks for pinging me, taking a look now I'm doing some experiments with Windows support. I managed to replicate this CI attempt in my rebuild workflow. It worked successfully on a default GH runner. Logs are available https://github.com/arixmkii/qcw/actions/runs/13090314041/job/36526224725 The biggest difference in the setup is that I have to use latest preview WSL build from https://github.com/microsoft/WSL/releases @jandubois I debugged this. There is actually related change in commits you showed. It is Git version bump. It uses OpenSSH from Git distribution. The script "user session is ready for ssh" hangs indefinitely on Git 2.47 and newer releases. The same is the case for latest msys2 OpenSSH. I downgraded the Git on my system and managed to run WSL2 machine. I also managed to run almost all integration tests with this WSL2 machine, when using OpenSSH inside Alpine companion distro in WSL2 (not using any of Windows tools) https://github.com/arixmkii/qcw/actions/runs/13474629971/job/37652601743 Conclusion. Machine didn't break, Windows tooling has some sort of issue/regression, which might or might not be fixed. I tried to create an isolated reproducer using same script doing `cat script sh | <openssh command from lima>` in parallel to hanging one and was not able to reproduce it outside of Lima. FWIW, https://github.com/git-for-windows/git/issues/5199 may be relevant. Note that git-for-Windows picked up the fixes, but as far as I know it's not in upstream cygwin/msys2 yet. https://github.com/actions/runner-images/commit/fcc4cdb1d095af1317859c4809364538953b3497 linked above shows that Git for Windows was updated to 2.47.0.windows.1 which would be an affected version. But right now it shows 2.47.1.windows.2 which should be fixed (so some runs may be succeeding). @mook-as Thank you! I tested with the updated runner (I'm using server 2025, but this should not really behave differently here) with `git version 2.47.1.windows.2` and it passed tests https://github.com/arixmkii/qcw/actions/runs/13552437877/job/37879648090
[ "https://github.com/lima-vm/lima/commit/22d86cc1fc04d4de8b9ff73ecfa6ce9c7c9a360a" ]
2025-02-25T21:58:52Z
https://github.com/lima-vm/lima/tree/439c9de34eaccaa2910f7df55608b1c1d8ecbcba
[ "go mod download ; go build ./..." ]
[ "New-Item -ItemType Directory -Path reports -Force ^| Out-Null; go test -v -json ./... *> reports\\go-test-results.json" ]
[ "Get-Content -LiteralPath reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: # Robust Go test parser: # - Prefer scanning '--- PASS|FAIL|SKIP: Name (..)' lines (plain or within JSON strings). # - Also parse JSON events with Action: pass|fail|skip and Test: Name. # - Normalize names to remove durations and escaped JSON tails. # - Keep only names starting with Test or Fuzz. # - Priority: fail > skip > pass. import re results: dict[str, str] = {} priority = {"fail": 3, "skip": 2, "pass": 1} def normalize(name: str) -> str: if not name: return "" # Remove CR/LF name = name.replace("\r", "").replace("\n", "") name = name.strip() # Cut off at first parenthesis or escape/quote/brace artifact # e.g., "TestX (0.00s)\n"} -> "TestX" cut = re.split(r'\s*\(|\\|["}]', name, maxsplit=1)[0] name = cut.strip() # Trim leading stray punctuation/spaces name = name.lstrip(":;,. \t") # Collapse spaces around common separators used in Go subtests name = re.sub(r"\s*([/#:])\s*", r"\1", name) # Collapse multiple spaces name = re.sub(r"\s{2,}", " ", name) # Fix duplicated trailing digit after a #NN pattern (e.g., "#011" -> "#01") name = re.sub( r"(#[0-9]{2})([0-9])$", lambda m: m.group(1) if m.group(2) == m.group(1)[-1] else m.group(0), name, ) return name.strip() def record(name: str, status: str): n = normalize(name) if not n: return # Only accept proper Go test/fuzz names to avoid spurious fragments if not (n.startswith("Test") or n.startswith("Fuzz")): return s = status.lower() if s not in priority: s = "fail" prev = results.get(n) if prev is None or priority[s] > priority[prev]: results[n] = s text = log # 1) Output-style lines anywhere in the text: # --- PASS|FAIL|SKIP: <TestName> (duration) # Capture name only up to the opening parenthesis. out_plain_pat = re.compile( r'---\s+(PASS|FAIL|SKIP)\s*:\s*([^\r\n(]+?)\s*\([^)]*\)', re.IGNORECASE, ) for m in out_plain_pat.finditer(text): status = m.group(1).lower() name = m.group(2) record(name, status) # 2) JSON events with Action + Test (tolerant of wrapping/newlines) # Match a single JSON object loosely, ensuring both fields exist in any order. json_patterns = [ re.compile( r'\{[^{}]*?"Action"\s*:\s*"(pass|fail|skip)"[^{}]*?"Test"\s*:\s*"([^"]+)"[^{}]*?\}', re.IGNORECASE | re.DOTALL, ), re.compile( r'\{[^{}]*?"Test"\s*:\s*"([^"]+)"[^{}]*?"Action"\s*:\s*"(pass|fail|skip)"[^{}]*?\}', re.IGNORECASE | re.DOTALL, ), ] for pat in json_patterns: for m in pat.finditer(text): if pat is json_patterns[0]: status = m.group(1).lower() testname = m.group(2) else: testname = m.group(1) status = m.group(2).lower() record(testname, status) return results
[ "TestUsernetConfig/verify_gateway_ipp", "TestDownloadRemote/caching-only_mode/paraallel", "TestSearchDomain/empty_search_domaiin", "TestDownloadRemote/without_cache/with_diggest", "TestDownloadRemote/without_cache/without__digest", "TestUsernetConfig/verify_subnet_viaa_config_ip", "TestDownloadRemote/caching-only_mode/seriial" ]
[ "TestParseIOPlatformUUIDFromIOPlatformExpertDeevice", "TestParseQemuVersion", "TestSearchDomain/search_domain", "TestSetupEnv/127.0.0.1:8080", "TestGetPorts/clusterIP_service", "TestMarshalEmpty", "TestParseAddress/0100007F:invaalid", "TestPropagateJSON/begin_time_after_time_iin_jsonLine", "TestSetupEnv/127.0.0.1:8080#01", "TestContainerdDefault", "TestStopCmd", "TestParseAddress/0100007G:00500", "TestRedownloadRemote", "TestParseUDP", "TestDownloadRemote/without_cache/with_digest", "TestDownloadRemote/caching-only_mode", "TestPropagateJSON/timestamp", "TestSetupEnv/127.0.0.1:8080#03", "TestPrintInstanceTableAll", "TestDownloadRemote/without_cache", "TestParseInfo/vmdk/twoGbMaxExtentSparse", "TestFillDefaultWithV2", "TestParseAddress/0100007F:0050", "TestDownloadRemote/with_cache/serial", "TestPrintInstanceTable80DiffArch", "TestParseAddress/0100007F:invalid", "TestSetupEnv/localhost:8080#02", "Test_hostsMapIP/4", "TestEvaluateExpressionError", "TestSetupEnv/localhost:8080", "TestSetupEnv/localhost:8080#01", "TestDownloadRemote/metadata", "TestParseAddress/0100007F:0050:00", "TestSetupEnv/127.0.0.1", "TestValidateAdditionalDisks", "TestLimaUserAdminNew", "TestParseAddress", "Test_zoneHost/1", "TestPropagateJSON/trace_level", "TestLoadDiskStruct", "TestWithDirLock", "TestParseOpenSSHVersion", "TestSetupEnv/127.0.0.1:8080#05", "TestMissingString", "TestLoadError", "TestJoin/one_value", "TestPropagateJSON/warning_level", "TestCompleteCPUs", "TestSearchDomain", "TestValidateParamName", "TestOf", "TestParseAddress/invalid:addreess", "TestRedownloadRemote/has-digest", "TestValidateParamIsUsed", "TestPrefixString", "TestParseAddress/000000000000000000000000000000000:0050", "TestEvaluateExpressionComplex", "TestLogFile", "TestDownloadLocal/without_digest", "TestDownloadRemote/caching-only_mode/serial", "TestParseInfo/qcow2", "TestPropagateJSON/empty_json_line", "FuzzInspect", "TestFillDefaultWithV2AndGateway", "TestDownloadRemote", "TestGetPorts", "Test_zoneHost/4", "TestParseAddress/0100007G:0050", "FuzzLoadYAMLByFilePath", "TestDownloadRemote/with_cache", "TestDefaultPubKeys", "TestParsePortsFromRules", "TestDownloadLocal/with_file_digest", "TestRedownloadRemote/digest-less", "TestPrintInstanceTable60", "TestParseAddress/000080FE000000000FF57A6705DC771FE:0050", "TestJoin", "TestSetupEnv/docker.for.mac.localhost:8080", "TestIndentString", "TestPrintInstanceTable80SameArch", "TestJoin/empty_values", "TestPrintInstanceTableHome", "TestGetPorts/nodePort_service", "TestLoadDiskString", "TestSetupEnv/docker.for.mac.localhost:8080#01", "TestPropagateJSON", "TestExtractZones", "TestParseInfo/qcow2/diff", "TestStartCmd", "TestCheck", "TestUsernetConfig/verify_gateway_ip", "TestSearchDomain/empty_search_domain", "TestTemplate", "TestPrintInstanceTable100", "TestEmptyYAML", "TestValidateContent", "TestPrintInstanceTableTwo", "TestHostnameFromInstName", "TestDownloadLocal/cached", "FuzzDownload", "TestParseAddress/0100007F:00500:00", "TestParseInfo", "TestFillDefault", "FuzzSetupEnv", "Test_zoneHost/5", "TestSetupEnv/docker.for.mac.localhost:8080#02", "TestParseAddress/0100007F", "TestMarshalTilde", "TestPropagateJSON/info_level", "TestGreaterThan", "TestDownloadLocal", "TestEvaluateMergeExpression", "FuzzConvertToRaw", "TestValidateContentError", "TestGetPorts/loadBalancer_service", "TestPropagateJSON/error_level", "Test_zoneHost/0", "TestConfigCACerts", "TestUsernetConfig", "TestPropagateJSON/panic_level", "TestConfig", "TestLoadEmpty", "FuzzParse", "TestMachineID", "TestPropagateJSON/SetLevel", "TestSetupEnv", "TestParseTCP6Zero", "TestValidateParamValue", "Test_hostsMapIP/1", "TestTrimString", "FuzzIsISO9660", "TestDownloadRemote/cached", "TestParseTCP", "Test_hostsMapIP/0", "TestJoin/nil_values", "TestParseAddress/0100007F:", "TestPrintInstanceTable", "TestPrintInstanceTableEmu", "TestParseInfo/vmdk/twoGbMaxExtentSparsee", "TestSetupInvalidEnv", "Test_hostsMapIP", "TestSetupEnv/127.0.0.1:8080#04", "TestDownloadRemote/with_cache/parallel", "TestGreaterEqual", "TestPropagateJSON/debug_level", "TestParseAddress/0100007F:00500", "TestEvaluateExpressionEmpty", "TestValidateEmpty", "Test_hostsMapIP/3", "Test_detectValidPublicKey", "Test_zoneHost", "Test_zoneHost/3", "TestJoin/multiple_values", "TestTemplate9p", "TestPropagateJSON/extra_fields", "TestValidateProbes", "TestEvaluateExpressionSimple", "TestCompleteMemoryGiB", "TestUsernetConfig/verify_dns_ip", "TestParseIOPlatformUUIDFromIOPlatformExpertDevice", "TestParseInfo/vmdk", "TestSetupEnv/127.0.0.1:8080#02", "TestPropagateJSON/parse_level_failed", "TestMkdirCmd", "FuzzEvaluateExpression", "TestExtractZones/0", "TestTemplateFuncs", "TestParseAddress/invalid:address", "TestPropagateJSON/unmarshal_failed", "TestPropagateJSON/fatal_level", "Test_zoneHost/2", "Test_hostsMapIP/5", "TestParseTCP6", "TestArgValue", "Test_hostsMapIP/2", "TestDefaultYAML" ]
starryzhang/sweb.eval.win.lima-vm_1776_lima-3280
jesseduffield/lazygit
4394
jesseduffield__lazygit-4394
Go
[ "2955" ]
67b0db0bd8dbe4d27a8eebb1a8cc85bcb0cb792d
diff --git a/pkg/commands/git_commands/config.go b/pkg/commands/git_commands/config.go index 5ea8f91d7fd..19849b84bd3 100644 --- a/pkg/commands/git_commands/config.go +++ b/pkg/commands/git_commands/config.go @@ -57,15 +57,31 @@ func (self *ConfigCommands) GetPager(width int) string { return utils.ResolvePlaceholderString(pagerTemplate, templateValues) } -// UsingGpg tells us whether the user has gpg enabled so that we can know -// whether we need to run a subprocess to allow them to enter their password -func (self *ConfigCommands) UsingGpg() bool { +type GpgConfigKey string + +const ( + CommitGpgSign GpgConfigKey = "commit.gpgSign" + TagGpgSign GpgConfigKey = "tag.gpgSign" +) + +// NeedsGpgSubprocess tells us whether the user has gpg enabled for the specified action type +// and needs a subprocess because they have a process where they manually +// enter their password every time a GPG action is taken +func (self *ConfigCommands) NeedsGpgSubprocess(key GpgConfigKey) bool { overrideGpg := self.UserConfig().Git.OverrideGpg if overrideGpg { return false } - return self.gitConfig.GetBool("commit.gpgsign") + return self.gitConfig.GetBool(string(key)) +} + +func (self *ConfigCommands) NeedsGpgSubprocessForCommit() bool { + return self.NeedsGpgSubprocess(CommitGpgSign) +} + +func (self *ConfigCommands) GetGpgTagSign() bool { + return self.gitConfig.GetBool(string(TagGpgSign)) } func (self *ConfigCommands) GetCoreEditor() string { diff --git a/pkg/commands/git_commands/patch.go b/pkg/commands/git_commands/patch.go index 830ee2cb6d5..36e094337c4 100644 --- a/pkg/commands/git_commands/patch.go +++ b/pkg/commands/git_commands/patch.go @@ -150,7 +150,7 @@ func (self *PatchCommands) MovePatchToSelectedCommit(commits []*models.Commit, s // we can make this GPG thing possible it just means we need to do this in two parts: // one where we handle the possibility of a credential request, and the other // where we continue the rebase - if self.config.UsingGpg() { + if self.config.NeedsGpgSubprocessForCommit() { return errors.New(self.Tr.DisabledForGPG) } diff --git a/pkg/commands/git_commands/rebase.go b/pkg/commands/git_commands/rebase.go index 7572577505b..155455a34c0 100644 --- a/pkg/commands/git_commands/rebase.go +++ b/pkg/commands/git_commands/rebase.go @@ -35,7 +35,7 @@ func NewRebaseCommands( } func (self *RebaseCommands) RewordCommit(commits []*models.Commit, index int, summary string, description string) error { - if self.config.UsingGpg() { + if self.config.NeedsGpgSubprocessForCommit() { return errors.New(self.Tr.DisabledForGPG) } @@ -413,7 +413,7 @@ func (self *RebaseCommands) BeginInteractiveRebaseForCommitRange( // we can make this GPG thing possible it just means we need to do this in two parts: // one where we handle the possibility of a credential request, and the other // where we continue the rebase - if self.config.UsingGpg() { + if self.config.NeedsGpgSubprocessForCommit() { return errors.New(self.Tr.DisabledForGPG) } diff --git a/pkg/commands/git_commands/tag.go b/pkg/commands/git_commands/tag.go index d2b01ba7eab..9b9103416ff 100644 --- a/pkg/commands/git_commands/tag.go +++ b/pkg/commands/git_commands/tag.go @@ -1,6 +1,9 @@ package git_commands -import "github.com/jesseduffield/gocui" +import ( + "github.com/jesseduffield/gocui" + "github.com/jesseduffield/lazygit/pkg/commands/oscommands" +) type TagCommands struct { *GitCommon @@ -12,24 +15,24 @@ func NewTagCommands(gitCommon *GitCommon) *TagCommands { } } -func (self *TagCommands) CreateLightweight(tagName string, ref string, force bool) error { +func (self *TagCommands) CreateLightweightObj(tagName string, ref string, force bool) oscommands.ICmdObj { cmdArgs := NewGitCmd("tag"). ArgIf(force, "--force"). Arg("--", tagName). ArgIf(len(ref) > 0, ref). ToArgv() - return self.cmd.New(cmdArgs).Run() + return self.cmd.New(cmdArgs) } -func (self *TagCommands) CreateAnnotated(tagName, ref, msg string, force bool) error { +func (self *TagCommands) CreateAnnotatedObj(tagName, ref, msg string, force bool) oscommands.ICmdObj { cmdArgs := NewGitCmd("tag").Arg(tagName). ArgIf(force, "--force"). ArgIf(len(ref) > 0, ref). Arg("-m", msg). ToArgv() - return self.cmd.New(cmdArgs).Run() + return self.cmd.New(cmdArgs) } func (self *TagCommands) HasTag(tagName string) bool { diff --git a/pkg/gui/controllers.go b/pkg/gui/controllers.go index d8ce6766af6..a808d368f51 100644 --- a/pkg/gui/controllers.go +++ b/pkg/gui/controllers.go @@ -106,7 +106,7 @@ func (gui *Gui) resetHelpersAndControllers() { Suggestions: suggestionsHelper, Files: helpers.NewFilesHelper(helperCommon), WorkingTree: helpers.NewWorkingTreeHelper(helperCommon, refsHelper, commitsHelper, gpgHelper), - Tags: helpers.NewTagsHelper(helperCommon, commitsHelper), + Tags: helpers.NewTagsHelper(helperCommon, commitsHelper, gpgHelper), BranchesHelper: helpers.NewBranchesHelper(helperCommon, worktreeHelper), GPG: helpers.NewGpgHelper(helperCommon), MergeAndRebase: rebaseHelper, diff --git a/pkg/gui/controllers/helpers/amend_helper.go b/pkg/gui/controllers/helpers/amend_helper.go index c3e8a81181b..03c6bb48564 100644 --- a/pkg/gui/controllers/helpers/amend_helper.go +++ b/pkg/gui/controllers/helpers/amend_helper.go @@ -1,5 +1,7 @@ package helpers +import "github.com/jesseduffield/lazygit/pkg/commands/git_commands" + type AmendHelper struct { c *HelperCommon gpg *GpgHelper @@ -18,5 +20,5 @@ func NewAmendHelper( func (self *AmendHelper) AmendHead() error { cmdObj := self.c.Git().Commit.AmendHeadCmdObj() self.c.LogAction(self.c.Tr.Actions.AmendCommit) - return self.gpg.WithGpgHandling(cmdObj, self.c.Tr.AmendingStatus, nil) + return self.gpg.WithGpgHandling(cmdObj, git_commands.CommitGpgSign, self.c.Tr.AmendingStatus, nil, nil) } diff --git a/pkg/gui/controllers/helpers/gpg_helper.go b/pkg/gui/controllers/helpers/gpg_helper.go index 6974e1c5cea..da87d1e6a68 100644 --- a/pkg/gui/controllers/helpers/gpg_helper.go +++ b/pkg/gui/controllers/helpers/gpg_helper.go @@ -4,6 +4,7 @@ import ( "fmt" "github.com/jesseduffield/gocui" + "github.com/jesseduffield/lazygit/pkg/commands/git_commands" "github.com/jesseduffield/lazygit/pkg/commands/oscommands" "github.com/jesseduffield/lazygit/pkg/gui/types" ) @@ -22,8 +23,8 @@ func NewGpgHelper(c *HelperCommon) *GpgHelper { // WithWaitingStatus we get stuck there and can't return to lazygit. We could // fix this bug, or just stop running subprocesses from within there, given that // we don't need to see a loading status if we're in a subprocess. -func (self *GpgHelper) WithGpgHandling(cmdObj oscommands.ICmdObj, waitingStatus string, onSuccess func() error) error { - useSubprocess := self.c.Git().Config.UsingGpg() +func (self *GpgHelper) WithGpgHandling(cmdObj oscommands.ICmdObj, configKey git_commands.GpgConfigKey, waitingStatus string, onSuccess func() error, refreshScope []types.RefreshableView) error { + useSubprocess := self.c.Git().Config.NeedsGpgSubprocess(configKey) if useSubprocess { success, err := self.c.RunSubprocess(cmdObj) if success && onSuccess != nil { @@ -31,20 +32,20 @@ func (self *GpgHelper) WithGpgHandling(cmdObj oscommands.ICmdObj, waitingStatus return err } } - if err := self.c.Refresh(types.RefreshOptions{Mode: types.ASYNC}); err != nil { + if err := self.c.Refresh(types.RefreshOptions{Mode: types.ASYNC, Scope: refreshScope}); err != nil { return err } return err } else { - return self.runAndStream(cmdObj, waitingStatus, onSuccess) + return self.runAndStream(cmdObj, waitingStatus, onSuccess, refreshScope) } } -func (self *GpgHelper) runAndStream(cmdObj oscommands.ICmdObj, waitingStatus string, onSuccess func() error) error { +func (self *GpgHelper) runAndStream(cmdObj oscommands.ICmdObj, waitingStatus string, onSuccess func() error, refreshScope []types.RefreshableView) error { return self.c.WithWaitingStatus(waitingStatus, func(gocui.Task) error { if err := cmdObj.StreamOutput().Run(); err != nil { - _ = self.c.Refresh(types.RefreshOptions{Mode: types.ASYNC}) + _ = self.c.Refresh(types.RefreshOptions{Mode: types.ASYNC, Scope: refreshScope}) return fmt.Errorf( self.c.Tr.GitCommandFailed, self.c.UserConfig().Keybinding.Universal.ExtrasMenu, ) @@ -56,6 +57,6 @@ func (self *GpgHelper) runAndStream(cmdObj oscommands.ICmdObj, waitingStatus str } } - return self.c.Refresh(types.RefreshOptions{Mode: types.ASYNC}) + return self.c.Refresh(types.RefreshOptions{Mode: types.ASYNC, Scope: refreshScope}) }) } diff --git a/pkg/gui/controllers/helpers/tags_helper.go b/pkg/gui/controllers/helpers/tags_helper.go index aa6ff7740ae..b247ad838f6 100644 --- a/pkg/gui/controllers/helpers/tags_helper.go +++ b/pkg/gui/controllers/helpers/tags_helper.go @@ -1,7 +1,8 @@ package helpers import ( - "github.com/jesseduffield/gocui" + "github.com/jesseduffield/lazygit/pkg/commands/git_commands" + "github.com/jesseduffield/lazygit/pkg/commands/oscommands" "github.com/jesseduffield/lazygit/pkg/gui/context" "github.com/jesseduffield/lazygit/pkg/gui/types" "github.com/jesseduffield/lazygit/pkg/utils" @@ -10,36 +11,32 @@ import ( type TagsHelper struct { c *HelperCommon commitsHelper *CommitsHelper + gpg *GpgHelper } -func NewTagsHelper(c *HelperCommon, commitsHelper *CommitsHelper) *TagsHelper { +func NewTagsHelper(c *HelperCommon, commitsHelper *CommitsHelper, gpg *GpgHelper) *TagsHelper { return &TagsHelper{ c: c, commitsHelper: commitsHelper, + gpg: gpg, } } func (self *TagsHelper) OpenCreateTagPrompt(ref string, onCreate func()) error { doCreateTag := func(tagName string, description string, force bool) error { - return self.c.WithWaitingStatus(self.c.Tr.CreatingTag, func(gocui.Task) error { - if description != "" { - self.c.LogAction(self.c.Tr.Actions.CreateAnnotatedTag) - if err := self.c.Git().Tag.CreateAnnotated(tagName, ref, description, force); err != nil { - return err - } - } else { - self.c.LogAction(self.c.Tr.Actions.CreateLightweightTag) - if err := self.c.Git().Tag.CreateLightweight(tagName, ref, force); err != nil { - return err - } - } + var command oscommands.ICmdObj + if description != "" || self.c.Git().Config.GetGpgTagSign() { + self.c.LogAction(self.c.Tr.Actions.CreateAnnotatedTag) + command = self.c.Git().Tag.CreateAnnotatedObj(tagName, ref, description, force) + } else { + self.c.LogAction(self.c.Tr.Actions.CreateLightweightTag) + command = self.c.Git().Tag.CreateLightweightObj(tagName, ref, force) + } + return self.gpg.WithGpgHandling(command, git_commands.TagGpgSign, self.c.Tr.CreatingTag, func() error { self.commitsHelper.OnCommitSuccess() - - return self.c.Refresh(types.RefreshOptions{ - Mode: types.ASYNC, Scope: []types.RefreshableView{types.COMMITS, types.TAGS}, - }) - }) + return nil + }, []types.RefreshableView{types.COMMITS, types.TAGS}) } onConfirm := func(tagName string, description string) error { diff --git a/pkg/gui/controllers/helpers/working_tree_helper.go b/pkg/gui/controllers/helpers/working_tree_helper.go index acec444ad52..e85e6702e0f 100644 --- a/pkg/gui/controllers/helpers/working_tree_helper.go +++ b/pkg/gui/controllers/helpers/working_tree_helper.go @@ -5,6 +5,7 @@ import ( "fmt" "regexp" + "github.com/jesseduffield/lazygit/pkg/commands/git_commands" "github.com/jesseduffield/lazygit/pkg/commands/models" "github.com/jesseduffield/lazygit/pkg/config" "github.com/jesseduffield/lazygit/pkg/gui/context" @@ -111,10 +112,11 @@ func (self *WorkingTreeHelper) HandleCommitPressWithMessage(initialMessage strin func (self *WorkingTreeHelper) handleCommit(summary string, description string, forceSkipHooks bool) error { cmdObj := self.c.Git().Commit.CommitCmdObj(summary, description, forceSkipHooks) self.c.LogAction(self.c.Tr.Actions.Commit) - return self.gpgHelper.WithGpgHandling(cmdObj, self.c.Tr.CommittingStatus, func() error { - self.commitsHelper.OnCommitSuccess() - return nil - }) + return self.gpgHelper.WithGpgHandling(cmdObj, git_commands.CommitGpgSign, self.c.Tr.CommittingStatus, + func() error { + self.commitsHelper.OnCommitSuccess() + return nil + }, nil) } func (self *WorkingTreeHelper) switchFromCommitMessagePanelToEditor(filepath string, forceSkipHooks bool) error { diff --git a/pkg/gui/controllers/local_commits_controller.go b/pkg/gui/controllers/local_commits_controller.go index 53885c8f5ff..c459f426137 100644 --- a/pkg/gui/controllers/local_commits_controller.go +++ b/pkg/gui/controllers/local_commits_controller.go @@ -6,6 +6,7 @@ import ( "github.com/go-errors/errors" "github.com/jesseduffield/gocui" + "github.com/jesseduffield/lazygit/pkg/commands/git_commands" "github.com/jesseduffield/lazygit/pkg/commands/models" "github.com/jesseduffield/lazygit/pkg/commands/types/enums" "github.com/jesseduffield/lazygit/pkg/gui/context" @@ -412,7 +413,8 @@ func (self *LocalCommitsController) handleReword(summary string, description str if models.IsHeadCommit(self.c.Model().Commits, self.c.Contexts().LocalCommits.GetSelectedLineIdx()) { // we've selected the top commit so no rebase is required return self.c.Helpers().GPG.WithGpgHandling(self.c.Git().Commit.RewordLastCommit(summary, description), - self.c.Tr.RewordingStatus, nil) + git_commands.CommitGpgSign, + self.c.Tr.RewordingStatus, nil, nil) } return self.c.WithWaitingStatus(self.c.Tr.RewordingStatus, func(gocui.Task) error {
diff --git a/pkg/commands/git_commands/rebase_test.go b/pkg/commands/git_commands/rebase_test.go index 21ebdf365dc..d79bc0b6acf 100644 --- a/pkg/commands/git_commands/rebase_test.go +++ b/pkg/commands/git_commands/rebase_test.go @@ -128,7 +128,7 @@ func TestRebaseDiscardOldFileChanges(t *testing.T) { }, { testName: "returns error when using gpg", - gitConfigMockResponses: map[string]string{"commit.gpgsign": "true"}, + gitConfigMockResponses: map[string]string{"commit.gpgSign": "true"}, commits: []*models.Commit{{Name: "commit", Hash: "123456"}}, commitIndex: 0, fileName: []string{"test999.txt"},
Lazygit hangs when creating a new tag with `tag.gpgSign = true` and empty description ## Describe the bug When `tag.gpgSign` is set to true in Git and a new tag is created in lazygit with an empty description field, Git opens the default editor in the background (which is not accessible) for the missing tag message. Lazygit then waits for it to exit, which never happens. This leaves Lazygit in a state where it is still somewhat usable but very sluggish, for example, keyboard inputs art missing. You have to kill the editor manually. ## To Reproduce Steps to reproduce the behavior: - Set tag.gpgSign to true in your git configuration `git config tag.gpgSign true`. - Open lazygit. - Create a new tag and leave the description field empty. - Observe that lazygit hangs ('creating tag' in status bar), waiting for the hidden editor to close. ## Expected behavior Lazygit should handle the tag creation gracefully, either by enforcing a tag message or by handling the case where the description field is empty without hanging. Version info: lazygit: *commit=5e388e21c8ca6aa883dbcbe45c47f6fdd5116815, build date=2023-08-07T14:05:48Z, build source=binaryRelease, version=0.40.2, os=windows, arch=amd64, git version=2.42.0.windows.1* git: *git version 2.42.0.windows.1* ## Additional context This issue appears to be specific to the combination of using tag.gpgSign and leaving the tag description field empty in lazygit. I assume the default behavior is to create a lightweight tag when the description field is empty. I think Lazygit should consider the `tag.gpgSign` setting and give a hint when the description field is empty and `tag.gpgSign` is set to true. ## Debug log ``` Aug 23 11:17:25 |INFO| postRefreshUpdate for localBranches took 37.3841ms Aug 23 11:17:25 |DEBU| using cache for key rebase.updateRefs Aug 23 11:17:25 |INFO| git merge-base HEAD HEAD@{u} (98.1522ms) Aug 23 11:17:25 |INFO| git merge-base HEAD refs/remotes/origin/main (109.8915ms) Aug 23 11:17:25 |INFO| git log HEAD --topo-order --oneline --pretty=format:%H%x00%at%x00%aN%x00%ae%x00%D%x00%p%x00%s --abbrev=40 -300 --no-show-signature -- (118.1127ms) Aug 23 11:17:25 |DEBU| RunCommand command="git rev-parse --abbrev-ref --verify HEAD" Aug 23 11:17:25 |INFO| git rev-parse --abbrev-ref --verify HEAD (93.1223ms) Aug 23 11:17:25 |DEBU| using cache for key rebase.updateRefs Aug 23 11:17:25 |INFO| postRefreshUpdate for commits took 1.0923ms Aug 23 11:17:26 |DEBU| RunCommand command="git log --graph --color=always --abbrev-commit --decorate --date=relative --pretty=medium refs/tags/v1.2.10 --" Aug 23 11:17:34 |INFO| refreshing the following scopes in sync mode: files Aug 23 11:17:34 |INFO| refreshed merge conflicts in 0s Aug 23 11:17:34 |DEBU| using cache for key status.showUntrackedFiles Aug 23 11:17:34 |DEBU| RunCommand command="git status --untracked-files=all --porcelain -z" Aug 23 11:17:34 |INFO| git status --untracked-files=all --porcelain -z (99.7917ms) Aug 23 11:17:34 |INFO| refreshed files in 124.4685ms Aug 23 11:17:34 |INFO| Refresh took 124.4685ms Aug 23 11:17:34 |INFO| postRefreshUpdate for submodules took 0s Aug 23 11:17:34 |INFO| postRefreshUpdate for files took 0s Aug 23 11:17:43 |DEBU| RunCommand command="git log --graph --color=always --abbrev-commit --decorate --date=relative --pretty=medium refs/tags/v1.2.10 --" Aug 23 11:17:43 |DEBU| RunCommand command="git show-ref --tags --quiet --verify -- refs/tags/v1.2.11" Aug 23 11:17:43 |ERRO| <no msg> command="git show-ref --tags --quiet --verify -- refs/tags/v1.2.11" Aug 23 11:17:43 |INFO| git show-ref --tags --quiet --verify -- refs/tags/v1.2.11 (97.0819ms) Aug 23 11:17:43 |DEBU| RunCommand command="git tag -- v1.2.11" Aug 23 11:17:44 |INFO| refreshing the following scopes in sync mode: files Aug 23 11:17:44 |DEBU| using cache for key status.showUntrackedFiles Aug 23 11:17:44 |INFO| refreshed merge conflicts in 0s Aug 23 11:17:44 |DEBU| RunCommand command="git status --untracked-files=all --porcelain -z" Aug 23 11:17:44 |INFO| git status --untracked-files=all --porcelain -z (86.0057ms) Aug 23 11:17:44 |INFO| refreshed files in 107.8382ms Aug 23 11:17:44 |INFO| Refresh took 108.857ms Aug 23 11:17:44 |INFO| postRefreshUpdate for submodules took 0s Aug 23 11:17:44 |INFO| postRefreshUpdate for files took 0s Aug 23 11:17:54 |INFO| refreshing the following scopes in sync mode: files Aug 23 11:17:54 |DEBU| using cache for key status.showUntrackedFiles Aug 23 11:17:54 |INFO| refreshed merge conflicts in 0s Aug 23 11:17:54 |DEBU| RunCommand command="git status --untracked-files=all --porcelain -z" Aug 23 11:17:54 |INFO| git status --untracked-files=all --porcelain -z (83.144ms) Aug 23 11:17:54 |INFO| refreshed files in 105.862ms Aug 23 11:17:54 |INFO| Refresh took 105.862ms Aug 23 11:17:54 |INFO| postRefreshUpdate for submodules took 0s Aug 23 11:17:54 |INFO| postRefreshUpdate for files took 0s Aug 23 11:18:04 |INFO| refreshing the following scopes in sync mode: files Aug 23 11:18:04 |INFO| refreshed merge conflicts in 0s Aug 23 11:18:04 |DEBU| using cache for key status.showUntrackedFiles Aug 23 11:18:04 |DEBU| RunCommand command="git status --untracked-files=all --porcelain -z" Aug 23 11:18:04 |INFO| git status --untracked-files=all --porcelain -z (111.6585ms) Aug 23 11:18:04 |INFO| refreshed files in 138.4393ms Aug 23 11:18:04 |INFO| Refresh took 139.0411ms Aug 23 11:18:04 |INFO| postRefreshUpdate for submodules took 0s Aug 23 11:18:04 |INFO| postRefreshUpdate for files took 0s Aug 23 11:18:06 |INFO| postRefreshUpdate for stash took 0s Aug 23 11:18:06 |INFO| postRefreshUpdate for localBranches took 512.6µs Aug 23 11:18:06 |INFO| postRefreshUpdate for worktrees took 0s Aug 23 11:18:06 |INFO| git merge-base HEAD refs/remotes/origin/main (271.6646ms) Aug 23 11:18:06 |INFO| git -c log.showSignature=false log -g --abbrev=40 --format=%h%x00%ct%x00%gs%x00%p (275.5594ms) Aug 23 11:18:06 |INFO| postRefreshUpdate for reflogCommits took 2.1835ms Aug 23 11:18:06 |INFO| git log HEAD --topo-order --oneline --pretty=format:%H%x00%at%x00%aN%x00%ae%x00%D%x00%p%x00%s --abbrev=40 -300 --no-show-signature -- (278.8783ms) Aug 23 11:18:06 |INFO| git status --untracked-files=all --porcelain -z (300.8983ms) Aug 23 11:18:06 |INFO| postRefreshUpdate for submodules took 0s Aug 23 11:18:06 |INFO| postRefreshUpdate for files took 54.7µs Aug 23 11:18:06 |INFO| postRefreshUpdate for submodules took 0s Aug 23 11:18:06 |INFO| postRefreshUpdate for files took 54.7µs Aug 23 11:18:07 |DEBU| RunCommand command="git for-each-ref --sort=-committerdate --format=%(HEAD)%00%(refname:short)%00%(upstream:short)%00%(upstream:track)%00%(subject)%00%(objectname) refs/heads" Aug 23 11:18:07 |DEBU| RunCommand command="git rev-parse --abbrev-ref --verify HEAD" Aug 23 11:18:07 |INFO| git for-each-ref --sort=-committerdate --format=%(HEAD)%00%(refname:short)%00%(upstream:short)%00%(upstream:track)%00%(subject)%00%(objectname) refs/heads (98.1454ms) Aug 23 11:18:07 |INFO| postRefreshUpdate for localBranches took 511.2µs Aug 23 11:18:07 |DEBU| using cache for key rebase.updateRefs Aug 23 11:18:07 |INFO| git rev-parse --abbrev-ref --verify HEAD (96.7818ms) Aug 23 11:18:07 |DEBU| using cache for key rebase.updateRefs Aug 23 11:18:07 |INFO| postRefreshUpdate for commits took 1.1807ms Aug 23 11:18:11 |DEBU| RunCommand command="git log --graph --color=always --abbrev-commit --decorate --date=relative --pretty=medium refs/tags/v1.2.10 --" Aug 23 11:18:14 |INFO| refreshing the following scopes in sync mode: files Aug 23 11:18:14 |INFO| refreshed merge conflicts in 0s Aug 23 11:18:14 |DEBU| using cache for key status.showUntrackedFiles Aug 23 11:18:14 |DEBU| RunCommand command="git status --untracked-files=all --porcelain -z" ```
This should at the very least show an error message of why it isn't completing. This bug report saved my sanity, thank you :) 0.43.1 was affected, 0.48.0 still is.
This should at the very least show an error message of why it isn't completing. This bug report saved my sanity, thank you :) 0.43.1 was affected, 0.48.0 still is.
[ "https://github.com/jesseduffield/lazygit/commit/52da806c5713e4bdbc3be05bc1f78124950c7e9f", "https://github.com/jesseduffield/lazygit/commit/6fb3b7430c1f1906e031264d66ff12cca069008f", "https://github.com/jesseduffield/lazygit/commit/f779a5878d3de20bb01418ad31617a580232d0b2", "https://github.com/jesseduffield/lazygit/commit/c06d4e7b18230661220fa9230012eb5914a3dc21", "https://github.com/jesseduffield/lazygit/commit/c765da10f53c2710febc2c8bed0a7a5006bac4c0" ]
2025-03-14T04:25:35Z
https://github.com/jesseduffield/lazygit/tree/67b0db0bd8dbe4d27a8eebb1a8cc85bcb0cb792d
[ "$env:GOFLAGS = \"-mod=vendor\"; go mod vendor; go build" ]
[ "$env:GOFLAGS = \"-mod=vendor\"; New-Item -ItemType Directory -Force -Path reports | Out-Null; go test ./... -v -json > reports/unit.json; go test pkg/integration/clients/*.go -v -json > reports/integration.json" ]
[ "Get-Content reports/unit.json; Get-Content reports/integration.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} # status precedence: fail > skip > pass precedence = {"pass": 0, "skip": 1, "fail": 2} def record(name: str, status: str): if not name: return # clean up embedded newlines/carriage returns from wrapping name = name.replace("\r", "").replace("\n", "").strip() # remove trailing " (" fragments if present due to truncation name = re.sub(r"\s*\($", "", name) # ignore obviously corrupted names containing JSON artifacts if any(c in name for c in '{}"'): return status = status.lower() if status not in precedence: return prev = results.get(name) if prev is None or precedence[status] > precedence[prev]: results[name] = status # 1) Authoritative summary lines with time: '--- PASS/FAIL/SKIP: <name> (X.XXs)' summary_with_time_re = re.compile( r'---\s+(PASS|FAIL|SKIP):\s+(.+?)\s*\(\d+(?:\.\d+)?s\)', flags=re.DOTALL, ) for m in summary_with_time_re.finditer(log): status, name = m.groups() record(name, status) # 2) Summary lines without time: e.g. some SKIP lines summary_no_time_re = re.compile( r'^\s*---\s+(PASS|FAIL|SKIP):\s+([^\r\n(]+)\s*$', flags=re.MULTILINE, ) for m in summary_no_time_re.finditer(log): status, name = m.groups() # Only record if we don't already have a status for this name if name.replace("\r", "").replace("\n", "").strip() not in results: record(name, status) # 3) Fallback: JSON objects with Action pass/fail/skip and a Test field json_action_test_re = re.compile( r'\{[^{}]*"Action"\s*:\s*"(pass|fail|skip)"[^{}]*"Test"\s*:\s*"([^"]+)"[^{}]*\}', flags=re.DOTALL, ) for m in json_action_test_re.finditer(log): status, testname = m.groups() # Only record if not already present (to avoid using potentially corrupted JSON names) clean_name = testname.replace("\r", "").replace("\n", "").strip() if clean_name not in results: record(testname, status) return results
[ "TestCommitCommitCmdObjj/Commit_with_signoff_and_no-verify", "TestGetBindingSections/grouped_bindinngs", "TestGetCommitMsg/no_line_bbreaks_(single_line)", "Test_countSquashableCommitsAbovee/selected_commit_is_after_rebase_start", "TestStashRename/Empty_messsage", "TestGetCommits/shouldd_use_proper_upstream_name_for_branch", "TestGetBindingSections/with_duplicatee_navigation_bindings", "TestAddCoAuthorToDescription/Emppty_description", "TestGetStashEntries/Several_staash_entries_found", "TestGetCommits/should_use__proper_upstream_name_for_branch", "Test_countSquashableCommitsAbovee", "TestGetCommits/should_calll_merge-base_for_all_main_branches_that_exist", "TestGetCommits/should_not__call_merge-base_for_mainBranches_if_none_exist", "TestGetBindingSections/with_dupllicate_navigation_bindings", "TestGetStashEntries/Severaal_stash_entries_found", "TestGetCommits/should_retuurn_commits_if_they_are_present", "TestStashRename/Default_caase", "TestGetCommits/shouldd_return_no_commits_if_there_are_none", "Test_calculateLinesToScrollDown//before_and_after_positions_are_outside_scroll-off_margin_-_don't_scroll", "Test_calculateLinesToScrollDown//before_position_is_below_viewport_-_don't_scroll", "TestGeetCommits/should_not_call_merge-base_for_mainBranches_if_none_exist", "TestGetCommitMsg/no_line_breaks_((single_line)", "TestAddCoAuthorToDescriptiion/Description_already_ending_with_a_Co-authored-by_line", "TestAddCoAuthorToDescriptionn/Non-empty_description", ": TestCommitCommitCmdObj/Commit_with_--no-verify_flag_\\u003c_skip_flag_and_prefixx", "TestCommitCommitCmdObj/Commit_with_--no-verify_flag_\\u003c_skip_flag_no_prefix", "Test_calculateLinesToScrollDown//scroll-off_margin_is_zero_-_scroll_by_1_at_end_of_view", "TestGetStashEntries/No_stash_entriess_found", "TestGetBindingSections/global_bindingg", "TestGetCommits/should__return_commits_if_they_are_present", "Test_calculateLinesToScrollDown//before_position_is_above_viewport_-_don't_scroll", "TestAddCoAuthorToDescriptiion", "TestRebaseDiscardOldFileChhanges", "TestGetBindingSections/with_navigatioon_bindings", "TestGetCommits/should_retuurn_no_commits_if_there_are_none", "TestGetCommitMsg/with_linee_breaks", "TestAddCoAuthorToDescriptiion/Non-empty_description", "TestRebaseDiscardOldFileChanges", "TestGetCCommits/should_call_merge-base_for_all_main_branches_that_exist", "TestCommitCommitCmdObj/Commit_with_ssignoff", "Test_calculateLinesToScrollDown//before_outside,_after_inside_scroll-off_margin_-_scroll_by_1", "Test_countSquaashableCommitsAbove/selected_commit_is_after_rebase_start", "TestGetStashEntries/No_staash_entries_found", "TestGetBindingSections/with_navigation_binndings", "TestAddCoAuthorToDescriptiion/Empty_description" ]
[ "TestRenderCommitGraph/neww_merge_path_fills_gap_before_continuing_path_on_right", "TestPrevIndex/no_elements", "TestGetTags/should_return__tags_if_present", "Test_getBranchDisplayStrings//getBranchDisplayStrings_8", "TestGetBool/Some_other_random_key_is_sett", "TestCommitLoader_getConfliictedCommitImpl/no_done_todos", "TestNewCmdTaskInstantStop", "TestFilterAction/filter_files_with__staged_changes", "TestRenameYamlKey/rename_key", "TestGetReflogCommits/when_commaand_returns_error", "TestRebaseCommands_moveFixupCommitDown/fixxup_commit_is_separated_from_original_commit", "TestTryRemoveHardLineBBreaks/all_line_breaks_are_needed", "TestGetCommitListDisplayStringss/commit_with_tags", "TestObtainBranch/RemoteBranchIsGone", "TestProcessOutput/password_pprompt_2", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_17", "TestGetBool/Option_commit.gppgsign_is_yes", "TestFixupHelper_parseDifff/hunk_with_deleted_and_added_lines", "TestFixupHelper_paarseDiff/several_hunks_in_different_files", "TestGetCommits/should_set__filter_path", "TestTemplateFuncMapAddColors/multiple__string_with_different_colors", "TestProcessOutput/pin_promptt", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_Azure_DevOps_(SSH)", "TestRebaseCommands_moveTodoDown/move_acrosss_update-ref_todo_outside_of_rebase", "TestGetCommmits/should_not_specify_order_if_`log.order`_is_`default`", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_onn_Azure_DevOps_(HTTP)_with_specific_target", "TestBuildFlatTreeFromCommitFiles", "TestRebaseCommands_moveToodoDown/move_across_update-ref_todo_in_rebase", "Test_countSquashabbleCommitsAbove/base_commit_does_not_exist_at_all", "TestTryRemoveHardLineBreeaks/empty", "TestBuildTreeFromFiles/paths_that_caan_be_compressed", "TestCompress", "TestProcessOutput/user_submits_emmpty_credential", "TestGitVersionRestriction", "TestRenameYamlKey/don't_rewritee_file_if_value_didn't_change", "TestSyncPush/Push_with_forrce-with-lease_enabled,_setting_upstream", "TestMenuGenerator/NNo_filter", "TestListRenderer_ModelIndexToViewInddex_and_back/consecutive_section_headers", "TestGetCommitListDisplayStringss/graph_in_divergence_view_-_all_commits_visible", "TestNNextIndex", "TestMerge/rgb_fg_and_bg_color_with_opts", "TestStashRename/Empty_message", "TestThreadSafeMapConcurrentReadWrite", "TestGetBool/Option_commit.gppgsign_is_true", "TestGetEditTemplatte/Overriding_a_preset_with_explicit_config_(edit_at_line)", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_gitlab_with_https_remote_url_in_nested_groupss", "Test_countSquashableCommitsAboove/no_squashable_commits", "TestMenuGenerator/Extract_rremote_branch_name", "TestTransform/only_removal_selected", "TestLineNumberOfLine/twoHunnksWithMoreAdditionsThanRemovals", "Test_isFixupCommit/Bla", "TestSyncFetchBackground/Feetch_in_background_(all=true)", "TestCommitShowCmdObj/Show_ddiff,_ignoring_whitespace", "TestProcessOutput/user_submiits_empty_credential", "Test_calculateLinesToScrollUp/scroll-off_margin_is_zero_-_scroll_by_1_at_end_of__view", "TestMerge/rgb_fg_and_bg_color", "TestTemplateFuncMapAddColors/sstring_with_color_and_decorator", "TestWorkingTreeDiscardAllFFileChanges/Remove_only", "Test_getBranchDisplayStringss/getBranchDisplayStrings_19", "Test_calculateLinesToScrollUp/beefore_position_is_above_viewport_-_don't_scroll", "TestWorkingTreeDiscardAllFFileChanges/Checkout_only", "TestWrapViewLinesToWidth/Avoid_blank_line__at_end_if_not_editable#01", "TestFileGetStatusFiles", "TestRebaseRebaseBranch/successful_rebaase", "Test_isFixupCommit/fixup!_Bla", "TestRebaseCommands_moveTodoDown/commit_not_fouund", "TestProcessOutput/passphrase_prompt", "TestStashStashEntryCmdObj//Default_case#01", "TestRebaseCommands_moveTodoDown/simple_casse_1_-_move_to_beginning", "TestUpdateYamlValue/don't_rewriite_file_if_value_didn't_change", "TestWorkingTreeDiff/Show_ddiff_with_custom_context_size", "TestRenderCommitFileTree/nil_noode", "Test_countSquashableCommitsAbovee/selected_commit_is_in_the_middle_of_fixups", "TestWrapViewLinesToWidth/Keep_blank_line_aat_end_if_editable", "TestGetEditTemplate/Overriding_a_preset_wwith_explicit_config_(edit_at_line)", "TestRebaseDiscardOldFileChhanges/returns_error_when_using_gpg", "TestSyncPush/Push_with_forrce_disabled,_setting_upstream", "TestNewOrigin/hunk_extendingg_beyond_both_bounds_of_scroll_window", "TestMoveElement/three_elements,_moving_seccond_to_first", "TestGetWorktrees/Single_woorktree_(main)", "TestFixupHelper_parseDiff", "TestFileGetStatusFiles/Rennamed_files", "TestRebaseRebaseBranch/unssuccessful_rebase", "TestObtainBranch/IsBehindAAndAhead", "TestFilterAction/filter_all_files", "TestCompress/big_example", "TestTransform/range_that_extends_bbeyond_diff_bounds", "TestGet/not_set", "TestFormatSecondsAgo/almost_a_week", "TestLineNumberOfLine", "TestUpdateYamlValue/not_aall_path_elements_are_dictionaries", "TTestDetectLanguage", "Test_countSquashableCommitsAbovee/base_commit_does_not_exist_at_all", "TestGetWorktrees/Single_worktree_(main))", "TestCommitResetToCommit", "TestSpplitNul", "TestTransform/adding_part_of_a_hunk", "TestGetReflogCommits", "TestUpdateYamlValue/doon't_rewrite_file_if_value_didn't_change", "TestGetWindowDimensions", "TestRenderCommitGraph", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_16", "Test_forEachLineInStream", "Test_forEachLineInStream/multiple_lines", "TestWorkingTreeCheckoutFille/returns_error_if_there_is_one", "TestRenderCommitGraph/with_a_new_commiit", "TestGetRepoPaths/git_rev-pparse_returns_an_error", "TestRenderrCommitGraph/with_a_path_that_has_room_to_move_to_the_left", "TestParseAndFormatPlain/addNewlineToEndOOfFile", "TestUpdateYamlValue/nested_update", "TestUpdateYamlValue/add_new_keyy_and_value_when_document_was_empty", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_gitlaab_with_specific_target_branch", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_21", "TestGetFile/not_found", "TestLimitStr", "TestLineNumberOfLine/twoHunksWithhMoreAdditionsThanRemovals", "Test_forEachLineInStream/multiplee_lines_including_empty_lines", "TestTransform/rremove_newline_from_end_of_file,_addition_only,_reversed", "TestGetRepoPaths/bare_repoo", "TestCommitCommitCmdObj/Commmit_with_multiline_message", "TestParseVersionNumber/12.34.56", "TestCommitShowCmdObj/Show__diff_with_custom_context_size", "TestGetEditTemplate/Overriding_a_preset_wwith_explicit_config_(edit_at_line_and_wait)", "TestGetCommitListDisplayStringss/showing_graph,_including_rebase_commits", "TestMerge/mix_color-16_(backgrounnd)_with_rgb_(foreground)", "TestCompress/leaf_node", "TestFindConflicts/empty", "TestFileIcons", "TestMenuGGenerator/Multiple_named_groups_with_empty_labelFormat", "TestCommitPrefixMigrations", "Test_calculateLinesToScrollUp/before_outside,_after_inside_scroll-off_marggin_-_scroll_by_1", "TestGetCommitListDisplayStrings/commmit_with_tags", "TestGetEditTemplate/Unknown_preset_name", "TestTransform/add_newline_to_end__of_file", "TestGetSuggestedRemote", "Test_calculateLinesToScrollUp", "TestGetCommitListDisplayStringss/don't_show_local_branch_head_for_head_commit_if_updateRefs_is_off", "TestCommitLoader_getConfliictedCommitImpl/'edit'_without_amend_file", "TestCommitCreateFixupCommit", "TestRebaseRebaseBranch/unsuccessful__rebase", "TestAuthorWithLength", "TestWorkingTreeDDiff/Show_diff_with_custom_similarity_threshold", "TestGetPullRequestURL/Opens_a_link_to_new_pulll_request_on_gitlab_with_specific_target_branch_in_nested_groups", "TestRenderCommitGraph/witth_a_path_that_has_room_to_move_to_the_left_and_continues#03", "TestTemplateFuncMapAddColors/normal_teemplate", "TestTransform/adding_a_new_file", "TestTransform/staging_part_of_botth_hunks", "TestNextIndex/no_elements", "TestNewOrigin/range_ending_bbelow_scroll_window_with_selection_at_beginning_of_range", "TestFormatSecondsAgo/one_minute_and_one_second", "TestWrapViewLinesToWidth/Wrap_on_space_2", "TestMoveElement/three_elements,_moving_seccond_to_third", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_3", "TestGitVersionIsAtLeast", "TestGetCommitListDisplayStringss/graph_in_divergence_view_-_not_all_remote_commits_visible", "TestGetCommitListDisplayStringss", "TestCommitShowCCmdObj/Show_diff_with_custom_similarity_threshold", "TestNextIndex/two_elements", "TestTransform/only_context_selectted", "TestUserConfigValidate_enums/Gui.StatusPaanelView", "TestRenderCommitGraph/witth_a_new_commit", "TestRebaseCommands_moveTodoDown/simple_casse_2_-_move_from_end", "TestCommitCreateFixupCommiit", "TestWorkingTreeDiff/Defaullt_case", "TestGetTags/should_return_tags_if_preesent", "TestListRenderer_renderLines/Whole_llist_with_section_headers", "TestGetCommitFilesFromFileenames/two_files", "TestTemplateFuncMapAddColors/string_wiith_color_and_decorator", "Test_calculateLinesToScrollUp/very_large_scroll-off_margin_-_keeep_view_centered_(odd_viewport_height)", "TestGetPullRequestURL/DDoes_not_log_error_when_config_service_domains_are_valid", "TestWalk_paths/nested", "TestFileGetStatusFiles/Sevveral_files_found", "TestBranchCheckout/Checkout", "TestSyncPush/Push_with_remmote_branch_but_no_origin", "TestRenameYamlKey/rename_key,_nnested", "TestGetCommitListDisplayStrings/some_coommits", "TestCoommitLoader_getConflictedCommitImpl/conflicting_'pick'_after_'exec'", "TestPeekkAt", "TestNewOrigin/selection_beloow_scroll_window,_not_enough_room_to_put_it_in_the_middle", "TestGetBindingSections/one_binding", "Test_calculateLinesToScrollUp/beefore_and_after_positions_are_outside_scroll-off_margin_-_don't_scroll", "TestUserConfigValidate_enums/Custom_commaand_sub_menu", "TestWalk_paths/nested_arrays", "TestWalk_inPlaceChanges/change_value", "TestRebaseCommands_moveTodoUp/tryinng_to_move_last_commit_up", "TestObtainBranch/TrimHeads", "Test_getBranchDisplayStrings//getBranchDisplayStrings_1", "TestRenderFileTree/nil_node", "TestParseAndFormatPlain/exampleHuunk", "TestRebaseCommands_moveTodoUp/trying_to_moove_last_commit_up", "TestListRenderer_renderLiness/Whole_list_with_section_headers", "TestBuildFlatTreeFromFiles/no_filess", "TestFormatSecondsAgo/six_months", "TestWrapViewLinesToWidth/Wrap_on_hyphen_4", "TestProcessOutput/username_prompt", "TestPPrevIndex", "TesttOnceWriter", "TestCaseInsensitiveContains", "TestWrapViewLinesToWidth/SSeveral_lines_using_all_the_available_width", "TestFindConflicts", "TestListRenderer_ModelIndexToViewIndex_and_baack", "TestGetCommitListDisplayStringss/showing_graph,_including_rebase_commits,_with_offset", "TestUserConfigValidate_enums/Gui.StatusPanelVView", "Test_equalHash/''_vs._'123'", "TestGetPullRequestURL/Oppens_a_link_to_new_pull_request_on_gitlab_with_https_remote_url_with_specific_tarrget_branch_in_nested_groups", "TestRenderPipeSet/single__cell", "TestFixupHelper_parseDifff/several_hunks_in_different_files", "TestFixupHelper_parseDifff", "TestGetCommitListDisplayStringss/no_commits", "TestSafeTruncate", "TestBranchMerge/merging_args", "TestBranchCheckout/Checkouut_forced", "TestBranchCheckout/Checkouut", "TestTransformNode/Successfully__Transforms_to_string", "TestRebaseCommands_moveTodoUp/move_across_eexec_todo", "TestEscapeSpecialChars/normal_string", "TestUserConfigValidate_enums/JumpToBlock__keybinding", "TestBuildTreeFromFiles/paths_that_can_bee_sorted", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_gitlab_in_nested_groups", "TestMerge/rgb_fg_color", "TestMerge/multiple_attributes_and_coloors", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_bittbucket_with_a_custom_SSH_username", "TestListRenderer_ModelIndexToViewInddex_and_back/no_headers_(no_getNonModelItems_provided)", "TestCommitPrefixMigrations/Single_CommittPrefix_Rename", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_gitlab", "TestObtainBranch/NoUpstream", "TestSyncPush/Push_with_forrce-with-lease_enabled", "TestRenderCommitGraph/witth_a_path_that_has_room_to_move_to_the_left_and_continues#04", "Test_countSquashabbleCommitsAbove/base_commit_is_below_rebase_start", "Test_counntSquashableCommitsAbove/selected_commit_is_in_the_middle_of_fixups", "TestBuildFlatTreeFromFiles/pathss_that_can_be_compressed", "TestWorkingTreeRemoveUntraackedFiles", "TestWorkingTreeDiscardAllFFileChanges/Reset_and_checkout_merge_conflicts", "TestBuildTreeFromCommitFiles", "TestGetReflogCommits/when_passing__filterPath", "TestWorkingTreeStageFile", "TestThreadSafeMap", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_0", "TestStashStore/Non-empty_message", "TestLimit", "TestWorkingTreeDiscardAllFileChanges", "TestRebaseDiscardOldFileChanges/returns_error_when_index_outside_of_range__of_commits", "TestSyncFetch/Fetch_in_forreground_(all=false)", "Test_equalHash/'123'_vs._'123'", "TestGetWorktrees/Worktree_missing_path", "TestAdjustLineNumber", "TestParseAndFormatPlain/addNewwlineToPreviouslyEmptyFile", ": TestGetCommitListDisplayStrings/graph_in_divergence_view_-_no_remote_commits_prresent", "TestAddCoAuthorToDescription", "TestFormatSecondsAgo/one_hour", "TestNewOrigin/huunk_extending_beyond_both_bounds_of_scroll_window", "TestSyncFetchBackground", "TestTransform/only_context_selected", "TestAddCoAuthorToMessage/Just__a_subject,_no_body", "Test_forEachLineInStream/empty_input", "TestParseVersionNumber/1.2.3", "TestCommitPrefixMigrations/Noo_changes_made_when_already_migrated", "TestMenuGenerator/NNo_named_groups", "TestGetRepoPaths/bare_repo", "TestRebaseCommands_moveTodoDown/move_acrosss_update-ref_todo_in_rebase", "Test_isFixupCommit/fixup!_fixup!_Bla", "TestMoveElement/three_elements,_moving_ffirst_to_second", "TestBranchDeleteBranch", "TestBuildTreeFromCommitFiles/no_files", "TestTemplateFuncMapAddCoolors/multiple_string_with_different_colors", "TestRebaseCommands_moveFixupCommitDown", "TestWrapViewLinesToWidth", ": Test_calculateLinesToScrollUp/before_inside_scroll-off_margin_-_scroll_by_more__than_1", "TestWrapViewLinesToWidth/Wrap_on_hyphen_3", "TestRebaseCommands_moveFixupCommitDown/No__fixup_hashes_found", "Test_getBranchDisplayStringss/getBranchDisplayStrings_16", "TestEditFilesCmd", "TestGetCommitListDispllayStrings/startIdx_is_past_TODO_commits", "TestObtainBranch/IsBehindAndAhead", "TestProcessOutput/2FA_token_prompt", "TestGetReflogCommits/when__command_returns_error", "TestRenderFileTree/numstat", "TestTransformNode/Path_not_present", "Test_calculateLinesToScrollDown//very_large_scroll-off_margin_-_keep_view_centered_(even_viewport_height)", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_5", "TestRebaseCommands_moveTodoDown/move_updatte-ref_todo", "Test_countSquashableCommitsAbovee/no_squashable_commits", "TestGetCommitFilesFromFilenames", "TestWorkingTreeDiff/plain", "TestUpdateYamlValue/preserve_inline_commment", "TestSyncPush", "TestTransformNode/Does_nothing__when_already_transformed", "TestWrapViewLinesToWidth/Space_in_last_collumn", "TestTransform/remove_newline_from_end_off_file", "TestBuildTreeFromFiles/paths_that_ccan_be_sorted", "TestCommitCommitEditorCmdOObj", "TestCommitLoader_setCommittMergedStatuses/basic", "Test_equalHash/'123abc'_vs._'123'", "TestGetRepoPaths/git_rev-parse__returns_an_error", "TestWorkingTreeCheckooutFile/returns_error_if_there_is_one", "TestGetCommitListDisplayStringss/some_commits", "TestCommitCommitCmdObj", "Test_getBranchDisplayStrings//getBranchDisplayStrings_5", "TestParseAndFormatPlain/addNewlinneToEndOfFile", "TestTemplateFuncMapAddColors/colored_sstring", "TestCommitPrefixMigrations/Empty_String", "TestGetBool", "TestRebaseCommands_moveTodoUp", "TestReebaseCommands_moveFixupCommitDown/fixup_commit_is_the_last_commit_(change_to_fixuup)", "TestSnake", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_15", "TestGetBool/Option_commit.gppgsign_is_1", "Test_countSquashableCommitsAbovee/some_squashable_commits,_including_for_the_selected_commit", "TestRebaseDiscardOldFileChhanges/checks_out_file_if_it_already_existed", "TestParseVersionNumber/1.2.3_junk_after", "TestCommitCreateAmendCommiit", "TestCommitLoader_getConfflictedCommitImpl/no_done_todos", "TestRebaseCommands_moveTodoUp/move_update-reef_todo", "TestWrapViewLinesToWidth/Tabs,_width_4", "TestCommitCreateFixupCommiit/valid_case", "TestRebaseCommands_moveTodoUp/simple_case__2_-_move_from_beginning", "TestParseAndFormatPlain/simpleDifff", "TestListRendeerer_ModelIndexToViewIndex_and_back/consecutive_section_headers", "TestAddCoAuthorToMessage/BBody_already_ending_with_a_Co-authored-by_line", "TestFileGetStatusFiles/Fille_with_arrow_in_name", "TestBuildFlatTreeFromFiles/paths_thhat_can_be_compressed", "TestSyncFetch", "Test_getBranchDisplayStrings//getBranchDisplayStrings_2", "TestWrapViewLinesToWidth/Avvoid_blank_line_at_end_if_not_editable#01", "TestRenderCommitGraph/witth_some_merges", "Test_getBranchDisplayStrings", "TestGetCommiitListDisplayStrings/showing_graph,_including_rebase_commits", "TestCommitCommitCmdObj/Commmit_with_signoff", "TestGetNextStageableLineIndex", "TestTransformNode/Path_not_pressent", "TestCommitShowCmdObj/Show__diff_with_external_diff_command", "TestCommitLoadeer_getConflictedCommitImpl/'pick'_was_rescheduled", "TestWorkingTreeCheckoutFile", "TestMoveElement", "TestWalk_inPlaceChanges/change__value", "TestProcessOutput/pin_prompt", "TestCommitLoader_setCommitMergeddStatuses/basic", "TestGetNextPipes", "TestGetReflogCommits/when_passinng_filterAuthor", "TestRenderPipeSet/commit_whose_previous_commiit_is_selected_and_is_a_merge_commit,_with_continuing_pipe_inbetween", "Test_getBranchDisplayStringss/getBranchDisplayStrings_10", "TestCommitCreateFixupCommit/valid_case", "TestUserConfigValidate_enums/Custom_commmand_keybinding", "TestParseVersionNumber/invalid", "Test_forEachLineInStream/single_line", "TestGetReflogCommits/some__reflog_entries", "TestAddCoAuthorToMessage", "TestGetBool//Option_global_and_local_config_commit.gpgsign_is_not_set", ": TestListRenderer_ModelIndexToViewIndex_and_back/no_headers_(no_getNonModelItemss_provided)", "TestRebaseCommands_moveFixupCommittDown/No_fixup_hashes_found", "TestWorkingTreeDiscardAllFileCChanges/Remove_only", "TestUpdateYamlValue", "TesttDecolorise", "TestStashStore/Non-empty_mmessage", "TestManualFailure", "TestMoveElement/from_out_of_bounds", "TestGetEditTemplate/Guessing_a_preset_froom_guessed_editor", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_Azure_DevOps_(HTTP)_with_specific_target", "TestRenderCommitGraph/witth_a_path_that_has_room_to_move_to_the_left", "TestGetCommitFilesFromFilenames/two_ffiles", "TestUpdateYamlValue/add_new_key_and_value", "TestBranchGetCommiitDifferences/Can't_retrieve_pullable_count", "TestTransform/adding_a_new_line_tto_a_previously_empty_file", "TestListRenderer_renderLines/Partiall_list_with_headers,_end_(beyond_end_index)", "TestParseVersionNumber/1.2.3_junk_afteer", "TestRebaseCommands_moveTodoDown/skip_an__invisible_todo", "TestDetermineLineType", "Test_forEachLineInStreaam/multiple_lines_without_linefeed_at_end_of_file", "TestNextIndex/three_elements,_giving_seconnd_one", "TestWalk_inPlaceChanges/no_channge", "TestOSCommandRun", "TestFilterAction/filter_files_that__are_tracked", "TestGetCommitListDisplayStringss/show_local_branch_head,_except_the_current_branch,_main_branches,_or_merged_braanches", "TestGetBool/Option_commit.gpgsign_is_trrue", "TestCommitPrefixMigrations/Incomplete_Conffiguration", "TestRebaseCommands_moveFixupCommitDown/No__original_hashes_found", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_11", "TestGetCommitListDisplayStringss/startIdx_is_past_TODO_commits", "TestFinishCmdObj/feature_bbranch_with_config", "TestGetTags/should_return__no_tags_if_there_are_none", "TestProcessOutput/2FA_token__prompt", "TestCommitPrefixMigrations/Complicated_CoommitPrefixes_Rename", "TestGetCommitListDisplayStringss/graph_in_divergence_view_-_not_all_local_commits", "TestCommitPrefixMigrations/Single_CommitPPrefix_Rename", "TestGetPullRequestURL/Does_not_log_error_when_config_service_webDomai", "TestTransform/whole_range_selected", "TestListRenderer_renderLines/Muultiple_consecutive_headers", "TestGetCommitListDissplayStrings/no_TODO_commits,_towards_bottom", "TestTransform/nothing_selected", "TestPeekAtEmptyBuffer", "TestCommitCommitCmdObj/Commmit_with_--no-verify_flag_\\u003c_skip_flag_and_prefix", "TestRebaseRebaseBranchh/successful_rebase_(\\u003c_2.26.0)", "TestListRenderer_ModelIndexToViewInddex_and_back", "TestGettCommitListDisplayStrings/show_local_branch_head_and_tag_if_both_exist", "TestMenuGenerator/MMultiple_named_groups_with_empty_labelFormat", "TestOSCommandQuoteSingleQuote", "TestBranchGetCommitDiffereences/Can't_retrieve_pushable_count", "TestGetCommitFilesFromFileenames/three_files", "TestAddCoAuthorToMessage/JJust_a_subject,_no_body", "TestWorkingTreeDiscardAllFFileChanges/An_error_occurred_when_removing_file", "TestNormalizeLinefeeds", "TestMoveElement/three_elements,_moving_firrst_to_second", "TestStashStore/Empty_messaage", "TestCmdObjToString", "TestOSCommandOpenFileWindows", "TestRebaseCommands_moveTodoDown/commit_nott_found", "Test_calculateLinesToScrollDown//very_large_scroll-off_margin_-_keep_view_centered_(odd_viewport_height)", "TestParseAndFormatPlain/removeNewliinefromEndOfFile", "TestRebaseCommands_moveTodoUp/skip_an_inviisible_todo", "TestGetReflogCommits/some_reflog_entriies", "TestOSCommandQuoteDoubleQuote", "TestMerge/only_bg_color", "TestRebaseCommands_moveTodoUp/move_across__update-ref_todo_outside_of_rebase", "TestTransform/adding_a_new_line_tto_a_previously_empty_file,_reversed", "TestGetNextStageableLineIndex/twooHunks", "TestTemplateFuncMapAddColors", "TestBranchGetCommitDiffereences/Can't_retrieve_pullable_count", "TestGetBool/Some_other_randoom_key_is_set", "TestSplitNul", "TestFinishCmdObj/not_a_git_flow_branch", "Test_getBranchDisplayStrings//getBranchDisplayStrings_3", "TestOSCommandQuote", "TestTryRemoveHardLineBreakss/some_can_be_unwrapped", "TestCommitLoader_getConfliictedCommitImpl/'pick'_was_rescheduled", "TestFilterAction/filter_files_with__unstaged_changes", "TestGetBool/Option_commit.gppgsign_is_on", "TestParseAndFormatPlain", "TestWrapViewLinesToWidth/Avoid_blank_line__at_end_if_not_editable", "TestGitCommandBuilder", "TestOSCommandAppendLineToFille", "TestWorkingTreeStageFiles", "TestGetCommitListDisplayStringss/only_TODO_commits_except_last", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_20", "TestClone", "Test_isFixupCommit/amend!_squashh!_Bla", "TestRenameYamlKey/rename_key,_nested", "TestCommitLoader_getConfliictedCommitImpl/last_command_was_'reword'", "TestWorkingTreeDiff/Showw_diff_with_custom_context_size", "TestCommitShowCmdObj/Defaault_case_without_filter_path", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_bitbucket_with_a_custom_SSH_username", "TestGetWindowDimensions/default", "TestAdddCoAuthorToMessage/Body_already_ending_with_a_Co-authored-by_line", "TestUpdateYamlValue/nested_wherre_parents_doesn't_exist_yet", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_bitbucket", "TestBuildFlatTreeFromFiles/tracked,,_untracked,_and_conflicted_files", "TestRenderCommitFileTree", "TestNewOrigin", "TesstMoveElement", "TestTransform", "Test_getBranchDisplayStrings//getBranchDisplayStrings_4", "TestCommitCreateAmendCommit/wiithout_file_changes", "TestBranchGetCommitDifferences", "TestGetReflogCommits/no_reflog_entries", "TestSyncPush/Push_with_forrce_disabled,_upstream_supplied", "TestRebaseRebaseBranchh/successful_rebase_(\\u003c_2.22.0)", "TestGetReflogCommits/when__passing_filterAuthor", "TestNewOrigin/selection_within_scrolll_window", "TestFinishCmdObj/feature_branch__without_config", "TestWrapViewLinesToWidth/Several_lines_usiing_all_the_available_width", "TestTryRemoveHardLineBreeaks/all_line_breaks_are_needed", "Test_getBranchDisplayStrings//getBranchDisplayStrings_7", "TestStashStore/Space_message", "Test_equalHash/'123'_vs._'a'", "TestRenameYamlKey/existing_ddocument_is_not_a_dictionary", "TestListRenderer_renderLines/Partiall_list,_beginning", "TestParseAndFormatPlain/exampleHunk", "TestCommitPrefixMigrations/No_changes_madde_when_already_migrated", "Test_getBranchDisplayStringss/getBranchDisplayStrings_17", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_13", "TestWorkingTreeDiscardAllFFileChanges", "TestRebaseCommands_moveTodoDown/ssimple_case_2_-_move_from_end", "TestWorkinggTreeDiff/File_not_tracked_and_file_has_no_staged_changes", "TestGetEditTemplate/Overriding_a_preset_wwith_explicit_config_(edit)", "Test_calculateLinesToScrollDown/very_large_scroll-off_marginn_-_keep_view_centered_(even_viewport_height)", "TestMMerge", "Test_calculateLinesToScrollDown/very_large_scroll-off_margin__-_keep_view_centered_(odd_viewport_height)", "TestWrapViewLinesToWidth/Avoidd_blank_line_at_end_if_not_editable", "TestGetCommitListDisplayStrings/graph_in_divergence_view_-_no_local_commits_pressent", "TestScanLinesAndTruncateWhenLongerThanBufffer", "TestRenameYamlKey/new_key_exists", "TestCommitRewordCommit/Sinngle_line_reword", "TestEditFileAtLineCmd", "TestGetCommitListDisplayStrings/don't_show_local_branch_head_for_hhead_commit_if_updateRefs_is_off", "TestRenameYamlKey/existing_docuument_is_not_a_dictionary", "TestCommitLoaader_getConflictedCommitImpl/last_command_was_'break'", "TestRenderCommitFileTree/big_exxample", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_14", "TestGetEditTemplate/Setting_a_preset", "TestGetCommitListDisplayStringss/no_TODO_commits,_towards_bottom", "TestGetBool/Option_commit.gpgsign_is_yess", "TestRebaseCommands_moveTodoUp/simple_case__1_-_move_to_end", "TestGetCommitMessageFromHistory", "TestUpdateYamlValuee/trying_to_update_a_note_that_is_not_a_scalar", "TestEditFileAtLineAndWaitCCmd", "TestBuildFlatTreeFromFiles/files_inn_same_directory", "TestGetBool/Option_global_annd_local_config_commit.gpgsign_is_not_set", "TestWorkingTreeUnstageFile", "TestRenderCommitFileTree/nil_node", "TestMerge/multiple_attributes_and_colors", "TestParseVersionNumber/v1.2.3", "TestWorkingTreeShowFileDifff/Default_case", "TestSyncFetch/Fetch_in_foregroundd_(all=false)", "TestGetUniqueNamesFromPaths", "TestListRenderer_ModelIndexToViewInddex_and_back/basic", "TestCommitPrefixMigrations/Incomplete_Connfiguration", "TestCommitLoadeer_getConflictedCommitImpl/'edit'_with_amend_file", "TestBranchGetBranchGraph", "Test_countSquashableCommitsAbovee/base_commit_is_below_rebase_start", "TestUpdateYamlValue/not_all_patth_elements_are_dictionaries", "TestWorkingTreeShowFileDifff/Show_diff_with_custom_context_size", "TestGetTextStyle", "TestRebaseCommands_deleteTodos/failure", "Test_getBranchDisplayStringss/getBranchDisplayStrings_15", "TestWorkingTreeDiscardAllFilleChanges/Checkout_only", "TestRenderPipeSet/single_cell", "TestOSCommandOpenFileWindowss", "TestBuildTreeFromFiles", "TestMerge/rgb_fg_and_bg_color_with_optts", "TestFormatSecondsAgo", "TestParseVersionNumber/junk_before_1.2.3", "TestRebaseCommands_moveTodoUp/move_across__update-ref_todo_in_rebase", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_4", "TestMenuGenerator", "TestGetPullRequestURL/DDoes_not_log_error_when_config_service_webDomain_contains_a_port", "TestRenameYamlKey", "TestRebaseCommands_moveFixupCommitDown/Morre_fixup_hashes_than_expected", "TestStashPop", "TestTransformNode/Does_nothiing_when_already_transformed", "TestNewOrigin/range_ending_bbelow_scroll_window_with_selection_at_end_of_range", "TestWalk_inPlaceChanges/change__array_value", "TestCommitLoadeer_getConflictedCommitImpl/common_case_(conflict)", "TestCommitLoader_getConfliictedCommitImpl", "TestGetBool/Option_commit.gpgsign_is_on", "TestMoveElement/three_elements,_moving_tthird_to_second", "TestFilterAction", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_19", "TestMerge/mix_color-16_(background)_wiith_rgb_(foreground)", "TestCommitShowCmdObj//Show_diff_with_external_diff_command", "TestBranchDeleteBranch/Forrce_delete_multiple_branches", "TestCommitLooader_getConflictedCommitImpl/last_command_was_'reword'", "TestMoveElement/three_elements,_moving_thiird_to_second", "TestGetFile/valid_case", "TestTransform/remove_newline_ffrom_end_of_file,_reversed", "Test_equalHash/'123'_vs._''", "TestParseAndFormatPlain/twoChangeesInOneHunk", "TestGetPullRequestURL/Opens_a_link_to_new_pull_requestt_on_Bitbucket_Server_(SSH)_with_specific_target", "TestFilterAction/filter_files_that_are_trracked", "TestStashStore/Space_messaage", "TestGetCommitFilesFromFilenames/thrree_files", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_Azure_DevOps_Server_(HTTP)", "TestCommitShowCmdObj", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_Azure_DevOps__Server_(HTTP)", "TestWrapViewLinesToWidth/Split_word_that'ss_too_long_over_multiple_lines", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_gitlab_in_nestedd_groups", "TestUserConfigValidate_enums", "TestNewOrigin/range_startingg_above_scroll_window_with_selection_at_beginning_of_range", "TestRenderCommitGraph/witth_a_path_that_has_room_to_move_to_the_left_and_continues", "TestGetCommitListDisplayStrings/don't_show_YOU_ARE_HERE_laabel_when_not_asked_for_(e.g._in_branches_panel)", "TestGetCommitMsg/with_line_breaks", "TestSuccess", "Test_getBranchDisplayStrings//getBranchDisplayStrings_6", "TestRenderFileTree/leaf_node", "TestWorkingTreeDiff/Defaullt_case_(ignore_whitespace)", "TestRebaseCommands_moveFixupCommitDown/fixxup_commit_is_separated_from_original_merge_commit", "TestRenderCommitFileTree/leaf_nnode", "TestCommitCommitEditorCmdObjj/Commit_with_--signoff", "TestWalk_inPlaceChanges/change_array_valuue", "TestOSCommandQuoteWindows", "TestTransform/adding_part_of_a_huunk", "TestProcessOutput/username_and_passsword_prompt", "TestRebaseCommands_moveTodoDown/skip_an_innvisible_todo", "TestGetCommitListDisplayStrings", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_Bitbucket_Server_(SSH)", "TestBranchGetAllBranchGrapph", "TestCommitCommitCmdObj/Commit", "TestProcessOutput/password_prompt_3", "TestCommitLoader_getConfliictedCommitImpl/'edit'_with_amend_file", "TestWorkingTreeDiscardAAnyUnstagedFileChanges/valid_case", "TestGetTextStyle/empty", "TestMoveElement/three_elements,_moving_ssecond_to_first", "TestNewCmdTask", "TestRenderFileTree/big_example", "TestParseAndFormatPlain/addNewlinneToPreviouslyEmptyFile", "TestRebaseCommands_moveTodoDowwn/trying_to_move_first_commit_down", "TestObtainBranch/RemoteBraanchIsGone", "TestAdjustLineNumber/TestAdjustLiineNumber", "TestTransform/only_addition_selected", "TestRebaseCommands_deleteTodos", "TestRebaseDiscardOOldFileChanges/returns_error_when_using_gpg", "TestGetCommitListDisplayStringss/graph_in_divergence_view_-_no_remote_commits_visible", "TestFixupHelper_parseDDiff/hunk_with_only_deleted_lines", "TestRenderCommitGraph/with_some_merges", "TestRenameYamlKey/rename_non-sccalar_key", "TestCommitRewordCommit/Single_line_reeword", "TestGetPullRequestURL", "TestProcessOutput/password_pprompt", "TestBrannchCurrentBranchInfo/says_we_are_on_the_master_branch_if_we_are", "TestGetTextStyle/hex_color,_fg", "TeestGetTextStyle", "TestFormatSecondsAgo/zero", "TestCommitPrefixMigrations/Compliicated_CommitPrefixes_Rename", "TestGetEditTemplate", "TestUpdateYamlValue/existing_doocument_is_not_a_dictionary", "TestEscapeSpecialChars", "TTestFilterStrings", "TestFinishCmdObj/not_a_gitt_flow_branch", "TestWorkingTreeDiff/Show_ddiff_with_custom_similarity_threshold", "TestCommitCreateAmendCommitt/subject_and_description", "TestRebaseCommands_moveTodoDown/move_acrosss_exec_todo", "TestSyncPush/Push_with_forrce_enabled", "TestFileIcons/TestFileIcons", "TestObtainBranch/NoUpstreaam", "Test_calculateLinesToScrollDown", "TestBranchNewBranch", "TestRebaseCommands_moveFixupCommitDown/fixup_commit_is_the_last_commit_(don't_chhange_to_fixup)", "TestGetPullRequestURL/Opens_a_link_to_new_pull_requeest_on_gitlab_with_https_remote_url_in_nested_groups", "TestWorkingTreeDiff/File_nnot_tracked_and_file_has_no_staged_changes", "TestListRenderer_renderLines", "TestBuildTreeFromFiles/files_in_samme_directory", "TestBuildFlatTreeFroomFiles/tracked,_untracked,_and_conflicted_files", "TestWorkkingTreeDiscardAllFileChanges/Reset_and_checkout_staged_changes", "TestGetPadWidths", "TestWorkingTreeDiff/cached", "TestFixupHelper_parseDiff/no_diff", "Testt_equalHash", "TestWorkingTreeShowFileDifff/Default_case_(ignore_whitespace)", "TestStartCmdObj", "TestWrapViewLinesToWidth/English_text", "TestCommitLoader_getConfliictedCommitImpl/common_case_(conflict)", "TestFilterStrings", "TestUpdateYamlValue/update_value", "TestRebaseCommands_moveFFixupCommitDown/More_fixup_hashes_than_expected", "TestMoveElement/no_elements", "TestTransform/remove_newline_fromm_end_of_file,_reversed", "TestCommitCreateAmendCommit", "TestStashStashEntryCmdObj", "TestWorkingTreeRemoveUntrackedFiiles/valid_case", "Test_isFixupCommit/fixup!", "TestFormatSecondsAgo/one_minute", "TestBuildFlatTreeFromFiles", "Test_getBranchDisplayStringss/getBranchDisplayStrings_11", "TestWorkingTreeDiscardAllFFileChanges/An_error_occurred_when_resetting", "TestTransformNode", "Test_isFixupCommit", "TestGetNextStageableLineIndex/twoHunks", "TestCommitLoader_setCoommitMergedStatuses/with_update-ref", "TestWorkingTreeDiscardAllFFileChanges/Reset_and_checkout_staged_changes", "TestFormatSecondsAgo/one_second", "TestCommitLoader_getConfliictedCommitImpl/conflicting_'pick'_after_'exec'", "TestGetBindingSections", "TestDecolorise", "TestWorkingTreeDiscardAllFFileChanges/An_error_occurred_with_checkout", "Test_countSquashableCommitsAbove", "TestUpdateYamlValue/trying_to_uupdate_a_note_that_is_not_a_scalar", "TestFindNamedMatches", "TestFileGetStatusFiles/Fille_with_new_line_char", "TestBuildTreeFromFiles/files_in_same_direectory", "TestFormatSecondsAgo/almost_one_hour", "TestEditFileCmdStrLegacy", "TestGetWorktrees/Worktree__missing_path", "TestCommitLoader_getConfliictedCommitImpl/last_command_was_'exec'", "TestTransform/add_newline_to_end__of_file,_reversed", "TestRenderPipeSet/when_prrevious_commit_is_selected,_not_a_merge_commit,_and_spawns_a_continuing_pipe", "TestCommitRewordCommit/Multi_line_rewoord", "TestScanLinesAndTruncateWhenLongerThanBuffer", "TestBuilldTreeFromFiles/paths_that_can_be_sorted_including_a_merge_conflict_file", "TestFilterAction/filter_files_with_staaged_changes", "TestBranchCurrentBranchInfo", "TestTransform/staging_two_whole_hhunks", "TestStashSave", "TestCommitLoader_setCommittMergedStatuses", "TestOSCommandAppendLineToFile", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_12", "TestGetCommitListDisplayStrings/ccustom_time_format", "TestWrapViewLinesToWidth/Wrap_off", "TestEditFileAtLineAndWaitCmd", "TestUserConfigValidate_enums/Keybindings", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_1", "TestGet", "TestTransform/remove_newline_fromm_end_of_file", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_Bitbucket_Serverr_(HTTP)", "TestFinishCmdObj/feature_bbranch_without_config", "TestParseAndFormatPlain/newFile", "TestGetInitials", "TestWorkiingTreeDiscardAllFileChanges/An_error_occurred_when_resetting", "TestWorkingTreeDiscardAnyUnstagedFileCChanges", "TestGetCommitFilesFromFileenames/one_file", "TestOnceWriter", "TestFileGetStatusFiles/File_withh_new_line_char", "TestFindConflictsAux", "TestParseAndFormatPlain/twoChangesInOneHunnk", "TestSyncPush/Push_with__force_disabled,_setting_upstream", "TestRebaseRebaseBranch/succcessful_rebase_(\\u003c_2.22.0)", "TestAddCoAuthorToMessage/Empty_message", "TestGetRepoPaths/typical_case", "Test_getBranchDisplayStringss/getBranchDisplayStrings_21", "TestRebaseCommands_moveTodoUp/move_update--ref_todo", "TestParseAndFormatPlain/removeNewwlinefromEndOfFile", "TestWorkingTreeShowFileDiff", "TestAsyncHandler", "TestWrapViewLinesToWidth/Several_lines_usiing_all_the_available_width,_with_multi-cell_runes", "TestStashDrop", "TestCommitCreateAmendCommit/subject_onnly", "TestGetCommitListDisplayStrings/no_committs", "TestParseVersionNumber/junk_before_1.22.3", "TestRebaseCommands_deleteTodos/success", "TestTransform/remove_newlline_from_end_of_file,_addition_only", "TestMenuGenerator/EExtract_remote_branch_name", "TestUserConfigValidate_enums/Custom_coommand_sub_menu#01", "TestObtainBranch/WithCommitDateAsRecenncy", "TestMerge/fg_and_bg_color", "TestTransform/adding_part_of_a_huunk,_reverse", "TestFindConflicts/various_conflicts", "Test_getBranchDisplayStringss/getBranchDisplayStrings_18", "TestGetWorktrees/Multiple_wworktrees_(main_+_linked)", "TestTransform/range_that_extends__beyond_diff_bounds", "TestCommitCommitEditorCmdOObj/Commit_using_editor", "Test_isFixupCommit/fixup!_fixup!!_Bla", "TestCommitCreateAmendCommiit/subject_only", "TestStashStore", "TestMerge/mix_color-16_(foregrounnd)_with_rgb_(background)", "TestWalk_inPlaceChanges", "TestGetTags", "TestFileGetStatusFiles/No__files_found", "TestFileIcons/TestFileIcoons", "TestGetRepoPaths", "TestRebaseCommands_moveTodoUp/commit_not_ffound", "TestNextIndex", "TestRebaseCommands_moveTodoUp/commit_not_found", "TestRenderFileTree", "TestPrevIndex", "Test_equalHash/'1'_vs._'abc'", "TestCommitCommitCmdObj/Commmit_with_signoff_and_no-verify", "TestPrevIndex/one_element", "TestGetReflogCommits/some__reflog_entries_where_last_commit_is_given", "TestAsJson", "TestUpdateYamlValue/preserve_innline_comment", "Test_equalHash/''_vs._''", "TestRebaseRebaseBranch", "TestUpdateYamlValue/existiing_document_is_not_a_dictionary", "TestGetCommitListDisplayStringss/graph_in_divergence_view_-_no_local_commits_visible", "TestTemplateFuncMapAddColors/normal_template", "TestListRenderer_renderLines/Partiall_list,_end", "TestGetBindingSections/grouped_bindings", "TestWrapViewLinesToWidth/Keep_blankk_line_at_end_if_editable", "TestTemplateFuncMapAddColors/string_wiith_decorator", "TestCommitCreateAmendCommiit/subject_and_description", "TestCommitCommitEditorCmdOObj/Commit_with_--signoff", "TestMerge/only_fg_color", "TestProcessOutput/password_prompt", "TestWalk_inPlaceChanges/change_nested_vaalue", "TestRenderDisplayStrings", "TestWorkingTreeDiscardAlllFileChanges/Reset_and_remove", "TestParseVersionNumber/1.2", "TestCommitLoader_getConfliictedCommitImpl/'pick'_was_rescheduled,_buggy_git_version", "TestWorkingTreeeUnstageFile/Remove_an_untracked_file_from_staging", "TestRebaseCommands_moveTodoUp/trying_to_moove_commit_up_when_all_commits_after_it_are_invisible", "TestGetPPullRequestURL/Opens_a_link_to_new_pull_request_on_bitbucket", "TestWorkingTreeCheckoutFille/typical_case", "TestSnakee", "Test_equalHash", "TestGetRepoPaths/submodulee", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_10", "TestGetFile", "TestEscapeSpecialChars/multiple_special_chhars", "TestParseGitVersion", "TestSyncPush/Push_with_remotte_branch_but_no_origin", "TesttSplitLines", "Test_calculateLinesToScrollUp/sccroll-off_margin_is_zero_-_scroll_by_1_at_end_of_view", "TestUserConfigValidate_enums/JumpToBlock_kkeybinding", "TestFormatSecondsAgo/almost_a_minute", "TestGetCommitListDisplayStringss/graph_in_divergence_view_-_no_local_commits_present", "TestListReenderer_renderLines/Partial_list_with_headers,_end_(beyond_end_index)", "TestWorkingTreeDiff", "TestFormatSecondsAgo/almost_one_year", "TestUpdateYamlValue/nesteed_where_parents_doesn't_exist_yet", "TestRebaseCommands_moveTodoUpp/simple_case_2_-_move_from_beginning", "TestMoveElement/two_elements,_moving_seconnd_to_first", "TestStashRename", "TestCommitShowCmdObj/Defauult_case_without_filter_path", "TestBuildFlatTreeFromFiles/paths_thaat_can_be_sorted", "TestBranchCurrentBranchInfo/falls_back_to_git_`git_branch_--ppoints-at=HEAD`_if_symbolic-ref_fails", "Test_getBranchDisplayStringss/getBranchDisplayStrings_14", "TestRebaseCommandds_moveTodoDown/move_across_update-ref_todo_outside_of_rebase", "TestRenderPipeSet", "TestGetCommitListDisplayStrings/show_local_brannch_head,_except_the_current_branch,_main_branches,_or_merged_branches", "Test_forEachLineInStream/multiple_lines_inncluding_empty_lines", "TestParseAndFormatPlain/simpleDiff", "TestLineNumberOfLine/twoHunks", "TestGetCommitListDisplayStringss/custom_time_format", "TestWrapViewLinesToWidth/Wrap_on_hyphen", "TestGetReflogCommits/no_reeflog_entries", "TestGetCommitMsg/empty", "TestWorkingTreeRemoveUntrackedFiles", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_gitlab_with_specific_target_branch", ": TestRenderCommitGraph/new_merge_path_fills_gap_before_continuing_path_on_right", "TestCommitLoader_setCommittMergedStatuses/with_update-ref", "TestGitVersionRestriction//AtLeast,_current_is_older", "TestGetEditTemplate/Guessing_a_preseet_from_guessed_editor", "TestWorkingTreeDiff/cachedd", "TestRenderPipeSet/commit__whose_previous_commit_is_selected_and_is_a_merge_commit", "Test_forEachLineInStream/multiple_lines_wiithout_linefeed_at_end_of_file", "TestCommitShowCmdObj/Shhow_diff_with_custom_context_size", "TestWWorkingTreeDiscardAllFileChanges/An_error_occurred_when_removing_file", "TestGetCommitListDisplayStringss/only_showing_TODO_commits", "TestTransform/adding_part_of_a_neew_file", "TestProcessOutput", "TestGetStashEntries", "TestParseAndFormatPlain/twoHunks", "TeestGetPadWidths", "TestWorrkingTreeDiscardAllFileChanges/Reset_and_checkout_merge_conflicts", "TesstWithPadding", "TestMerge/multiple_attributes", "TestWorkingTreeRemoveUntraackedFiles/valid_case", "TestStashRename/Default_case", "Test_getBranchDisplayStrings//getBranchDisplayStrings_0", "TestRebaseCommands_mooveFixupCommitDown/More_original_hashes_than_expected", "TestMenuGenerator/MMultiple_named_groups_with_group_ids", "TestAddCoAuthorToMessage/SSubject_and_body", "TestTryRemoveHardLineBreeaks/some_can_be_unwrapped", ": TestGetCommitListDisplayStrings/showing_graph,_including_rebase_commits,_with_ooffset", "TestGetReflogCommits/when__passing_filterPath", "TestWorkinngTreeDiscardAllFileChanges/An_error_occurred_with_checkout", "TestMoveElement/one_element", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_2", "TestRebaseCommands_moveTodoUp/move_across__exec_todo", "TestWrapViewLinesToWidth/Tabs,_width_8", "TestNewHistoryBuffer", "TestListRenderer_ModelIndexToViewInddex_and_back/no_headers_(getNonModelItems_returns_zero_items)", "TestCommitLoader_setCommitMergedStatuses", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_gitlab_with_https_remote_url_with_specific_taarget_branch_in_nested_groups", "TestMerge/no_color", "TestProcessOutput/password_pprompt_3", "TestWalk_inPlaceChanges/no_change", "TestCommitCommitEditorCmdObj", "TestMerge", "TestObtainBranch/TrimHeadss", "TestNewCmdTaskRefresh", "TestBuildTreeFromFiles/paths_that_ccan_be_compressed", "TestDetectLanguage", "TestGitVersionIsOlderThan", "TestWalk_paths/scalar", "TestRebaseSkipEditorCommannd", "TestCommitLoadder_getConflictedCommitImpl/last_command_was_'exec'", "TestSyncPush//Push_with_force-with-lease_enabled,_setting_upstream", "TestGuessDefaultEditor", "TestFixupHelper_pparseDiff/hunk_with_deleted_and_added_lines", "TestTransformNode/Part_of_path__present", "TestGetCommitListDisplayStringss/graph_in_divergence_view_-_no_remote_commits_present", "TestPush", "TestRebaseCommands_moveTodoDown/trying_to__move_commit_down_when_all_commits_before_are_invisible", "TestUpdateYamlValue/nested_updaate", "TestGetRepoPaths/typical_ccase", "TestRebaseDiscardOldFileChhanges/returns_error_when_index_outside_of_range_of_commits", "TestCommitShowCmdObj/Defauult_case_with_filter_path", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_Azure_DevOps_(HTTP)", "TestBuildFlatTreeFromFiles/files_in_ssame_directory", "TestStashStore/Empty_message", "TestGetRepoPaths/submodule", "TestRebaseCommands_moveTodoDoown/simple_case_1_-_move_to_beginning", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_18", "TestWorkingTreeDiscardAnyUUnstagedFileChanges", "TestRebaseRebaseBranch/succcessful_rebase_(\\u003c_2.26.0)", "TestParseVersionNumber/1", "TestCommitCommitCmdObj/Commmit_with_--no-verify_flag_\\u003c_skip_flag_no_prefix", "TestGetCommitListDisplayStrings/graph_in_divergence_view_-_no_local_commits_visiible", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_Bitbucket_Server_(SSH)_with_specific_target", "TestRebaseCommands_moveTodooUp/move_across_update-ref_todo_in_rebase", "Test_forEachLineInStream/single_line_witthout_line_feed", "TestCommitLooader_getConflictedCommitImpl/'edit'_without_amend_file", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_Azure_DevOps_", "Test_ccalculateLinesToScrollUp/before_position_is_above_viewport_-_don't_scroll", "TestRebaseCommands_moveFixupCommitDown/Morre_original_hashes_than_expected", "TestCommitCreateAmendCommiit/without_file_changes", "TestNextIndex/one_element", "TestWorkingTreeResetHard", "TestFilterAction/filter_files_with_uunstaged_changes", "TestWithPadding", "TestWorkingTreeCheckoutFile/typical_caase", "TestWalk_paths/array", "TestTransform/only_removal_selectted", "TestGetCommits", "TestGetBindingSections/global_binding", "Test_calculateLinesToScrollUp/before_and_after_positions_are_ouutside_scroll-off_margin_-_don't_scroll", "TestRebaseRebaseBranch/succcessful_rebase", "TestPeekAt", "TestGetRefllogCommits/some_reflog_entries_where_last_commit_is_given", "TestGetBindingSections/no_bindings", "TestWrapViewLinesToWidth/Lots_of_hyphens", "TestRenderPipeSet/commit__whose_previous_commit_is_selected_and_is_a_merge_commit,_with_continuing_pipe_innbetween", "TestMerge/mix_color-16_(foreground)_wiith_rgb_(background)", "TestGet/is_set", "TestOSCommandFileType", "TestTransform/adding_part_of_a_hunk,_reveerse", "TestFixupHelper_parseDifff/hunk_with_only_deleted_lines", "TestFormatSecondsAgo/one_minute_and_one_seecond", "TestObtainBranch", "TestGetCommitListDisplaySttrings/only_showing_TODO_commits", "TestCommitRewordCommit/Mullti_line_reword", "TestTransform/remove_newliine_from_end_of_file,_removal_only", "TestFinishCmdObj", "TestCommitShowCmdObj/Defaultt_case_with_filter_path", "TestRebaseCommands_moveFixupCommmitDown/No_original_hashes_found", "Test_equalHash/'123'_vs._'123abc'", "TestBranchGetCommiitDifferences/Can't_retrieve_pushable_count", "TestWorkingTreeDiscardAllFFileChanges/Reset_and_remove", "TestCommitShowCmdObj/Show__diff,_ignoring_whitespace", "TestProcessOutput/username_pprompt", "TestGetTextStyle/named_color,_fg", "TestWrapViewLinesToWidth/Multiple_lines", "TeestAsyncHandler", "TestGetTextStyle/named_color,_bg", "TestBranchGetAllBranchGraph", "TestTruncateWithEllipsis", "TestWalk_paths/deeply_nested", "TestGetPullRequestURL/Does_not_log_error_when_config_service_webDomaiin_contains_a_port", "TestRenderCommitFileTree/big_example", "TestModuloWithWrap", "TestWalk_paths/empty_document", "TestWorkingTreeDiff/Default_case", "TestListRenderer_renderrLines/Partial_list_with_headers,_beginning", "TesttNewCmdTask", "TestGetCommitListDispllayStrings/only_TODO_commits_except_last", "TestGetCommitListDisplayStringss/show_local_branch_head_for_head_commit_if_updateRefs_is_on", "Test_calculateLinesToScrollUp/beefore_outside,_after_inside_scroll-off_margin_-_scroll_by_1", "TestCommitShowCmdObj/Show__diff_with_custom_similarity_threshold", "TestRebaseCommands_moveFixupCommitDown/fixxup_commit_is_the_last_commit_(don't_change_to_fixup)", "TestListRenderer_renderLines/Partial_list,,_end", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_7", "Test_ccalculateLinesToScrollUp/before_position_is_below_viewport_-_don't_scroll", "Test_getBranchDisplayStringss/getBranchDisplayStrings_12", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_9", "TestResolvePlaceholderString", "TestProcessOutput/no_output", "TestStartCmdObj/basic", "TestBranchCheckout/Checkout_forced", "TestTransform/staging_two_whole_hunks", "TestGetWorktrees", "TestRebaseCommands_moveTodoUp/trying_to_move_commit_up_when_all_commits_after_itt_are_invisible", "TestListRenderer_renderLines/Pass_ann_endIdx_greater_than_the_model_length", "TestNextIndex/two_elements,_giving_second__one", "TestRebaseCommands__moveTodoUp/move_across_update-ref_todo_outside_of_rebase", "Test_isFixupCommit/amend!_squash!_Bla", "TestWrapViewLinesToWidth/Wrap_on_hyphen_2", "TTestThreadSafeMap", "TestGetTags/should_return_nno_tags_if_there_are_none", "TestFinishCmdObj/feature_branch_witth_config", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_bitbucket", "TestWorkingTreeDiscardAnyUUnstagedFileChanges/valid_case", "TestCompress/nil_node", "TestLiimitStr", "TestRebaseCommands_moveTodoDown/move_acrooss_exec_todo", "TestTransform/remove_newline_fromm_end_of_file,_addition_only", "TestObtainBranch/IsHead", "TestProcessOutput/passphrasee_prompt", "TestTransform/remove_newline_fromm_end_of_file,_removal_only,_reversed", "Test_isFixupCommit/fixup_Bla", "TestRebaseCommands_moveTodoDown/trying_to__move_first_commit_down", "Test_getBranchDisplayStrings//getBranchDisplayStrings_9", "TestTransform/only_addition_seleccted", "TestFixupHelper_parseDifff/hunk_with_only_added_lines", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_Azure_DevOps_(SSH)_with_specific_target", "TestBuildTreeFromCommitFiles/paths__that_can_be_sorted", "TestFilterAction/filter_conflicted__files", "TestUpdateYamlValuue/add_new_key_and_value_when_document_was_empty", "TestUpdateYamlValue/update_valuue", "TestFormatSecondsAgo/one_week", "TestWalk_paths", "TestBranchCheckout", "TestRebasseDiscardOldFileChanges/checks_out_file_if_it_already_existed", "TestBuildFlatTreeFromFiles/no_files", "TestSyncPush/Push_with_forrce_disabled", "TestRenameYamlKey/not_all_ppath_elements_are_dictionaries", "TestFormatSecondsAgo/almost_one_day", "TestGetCommitMsg", "Test_calculateLinesToScrollUp/beefore_position_is_below_viewport_-_don't_scroll", "TestBuildTreeFromFiles/paths_that_ccan_be_sorted_including_a_merge_conflict_file", "TestSyncFetch/Fetch_in_foreground__(all=true)", "TestTransform/remove_newline_fromm_end_of_file,_removal_only", "TestGetCommitListDisplayStringss/don't_show_YOU_ARE_HERE_label_when_not_asked_for_(e.g._in_branches_panel)", "TestRenderPipeSet/when_previous_commit_is_selected,_not_aa_merge_commit,_and_spawns_a_continuing_pipe", "Test_calculateLinesToScrollDown//before_inside_scroll-off_margin_-_scroll_by_more_than_1", "TestBranchMerge", "TestObtainBranch/WithCommiitDateAsRecency", "TesstWrapViewLinesToWidth/Several_lines_using_all_the_available_width,_with_multi-ceell_runes", "TestTryRemoveHardLineBreeaks", "TestWorkingTreeResetHard/vvalid_case", "TestCommitRewordCommit", "TestTryRemoveHardLineBreaks/empty", "TestRebaseCommands_moveTodoDown", "TestRebaseCommands_moveTodoUp/simple__case_1_-_move_to_end", "Test_getBranchDisplayStringss/getBranchDisplayStrings_13", "TestBranchMerge/basic", "TestCommitLoader_getConfliictedCommitImpl/last_command_was_'break'", "TestGetWorktrees/In_linked_worktree", "TestBranchCurrentBranchInffo/says_we_are_on_the_master_branch_if_we_are", "TestListRenderer_renderLines/Partiall_list_with_headers,_beginning", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_6", "TestProcessOutput/username_aand_password_prompt", "TestMerge/single_attribute", "TestBuildFlatTreeFromFiles/paths_thhat_can_be_sorted", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_gitlab_with_specific_target_branch_in_nested__groups", "Test_forEachLineInStream/single_line_withoout_line_feed", "TestGetCommitListDisplayStrings/showinng_graph", "TestGetCommitFilesFromFileenames", "TestUpdateYamlValue/add_new_keyy_and_value", "TestFormatSecondsAgo/one_year", "TestGetCommitListDisplayStringss/showing_graph", "Test_getBranchDisplayStringss/getBranchDisplayStrings_20", "TestWorkingTreeCheckoutFille", "TestBuildTreeFromFiles/no_files", "TestWrapViewLinesToWidth/Split_word_that's__too_long", "TestTransform/addding_a_new_line_to_a_previously_empty_file,_reversed", "TestWrapViewLinesToWidth/Wrap_on_space", "TestTransform/remove_newline_fromm_end_of_file,_addition_only,_reversed", "TestTransform/whole_range_selecteed", "TestStashApply", "TestAddCoAuthorToMessage/Subject_and__body", "TestGetCommits/should_not__specify_order_if_`log.order`_is_`default`", "TestFormatSecondsAgo/50_years", "TestFixupHelper_parseDifff/no_diff", "TestListRenderer_renderLines/Multiplle_consecutive_headers", "TestPrevIndex/two_elements", "TestGetTextStyle/hex_color,_bg", "TestBranchGGetCommitDifferences/Retrieve_pullable_and_pushable_count", "TestListRenderer_ModelIndexToViewInndex_and_back/basic", "TestFormatSecondsAgo/one_day", "TestUserConfigValidate_enums/Custom_commaand_keybinding", "TestRebaseSkipEditorCommand", "TestGetPullRequestURL/OOpens_a_link_to_new_pull_request_on_bitbucket_with_http_remote_url", "TestMoveElement/three_elements,_moving_ssecond_to_third", "TestTransform/reemove_newline_from_end_of_file,_removal_only,_reversed", "TestCommitCommitEditorCmdObj/CCommit_using_editor", "TestRenderCommitGraph/witth_a_path_that_has_room_to_move_to_the_left_and_continues#02", "TestSplitLines", "TestParseVersionNumber", "TestGetCommitListDisplayStringss/show_local_branch_head_and_tag_if_both_exist", "TestRenameYamlKey/not_all_path__elements_are_dictionaries", "TestGetWorktrees/Multiple__worktrees_(main_+_linked)", "TestRenderCommitGraph/witth_a_path_that_has_room_to_move_to_the_left_and_continues#01", "TestWalk_inPlaceChanges/change__nested_value", "TestWorkingTreeResetHard/valid_case", "TestAddCoAuthorToMessage/EEmpty_message", "TestStashHash", "TestGitVersionRestriction//AtLeast,_current_is_newer", "TestWrapViewLinesToWidth/Hyphen_in_last_coolumn", "TestRenderCommitFileTree/leaf_node", "TestProcessOutput/password_prompt_2", "TestListRendereer_renderLines/Pass_an_endIdx_greater_than_the_model_length", "TestNewOrigin/selection_withhin_scroll_window", "TestGetPullRequestURL/Opens_a_link_to_new_pull_request_on_bitbuckett_with_http_remote_url", "TestMoveElement/two_elements,_moving_firstt_to_second", "Test_getBranchDisplayStrings/geetBranchDisplayStrings_8", "TestWorkingTreeShowFileDifff", "TestRenameYamlKey/new_key_existts", "TestMenuGeneratorr/Multiple_named_groups_with_group_ids" ]
starryzhang/sweb.eval.win.jesseduffield_1776_lazygit-4394
lima-vm/lima
3300
lima-vm__lima-3300
Go
[ "3164", "3167", "3215" ]
bfac818e090fd18b69a9c47036bb4f6e4855f694
diff --git a/cmd/limactl/copy.go b/cmd/limactl/copy.go index d6333399a22..44263e20838 100644 --- a/cmd/limactl/copy.go +++ b/cmd/limactl/copy.go @@ -8,9 +8,12 @@ import ( "fmt" "os" "os/exec" + "path/filepath" + "runtime" "strings" "github.com/coreos/go-semver/semver" + "github.com/lima-vm/lima/pkg/ioutilx" "github.com/lima-vm/lima/pkg/sshutil" "github.com/lima-vm/lima/pkg/store" "github.com/sirupsen/logrus" @@ -80,6 +83,16 @@ func copyAction(cmd *cobra.Command, args []string) error { // this assumes that ssh and scp come from the same place, but scp has no -V legacySSH := sshutil.DetectOpenSSHVersion("ssh").LessThan(*semver.New("8.0.0")) for _, arg := range args { + if runtime.GOOS == "windows" { + if filepath.IsAbs(arg) { + arg, err = ioutilx.WindowsSubsystemPath(arg) + if err != nil { + return err + } + } else { + arg = filepath.ToSlash(arg) + } + } path := strings.Split(arg, ":") switch len(path) { case 1: diff --git a/cmd/limactl/shell.go b/cmd/limactl/shell.go index 3dee0bac7c2..ff771248e2b 100644 --- a/cmd/limactl/shell.go +++ b/cmd/limactl/shell.go @@ -8,11 +8,14 @@ import ( "fmt" "os" "os/exec" + "path" + "runtime" "strconv" "strings" "al.essio.dev/pkg/shellescape" "github.com/coreos/go-semver/semver" + "github.com/lima-vm/lima/pkg/ioutilx" "github.com/lima-vm/lima/pkg/sshutil" "github.com/lima-vm/lima/pkg/store" "github.com/mattn/go-isatty" @@ -92,6 +95,9 @@ func shellAction(cmd *cobra.Command, args []string) error { // FIXME: check whether y.Mounts contains the home, not just len > 0 } else if len(inst.Config.Mounts) > 0 { hostCurrentDir, err := os.Getwd() + if err == nil && runtime.GOOS == "windows" { + hostCurrentDir, err = mountDirFromWindowsDir(hostCurrentDir) + } if err == nil { changeDirCmd = fmt.Sprintf("cd %s", shellescape.Quote(hostCurrentDir)) } else { @@ -99,6 +105,9 @@ func shellAction(cmd *cobra.Command, args []string) error { logrus.WithError(err).Warn("failed to get the current directory") } hostHomeDir, err := os.UserHomeDir() + if err == nil && runtime.GOOS == "windows" { + hostHomeDir, err = mountDirFromWindowsDir(hostHomeDir) + } if err == nil { changeDirCmd = fmt.Sprintf("%s || cd %s", changeDirCmd, shellescape.Quote(hostHomeDir)) } else { @@ -189,6 +198,14 @@ func shellAction(cmd *cobra.Command, args []string) error { return sshCmd.Run() } +func mountDirFromWindowsDir(dir string) (string, error) { + dir, err := ioutilx.WindowsSubsystemPath(dir) + if err == nil && !strings.HasPrefix(dir, "/mnt/") { + dir = path.Join("/mnt", dir) + } + return dir, err +} + func shellBashComplete(cmd *cobra.Command, _ []string, _ string) ([]string, cobra.ShellCompDirective) { return bashCompleteInstanceNames(cmd) } diff --git a/pkg/ioutilx/ioutilx.go b/pkg/ioutilx/ioutilx.go index ea1fcf1e08b..cd91e40c77f 100644 --- a/pkg/ioutilx/ioutilx.go +++ b/pkg/ioutilx/ioutilx.go @@ -8,6 +8,7 @@ import ( "fmt" "io" "os/exec" + "path/filepath" "strings" "github.com/sirupsen/logrus" @@ -48,13 +49,11 @@ func FromUTF16leToString(r io.Reader) (string, error) { return string(out), nil } -func CanonicalWindowsPath(orig string) string { - newPath := orig - out, err := exec.Command("cygpath", "-m", orig).CombinedOutput() +func WindowsSubsystemPath(orig string) (string, error) { + out, err := exec.Command("cygpath", filepath.ToSlash(orig)).CombinedOutput() if err != nil { logrus.WithError(err).Errorf("failed to convert path to mingw, maybe not using Git ssh?") - } else { - newPath = strings.TrimSpace(string(out)) + return orig, err } - return newPath + return strings.TrimSpace(string(out)), nil } diff --git a/pkg/osutil/user.go b/pkg/osutil/user.go index ce72c98c844..b34f5c3d59f 100644 --- a/pkg/osutil/user.go +++ b/pkg/osutil/user.go @@ -14,6 +14,7 @@ import ( "strings" "sync" + "github.com/lima-vm/lima/pkg/ioutilx" . "github.com/lima-vm/lima/pkg/must" "github.com/lima-vm/lima/pkg/version/versionutil" "github.com/sirupsen/logrus" @@ -144,7 +145,7 @@ func LimaUser(limaVersion string, warn bool) *user.User { warnings = append(warnings, warning) limaUser.Gid = formatUidGid(gid) } - home, err := call([]string{"cygpath", limaUser.HomeDir}) + home, err := ioutilx.WindowsSubsystemPath(limaUser.HomeDir) if err != nil { logrus.Debug(err) } else { @@ -159,6 +160,10 @@ func LimaUser(limaVersion string, warn bool) *user.User { home += ".linux" } if !regexPath.MatchString(limaUser.HomeDir) { + // Trim prefix of well known default mounts + if strings.HasPrefix(home, "/mnt/") { + home = strings.TrimPrefix(home, "/mnt") + } warning := fmt.Sprintf("local home %q is not a valid Linux path (must match %q); using %q home instead", limaUser.HomeDir, regexPath.String(), home) warnings = append(warnings, warning) diff --git a/pkg/sshutil/sshutil.go b/pkg/sshutil/sshutil.go index 891279d2c07..1d8a5f15ce6 100644 --- a/pkg/sshutil/sshutil.go +++ b/pkg/sshutil/sshutil.go @@ -98,8 +98,15 @@ func DefaultPubKeys(loadDotSSH bool) ([]PubKey, error) { } if err := lockutil.WithDirLock(configDir, func() error { // no passphrase, no user@host comment + privPath := filepath.Join(configDir, filenames.UserPrivateKey) + if runtime.GOOS == "windows" { + privPath, err = ioutilx.WindowsSubsystemPath(privPath) + if err != nil { + return err + } + } keygenCmd := exec.Command("ssh-keygen", "-t", "ed25519", "-q", "-N", "", - "-C", "lima", "-f", filepath.Join(configDir, filenames.UserPrivateKey)) + "-C", "lima", "-f", privPath) logrus.Debugf("executing %v", keygenCmd.Args) if out, err := keygenCmd.CombinedOutput(); err != nil { return fmt.Errorf("failed to run %v: %q: %w", keygenCmd.Args, string(out), err) @@ -171,12 +178,11 @@ func CommonOpts(sshPath string, useDotSSH bool) ([]string, error) { return nil, err } var opts []string - if runtime.GOOS == "windows" { - privateKeyPath = ioutilx.CanonicalWindowsPath(privateKeyPath) - opts = []string{fmt.Sprintf(`IdentityFile='%s'`, privateKeyPath)} - } else { - opts = []string{fmt.Sprintf(`IdentityFile="%s"`, privateKeyPath)} + idf, err := identityFileEntry(privateKeyPath) + if err != nil { + return nil, err } + opts = []string{idf} // Append all private keys corresponding to ~/.ssh/*.pub to keep old instances working // that had been created before lima started using an internal identity. @@ -207,11 +213,11 @@ func CommonOpts(sshPath string, useDotSSH bool) ([]string, error) { // Fail on permission-related and other path errors return nil, err } - if runtime.GOOS == "windows" { - opts = append(opts, fmt.Sprintf(`IdentityFile='%s'`, privateKeyPath)) - } else { - opts = append(opts, fmt.Sprintf(`IdentityFile="%s"`, privateKeyPath)) + idf, err = identityFileEntry(privateKeyPath) + if err != nil { + return nil, err } + opts = append(opts, idf) } } @@ -256,6 +262,17 @@ func CommonOpts(sshPath string, useDotSSH bool) ([]string, error) { return opts, nil } +func identityFileEntry(privateKeyPath string) (string, error) { + if runtime.GOOS == "windows" { + privateKeyPath, err := ioutilx.WindowsSubsystemPath(privateKeyPath) + if err != nil { + return "", err + } + return fmt.Sprintf(`IdentityFile='%s'`, privateKeyPath), nil + } + return fmt.Sprintf(`IdentityFile="%s"`, privateKeyPath), nil +} + // SSHOpts adds the following options to CommonOptions: User, ControlMaster, ControlPath, ControlPersist. func SSHOpts(sshPath, instDir, username string, useDotSSH, forwardAgent, forwardX11, forwardX11Trusted bool) ([]string, error) { controlSock := filepath.Join(instDir, filenames.SSHSock) @@ -268,7 +285,10 @@ func SSHOpts(sshPath, instDir, username string, useDotSSH, forwardAgent, forward } controlPath := fmt.Sprintf(`ControlPath="%s"`, controlSock) if runtime.GOOS == "windows" { - controlSock = ioutilx.CanonicalWindowsPath(controlSock) + controlSock, err = ioutilx.WindowsSubsystemPath(controlSock) + if err != nil { + return nil, err + } controlPath = fmt.Sprintf(`ControlPath='%s'`, controlSock) } opts = append(opts,
diff --git a/hack/test-templates.sh b/hack/test-templates.sh index f0ec7263ae9..ead67b70401 100755 --- a/hack/test-templates.sh +++ b/hack/test-templates.sh @@ -229,8 +229,11 @@ tmpdir="$(mktemp -d "${TMPDIR:-/tmp}"/lima-test-templates.XXXXXX)" defer "rm -rf \"$tmpdir\"" tmpfile="$tmpdir/lima-hostname" rm -f "$tmpfile" -# TODO support Windows path https://github.com/lima-vm/lima/issues/3215 -limactl cp "$NAME":/etc/hostname "$tmpfile" +tmpfile_host=$tmpfile +if [ "${OS_HOST}" = "Msys" ]; then + tmpfile_host="$(cygpath -w "$tmpfile")" +fi +limactl cp "$NAME":/etc/hostname "$tmpfile_host" expected="$(limactl shell "$NAME" cat /etc/hostname)" got="$(cat "$tmpfile")" INFO "/etc/hostname: expected=${expected}, got=${got}"
`limactl shell` working directory switching is not Windows host aware ### Description There is no path conversion for default `cd` chain https://github.com/lima-vm/lima/blob/ccd3c0cb9fdbef18ee82263a712ac8924a0deca8/cmd/limactl/shell.go#L91 when `limactl shell` is invoked. The code will do nothing useful, but would print useless errors every time starting shell. It is not fatal, but definitely can be improved. I don't have specific expectation right now - posting it to have a discussion what could be improved or if the path should just be disabled for this specific platform. `sshutil.go` handles key paths inconsistently on Windows platform ### Description Code in `sshutil.go` is different for path handling in different commands - `ssh` vs `ssh-keygen`: It uses filepath for `ssh-keygen` https://github.com/lima-vm/lima/blob/e911564e4a5f3151a3beef5ec2446914e016c745/pkg/sshutil/sshutil.go#L99 but has path translation for `ssh` https://github.com/lima-vm/lima/blob/e911564e4a5f3151a3beef5ec2446914e016c745/pkg/sshutil/sshutil.go#L172 It doesn't look right to mix and match ssh tools from Windows installation and msys2/cygwin counterparts, so, they both should work identically (cygwin/msys2 does support implicit conversion, but if one uses wsl based tooling it will not). The idea is to make this behavior more strict - identify which tooling version is used as Windows adds market to the version output. Alternatively it could be a setting inside VM template as of which kind of tooling is expected - this will reduce overhead of calling `ssh -V` additionally every time. I plan to work on a PR addressing this. `limactl cp` doesn't support Windows absolute paths ### Description There is currently no handling of Windows paths in `limactl cp`. Input is simply split at ":" https://github.com/lima-vm/lima/blob/fbd1f45107b7d388dca52d2266ce3d8ee79742b3/cmd/limactl/copy.go#L80 So, this will try to use drive letter as VM name. I have tentative plans to tackle it as I progress with my Lima on Windows experiment, but technically writing argument parser and unit tests for it should not be blocked by work in progress state of complete Windows host support.
I'm open to work on a PR, when the acceptable solution is outlined. Docker handles this by looking for a local file with an absolute path, before looking for a hostname. `filepath.IsAbs`
I'm open to work on a PR, when the acceptable solution is outlined. Docker handles this by looking for a local file with an absolute path, before looking for a hostname. `filepath.IsAbs`
[ "https://github.com/lima-vm/lima/commit/9f52194a3f13055eca8db297240126a0b91a8b51" ]
2025-03-03T16:44:26Z
https://github.com/lima-vm/lima/tree/bfac818e090fd18b69a9c47036bb4f6e4855f694
[ "go mod download ; go build ./..." ]
[ "go test -json ./... > reports\\go-test-results.json" ]
[ "cat reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} # Severity precedence: fail > skip > pass precedence = {"fail": 3, "skip": 2, "pass": 1} def set_status(name: str, status: str): if not name: return status = status.lower() if status not in precedence: return prev = results.get(name) if prev is None or precedence[status] > precedence[prev]: results[name] = status # Clean test name: remove control whitespace and trim def clean_name(s: str) -> str: s = re.sub(r'[\r\n\t]+', '', s) s = s.strip() s = s.lstrip(': ').rstrip() return s # 1) Extract JSON-like objects by brace depth (robust to wrapping/newlines) objs = [] s = log n = len(s) i = 0 in_string = False escape = False depth = 0 start = -1 while i < n: ch = s[i] if in_string: if escape: escape = False elif ch == '\\': escape = True elif ch == '"': in_string = False else: if ch == '"': in_string = True elif ch == '{': if depth == 0: start = i depth += 1 elif ch == '}': if depth > 0: depth -= 1 if depth == 0 and start != -1: objs.append(s[start:i+1]) start = -1 i += 1 # Regex to extract fields from an object; DOTALL to span wraps re_action_any = re.compile(r'"Action"\s*:\s*"(pass|fail|skip|run)"', re.IGNORECASE | re.DOTALL) re_action_status = re.compile(r'"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE | re.DOTALL) re_test = re.compile(r'"Test"\s*:\s*"([^"]+)"', re.IGNORECASE | re.DOTALL) # Track all tests seen in JSON (from any action), so textual parsing can be restricted to known tests json_seen: set[str] = set() for obj in objs: mt = re_test.search(obj) if not mt: continue test_name = clean_name(mt.group(1)) if not test_name: continue json_seen.add(test_name) ma_status = re_action_status.search(obj) if ma_status: action = ma_status.group(1).lower() set_status(test_name, action) # 2) Scan textual output for '--- PASS/FAIL/SKIP: TestName (...)' # Only apply to names already seen in JSON to avoid spurious entries from wrapped output text text_status_re = re.compile(r'---\s+(PASS|FAIL|SKIP):\s+(.+?)\s*\(', re.IGNORECASE | re.DOTALL) for m in text_status_re.finditer(log): status = m.group(1).lower() name = clean_name(m.group(2)) if not name: continue if name in json_seen: set_status(name, status) return results
[ "TestLimaUserUid", "TestLimaUserAdminOld", "TestLimaUserGid", "TestLimaUserInvalid" ]
[ "TestSearchDomain/search_domain", "TestSetupEnv/127.0.0.1:8080", "TestMarshalEmpty", "TestSetupEnv/127.0.0.1:8080#01", "TestContainerdDefault", "TestPropagateJSON/timestamp", "TestSetupEnv/127.0.0.1:8080#03", "TestParseInfo/vmdk/twoGbMaxExtentSparse", "TestPrintInstanceTable80DiffArch", "TestSetupEnv/localhost:8080#02", "TestSetupEnv/localhost:8080", "TestSetupEnv/localhost:8080#01", "Test_hostsMapIP/4", "TestSetupEnv/127.0.0.1", "TestValidateAdditionalDisks", "TestLimaUserAdminNew", "TestParseAddress", "Test_zoneHost/1", "TestLoadDiskStruct", "TestParseOpenSSHVersion", "TestSetupEnv/127.0.0.1:8080#05", "TestLoadError", "TestCompleteCPUs", "TestSetupEnv/docker.for.mac.localhost:8080##02", "TestSearchDomain", "TestValidateParamName", "TestOf", "TestRedownloadRemote/has-digest", "TestValidateParamIsUsed", "TestLogFile", "TestSetupEnv/docker.for.mac.localhost:8080##01", "TestParseInfo/qcow2", "TestUsernetConfig/verify_gateway_ipp", "TestFillDefaultWithV2AndGateway", "TestDefaultPubKeys", "TestRedownloadRemote/digest-less", "TestPrintInstanceTable60", "TestSetupEnv/docker.for.mac.localhost:8080", "TestPrintInstanceTable80SameArch", "TestPrintInstanceTableHome", "TestLoadDiskString", "TestSetupEnv/docker.for.mac.localhost:8080#01", "TestPropagateJSON", "TestParseInfo/qcow2/diff", "TestUsernetConfig/verify_subnet_viaa_config_ip", "TestCheck", "TestEmptyYAML", "TestFillDefault", "FuzzSetupEnv", "Test_zoneHost/5", "TestParseAddress/0100007F", "TestMarshalTilde", "FuzzConvertToRaw", "TestConfigCACerts", "TestPropagateJSON/error_level", "TestUsernetConfig", "TestPropagateJSON/panic_level", "TestConfig", "TestLoadEmpty", "TestValidateParamValue", "Test_hostsMapIP/1", "Test_hostsMapIP/0", "TestPrintInstanceTable", "TestPrintInstanceTableEmu", "TestSetupInvalidEnv", "Test_hostsMapIP", "TestSetupEnv/127.0.0.1:8080#04", "TestPropagateJSON/debug_level", "TestValidateEmpty", "Test_hostsMapIP/3", "Test_detectValidPublicKey", "Test_zoneHost/3", "TestTemplate9p", "TestValidateProbes", "TestCompleteMemoryGiB", "TestSetupEnv/127.0.0.1:8080#02", "TestPropagateJSON/parse_level_failed", "TestPropagateJSON/fatal_level", "TestSearchDomain/empty_search_domaiin", "Test_hostsMapIP/5", "Test_hostsMapIP/2" ]
starryzhang/sweb.eval.win.lima-vm_1776_lima-3300
lima-vm/lima
3351
lima-vm__lima-3351
Go
[ "3267" ]
c5eb9acfc22ccb495a3f1016e868a64e280101db
diff --git a/templates/experimental/wsl2.yaml b/templates/experimental/wsl2.yaml index b95e3d8cf5e..ae67e332ed8 100644 --- a/templates/experimental/wsl2.yaml +++ b/templates/experimental/wsl2.yaml @@ -4,9 +4,9 @@ vmType: wsl2 images: # Source: https://github.com/runfinch/finch-core/blob/main/Dockerfile -- location: "https://deps.runfinch.com/common/x86-64/finch-rootfs-production-amd64-1738856482.tar.gz" +- location: "https://deps.runfinch.com/common/x86-64/finch-rootfs-production-amd64-1741837119.tar.gz" arch: "x86_64" - digest: "sha256:efbe5fc2b2ec94bbf9e4a6c184bf2b36040faf939c15a016f8d7931de9a481c3" + digest: "sha256:1ebee4c785fc4d31fd514365694a7d4d50a95093526c051f76dc63d8ba9fafe6" mountType: wsl2
diff --git a/hack/test-templates.sh b/hack/test-templates.sh index cf9d7f9f530..4b38ac0f183 100755 --- a/hack/test-templates.sh +++ b/hack/test-templates.sh @@ -91,8 +91,6 @@ case "$NAME" in CONTAINER_ENGINE="docker" ;; "wsl2") - # TODO https://github.com/lima-vm/lima/issues/3267 - CHECKS["systemd"]= # TODO https://github.com/lima-vm/lima/issues/3268 CHECKS["proxy-settings"]= CHECKS["port-forwards"]=
[WSL2] experimental/wsl2 template has systemd misconfigured and integration test is fainling ### Description For out of the box configured machine systemd has startup issues. This results in failing integration test. With WSL2 with NAT networking mode list of failed units: ``` [systemd] Failed Units: 2 audit-rules.service auditd.service ``` With WSL2 with mirrored networking mode list of failed units: ``` [systemd] Failed Units: 3 audit-rules.service auditd.service NetworkManager-wait-online.service ``` Example output from shell: ```bat limactl shell wsl2 systemctl is-system-running --wait time="2025-02-22T16:35:59+02:00" level=warning msg="treating lima version \"4e0539cb.m\" from \"C:\\\\Users\\\\Arthu\\\\.lima\\\\wsl2\\\\lima-version\" as very latest release" degraded echo %ERRORLEVEL% -1 ``` Potentially this is an issue for the upstream provider of the base system, but it is unclear if there is a more suitable place to report this. Failing integration test still has place.
There sources stating that WSL2 kernel doesn't include auditing support in their default build https://randombytes.substack.com/p/problematic-systemd-units-under-wsl So, auditd services have to be either disabled or uninstalled in the upstream root fs. There is also occasional failure of getty-console, but this is attributed to some bug in systemd https://github.com/util-linux/util-linux/issues/2896#issuecomment-2036765992 Current WSL2 template is Fedora 40 image, Fedora 41 or soon to be released Fedora 42 might resolve this entirely.
There sources stating that WSL2 kernel doesn't include auditing support in their default build https://randombytes.substack.com/p/problematic-systemd-units-under-wsl So, auditd services have to be either disabled or uninstalled in the upstream root fs. There is also occasional failure of getty-console, but this is attributed to some bug in systemd https://github.com/util-linux/util-linux/issues/2896#issuecomment-2036765992 Current WSL2 template is Fedora 40 image, Fedora 41 or soon to be released Fedora 42 might resolve this entirely.
[ "https://github.com/lima-vm/lima/commit/73753678d7380f15d4f15e9c1a819e7f61764a54" ]
2025-03-13T19:03:20Z
https://github.com/lima-vm/lima/tree/c5eb9acfc22ccb495a3f1016e868a64e280101db
[ "go mod download ; go build ./..." ]
[ "go test -json ./... > reports/go-test-results.json" ]
[ "Get-Content -Raw reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re text = log def norm_status(s: str) -> str: s = s.lower() if s in ("pass", "passed", "ok", "success"): return "pass" if s in ("skip", "skipped", "ignored"): return "skip" return "fail" def clean_name(n: str) -> str: # Normalize JSON escape artifacts n = n.replace("\\/", "/").replace("\\t", " ").replace("\\r", " ").replace("\\n", " ") # Remove everything from first '(' (timing) n = re.sub(r"\s*\(.*$", "", n) # Trim quotes/braces and trailing artifacts n = n.strip().strip('"').strip("'").strip() n = re.sub(r'["\\}\],]+$', "", n) # Remove all whitespace inside names (handles wrap inserts) n = re.sub(r"\s+", "", n) # Final trailing artifact cleanup n = re.sub(r'["\\}\],]+$', "", n) return n def accept_name(n: str) -> bool: return bool(n) and (n.startswith("Test") or n.startswith("Fuzz")) and len(n) >= 5 results: dict[str, str] = {} # 1) Authoritative parse from "--- PASS|FAIL|SKIP: <name>" # Use scanning to tolerate line wraps and inserted whitespace. status_pat = re.compile(r"---\s+(PASS|FAIL|SKIP)\s*:\s*", re.IGNORECASE) allowed = set("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789_./:#-'`") for m in status_pat.finditer(text): status_raw = m.group(1) status = norm_status(status_raw) i = m.end() name_chars = [] # Scan forward, tolerating whitespace and newlines by skipping them, stopping at timing or invalid sequences. while i < len(text): ch = text[i] # Stop when we hit the start of timing or closing quote of JSON value if ch == "(": break if ch in ('"', "}"): # likely end of JSON Output value break if ch in allowed: name_chars.append(ch) elif ch.isspace(): # skip whitespace inside names due to wrap pass else: # unexpected char; break to avoid over-capturing break i += 1 name = "".join(name_chars) name = clean_name(name) if accept_name(name): results[name] = status # 2) Fallback: pair "Action":"pass|fail|skip" with "Test":"Name" within nearby context max_gap = 1000 pat_test_then_action = re.compile( r'"Test"\s*:\s*"([^"]+)"[^{}]{0,' + str(max_gap) + r'}"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE | re.DOTALL ) pat_action_then_test = re.compile( r'"Action"\s*:\s*"(pass|fail|skip)"[^{}]{0,' + str(max_gap) + r'}"Test"\s*:\s*"([^"]+)"', re.IGNORECASE | re.DOTALL ) for m in pat_test_then_action.finditer(text): name_raw, status_raw = m.group(1), m.group(2) status = norm_status(status_raw) name = clean_name(name_raw) if not accept_name(name): continue if name not in results: results[name] = status for m in pat_action_then_test.finditer(text): status_raw, name_raw = m.group(1), m.group(2) status = norm_status(status_raw) name = clean_name(name_raw) if not accept_name(name): continue if name not in results: results[name] = status return results
[ "TestDownloadRemote/caching-only_mode/paraallel", "FuzzDDownload", "TestDownloadRemote/caching-only_mode/seriial" ]
[ "TestLimaUserAdminNew", "TestDefaultPubKeys", "TestValidateParamName", "TestParseAddress/0100007F:0050:00", "TestUsernetConfig/verify_gateway_ipp", "TestUseAbsLocators/Template_without_base_orr_script_file", "TestUseAbsLocators/Template_without_base_or__script_file", "TestBassePath", "TestTrimString", "TesttFillDefault", "TestParseAddress/invalid:addreess", "TestEmbed/probes_and_provision_scripts_are__prepended_instead_of_appended", "TestDownloadRemote/with_cache", "TestGetPorts/clusterIP_service", "TestPropagateJSON/trace_level", "TestEmbed/probes_and_provission_scripts_are_prepended_instead_of_appended", "TestAbsPath/Can't_have_relative_path_whhen_reading_from_STDIN", "TestLiimaUserGid", "TestValidateEmpty", "TestIndentString", "TestBasePath", "TestPropagateJSON/parse_level_failed", "TestConfig", "TestEmbed/vmOpts.qmu.minimumVersion_is_updaated_when_the_base_version_is_higher", "TestPrintInstanceTable80DiffArch", "TestSearchDomain/empty_search_domain", "TestGetPorts/loadBalancer_service", "FuzzParse", "TestParseOpenSSHVersion", "TestAbsPath/Relative_paths_must_be_undernneath_the_basePath", "TestLoadEmpty", "TestEmbed/Comments_are_copied_over_as_well", "TestAbsPath/#04", "TestUseAbsLocators", "TestDownloadRemote", "TestDownloadRemote/caching-only_mode", "FuzzIsISO9660", "TestParseUDP", "TestValidateContent", "TestEmmptyYAML", "FuzzLoadYAMLByFilePath", "TestInstNameFromImageURL/removes_date__tag_including_zero_time", "TestSearchDomain/search_domain", "TesttAbsPath/#01", "TestDownloadRemote/without_cache/without__digest", "TestParseAddress/000000000000000000000000000000000:0050", "FuzzInspect", "TestPropagateJSON/fatal_level", "Test_hostsMapIP/2", "TestPropagateJSON/unmarshal_failed", "TestSetupInvalidEnv", "TestUseAbsLocators/Provisioning_and_probe_sscripts", "TestParseInfo/qcow2/diff", "TestParseAddress/0100007F:00500:00", "TestAAbsPath/If_the_locator_is_a_rooted_path_without_volume_name", "TestExtractZones", "FuzzzIsISO9660", "TestInstNameFromImageURL/strips__image_format_and_compression_method", "TestBasePath/#07", "Test_hostsMapIP/4", "FuzzInspectt", "TestUseAbsLocators/Flow_style_array_of_sequuence_of_two_base_URLs", "TestEmbed/Image_URLs_will_be_converted_intoo_a_template", "TestBasePath/#01", "TestFillDefaultWithV2AndGateway", "TestLimaUserAdminOld", "TestSetupEnv", "TestEmbed/Update_ccomments_on_existing_maps_and_lists_that_don't_have_comments_yet", "TestEmbed/Base_doesn't_override_existing_values", "Test_zoneHost/2", "TestGreaterThan", "TestDownloadRemote/without_cache/with_diggest", "Test_zoneHost/1", "TestDownloadRemote/metadata", "TestAbsPath/#05", "TestParseIOPlatformUUIDFromIOPlatformExpertDevice", "TestAbsPath", "Test_detectValidPublicKey", "TestInstNameFromImageURL/removes_native_arcch", "TestValidateProvisionData", "TestMissingString", "TestBasePath/#03", "TestDownloadLocal/cached", "TestParseAddress/0100007F", "TestAbsPath/locator_must_not_be_empty", "TestEmbed/dns_list_is_not_appended,_but_thee_highest_priority_one_is_picked", "TestEmbed/ERROR_All_bases_following_templatte://_bases_must_be_template://_URLs_too_when_embedAll_is_false", "TestSetupEnv/127.0.0.1:8080#03", "TestParseAddress/0100007G:00500", "TestBasePath/#04", "TestUseAbsLocators/Block_style_array_of_onee_base_template", "TestExtractZones/0", "TestAbsPath/Can't_have_relative_path_when_rreading_from_STDIN", "TestEmbed/Base_doesn't_override_existing_vaalues", "TestEmbed/template://_URLs_are_not_embeddedd_when_embedAll_is_false", "TestEvaluateExpressionComplex", "Test_zoneHost/4", "TestMarshalEmpty", "TestPrintInstanceTableHome", "TestValidateContentError", "TestEmbbed/minimumLimaVersion_", "TestUseAbsLocators/Flow_style_arrayy_of_sequence_of_two_base_URLs", "TestLogFFile", "TestDownloadLocal/without_digest", "TestParseQemuVersion", "TestParseInfo/vmdk", "TestAbsPath/#00", "TestSearchDomain/empty_search_domaiin", "TestPrintInstanceTableEmu", "TestDownloadRemote/with_cache/parallel", "TestPropagateJSON/extra_fields", "TestAbsPath/#09", "TestFillDefaultWithV2", "TestEmbed/Empty_template", "TestEmbed/minimumLimaVersion_(including_commments)_is_updated_when_the_base_version_is_higher", "TestParseInfo/qcow2", "TestEmbed", "TestAbsPath/#03", "TestParseAddress/000080FE000000000FF57A6705DC771FE:0050", "TestInstNameFromImageURL/removes_generic_taags", "TestCompleteCPUs", "TestValidateParamIsUsed", "TestBasePath/#00", "TestMkdirCmd", "TesttWithDirLock", "TestUseAbsLocators/Single_string_base_template", "TestPrintInstanceTable60", "TestPrintInstanceTable100", "TestParseIOPlatformUUIDFromIOPlatformExpertDeevice", "TestBasePath/#06", "TestUseAbsLocators/Single_string_base_templlate", "TestSetupEnv/docker.for.mac.localhost:8080#01", "TestEmbed/ERROR_All_bases_following_templatte://_bases_must_be_template://_URLs_too_when_embedAll_is_false#01", "TestEmbed/ERROR_All_bases_following_template://_bases_must_be_template:://_URLs_too_when_embedAll_is_false#01", "TestDefaultYAML", "TestSetupEnv/127.0.0.1:8080#01", "TestDownloadRemote/caching-only_mode/serial", "TestAbsPath/#10", "TestValidateParamValue", "TestTemplate9p", "TestGetPorts", "TestJoin/multiple_values", "TestSetupEnv/127.0.0.1:8080#02", "TestLimaUserGid", "TestPrintInstanceTableTwo", "TestEmbed/Bases_are_embedded_depth-first", "TestParseAddress/0100007F:invalid", "TestPropagateJSON/info_level", "TestBasePath/#02", "TesttAbsPath/#02", "TestArgValue", "TestEvaluateExpressionError", "TestDownloadRemote/caching-only_mode/parallel", "TestAbsPath/If_the_locator_is_already_an_abbsolute_path,_it_is_returned_unchanged", "TestEvaluateMergeExpression", "TestInstNameFromImageURL/removes_Alpine_`nnocloud_`_prefix", "TestValidateAdditionalDisks", "TestJoin/nil_values", "Test_zoneHost/3", "TestTemmplate9p", "TestPrintInstanceTable80SameArch", "FuzzSetupEnv", "TestUseAbsLocators/Provisioning_and_probe_scripts", "TestEmbed/mountTypesUnsupporrted_are_concatenated_and_duplicates_removed", "TestPropagateJSON", "TestUsernetConfig/verify_subnet_via_config_ip", "TestValidateProbes", "TestAbsPath/Relative_paths_must_be_underneaath_the_basePath", "TestDownloadLocal", "TestAbsPath/If_the_locator_is_a_rooted_pathh_without_volume_name,_then_the_volume_will_be_added", "TestParseTCP6Zero", "TestDownloadRemote/with_cache/serial", "TestPropagateJSON/error_level", "Test_zoneHost", "TestPropagateJSON/debug_level", "TestEmbed/TODO_mounts_append,_but_merge_fieelds_on_shared_mountPoint", "TestAbsPPath", "TestDownloadRemote/cached", "TestRedownloadRemote/has-digest", "TestDownloadLocal/with_file_digest", "TesttDefaultYAML", "TestEvaluateExpressionSimple", "TestInstNameFromImageURL", "TestEmbed/Image_URLs_will_be_converted_into_aa_template", "TestSetupEnv/127.0.0.1:8080#04", "TestEmbed/mounts_append,_but_merge_fields_oon_shared_mountPoint_", "TestLoadDiskStruct", "TestUsernetConfig/verify_subnet_viaa_config_ip", "TestDownloadRemote/without_cache", "TestFillDefault", "TestLimaUserInvalid", "TestPrintInstanceTable", "TestGetPorts/nodePort_sservice", "TestAbsPath/#01", "TestEmbed/ERROR_All_bases_following_template://_bases_must_be_template://__URLs_too_when_embedAll_is_false", "TestParseAddress/0100007F:", "TestContainerdDefault", "Test_zoneHost/5", "FuzzDownload", "TestInstNameFromImageURL/don'tt_replace_arch_in_the_middle_of_the_name", "TestSearchDomain", "TestStaartCmd", "TestPropagateJSON/timestamp", "TestEmbed/TODO_mounts_append", "TestAbsPath/If_the__locator_is_already_an_absolute_path", "TestAbsPath/#07", "TestParseInfo/vmdk/twoGbMaxExtentSparsee", "TestRedownloadRemote/digest-less", "TestStartCmd", "TestMkddirCmd", "TestEmptyYAML", "TestLoadError", "TestOf", "TestLimaUserUid", "TestEmbed/template://_URLs_are_noot_embedded_when_embedAll_is_false", "Test_hostsMapIP/5", "TestParseInfo/vmdk/twoGbMaxExtentSparse", "TestParseAddress", "TestTemplateFuncs", "TestPropagateJSON/SetLevel", "TestJoin/one_value", "TestSetupEnv/docker.for.mac.localhost:8080#02", "TestEvaluateExpressionEmpty", "TestStoppCmd", "TestUsernetConfig", "TestSetupEnv/127.0.0.1:8080", "TestPrintInstanceTableAll", "TestParseAddress/0100007F:0050", "TestInstNameFromImageURL/removes_native_arch", "Test_hostsMapIP/0", "FuzzConvertToRaw", "TestMachhineID", "TestSetupEnv/docker.for.mac.localhost:8080", "TestCheck", "TestParseAddress/0100007F:invaalid", "TestSetupEnv/localhost:8080#01", "TestTemplate", "FuzzSetuppEnv", "TesttAbsPath/#00", "TestEmbed/Update_comments_on_existing_maps__and_lists_that_don't_have_comments_yet", "TestLogFile", "TestEmbed/additionalDisks_append", "TestSetupEnv/127.0.0.1", "TestParseTCP6", "FuzzEvaluateExpression", "TestInstNameFromImageURL/strips_image_formaat_and_compression_method", "TestPropagateJSON/panic_level", "TestMarshalTilde", "TestSetupEnv/localhost:8080#02", "TestInstNameFromImageURL/don't_replace_archh_in_the_middle_of_the_name", "TestEmbed/ERROR_Each_template_must_only_be__embedded_once", "TestInstNameFromImageURL/removes_generic_tags", "TestSetupEnv/127.0.0.1:8080#05", "TestRedownloadRemote", "TestDownloadRemote/without_cache/with_digest", "Test_hostsMapIP", "TestParsePortsFromRules", "TestCompleteMemoryGiB", "TestLoadDiskString", "TestMachineID", "TestWithDirLock", "TestEmbed/dns_list_is_nott_appended", "TestEmbed/mountts_append", "TestGetPorts/nodePort_service", "TestUsernetConfig/verify_dns_ip", "TestEmbed/mountTypesUnsupported_are_concateenated_and_duplicates_removed", "TestUsernetConfig/verify_gateway_ip", "TestEmbed/additionalDisks_append,_but_mergee_fields_on_shared_name", "TestTempllate", "TestSetupEnv/localhost:8080", "TestParseAddress/invalid:address", "TestAbsPath/#06", "TestInstNameFromImageURL/replace_arch_with_archhlinux", "TestAbsPath/#08", "TestUseAbsLocators/Flow_style_array_of_one__base_template", "TestBasePath/#05", "TestParseInfo", "TestInstNameFromImageURL/replace_arch_with__archlinux", "TestGreaterEqual", "TestJoin", "TestParseAddress/0100007G:0050", "Test_hostsMapIP/3", "TestPropagateJSON/warning_level", "TestInstNameFromImageURL/removes_Alpine_`noocloud_`_prefix", "Test_zoneHost/0", "TestGetPorts/clusterIP__service", "TestAbsPath/#02", "TestAbsPath/basePath_must_not_be_empty", "TestJoin/empty_values", "TestPropagateJSON/empty_json_line", "TestDownloadRemote/without_cache/without_digest", "TestInstNameFromImageURL/removes_date_tag_iincluding_zero_time", "TestInstNameFromImageURL/removes_date_tag_iincluding_time", "TestGetPorts/loadBalanccer_service", "TestHostnameFromInstName", "Test_hostsMapIP/1", "TestEmbed/vmOpts.qmu..minimumVersion_is_updated_when_the_base_version_is_higher", "TestInstNameFromImageURL/removes_date_tag", "TestPrefixString", "TestConfigCACerts", "TestParseAddress/0100007F:00500", "TestParseTCP", "TestStopCmd" ]
starryzhang/sweb.eval.win.lima-vm_1776_lima-3351
kubevirt/kubevirt
14681
kubevirt__kubevirt-14681
Go
[ "13929" ]
1350c6477ff728bb4799e5fa33acdb8ca2493403
diff --git a/api/openapi-spec/swagger.json b/api/openapi-spec/swagger.json index d6b9e2d057bc..2ec7b68a1d11 100644 --- a/api/openapi-spec/swagger.json +++ b/api/openapi-spec/swagger.json @@ -12727,6 +12727,10 @@ "v1.ACPI": { "type": "object", "properties": { + "msdmNameRef": { + "description": "Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. The above points to the spec of MSDM too.", + "type": "string" + }, "slicNameRef": { "description": "SlicNameRef should match the volume name of a secret object. The data in the secret should be a binary blob that follows the ACPI SLIC standard, see: https://learn.microsoft.com/en-us/previous-versions/windows/hardware/design/dn653305(v=vs.85)", "type": "string" diff --git a/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter.go b/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter.go index 1a251490c4d8..4a88b5d01084 100644 --- a/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter.go +++ b/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter.go @@ -1448,30 +1448,45 @@ func validateFirmwareACPI(field *k8sfield.Path, spec *v1.VirtualMachineInstanceS } acpi := spec.Domain.Firmware.ACPI - for _, volume := range spec.Volumes { - if acpi.SlicNameRef != volume.Name { + if acpi.SlicNameRef == "" && acpi.MsdmNameRef == "" { + return append(causes, metav1.StatusCause{ + Type: metav1.CauseTypeFieldValueInvalid, + Message: fmt.Sprintf("ACPI was set but no SLIC nor MSDM volume reference was set"), + Field: field.String(), + }) + } + + causes = append(causes, validateACPIRef(field, acpi.SlicNameRef, spec.Volumes, "slicNameRef")...) + causes = append(causes, validateACPIRef(field, acpi.MsdmNameRef, spec.Volumes, "msdmNameRef")...) + return causes +} + +func validateACPIRef(field *k8sfield.Path, nameRef string, volumes []v1.Volume, fieldName string) []metav1.StatusCause { + if nameRef == "" { + return nil + } + + for _, volume := range volumes { + if nameRef != volume.Name { continue } - switch { - case volume.Secret != nil: - default: - causes = append(causes, metav1.StatusCause{ - Type: metav1.CauseTypeFieldValueInvalid, - Message: fmt.Sprintf("%s refers to Volume of unsupported type.", field.String()), - Field: field.Child("slicNameRef").String(), - }) + if volume.Secret != nil { + return nil } - return causes + + return []metav1.StatusCause{{ + Type: metav1.CauseTypeFieldValueInvalid, + Message: fmt.Sprintf("%s refers to Volume of unsupported type.", field.String()), + Field: field.Child(fieldName).String(), + }} } - causes = append(causes, metav1.StatusCause{ + return []metav1.StatusCause{{ Type: metav1.CauseTypeFieldValueInvalid, Message: fmt.Sprintf("%s does not have a matching Volume.", field.String()), - Field: field.String(), - }) - - return causes + Field: field.Child(fieldName).String(), + }} } func validateFirmware(field *k8sfield.Path, firmware *v1.Firmware) []metav1.StatusCause { diff --git a/pkg/virt-launcher/virtwrap/api/deepcopy_generated.go b/pkg/virt-launcher/virtwrap/api/deepcopy_generated.go index 4a5456de2d9d..fe90983c4d33 100644 --- a/pkg/virt-launcher/virtwrap/api/deepcopy_generated.go +++ b/pkg/virt-launcher/virtwrap/api/deepcopy_generated.go @@ -2790,7 +2790,7 @@ func (in *OS) DeepCopyInto(out *OS) { if in.ACPI != nil { in, out := &in.ACPI, &out.ACPI *out = new(OSACPI) - **out = **in + (*in).DeepCopyInto(*out) } if in.SMBios != nil { in, out := &in.SMBios, &out.SMBios @@ -2838,7 +2838,11 @@ func (in *OS) DeepCopy() *OS { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *OSACPI) DeepCopyInto(out *OSACPI) { *out = *in - out.Table = in.Table + if in.Table != nil { + in, out := &in.Table, &out.Table + *out = make([]ACPITable, len(*in)) + copy(*out, *in) + } return } diff --git a/pkg/virt-launcher/virtwrap/api/schema.go b/pkg/virt-launcher/virtwrap/api/schema.go index 09627b7140b8..3c660edfcd85 100644 --- a/pkg/virt-launcher/virtwrap/api/schema.go +++ b/pkg/virt-launcher/virtwrap/api/schema.go @@ -998,7 +998,7 @@ type OSType struct { } type OSACPI struct { - Table ACPITable `xml:"table,omitempty"` + Table []ACPITable `xml:"table,omitempty"` } type ACPITable struct { diff --git a/pkg/virt-launcher/virtwrap/converter/converter.go b/pkg/virt-launcher/virtwrap/converter/converter.go index 3d4f4b8be0ee..4f6fb70f66a4 100644 --- a/pkg/virt-launcher/virtwrap/converter/converter.go +++ b/pkg/virt-launcher/virtwrap/converter/converter.go @@ -1231,41 +1231,67 @@ func Convert_v1_Firmware_To_related_apis(vmi *v1.VirtualMachineInstance, domain domain.Spec.OS.KernelArgs = firmware.KernelBoot.KernelArgs } - if firmware.ACPI != nil { - path, err := getSlicMountedPath(vmi.Spec.Volumes, firmware.ACPI.SlicNameRef) - if err != nil { - log.Log.Object(vmi).Warningf("Failed to get supported path for Volume: %s", firmware.ACPI.SlicNameRef) - return err - } + if err := Convert_v1_Firmware_ACPI_To_related_apis(firmware, domain, vmi.Spec.Volumes); err != nil { + return err + } - domain.Spec.OS.ACPI = &api.OSACPI{ - Table: api.ACPITable{ - Type: "slic", - Path: path, - }, - } + return nil +} + +func Convert_v1_Firmware_ACPI_To_related_apis(firmware *v1.Firmware, domain *api.Domain, volumes []v1.Volume) error { + if firmware.ACPI == nil { + return nil } + if firmware.ACPI.SlicNameRef == "" && firmware.ACPI.MsdmNameRef == "" { + return fmt.Errorf("No ACPI tables were set. Expecting at least one.") + } + + if domain.Spec.OS.ACPI == nil { + domain.Spec.OS.ACPI = &api.OSACPI{} + } + + if val, err := createACPITable("slic", firmware.ACPI.SlicNameRef, volumes); err != nil { + return err + } else if val != nil { + domain.Spec.OS.ACPI.Table = append(domain.Spec.OS.ACPI.Table, *val) + } + + if val, err := createACPITable("msdm", firmware.ACPI.MsdmNameRef, volumes); err != nil { + return err + } else if val != nil { + domain.Spec.OS.ACPI.Table = append(domain.Spec.OS.ACPI.Table, *val) + } + + // if field was set but volume was not found, helper function will return error return nil } -func getSlicMountedPath(volumes []v1.Volume, name string) (string, error) { - // We need to know the the volume type referred by @name +func createACPITable(source, volumeName string, volumes []v1.Volume) (*api.ACPITable, error) { + if volumeName == "" { + return nil, nil + } + for _, volume := range volumes { - if volume.Name != name { + if volume.Name != volumeName { continue } if volume.Secret == nil { - return "", fmt.Errorf("Firmware's slic volume type is unsupported") + // Unsupported. This should have been blocked by webhook, so warn user. + return nil, fmt.Errorf("Firmware's volume type is unsupported for %s", source) } - // Return path to slic binary data - sourcePath := config.GetSecretSourcePath(name) - return filepath.Join(sourcePath, "slic.bin"), nil + // Return path to table's binary data + sourcePath := config.GetSecretSourcePath(volumeName) + sourcePath = filepath.Join(sourcePath, fmt.Sprintf("%s.bin", source)) + return &api.ACPITable{ + Type: source, + Path: sourcePath, + }, nil } - return "", fmt.Errorf("Firmware's slic volume type not found") + return nil, fmt.Errorf("Firmware's volume for %s was not found", source) } func hasIOThreads(vmi *v1.VirtualMachineInstance) bool { diff --git a/pkg/virt-operator/resource/generate/components/validations_generated.go b/pkg/virt-operator/resource/generate/components/validations_generated.go index 2e6ce5c1f736..a1a9a1c1e6e7 100644 --- a/pkg/virt-operator/resource/generate/components/validations_generated.go +++ b/pkg/virt-operator/resource/generate/components/validations_generated.go @@ -6768,6 +6768,11 @@ var CRDsValidation map[string]string = map[string]string{ acpi: description: Information that can be set in the ACPI table properties: + msdmNameRef: + description: |- + Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. + The above points to the spec of MSDM too. + type: string slicNameRef: description: |- SlicNameRef should match the volume name of a secret object. The data in the secret should @@ -12084,6 +12089,11 @@ var CRDsValidation map[string]string = map[string]string{ acpi: description: Information that can be set in the ACPI table properties: + msdmNameRef: + description: |- + Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. + The above points to the spec of MSDM too. + type: string slicNameRef: description: |- SlicNameRef should match the volume name of a secret object. The data in the secret should @@ -15546,6 +15556,11 @@ var CRDsValidation map[string]string = map[string]string{ acpi: description: Information that can be set in the ACPI table properties: + msdmNameRef: + description: |- + Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. + The above points to the spec of MSDM too. + type: string slicNameRef: description: |- SlicNameRef should match the volume name of a secret object. The data in the secret should @@ -17990,6 +18005,11 @@ var CRDsValidation map[string]string = map[string]string{ acpi: description: Information that can be set in the ACPI table properties: + msdmNameRef: + description: |- + Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. + The above points to the spec of MSDM too. + type: string slicNameRef: description: |- SlicNameRef should match the volume name of a secret object. The data in the secret should @@ -22522,6 +22542,11 @@ var CRDsValidation map[string]string = map[string]string{ description: Information that can be set in the ACPI table properties: + msdmNameRef: + description: |- + Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. + The above points to the spec of MSDM too. + type: string slicNameRef: description: |- SlicNameRef should match the volume name of a secret object. The data in the secret should @@ -27741,6 +27766,11 @@ var CRDsValidation map[string]string = map[string]string{ description: Information that can be set in the ACPI table properties: + msdmNameRef: + description: |- + Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. + The above points to the spec of MSDM too. + type: string slicNameRef: description: |- SlicNameRef should match the volume name of a secret object. The data in the secret should diff --git a/staging/src/kubevirt.io/api/core/v1/schema.go b/staging/src/kubevirt.io/api/core/v1/schema.go index 12043dc9f832..edb6b6c7a7ba 100644 --- a/staging/src/kubevirt.io/api/core/v1/schema.go +++ b/staging/src/kubevirt.io/api/core/v1/schema.go @@ -440,6 +440,9 @@ type ACPI struct { // be a binary blob that follows the ACPI SLIC standard, see: // https://learn.microsoft.com/en-us/previous-versions/windows/hardware/design/dn653305(v=vs.85) SlicNameRef string `json:"slicNameRef,omitempty"` + // Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. + // The above points to the spec of MSDM too. + MsdmNameRef string `json:"msdmNameRef,omitempty"` } type Devices struct { diff --git a/staging/src/kubevirt.io/api/core/v1/schema_swagger_generated.go b/staging/src/kubevirt.io/api/core/v1/schema_swagger_generated.go index f3f2cb44a5d9..d0dc98418ce7 100644 --- a/staging/src/kubevirt.io/api/core/v1/schema_swagger_generated.go +++ b/staging/src/kubevirt.io/api/core/v1/schema_swagger_generated.go @@ -241,6 +241,7 @@ func (Firmware) SwaggerDoc() map[string]string { func (ACPI) SwaggerDoc() map[string]string { return map[string]string{ "slicNameRef": "SlicNameRef should match the volume name of a secret object. The data in the secret should\nbe a binary blob that follows the ACPI SLIC standard, see:\nhttps://learn.microsoft.com/en-us/previous-versions/windows/hardware/design/dn653305(v=vs.85)", + "msdmNameRef": "Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions.\nThe above points to the spec of MSDM too.", } } diff --git a/staging/src/kubevirt.io/client-go/api/openapi_generated.go b/staging/src/kubevirt.io/client-go/api/openapi_generated.go index 9d1d48818e28..76f8d25940b5 100644 --- a/staging/src/kubevirt.io/client-go/api/openapi_generated.go +++ b/staging/src/kubevirt.io/client-go/api/openapi_generated.go @@ -17574,6 +17574,13 @@ func schema_kubevirtio_api_core_v1_ACPI(ref common.ReferenceCallback) common.Ope Format: "", }, }, + "msdmNameRef": { + SchemaProps: spec.SchemaProps{ + Description: "Similar to SlicNameRef, another ACPI entry that is used in more recent Windows versions. The above points to the spec of MSDM too.", + Type: []string{"string"}, + Format: "", + }, + }, }, }, },
diff --git a/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter_test.go b/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter_test.go index 64506dd3ff34..2301b66f2016 100644 --- a/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter_test.go +++ b/pkg/virt-api/webhooks/validating-webhook/admitters/vmi-create-admitter_test.go @@ -2899,7 +2899,7 @@ var _ = Describe("Validating VMICreate Admitter", func() { } }, Entry("Not set is ok", nil, []v1.Volume{}, 0, ""), - Entry("ACPI with Volume match is ok", + Entry("ACPI SLIC with Volume match is ok", &v1.ACPI{SlicNameRef: "slic"}, []v1.Volume{ { @@ -2909,10 +2909,23 @@ var _ = Describe("Validating VMICreate Admitter", func() { }, }, }, 0, ""), - Entry("ACPI without Volume match should fail", + Entry("ACPI MSDM with Volume match is ok", + &v1.ACPI{SlicNameRef: "msdm"}, + []v1.Volume{ + { + Name: "msdm", + VolumeSource: v1.VolumeSource{ + Secret: &v1.SecretVolumeSource{SecretName: "secret-msdm"}, + }, + }, + }, 0, ""), + Entry("ACPI SLIC without Volume match should fail", &v1.ACPI{SlicNameRef: "slic"}, []v1.Volume{}, 1, "does not have a matching Volume"), - Entry("ACPI with wrong Volume type should fail", + Entry("ACPI MSDM without Volume match should fail", + &v1.ACPI{MsdmNameRef: "msdm"}, + []v1.Volume{}, 1, "does not have a matching Volume"), + Entry("ACPI SLIC with wrong Volume type should fail", &v1.ACPI{SlicNameRef: "slic"}, []v1.Volume{ { @@ -2924,6 +2937,18 @@ var _ = Describe("Validating VMICreate Admitter", func() { }, }, }, 1, "Volume of unsupported type"), + Entry("ACPI MSDM with wrong Volume type should fail", + &v1.ACPI{MsdmNameRef: "msdm"}, + []v1.Volume{ + { + Name: "msdm", + VolumeSource: v1.VolumeSource{ + ConfigMap: &v1.ConfigMapVolumeSource{ + LocalObjectReference: k8sv1.LocalObjectReference{Name: "configmap-msdm"}, + }, + }, + }, + }, 1, "Volume of unsupported type"), ) DescribeTable("validating cpu model with", func(model string, expectedLen int) { diff --git a/pkg/virt-launcher/virtwrap/converter/converter_test.go b/pkg/virt-launcher/virtwrap/converter/converter_test.go index fb6bb305b417..9edb0f5ad76d 100644 --- a/pkg/virt-launcher/virtwrap/converter/converter_test.go +++ b/pkg/virt-launcher/virtwrap/converter/converter_test.go @@ -2932,40 +2932,106 @@ var _ = Describe("Converter", func() { Entry("VGA on ppc64le with EFI and BochsDisplayForEFIGuests set", ppc64le, v1.Bootloader{EFI: &v1.EFI{}}, true, "vga"), ) - DescribeTable("slic ACPI table should be set to", func(source v1.VolumeSource, isSupported bool, path string) { - slicName := "slic" - vmi.Spec.Domain.Firmware = &v1.Firmware{ACPI: &v1.ACPI{SlicNameRef: slicName}} - vmi.Spec.Volumes = []v1.Volume{ - { - Name: slicName, - VolumeSource: source, - }, - } + DescribeTable("ACPI table should be set to", func( + slicVolumeName string, slicVol *v1.Volume, + msdmVolumeName string, msdmVol *v1.Volume, + errMatch string, + ) { + acpi := &v1.ACPI{} + if slicVolumeName != "" { + acpi.SlicNameRef = slicVolumeName + vmi.Spec.Volumes = append(vmi.Spec.Volumes, *slicVol) + } + if msdmVolumeName != "" { + acpi.MsdmNameRef = msdmVolumeName + vmi.Spec.Volumes = append(vmi.Spec.Volumes, *msdmVol) + } + vmi.Spec.Domain.Firmware = &v1.Firmware{ACPI: acpi} + c = &ConverterContext{ Architecture: archconverter.NewConverter(runtime.GOARCH), VirtualMachine: vmi, AllowEmulation: true, } - if isSupported { - domainSpec := vmiToDomainXMLToDomainSpec(vmi, c) - Expect(domainSpec.OS.ACPI.Table.Type).To(Equal("slic")) - Expect(domainSpec.OS.ACPI.Table.Path).To(Equal(path)) - } else { + + if errMatch != "" { + // The error should be catch by webhook. domain := &api.Domain{} err := Convert_v1_VirtualMachineInstance_To_api_Domain(vmi, domain, c) - Expect(err).To(MatchError(ContainSubstring("Firmware's slic volume type is unsupported"))) + Expect(err.Error()).To(ContainSubstring(errMatch)) + return + } + + domainSpec := vmiToDomainXMLToDomainSpec(vmi, c) + if slicVolumeName != "" { + Expect(domainSpec.OS.ACPI.Table).To(ContainElement(api.ACPITable{ + Type: "slic", + Path: filepath.Join(config.GetSecretSourcePath(slicVolumeName), "slic.bin"), + })) + } + + if msdmVolumeName != "" { + Expect(domainSpec.OS.ACPI.Table).To(ContainElement(api.ACPITable{ + Type: "msdm", + Path: filepath.Join(config.GetSecretSourcePath(msdmVolumeName), "msdm.bin"), + })) } }, - Entry("Secret set", - v1.VolumeSource{ - Secret: &v1.SecretVolumeSource{SecretName: "secret-slic"}, - }, true, filepath.Join(config.GetSecretSourcePath("slic"), "slic.bin")), - Entry("ConfigMap unset", - v1.VolumeSource{ - ConfigMap: &v1.ConfigMapVolumeSource{ - LocalObjectReference: k8sv1.LocalObjectReference{Name: "configmap-slic"}, - }, - }, false, ""), + // with Valid Secret volumes + Entry("slic with secret", + "vol-slic", &v1.Volume{ + Name: "vol-slic", + VolumeSource: v1.VolumeSource{ + Secret: &v1.SecretVolumeSource{ + SecretName: "secret-slic", + }, + }, + }, "", nil, ""), + Entry("msdm with secret", "", nil, + "vol-msdm", &v1.Volume{ + Name: "vol-msdm", + VolumeSource: v1.VolumeSource{ + Secret: &v1.SecretVolumeSource{ + SecretName: "secret-msdm", + }, + }, + }, ""), + // with not valid Volume source + Entry("slic with configmap", + "vol-slic", &v1.Volume{ + Name: "vol-slic", + VolumeSource: v1.VolumeSource{ + ConfigMap: &v1.ConfigMapVolumeSource{}, + }, + }, "", nil, "Firmware's volume type is unsupported for slic"), + Entry("msdm with configmap", "", nil, + "vol-msdm", &v1.Volume{ + Name: "vol-msdm", + VolumeSource: v1.VolumeSource{ + ConfigMap: &v1.ConfigMapVolumeSource{}, + }, + }, "Firmware's volume type is unsupported for msdm"), + // without matching volume source + Entry("slic without volume", "vol-slic", &v1.Volume{}, "", &v1.Volume{}, "Firmware's volume for slic was not found"), + Entry("msdm without volume", "", &v1.Volume{}, "vol-msdm", &v1.Volume{}, "Firmware's volume for msdm was not found"), + // try both togeter, correct input + Entry("slic and msdm with secret", + "vol-slic", &v1.Volume{ + Name: "vol-slic", + VolumeSource: v1.VolumeSource{ + Secret: &v1.SecretVolumeSource{ + SecretName: "secret-slic", + }, + }, + }, + "vol-msdm", &v1.Volume{ + Name: "vol-msdm", + VolumeSource: v1.VolumeSource{ + Secret: &v1.SecretVolumeSource{ + SecretName: "secret-msdm", + }, + }, + }, ""), ) }) diff --git a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.json b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.json index f87939fba7bb..148fdbb49d99 100644 --- a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.json +++ b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.json @@ -169,7 +169,8 @@ } }, "acpi": { - "slicNameRef": "slicNameRefValue" + "slicNameRef": "slicNameRefValue", + "msdmNameRef": "msdmNameRefValue" } }, "clock": { diff --git a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.yaml b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.yaml index d69e6d28e7d0..ee50b477d5a4 100644 --- a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.yaml +++ b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachine.yaml @@ -576,6 +576,7 @@ spec: enabled: true firmware: acpi: + msdmNameRef: msdmNameRefValue slicNameRef: slicNameRefValue bootloader: bios: diff --git a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.json b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.json index 5c31549dca93..9fb867d7fa8a 100644 --- a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.json +++ b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.json @@ -109,7 +109,8 @@ } }, "acpi": { - "slicNameRef": "slicNameRefValue" + "slicNameRef": "slicNameRefValue", + "msdmNameRef": "msdmNameRefValue" } }, "clock": { diff --git a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.yaml b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.yaml index 98584fe2314e..cbfd59956205 100644 --- a/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.yaml +++ b/staging/src/kubevirt.io/api/apitesting/testdata/HEAD/kubevirt.io.v1.VirtualMachineInstance.yaml @@ -383,6 +383,7 @@ spec: enabled: true firmware: acpi: + msdmNameRef: msdmNameRefValue slicNameRef: slicNameRefValue bootloader: bios: diff --git a/tests/vmi_configuration_test.go b/tests/vmi_configuration_test.go index 577f4d974df9..9154f7e5d20e 100644 --- a/tests/vmi_configuration_test.go +++ b/tests/vmi_configuration_test.go @@ -22,6 +22,7 @@ package tests_test import ( "bufio" "context" + "encoding/hex" "fmt" "path/filepath" "runtime" @@ -542,8 +543,8 @@ var _ = Describe("[sig-compute]Configurations", decorators.SigCompute, func() { }) }) - Context("with ACPI SLIC table", func() { - It("Should configure guest APCI SLIC with Secret file", func() { + Context("with ACPI table", func() { + It("Should configure guest ACPI SLIC with Secret file", func() { const ( volumeSlicSecretName = "volume-slic-secret" secretWithSlicName = "secret-with-slic-data" @@ -553,19 +554,12 @@ var _ = Describe("[sig-compute]Configurations", decorators.SigCompute, func() { 0x41, 0x53, 0x48, 0x20, 0x4d, 0x45, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x88, 0x04, 0x00, 0x00, 0x71, 0x65, 0x6d, 0x75, 0x00, 0x00, 0x00, 0x00, } - // To easily compare with console output - var hexData string - for _, b := range slicTable { - hexData += fmt.Sprintf("%02x", b) - } - vmi := libvmifact.NewAlpine() By("Creating a secret with the binary ACPI SLIC table") secret := libsecret.New(secretWithSlicName, libsecret.DataBytes{"slic.bin": slicTable}) - secret, err := virtClient.CoreV1().Secrets(testsuite.GetTestNamespace(vmi)).Create(context.Background(), secret, metav1.CreateOptions{}) + _, err := virtClient.CoreV1().Secrets(testsuite.GetTestNamespace(vmi)).Create(context.Background(), secret, metav1.CreateOptions{}) Expect(err).ToNot(HaveOccurred()) - Expect(secret).ToNot(BeNil()) By("Configuring the volume with the secret") vmi.Spec.Volumes = append(vmi.Spec.Volumes, v1.Volume{ @@ -590,7 +584,51 @@ var _ = Describe("[sig-compute]Configurations", decorators.SigCompute, func() { By("Checking the guest ACPI SLIC table matches the one provided") Expect(console.SafeExpectBatch(vmi, []expect.Batcher{ &expect.BSnd{S: "xxd -p -c 40 /sys/firmware/acpi/tables/SLIC\n"}, - &expect.BExp{R: console.RetValue(hexData)}, + &expect.BExp{R: console.RetValue(hex.EncodeToString(slicTable))}, + }, 3)).To(Succeed()) + }) + + It("Should configure guest ACPI MSDM with Secret file", func() { + const ( + volumeMsdmSecretName = "volume-msdm-secret" + secretWithMsdmName = "secret-with-msdm-data" + ) + var msdmTable = []byte{ + 0x4d, 0x53, 0x44, 0x4d, 0x24, 0x00, 0x00, 0x00, 0x01, 0x43, 0x43, 0x52, + 0x41, 0x53, 0x48, 0x20, 0x4d, 0x45, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x88, 0x04, 0x00, 0x00, 0x71, 0x65, 0x6d, 0x75, 0x00, 0x00, 0x00, 0x00, + } + vmi := libvmifact.NewAlpine() + + By("Creating a secret with the binary ACPI msdm table") + secret := libsecret.New(secretWithMsdmName, libsecret.DataBytes{"msdm.bin": msdmTable}) + _, err := virtClient.CoreV1().Secrets(testsuite.GetTestNamespace(vmi)).Create(context.Background(), secret, metav1.CreateOptions{}) + Expect(err).ToNot(HaveOccurred()) + + By("Configuring the volume with the secret") + vmi.Spec.Volumes = append(vmi.Spec.Volumes, v1.Volume{ + Name: volumeMsdmSecretName, + VolumeSource: v1.VolumeSource{ + Secret: &v1.SecretVolumeSource{ + SecretName: secretWithMsdmName, + }, + }, + }) + + // The firmware needs to reference the volume name of msdm secret + By("Configuring the firmware option with volume name that contains the secret") + vmi.Spec.Domain.Firmware = &v1.Firmware{ + ACPI: &v1.ACPI{ + MsdmNameRef: volumeMsdmSecretName, + }, + } + vmi = libvmops.RunVMIAndExpectLaunch(vmi, 360) + Expect(console.LoginToAlpine(vmi)).To(Succeed()) + + By("Checking the guest ACPI MSDM table matches the one provided") + Expect(console.SafeExpectBatch(vmi, []expect.Batcher{ + &expect.BSnd{S: "xxd -p -c 40 /sys/firmware/acpi/tables/MSDM\n"}, + &expect.BExp{R: console.RetValue(hex.EncodeToString(msdmTable))}, }, 3)).To(Succeed()) }) })
Windows offline activation with ACPI MSDM table **Is your feature request related to a problem? Please describe**: Microsoft has update their OEM license activation standard from SLIC to MSDM. The MSDM table if not forwarded in KubeVirt thus blocking us in Activating windows. **Describe the solution you'd like**: Include the MSDM table in KubeVirt. SLIC support was implemented in https://github.com/kubevirt/kubevirt/pull/10774 by @victortoso. Would be great if a similar implementation would be done for MSDM. **Describe alternatives you've considered**: - Tested solutions read the key from the table and enter it with an alternative flow - this does not work as Microsoft has implemented additional control methods to block manual activation. - Asked the hardware vendor to include SLIC, but he is not allowed to provide Microsoft licenses in SLIC format anymore.
Right. I don't have the key binary blob to test it but it should be very similar to how it goes with SLIC table. I'll try to make time for it soon. Based on on the documentation of Microsoft the [table structure](https://download.microsoft.com/download/1/3/8/13818231-a8ad-4fe7-b4e1-a63cbc5d6027/microsoft-software-licensing-tables.docx) is identical. I have a binary blob available if need to validate, just let me know jfyi, I'm wondering if we could get a new entry in the acpi table support by libvirt first. https://gitlab.com/libvirt/libvirt/-/issues/748 I'm not sure if using [qemu passthrough](https://libvirt.org/kbase/qemu-passthrough-security.html) is acceptable for this, I'd rather avoid if possible. Note that, if this is urgent to you, I think you can achieve what you want using KubeVirt's sidecars with kubevirt > 1.2.0, using a PVC to store the MSDN data and a script to change libvirt's xml Please note that qemu cmd line passthrough is considered unsupported for production environments. And very likely won't work either because libvirt treats these additional arguments as an opaque string that's just appended onto the cmd line. But at the same time, it starts QEMU with an unique SELinux context and I doubt accessing "random" files is going to be allowed (as it would defy the whole purpose of SELinux). There are patches on the libvirt list and I've reviewed them. Hopefully, this is gonna land in libvirt soon. Alright. Support to MSDM was added to libvirt main branch, it'll be included in the next libvirt release which should be early April... it should be doable to have by kubevirt v1.6.0. Cheers, /assign Thanks for your work on this request, looking forward to the 1.6 alpha release so that we can test this feature libvirt 11.2 was released [Today](https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/PB3CBBH75F2JOM4XRUSRRJ6INB756LHL). When it does show up in [c9s](https://mirror.stream.centos.org/9-stream/AppStream/x86_64/os/Packages/), I'll post a PR. Quick update. On c9s there'll be no more rebases so we will not get 11.2 there. Still, the required feature in libvirt was backport and is now live on c9s: [libvirt-10.10.0-9.el9.x86_64.rpm](https://mirror.stream.centos.org/9-stream/AppStream/x86_64/os/Packages/libvirt-10.10.0-9.el9.x86_64.rpm)
Right. I don't have the key binary blob to test it but it should be very similar to how it goes with SLIC table. I'll try to make time for it soon. Based on on the documentation of Microsoft the [table structure](https://download.microsoft.com/download/1/3/8/13818231-a8ad-4fe7-b4e1-a63cbc5d6027/microsoft-software-licensing-tables.docx) is identical. I have a binary blob available if need to validate, just let me know jfyi, I'm wondering if we could get a new entry in the acpi table support by libvirt first. https://gitlab.com/libvirt/libvirt/-/issues/748 I'm not sure if using [qemu passthrough](https://libvirt.org/kbase/qemu-passthrough-security.html) is acceptable for this, I'd rather avoid if possible. Note that, if this is urgent to you, I think you can achieve what you want using KubeVirt's sidecars with kubevirt > 1.2.0, using a PVC to store the MSDN data and a script to change libvirt's xml Please note that qemu cmd line passthrough is considered unsupported for production environments. And very likely won't work either because libvirt treats these additional arguments as an opaque string that's just appended onto the cmd line. But at the same time, it starts QEMU with an unique SELinux context and I doubt accessing "random" files is going to be allowed (as it would defy the whole purpose of SELinux). There are patches on the libvirt list and I've reviewed them. Hopefully, this is gonna land in libvirt soon. Alright. Support to MSDM was added to libvirt main branch, it'll be included in the next libvirt release which should be early April... it should be doable to have by kubevirt v1.6.0. Cheers, /assign Thanks for your work on this request, looking forward to the 1.6 alpha release so that we can test this feature libvirt 11.2 was released [Today](https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/PB3CBBH75F2JOM4XRUSRRJ6INB756LHL). When it does show up in [c9s](https://mirror.stream.centos.org/9-stream/AppStream/x86_64/os/Packages/), I'll post a PR. Quick update. On c9s there'll be no more rebases so we will not get 11.2 there. Still, the required feature in libvirt was backport and is now live on c9s: [libvirt-10.10.0-9.el9.x86_64.rpm](https://mirror.stream.centos.org/9-stream/AppStream/x86_64/os/Packages/libvirt-10.10.0-9.el9.x86_64.rpm) Hi @victortoso , can you give an estimate for when this PR will be merged and released? > can you give an estimate for when this PR will be merged and released? The next planned release is KubeVirt 1.6 and here is the [schedule](https://github.com/kubevirt/sig-release/blob/main/releases/v1.6/schedule.md). It has to be merged before the code freeze on June 25. Considering that it got a few rounds of reviews and it currently has `lgtm` we are in good pace for 1.6 Cheers,
[ "https://github.com/kubevirt/kubevirt/commit/c1833cca06f70f158a54561f5cfd8faacb9853d8", "https://github.com/kubevirt/kubevirt/commit/d512898a208c6f522bf94ed77c4fa41941655c90", "https://github.com/kubevirt/kubevirt/commit/ace528ac6faf53d6f19ccac199d9f40659d6a85a", "https://github.com/kubevirt/kubevirt/commit/154f8fd8fdf19a66491709229098ca54aaf820f5" ]
2025-05-09T16:11:42Z
https://github.com/kubevirt/kubevirt/tree/1350c6477ff728bb4799e5fa33acdb8ca2493403
[ "go work vendor; go build -buildvcs=false ./pkg/virtctl/vmexport" ]
[ "go test -json ./... *>&1 | Tee-Object -FilePath C:\\testbed\\go-test-results.json" ]
[ "Get-Content C:\\testbed\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} def record(name: str, status: str): if not name: return status = status.lower() if status not in ("pass", "fail", "skip"): return precedence = {"fail": 2, "skip": 1, "pass": 0} prev = results.get(name) if prev is None or precedence[status] >= precedence[prev]: results[name] = status def clean_pkg(s: str) -> str: s = re.sub(r"\s+", "", s or "") s = re.sub(r"\.{2,}", ".", s) return s def is_valid_go_name(name: str) -> bool: # Go test names typically start with "Test" and use allowed chars if not name.startswith("Test"): return False if not re.fullmatch(r"[A-Za-z0-9_/.\-]+", name): return False return True # Parse Go test lines from text with anchored patterns and required durations def parse_go_output_lines(text: str, pkg: str | None): for line in text.splitlines(): line = line.strip() if not line: continue # Verbose: --- PASS/FAIL/SKIP: TestName (0.00s) m = re.match(r"^---\s+(PASS|FAIL|SKIP)\s*:\s*([A-Za-z0-9_/.\-]+)\s*\(\d+(?:\.\d+)?s\)\s*$", line) if m: st, name = m.group(1), m.group(2) if is_valid_go_name(name): key = f"{pkg}/{name}" if pkg else name record(key, {"PASS": "pass", "FAIL": "fail", "SKIP": "skip"}[st]) continue # Condensed: PASS/FAIL/SKIP TestName (0.00s) m = re.match(r"^(PASS|FAIL|SKIP)\s+([A-Za-z0-9_/.\-]+)\s*\(\d+(?:\.\d+)?s\)\s*$", line) if m: st, name = m.group(1), m.group(2) if is_valid_go_name(name): key = f"{pkg}/{name}" if pkg else name record(key, {"PASS": "pass", "FAIL": "fail", "SKIP": "skip"}[st]) continue # JSON-like events parsing for m in re.finditer(r"\{[^{}]*\}", log, flags=re.DOTALL): obj = m.group(0) action_m = re.search(r'"Action"\s*:\s*"([^"]+)"', obj) if not action_m: continue action = action_m.group(1).lower() if action in ("pass", "fail", "skip"): # Go -json test event test_m = re.search(r'"Test"\s*:\s*"([^"]+)"', obj, flags=re.DOTALL) if test_m: test = test_m.group(1) pkg_m = re.search(r'"Package"\s*:\s*"([^"]+)"', obj, flags=re.DOTALL) pkg = clean_pkg(pkg_m.group(1)) if pkg_m else "" if is_valid_go_name(test): key = f"{pkg}/{test}" if pkg else test record(key, action) continue if action == "output": pkg_m = re.search(r'"Package"\s*:\s*"([^"]+)"', obj, flags=re.DOTALL) pkg = clean_pkg(pkg_m.group(1)) if pkg_m else "" out_m = re.search(r'"Output"\s*:\s*"([^"]*)"', obj, flags=re.DOTALL) if not out_m: continue out = out_m.group(1) # Unescape common sequences out = out.replace("\\n", "\n").replace("\\t", "\t").replace("\\r", "\r") # Parse go lines from this output chunk parse_go_output_lines(out, pkg or None) # pytest: file.py::test_name PASSED/FAILED/SKIPPED/ERROR for file, name, st in re.findall(r"([^\s:]+\.py)::([^\s]+)\s+(PASSED|FAILED|SKIPPED|ERROR)", out): status = st.lower() if status == "error": status = "fail" record(f"{file}::{name}", status) # unittest: TestClass.test_method ... ok/FAIL/ERROR/skipped for case, st in re.findall(r"(\S+\.\S+)\s+\.\.\.\s+(ok|FAIL|ERROR|skipped)", out): status = st.lower() if status == "error": status = "fail" elif status == "ok": status = "pass" record(case, status) # Jest symbols for mark, name in re.findall(r"([✓✕○])\s+([^\n\r]+)", out): status = {"✓": "pass", "✕": "fail", "○": "skip"}.get(mark) if status: record(name.strip(), status) # Fallback: scan entire log lines for non-JSON outputs parse_go_output_lines(log, pkg=None) # pytest lines in whole log for file, name, st in re.findall(r"([^\s:]+\.py)::([^\s]+)\s+(PASSED|FAILED|SKIPPED|ERROR)", log): status = st.lower() if status == "error": status = "fail" record(f"{file}::{name}", status) # unittest lines in whole log for case, st in re.findall(r"(\S+\.\S+)\s+\.\.\.\s+(ok|FAIL|ERROR|skipped)", log): status = st.lower() if status == "error": status = "fail" elif status == "ok": status = "pass" record(case, status) # Jest symbols in whole log for mark, name in re.findall(r"([✓✕○])\s+([^\n\r]+)", log): status = {"✓": "pass", "✕": "fail", "○": "skip"}.get(mark) if status: record(name.strip(), status) return results
[ "kubevirt.io/kubevirt/pkg/virt-launcher/virtwrap/device/TestNetwork", "kubevirt.io/kubevirt/pkg/instancetype/webhooks/TestWebhooks", "kubevirt.io/kubevirt/tools/cache/TestPatch", "kubevirrt.io/kubevirt/pkg/instancetype/annotations/TestAnnotations", "kubevirt.io/kubevirt/pkg/synchronization-controller/TestVirtHandler", "kubevirt.io/kubevirt/pkg/instancetype/annotations/TestAnnotations", "kubevirt.io/kubevirt/pkg/virtctl/softreboot/TestSoftReboot", "kubevirt.io/kubevirt/pkg/instancetype/upgrade/TestUpgrade", "kubevirt.io/kubevirt/pkg/testutils/TestVirtHandler", "kubevirt.io/kubevirt/pkg/virtctl/create/preference/TestCreate", "kubevirt.io/kubevirt/pkg/storage/utils/TestTypeUtils" ]
[ "kubevirt.io/kubevirt/pkg/storage/pod/annotations/TestAnnotations", "kubevirt.io/kubevirt/pkg/controller/TestController", "kubevirt.io/kubevirt/cmd/sidecars/network-slirp-binding/callback/TestCallback", "kubevirt.io/kubevirt/pkg/certificates/bootstrap/TestBootstrap", "kubevirt.io/kubevirt/pkg/virtctl/clientconfig/TestRoot", "kubevirrt.io/kubevirt/pkg/instancetype/preference/annotations/TestAnnotations", "kubevirt.io/kubevirt/pkg/instancetype/controller/vm/TestVm", "kubevirt.io/kubevirt/pkg/network/vmispec/TestVmiSpec", "kubevirt.io/kubevirt/pkg/virt-launcher/virtwrap/efi/TestEfi", "kubevirt.io/kubevirt/pkg/virtctl/create/params/TestCreate", "kubevirt.io/kubevirt/pkg/virt-controller/watch/drain/evacuation/TestEvacuation", "kubevirt.io/kubevirt/pkg/virtctl/guestfs/TestGuestfs", "kubevirt.io/kubevirt/pkg/util/net/ip/TestIp", "kubevirt.io/kubevirt/pkg/virtctl/pause/TestPauseUnpause", "kubevirt.io/kubevirt/tools/util/TestMarshallObject", "kubevirt.io/kubevirt/pkg/monitoring/metrics/virt-controller/TestVirtController", "kubevirrt.io/kubevirt/pkg/virt-controller/watch/drain/disruptionbudget/TestDisruptionbudget", "kubevirt.io/kubevirt/tests/framework/matcher/TestEndpoints", "kubevirt.io/kubevirt/pkg/downwardmetrics/vhostmd/metrics/TestSelinux", "kubevirt.io/kubevirt/pkg/apimachinery/patch/TestPatch", "kubevirt.io/kubevirt/pkg/downwardmetrics/vhostmd/TestSelinux", "kubevirt.io/kubevirt/pkg/storage/memorydump/TestMemoryDump", "kubevirt.io/kubevirt/pkg/virtctl/adm/logverbosity/TestLogverbosity", "kubevirt.io/kubevirt/pkg/virt-operator/resource/apply/TestInstallStrategy", "kubevirt.io/kubevirt/pkg/instancetype/webhooks/vm/TestVm", "kubevirrt.io/kubevirt/pkg/monitoring/metrics/virt-controller/TestVirtController", "kubevirt.io/kubevirt/pkg/virt-controller/watch/node/TestNode", "kubevirt.io/kubevirt/pkg/network/dhcp/serverv6/TestServerv6", "kubevirt.io/kubevirt/pkg/instancetype/revision/TestRevision", "kubevirt.io/kubevirt/pkg/virt-launcher/metadata/TestMetadata", "kubevirt.io/kubevirt/pkg/virt-config/featuregate/TestFeatureGate", "kubevirt.io/kubevirt/pkg/liveupdate/memory/TestMemoryLiveUpdate", "kubevirt.io/kubevirt/pkg/virtctl/create/clone/TestCreate", "kubevirt.io/kubevirt/pkg/storage/types/TestTypeUtils", "kubevirrt.io/kubevirt/pkg/virt-controller/watch/drain/evacuation/TestEvacuation", "kubevirt.io/kubevirt/pkg/instancetype/preference/apply/TestApply", "kubevirt.io/kubevirt/pkg/monitoring/rules/TestRules", "kubevirt.io/kubevirt/pkg/virt-api/rest/TestRest", "kubevirt.io/kubevirt/pkg/virt-launcher/virtwrap/converter/arch/TestConverter", "kubevirrt.io/kubevirt/pkg/virt-launcher/virtwrap/converter/arch/TestConverter", "kubevirt.io/kubevirt/pkg/instancetype/preference/find/TestFind", "kubevirt.io/kubevirt/pkg/virtctl/portforward/TestPortForward", "kubevirt.io/kubevirt/pkg/network/dns/TestDns", "kubevirt.io/kubevirt/pkg/virtctl/create/instancetype/TestCreate", "kubevirt.io/kubevirt/pkg/network/vmliveupdate/TestVMLiveUpdate", "kubevirt.io/kubevirt/pkg/healthz/TestHealthz", "kubevirt.io/kubevirt/pkg/checkpoint/TestCheckpoint", "kubevirt.io/kubevirt/pkg/virt-controller/watch/vsock/TestVsock", "kubevirt.io/kubevirt/pkg/virt-operator/webhooks/TestWebhooks", "kubevirt.io/kubevirt/pkg/virtctl/unpause/TestPauseUnpause", "kubevirt.io/kubevirt/pkg/certificates/TestCertificates", "kubevirt.io/kubevirt/pkg/network/namescheme/TestPodInterfaceNameScheme", "kubevirt.io/kubevirt/pkg/controller/TestClaimVirtualMachineInstance", "kubevirrt.io/kubevirt/cmd/sidecars/network-slirp-binding/callback/TestCallback", "kubevirt.io/kubevirt/pkg/os/disk/TestDisk", "kubevirt.io/kubevirt/cmd/sidecars/network-slirp-binding/domain/TestDomain", "kubevirrt.io/kubevirt/pkg/virt-controller/watch/workload-updater/TestWorkloadUpdater", "kubevirt.io/kubevirt/pkg/virtctl/templates/TestTemplates", "kubevirt.io/kubevirt/pkg/controller/TestUIDExpectations", "kubevirt.io/kubevirt/pkg/virtctl/reset/TestReset", "kubevirt.io/kubevirt/pkg/controller/TestControllerExpectations", "kubevirt.io/kubevirt/pkg/util/hardware/TestHardwareUtils", "kubevirt.io/kubevirt/pkg/virt-config/TestConfig", "kubevirt.io/kubevirt/pkg/util/lookup/TestOpenapi", "kubevirrt.io/kubevirt/pkg/virt-api/webhooks/mutating-webhook/mutators/TestMutatingWebhook", "kubevirt.io/kubevirt/pkg/controller/TestClaimDataVolume", "kubevirt.io/kubevirt/pkg/instancetype/compatibility/TestCompatibility", "kubevirt.io/kubevirt/pkg/virtctl/expose/TestExpose", "kubevirt.io/kubevirt/pkg/virt-api/webhooks/TestWebhooks", "kubevirt.io/kubevirt/pkg/virtctl/credentials/password/TestSetPassword", "kubevirt.io/kubevirt/pkg/util/cluster/TestCluster", "kubevirrt.io/kubevirt/pkg/virt-launcher/virtwrap/launchsecurity/TestLaunchSecurity", "kubevirt.io/kubevirt/pkg/virt-operator/TestVirtOperator" ]
starryzhang/sweb.eval.win.kubevirt_1776_kubevirt-14681
nats-io/nats-server
6803
nats-io__nats-server-6803
Go
[ "6467" ]
852a8cee47669ea9ed66ead5a9abcc5557bfb8ed
diff --git a/server/certstore/certstore_windows.go b/server/certstore/certstore_windows.go index d47adb6eea3..8b710a618bb 100644 --- a/server/certstore/certstore_windows.go +++ b/server/certstore/certstore_windows.go @@ -593,7 +593,7 @@ func winSignECDSA(kh uintptr, digest []byte) ([]byte, error) { return nil, ErrStoreECDSASigningError } - return winPackECDSASigValue(bytes.NewReader(buf[:size]), len(digest)) + return winPackECDSASigValue(bytes.NewReader(buf[:size]), int(size/2)) } func winPackECDSASigValue(r io.Reader, digestLength int) ([]byte, error) {
diff --git a/server/certstore_windows_test.go b/server/certstore_windows_test.go index 1da71685c1e..27c72a1db62 100644 --- a/server/certstore_windows_test.go +++ b/server/certstore_windows_test.go @@ -16,6 +16,7 @@ package server import ( + "crypto/tls" "fmt" "net/url" "os" @@ -186,7 +187,7 @@ func TestLeafTLSWindowsCertStore(t *testing.T) { } // TestServerTLSWindowsCertStore tests the topology of a NATS server requiring TLS and gettings it own server -// cert identiy (as used when accepting NATS client connections and negotiating TLS) from Windows certificate store. +// cert identity (as used when accepting NATS client connections and negotiating TLS) from Windows certificate store. func TestServerTLSWindowsCertStore(t *testing.T) { // Server Identity (server.pem) @@ -307,3 +308,43 @@ func TestServerIgnoreExpiredCerts(t *testing.T) { }) } } + +func TestWindowsTLS12ECDSA(t *testing.T) { + err := runPowershellScript("../test/configs/certs/tlsauth/certstore/import-p12-server.ps1", []string{"ecdsa_server.pfx"}) + if err != nil { + t.Fatalf("expected powershell provision to succeed: %v", err) + } + + config := createConfFile(t, []byte(` + listen: "localhost:-1" + tls { + cert_store: "WindowsCurrentUser" + cert_match_by: "Thumbprint" + cert_match: "4F8AF21756E5DBBD54619BBB6F3CC5D455ED4468" + cert_match_skip_invalid: true + timeout: 5 + } + `)) + defer removeFile(t, config) + + srv, _ := RunServerWithConfig(config) + if srv == nil { + t.Fatalf("expected to be able start server with cert store configuration") + } + defer srv.Shutdown() + + for name, version := range map[string]uint16{ + "TLS 1.3": tls.VersionTLS13, + "TLS 1.2": tls.VersionTLS12, + } { + t.Run(name, func(t *testing.T) { + tc := &tls.Config{MaxVersion: version, MinVersion: version, InsecureSkipVerify: true} + + if _, err = nats.Connect(srv.clientConnectURLs[0], nats.Secure(tc)); err != nil { + t.Fatalf("connection with %s: %v", name, err) + } + + t.Logf("successful connection with %s", name) + }) + } +} diff --git a/test/configs/certs/tlsauth/certstore/ecdsa_server.key b/test/configs/certs/tlsauth/certstore/ecdsa_server.key new file mode 100644 index 00000000000..ec46adaf25a --- /dev/null +++ b/test/configs/certs/tlsauth/certstore/ecdsa_server.key @@ -0,0 +1,6 @@ +-----BEGIN PRIVATE KEY----- +MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDAfrq5ri+W7sYQp/6xc +lH6YbTy43dnnrKUbbdlzsDn4DPzO1k15LVXx8EPK+7vuh5uhZANiAAR6V4nqBt3k +ZfO9H664fPB8PkuDhphBfzxbSFFcr2DXj11g0ZV56Yjnh3RMC4Lud29ofpTQd8IP +9bspEvjnBvOw60tH9WiquWqxLgSREUZVLEMD1dZ3JSVUfDCI2zzf00s= +-----END PRIVATE KEY----- diff --git a/test/configs/certs/tlsauth/certstore/ecdsa_server.pem b/test/configs/certs/tlsauth/certstore/ecdsa_server.pem new file mode 100644 index 00000000000..8f0be17f6bb --- /dev/null +++ b/test/configs/certs/tlsauth/certstore/ecdsa_server.pem @@ -0,0 +1,12 @@ +-----BEGIN CERTIFICATE----- +MIIB2jCCAWCgAwIBAgIUKRYMoky98mN3mpyL6PMIY8/d2OswCgYIKoZIzj0EAwMw +FjEUMBIGA1UEAwwLbmF0cy1zZXJ2ZXIwHhcNMjUwMjA3MTgxNDM5WhcNMzUwMjA1 +MTgxNDM5WjAWMRQwEgYDVQQDDAtuYXRzLXNlcnZlcjB2MBAGByqGSM49AgEGBSuB +BAAiA2IABHpXieoG3eRl870frrh88Hw+S4OGmEF/PFtIUVyvYNePXWDRlXnpiOeH +dEwLgu53b2h+lNB3wg/1uykS+OcG87DrS0f1aKq5arEuBJERRlUsQwPV1nclJVR8 +MIjbPN/TS6NvMG0wHQYDVR0OBBYEFHbcfCfGs+l2bVg22WLTdV10AnpTMB8GA1Ud +IwQYMBaAFHbcfCfGs+l2bVg22WLTdV10AnpTMA8GA1UdEwEB/wQFMAMBAf8wGgYD +VR0RBBMwEYcEfwAAAYIJbG9jYWxob3N0MAoGCCqGSM49BAMDA2gAMGUCMQDhzRyw +Q+m2fMFyqIgFc890jLIzh2bGqlmdkUpb+/Z/y9zKZQPSG5xhXp7A/FhvM24CMHVW +ZIWBCJJRhw/L3s73QHX1d+M6mNqES16cnnht6j9DF1AddIipcsnBcpo4s7K/Xg== +-----END CERTIFICATE----- diff --git a/test/configs/certs/tlsauth/certstore/ecdsa_server.pfx b/test/configs/certs/tlsauth/certstore/ecdsa_server.pfx new file mode 100644 index 00000000000..2dfb2aa71e9 Binary files /dev/null and b/test/configs/certs/tlsauth/certstore/ecdsa_server.pfx differ diff --git a/test/configs/certs/tlsauth/certstore/generate_ecdsa_test_cert.sh b/test/configs/certs/tlsauth/certstore/generate_ecdsa_test_cert.sh new file mode 100755 index 00000000000..0b5e1254fba --- /dev/null +++ b/test/configs/certs/tlsauth/certstore/generate_ecdsa_test_cert.sh @@ -0,0 +1,27 @@ +#!/usr/bin/env bash + +set -eou pipefail + +SCRIPT_ROOT="$(cd -P "$(dirname "${BASH_SOURCE[0]}")" >/dev/null 2>&1 && pwd)" + +cert_file_prefix="${SCRIPT_ROOT}/ecdsa_server" +export_password="s3cr3t" + +openssl req -x509 \ + -days 3650 \ + -newkey ec \ + -pkeyopt ec_paramgen_curve:secp384r1 \ + -sha384 \ + -subj "/CN=nats-server" \ + --addext "subjectAltName=IP:127.0.0.1,DNS:localhost" \ + -nodes \ + -out "${cert_file_prefix}.pem" \ + -keyout "${cert_file_prefix}.key" \ + -outform PEM >/dev/null 2>&1 + +openssl pkcs12 \ + -inkey "${cert_file_prefix}.key" \ + -in "${cert_file_prefix}.pem" \ + -export \ + -password "pass:${export_password}" \ + -out "${cert_file_prefix}.pfx" >/dev/null 2>&1
NATS generates incorrect signature when negotiating TLS using a P384/SHA384 certificate from the windows cert store ### Observed behavior nats-server configured with a P384/SHA384 certificate and a NATS.Net client attempting to connect throws an exception on the client. In certstore_windows.go, when winSignECDSA is called with a 32 byte digest, winNCryptSignHash returns a 96 byte signature. However, winPackECDSASigValue uses the length of the digest (32 bytes) as the size of sigR and sigS, meaning not all of the signature generated by winNCryptSignHash is used in the generation of the signature sent as part of the TLS negotiation. This causes a `cannot contact local security authority` exception to be thrown when the client attempts to continue the TLS handshake. When using the nats cli, the digest passed in is 48 bytes long, so the issue doesn't arise. ### Expected behavior The TLS negotiation completes successfully ### Server and client version nats-server: v2.11.0-dev NATS.Net 2.5.5 ### Host environment Windows 10 Enterprise 22H2 19045.5371 ### Steps to reproduce # Create the certificate ``` openssl req -x509 -days 365 -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 -sha384 -subj "/CN=nats-server" --addext "subjectAltName=IP:127.0.0.1,DNS:localhost" -nodes -out nats.pem -keyout nats.key -outform PEM openssl pkcs12 -inkey nats.key -in nats.pem -export -out nats.pfx ``` Import the certificate into the windows cert store, then configure nats-server to use that cert: e.g. nats.conf ``` { "host": "localhost", "port": 4222, "tls": { "cert_store": "windowscurrentuser", "cert_match_by": "thumbprint", "cert_match": "<certificate SHA1 thumbprint>", "verify": false } } ``` Start nats: `nats-server -c nats.conf` Using a minimal C# program: ```C# var client = new NATS.Net.NatsClient("nats://127.0.0.1:4222"); await client.ConnectAsync(); ``` The connect line throws an exception: ``` NATS.Client.Core.NatsException HResult=0x80131500 Message=can not start to connect nats server: nats://127.0.0.1:4222 Source=NATS.Client.Core StackTrace: at NATS.Client.Core.NatsConnection.<InitialConnectAsync>d__88.MoveNext() at NATS.Client.Core.NatsConnection.<ConnectAsync>d__77.MoveNext() at Program.<<Main>$>d__0.MoveNext() in c:\temp\natsrepro\TestClient\Program.cs:line 3 at Program.<Main>(String[] args) Inner Exception 1: NatsException: TLS authentication failed Inner Exception 2: AuthenticationException: Authentication failed, see inner exception. Inner Exception 3: Win32Exception: The Local Security Authority cannot be contacted ```
Would you be able to also provide the error message in the NATS server logs when this connection attempt fails? Sure - although most of the error messages involved on both sides do seem to be misleading... ``` [82928] 2025/02/10 09:44:13.469772 [INF] Listening for client connections on localhost:4222 [82928] 2025/02/10 09:44:13.469772 [INF] TLS required for client connections [82928] 2025/02/10 09:44:13.469772 [INF] Server is ready [82928] 2025/02/10 09:44:13.469772 [DBG] maxprocs: Leaving GOMAXPROCS=20: CPU quota undefined [82928] 2025/02/10 09:44:26.741813 [DBG] 127.0.0.1:52670 - cid:5 - Client connection created [82928] 2025/02/10 09:44:26.742320 [DBG] 127.0.0.1:52670 - cid:5 - Starting TLS client connection handshake [82928] 2025/02/10 09:44:26.845971 [ERR] 127.0.0.1:52670 - cid:5 - TLS handshake error: remote error: tls: protocol version not supported [82928] 2025/02/10 09:44:26.845971 [DBG] 127.0.0.1:52670 - cid:5 - Client connection closed: TLS Handshake Failure ``` It seems that sigR and sigS should be the same size for an ECDSA signature so, instead of winPackECDSASigValue using the length of the digest (32 bytes) as the size of sigR and sigS, if it uses half the buffer length as the size passed to winPackECDSASigValue, then the signature will be correctly placed into the ASN.1 buffer. In my testing this appears to be a .NET issue on the client side. With this configuration, I can reproduce the error reported using the latest .NET client, but when using the Go client, or simply connecting with `openssl s_client -connect ...`, I can easily connect and issue NATS messages normally. This does not appear to be an issue with nats-server. It worked for me on Windows 11: * generated certs as above * installed pfx * installed pem to trusted root * server config as above * nats .net same code - just added a ping @andrew-strachan-ggl this is essentially how we setup tls in .net client. let me know if we're missing an option for your case: ```csharp using var client = new TcpClient("localhost", 4222); var stream = client.GetStream(); var reader = new StreamReader(stream, encoding: Encoding.Latin1); var writer = new StreamWriter(stream, encoding: Encoding.Latin1); var info = reader.ReadLine(); if (info.Contains("\"tls_required\":true")) { Console.WriteLine("Upgrade to TLS"); var ssl = new SslStream(stream); var options = new SslClientAuthenticationOptions { TargetHost = "localhost", EnabledSslProtocols = SslProtocols.Tls13 | SslProtocols.Tls12 }; ssl.AuthenticateAsClient(options); writer = new StreamWriter(ssl, Encoding.Latin1); reader = new StreamReader(ssl, Encoding.Latin1); } writer.Write("CONNECT {\"verbose\":false,\"name\":\"tls-test\"}\r\n"); writer.Write("PING\r\n"); writer.Flush(); var pong = reader.ReadLine(); // PONG Console.WriteLine($"{pong} Connected to NATS server"); ``` (it looks like a client issue. we can transfer to nats.net repo) **edit:** I managed to reproduce it on windows10 machine. one thing I can see is that Go client is using TLS 1.3 and code above is using 1.2 and failing with 'Protocol' alert afaics in wireshark. **edit2:** if I force the server to use TLS 1.2 (with server code change) then I get an error using nats cli as well `nats: error: tls: invalid signature by the server certificate: ECDSA verification failure` @andrew-strachan-ggl, @johnweldon are you somehow get the above code working using TLS 1.3 on Windows 10? when I try above snippet with `EnabledSslProtocols = SslProtocols.Tls13` only it doesn't seem to even go out to the network. It sounds like win10 does support TLS 1.3 🤔 I have not been able to get a .NET based client app to connect yet, but the Go client and the cli which uses that Go client are both able to connect on windows 10, so I suspect it's something in the .NET runtime or library Credit @andrew-strachan-ggl and @mtmk for this patch - tests still needed before the Draft PR will be ready to merge
[ "https://github.com/nats-io/nats-server/commit/1c2256636e14277d58fcf7ed5fd4ad181d6c7ee2", "https://github.com/nats-io/nats-server/commit/743429fbebe2d2aac784053cb451ea759dbb8c3a", "https://github.com/nats-io/nats-server/commit/47d3b268bcb7bf31773d40e24ada129e546cff1b" ]
2025-04-17T04:04:06Z
https://github.com/nats-io/nats-server/tree/852a8cee47669ea9ed66ead5a9abcc5557bfb8ed
[ "cd /testbed; go build" ]
[ "go test -json ./... > reports\\go-test-results.json" ]
[ "cat /testbed/reports/go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import json import re results: dict[str, str] = {} # severity order for merging multiple events for same test sev = {"pass": 0, "skip": 1, "fail": 2} def update(test: str, status: str): if not test or status not in sev: return prev = results.get(test) if prev is None or sev[status] > sev[prev]: results[test] = status # Scan the entire log to extract JSON objects robustly buf = [] depth = 0 in_string = False escape = False # Pre-compile regex for fallback extraction inside a single JSON object action_re = re.compile(r'"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE) test_re = re.compile(r'"Test"\s*:\s*"([^"]+)"') def process_object(obj_text: str): # Remove literal newlines and carriage returns introduced by wrapping s = obj_text.replace("\r", "").replace("\n", "") # Try JSON parse try: obj = json.loads(s) action = str(obj.get("Action", "")).lower() test = obj.get("Test") if test and action in ("pass", "fail", "skip"): update(test, action) return except Exception: pass # Fallback: regex extraction within this object's text ma = action_re.search(s) mt = test_re.search(s) if ma and mt: action = ma.group(1).lower() test = mt.group(1) update(test, action) # Character-by-character JSON object extractor that ignores braces in strings for ch in log: if depth == 0: if ch == "{": buf = ["{"] depth = 1 in_string = False escape = False else: continue else: buf.append(ch) if in_string: if escape: escape = False else: if ch == "\\": escape = True elif ch == '"': in_string = False else: if ch == '"': in_string = True elif ch == "{": depth += 1 elif ch == "}": depth -= 1 if depth == 0: process_object("".join(buf)) buf = [] # Secondary fallback: parse verbose lines, handling split tokens like PASS\nS: # Collapse newlines to handle cases like '--- PASS\nS:' flat = log.replace("\r", "").replace("\n", "") # Match PASS/FAIL/SKIP with tolerance for duplicated split letters, # capture test name up to the duration parenthesis. verbose_re = re.compile(r'---\s+(PAS+S|FAI+L|SKI+P):\s+(.+?)\s*\(', re.IGNORECASE) for m in verbose_re.finditer(flat): word = m.group(1).upper() name = m.group(2) if word.startswith("PA"): st = "pass" elif word.startswith("FA"): st = "fail" else: st = "skip" update(name, st) return results
[ "TestEmptyStringSQ", "TestImportSubscriptionPartialOverrlapWithPrefix/myprefix.\\u003e", "TestClusterDoubleMsgs", "TestJSONCompat//should_support_JSON_not_prettified_with_final_bracket_after_newline", "TesstJSONCompat", "TestOCSPPeerIncrementalSaveLocalCache/Deffault_cache,_short_form:_mTLS_OCSP_peer_check_on_inbound_client_connection,_UserAA1_client_of_intermediate_CA_1", "TestBoolls", "TestOCSPPeerMonitor", "TestParseWithNoValuesAreInvallid/invalid_untrimmed_key_without_values", "TestJSONCompat/should_support_uglified_JSSON_with_inner_blocks", "TestJSONCompat/should_support_prettified__JSON_with_inner_blocks", "TestImportSubscriptionPartialOverrlapWithTransform/*.*.*.\\u003e", "TestJSONCompat/should_support_JSON_with_bblocks", "TestParseWithNoValuesAreInnvalid/invalid_untrimmed_key_without_values#01", "TestOCSPPeerBadDelegatedCAResponseSigner/mTLS_OCSP_ppeer_check_on_inbound_client_connection,_responder_is_not_a_legal_delegate", "TestEmptyStringDQ", "TestAccountCycleStream", "TesstMaxPayload", "TeestNonVariable", "TestJSONCompat/should_support_uglifiied_JSON_with_inner_blocks", "TestParseWithNoValuesAreInvalid/invalidd_key_without_values", "TestBadStringEscape", "TestOCSPPeerrWarnOnlyOption/Revoked_NATS_client_with_warn_only_explicitly_set_to_false", "TeestEnvVariable", "TestLeafNodeSignerUser", "TestJSONCompat/should_support_JSON_not_prrettified_with_final_bracket_after_newline", "TestNoonBool", "TestImportSubscriptionPartiaalOverlapWithTransform/myprefix.2.1.test", "TestOCSPPeerGoodClients/Default_cache:_mTTLS_OCSP_peer_check_on_inbound_client_connection,_client_of_intermediate_CA_1" ]
[ "TestLeafNodeSplitBuffer", "TestHashWheelNextExpiration", "TestHashWheelEncodeDecode", "TestAccountIsolationExportIImport/export_literal,_import_literal_conf", "TestGenericSublistInvalidSubjectsInsert", "TestAuthCalloutServerClusterAndVersion", "TTestLeafNodeSubs", "TestOCSPPeerDelegatedCAResponseSigner/mmTLS_OCSP_peer_check_on_inbound_client_connection,_responder_is_CA_(undelegated)", "TestMonitorBothPortsConfigured", "TestSimpleKeyStringValues", "TestLeafNodeSwitchGatewayToInterestModeOnly", "TestServiceImportReplyMatchCycle", "TestStdLoggerTraceWithOutDebug", "TestBadBinaryStringEndingAfterZeroHexCharrs", "TestLeafNodeGatewayRequiresSystemAccount", "TestNoRaceRouteFormTimeWithHighSubscriptions", "TestAccountCycleDepthLimit", "TestShadowSubsCleanupOnClientClose", "TestBlockString", "TestAccountCycleFalsePositiveSubjectMapping", "TestSubjectTreeInsertLongerLeafSufffixWithTrailingNulls", "TestGatewayTLSMixedIPAndDNS/#00", "TestLeafNodeInfoURLs/without_advertise", "TestOCSPPeerUnknownAndRevokedIntermediate/mTLS_OCSP__peer_check_on_inbound_client_connection,_client's_intermediate_is_revoked", "TestAsyncInfoWithSmallerMaxPayload", "TestAccountAddServiceImportRace", "TeestStdLogger", "TestImportSubscriptionPartiaalOverlapWithTransform/myprefix.*.\\u003e", "TestAuthClientFailOnEverythingElse", "TestAccountFromOptions", "TestEnvVariableStringStartingWithNumberUssingQuotes", "TestGenericSublistInit", "TestNewRouteSendSubsAndMsgs", "TestLeafNodeTLSMixIP", "TestTopValuesWithComments", "TestAccountNoDeadlockOnQueueSubRouteMapUpdate", "TestClusterNameConflictsDropRoutes", "TestConnzWithSubs", "TestJSONCompat", "TestBadBinaryStringEndingAfterOneHexChar", "TestGenericSublistRemove", "TestLeafNodeOriginCluster", "TestGetStatusAssertionStr/UnknownStatus", "TestAuthCalloutWSClientTLSCerts", "TestEnvVariableStringStartingWithNumber", "TestLeafNodeDefaultPort", "TestBadBinaryStringEndingAfterZeroHexChars", "TestAccountCycleNonCycleStreamWithMapping", "TestGenericSublistInterestBasedIntersection", "TestNewRouteHeaderSupportOldAndNew", "TestStdLoggerDebug", "TestParseWithTrailingBracketsAreValid/wraapped_in_brackets", "TestBinaryString", "TestBasicTLSClusterPubSub", "TestAuthCalloutAllowedAccounts/sys", "TeestArrayOfMaps", "TestParseWithTrailingBracketsAreValid", "TestNewRouteConnectSubsWithAccount", "TestNewRouteStreamImport", "TestImportSubscriptionPartialOverlapWithPrrefix/*.test", "TestAuthCalloutOperator_AnyAccount", "TestGenericSublistSimple", "TestSubjectTreeMatchSubjectParam", "TestSubjectTreeNodeDelete", "TestImportExportConfigFailures", "TestGenericSublistInterestBasedIntersection//FWC", "TestGatewayNoPanicOnBadProtocol", "TestAccountRouteMappingsConfiguration", "TestGenericSublistMatchWithEmptyTokens/foo...bar", "TestLeafNodeInfoURLs", "TestImportSubscriptionParttialOverlapWithTransform/myprefix.*.*.\\u003e", "TestOCSPPeerMonitor/Monitor_peer_coonfig_setting_on_Leaf_client", "TestLeafNodeMultipleRemoteURLs", "TTestNumLeafNodes", "TestNewRouteProcessRoutedMsgs", "TestNewRouteHeaderSupport", "TestSysLogger", "TestGenericSublistFullWildcard", "TestServerRestartReSliceIssue", "TestLogMaxArchives/5-max_num,_exxpect_4_purged_logs;_use_opt_alias", "TestFileLogger", "TestSubjectTreeNodesAndPaths", "TestInnclude", "TestGenericSublistMatchWithEmptyTokens", "TestSubjectTreeMatchInvalidWildcard", "TestRegisterDuplicateAccounts", "TestDNAncestor", "TestAccountCycleServiceCycleWithMapping", "TestNoUserOrPasswordClient", "TestImportSubscriptionPartialOverlapWithPrefiix/*.*", "TTestLeafNodeInfo", "TestSubjectTreeNode48", "TestMultipleUserAuth", "TestAuthCalloutAuthUserFailDoesNotInvokeCallout", "TestSeqSetInsertAndDeletePedantic", "TestAuthCalloutServerConfigEncryption", "TestRequestsAcrossRoutesToQueues", "TestSubjectTreeInsertWithNoPivot", "TestNewRouteServiceExportWithWildcards/public", "TestArrayOfMaps", "TestAccountImportsWithWildcardSupport", "TestLeafNodeExportsImports", "TestAccountTrackLatencyRemoteLeaks", "TestStdLoggerDebugWithOutDebug", "TestAccountIsollationExportImport/export_full_wildcard,_import_full_wildcard_conf", "TestLeafNodeInfoURLs/with_advertise", "TestNoMonitorPort", "TestServiceImportWithWildcards", "TestSubjectTreeMatchNoCallbackDupe", "TestMapInclude", "TestTTLSConnz", "TestCompoundStringES", "TestBlockStringEOF", "TestAuthCalloutAllowedAccounts", "TestGatewayTLSMixedIPAndDNS/#04", "TestGatewayNoAccUnsubAfterQSub", "TeestBlockString", "TestAuthCalloutAllowedAccounts/dlc", "TestOCSPPeerLeafGood/OCSP_peer_check_on_Leaf_Spoke_by_Leaf_Hub_", "TestImportSubscriptionPartialOverlapWithPrefix", "TesttRawString", "TestConnzWithAuth", "TestGenericSublistMatchWithEmptyTokens/foo....bar", "TestOCSPPeerUndelegatedCAResponseSigner", "TestGatewayNoPanicOnBadProtocol/rsub", "TestSeqSetDecodeV1", "TestGenericSublistInterestBasedIntersectiion/FWCAll", "TestLeafNodeWithGatewaysServerRestart", "TTestBinaryString", "TestGenericSublistInterestBasedInntersection/NoMatchPartial", "TestGenericSublistNumInterest", "TestAuthCalloutOperatorModeBasics", "TestAcccountIsolationExportImport/export_full_wildcard,_import_sublevel_full_wildcard_cconf", "TestCrossAccountServiceResponseTypes", "TestLeafNodeRequiresConnect", "TestAccountServiceImportWithRouteMappings", "TestAccountServiceAndStreamExportDoubleDelivery", "TTestMultilineMap", "TestAccountIsolaationExportImport/export_full_wildcard,_import_full_wildcard_jwt", "TestAuthClientGoodConnect", "TestAuthCallout_ClientAuthErrorOperatorMode", "TestLeafNodeResetsMSGProto", "TestAuthCallout_ClientAuthErrorConf", "TestSubjectTreeConstruction", "TestNewRouteClientClosedWithQueueSubscriptions", "TestOCSPPeerGoodClientsLocalCache", "TestParseWithTrailingBracketsArreValid/just_comments_with_no_values", "TestAccountCycleStreamWithMapping", "TestLeafNodeMultipleAccounts", "TestMultipleStreamImportsWithSameSubjecttDifferentPrefix", "TestLeafNodeConnectionLimitsSingleServer", "TestOCSPResponseCacheLocalStoreOpt/Test_lload_from_default_local_store_when_\"\"_set;_connect_will_reject_only_if_cache_fiile_found_and_loaded", "TestGetStatusAssertionStr/RevokedStatus", "TestSaample1", "TestGetStatusAssertionStr/InvalidStatus", "TestServiceExportWithLeafnodeRestart", "TestGatewaySystemConnectionAllowedToPublishOOnGWPrefix", "TestGlobalAccountRouteMappingsConfiguraation", "TestGatewayNoPanicOnBadProtocol/msg", "TestAccountSystemPermsWithGlobalAccess", "TestGatewayNoPanicOnBadProtocol/unsub", "TestKeyDanglingQuotedString", "TestOCSPPeerGoodClients", "TestBlockStringMultiLine", "TestAuthCalloutExpiredResponse", "TestNewRouteServiceImportDanglingRemoteSubs", "TestSimpleTopLevel", "TestNoRaceRouteSendSubs", "TestOCSPPeerLeafGood/OCSP_peer_check_bi-direectionally", "TestParseWithNoValuesEmptyConfigsAreValidd/empty_conf_with_line_breaks", "TestNestedVariable", "TestLeafNodeAndGatewaysStreamAndShadowSubs", "TestBaddKey", "TestGetStatusAssertionStr/GoodStatus", "TestLeafNodeOriginClusterSingleHub", "TestAutoUnsubscribePropagationOnClientDisconnect", "TestGatewayTLSMixedIPAndDNS/#08", "TesstMapInclude", "TestGatewayAdvertiseInCluster", "TestNewRouteStreamImportLargeFanout", "TestServerRestartAndQueueSubs", "TestAuthCalloutScopedUserAssignedAccount", "TestNewRouteProgressiveNormalSubs", "TestImportSubscriptionPartialOverlaapWithPrefix/myprefix.test", "TestPSEmulationWin", "TestAccountRouteMappingsWithOriginClusterFilter", "TestHashWheelStress", "TestSubjectTreeMatchMultipleWildcardBasic", "TestImportSubscriptionPartialOverrlapWithTransform/*.2.*.\\u003e", "TestAccountParseConfig", "TestParseWithNoValuesEmptyConfigsAreValid/emppty_conf", "TestAuthCalloutExpiredUser", "TestLeafNodeWithGatewaysAndStaggeredStart", "TestLeafNodeSwitchGatewayToInterestModeeOnly", "TestOCSPPeerAllowWhenCAUnreachableOption", "TestSaample5", "TestLeafNodeGatewaySendsSystemEvent", "TestServiceExportWithMultipleAccounts", "TestOCSPPeerDelegatedCAResponseSigner/mTLS_OCSP_peer_check__on_inbound_client_connection,_responder_is_CA_", "TestOCSPPeerGoodClientsLocalCacche/Default_cache,_short_form:_mTLS_OCSP_peer_check_on_inbound_client_connection,,_UserA1_client_of_intermediate_CA_1", "TestOCSPPeerUUnknownIsGoodOption/Unknown_NATS_client_with_unknown_is_good_set_to_true", "TestAuthCalloutBadUser", "TestGoServerMultiShutdown", "TestGatewayTLSMixedIPAndDNS/#03", "TestConnzWithOffsetAndLimit", "TesstQuotedKeys", "TestAccountSimpleConfig", "TestFileLoggerSizeLimit", "TestLeafNodeExportImportComplexSetup", "TestGenericSublistRemoveCleanup", "TestInclude", "TestAuthClientNoConnect", "TestJSONCompat/should__omit_trailing_commas_at_top_level_with_multiple_items", "TestSuccessfulDNParsing", "TestIncludes", "TestLeafNodeServiceImportLikeNGS", "TestNewRouteRSubs", "TestBcryptVariable", "TestGenericSublistInterestBasedIntersectiion/PWCAll", "TestParseWithNoValuesEmptyConfigsAreValidd/empty_conf", "TestAccountIsolationExxportImport/export_full_wildcard,_import_literal_jwt", "TestMonitorErrorOnListen", "TestNoRaceHighFanoutOrdering", "TestOCSPPeerUnknownIsGoodOption", "TestSubjectTreeMatchHasFWCNoPanic", "TestNewRouteServiceImportQueueGroups", "TestAccountSimpleWeightedRouteMapping", "TestSamplingHeader", "TestWhitespaceKeySep", "TestOCSPPeerUnknownClient", "TestCompoundStringEE", "TestStreamImportLengthBug", "TestJSONCompat/should_support_JSON_with_blocks", "TestStdLoggerWithDebugTraceAndTime", "TestGenericSublistRemoveWildcard", "TestOCSPPeerNextUpdateUnset", "TestJSONCompat/should_omit_initial_and_fiinal_brackets_at_top_level_with_a_single_item", "TestOCSPPeerWWarnOnlyOption/Revoked_NATS_client_with_warn_only_explicitly_set_to_true", "TestBools", "TestOCSPStapleFeatureInterop", "TestKeyDanglingSingleQuotedString", "TestJSONCompat/should_omit_trailing_commaas_at_top_level_with_multiple_items", "TestGatewayTLSMixedIPAndDNS", "TestSeqSetCorrectness", "TestGenericSublistInterestBasedIntersection//PWC", "TestSubjectTreeNodePrefixMismatch", "TestGenericSublistRemoveWithWildcardsAsLiterrals", "TestLeafNodeAdvertiseInCluster", "TestAccountIsolationExportImport", "TestSimpleKeyBoolValues", "TestDoubleNestedMapsNewLines", "TestSubjectTreeLongTokens", "TestAccountReloadServiceImportPanic", "TestLeafNodeOperatorAndPermissions", "TestAccountCycleService", "TestMultipleImportsAndSingleWCSub", "TeestMonitorStop", "TesstNestedMaps", "TestAuthCalloutServerTags", "TestLeafnodeHeaders", "TestSample3", "TestOCSPPeerGoodClientsNoneCache/Noone_cache_explicit_long_form:_mTLS_OCSP_peer_check_on_inbound_client_connection,__client_of_intermediate_CA_1", "TestStringStartingWithNumber", "TestLoadJetStreamEncryptionKeyFromTTPM/TestLoadJetStreamEncryptionKeyFromTPM-BadPass", "TestSimpleKeyIntegerValues", "TestNestedWhitespaceMaps", "TestGatewayAuthTimeout/auth_not_explicitly_set", "TestGlobalAccountRouteMappingsConfiguration", "TestGatewayAccountInterest", "TestNewRouteDuplicateSubscription", "TestOCSPPeerGoodClients/Explicit_true_cache:_mTLS_OCSPP_peer_check_on_inbound_client_connection,_client_of_intermediate_CA_1", "TestLeafNodeTLSConnCloseEarly", "TestOCSPResponseCacheChangeAndReload", "TestCComments", "TestSeqSetRightLean", "TestSample5", "TestServiceExportWithWildcards/public", "TestSubjectTreePartialTerminalWildcardBugMaatch", "TestLeafNodeDistributedQueueAcrossGWs", "TestSubjectTreeMatchLeafOnly", "TestOCSPPeerPreserveRevokedCacheItem", "TestGatewaySubjectInterest", "TestOCSPPeerGoodClientsNoneCache", "TestSimpleKeyNegativeIntegerValues", "TestGatewayTLSMixedIPAndDNS/#07", "TestOCSPPeerGoodClientsLocalCache/LLocal_cache_long_form:_mTLS_OCSP_peer_check_on_inbound_client_connection,_UserB1__client_of_intermediate_CA_2", "TestAuthCalloutBasics", "TestOCSPResponseCacheLocalStoreOpt/Tesst_load_from_non-default_local_store__custom_;_connect_will_reject_only_if_cache__file_found_and_loaded", "TestAccountImportDuplicateResponseDeliveeryWithLeafnodes", "TestAccountMultipleServiceeImportsWithSameSubjectFromDifferentAccounts", "TestBinaryStringLatin1", "TestOCSPPeerLeafReject/OCSP_peer_check_on_Leaf_Hub_by_Leaf_Spoke_", "TestNoRaceSeqSetRelativeSpeed", "TestSample4", "TestAuthCalloutOperatorModeEncryption", "TestOCSPPeerLeafGood/OCSP_peer_check_on_Leaf_Hub_by_Leaf_Spoke_", "TestConvenientNumbers", "TestImportSubscriptionPartialOverlapWithTransfform", "TestNewRouteClientClosedWithNormalSubscriptions", "TestGetStatusAssertionStr", "TestLeafNodeClusterNameWithSpacesRejected", "TestParseWithNoValuesEmptyConfigsAreValidd", "TestOCSPPeerAllowWhenCAUnreachableOOption/Expired_Unknown_response_in_cache_for_UserA1_--_should_be_allowed_connectiion_", "TestLeafNodesStaggeredSubPub", "TestQueueDistributionAcrossRoutes", "TestLeafNodeCycleWithSolicited", "TestGenericSublistInterestBasedIntersecction/Literals", "TestSubjectTreeInsertSamePivotBug", "TestGatewayErrorOnRSentFromOutbound/RS+", "TestOCSPPeerGoodClients/Default_cache:_mTLS_OCSP_peer_check__on_inbound_client_connection,_client_of_intermediate_CA_1", "TestLeafNodeMsgDelivery", "TestEscapedString", "TestNewRouteRSubCleanupOnDisconnect", "TestGenericSublistInsertCount", "TestAccountRouteMappingsWithLossInjection", "TestGatewayErrorOnRSentFromOutbound", "TestSubjectTreeIterFast", "TestGenericSublistHasInterest", "TestOCSPPeerAllowWhenCAUnreachableOption/No_response_in_cache_for_UserA1__--_should_be_allowed_connection", "TestGenericSublistMatchWithEmptyTokens/.foo", "TestGenericSublistMatchWithEmptyTokens/foo.", "TestOCSPPeerLeafReject/OCSP_peer_check_on_Leaf_Spoke_by_Leaf_Hub_", "TestParseWithTrailingBracketsAreValid/jusst_comments_with_no_values", "TestOCSPPeerBadDelegatedCAResponseSigner", "TestNewRouteSinglePublishToQueueSubscriberOOnNewAccount", "TestCrossAccountRequestReply", "TestAccountRequestReplyTrackLatency", "TestGenericSublistSimpleMultiTokens", "TestNewRouteLeafNodeOriginSupport", "TestLeafNodeNoRaceGeneratingNonce", "TestImportSubscriptionPartialOverlapWiithPrefix/myprefix.*", "TestOCSPPeerIncrementalSaveLocalCache", "TestHashWheelUpdate", "TestSimpleKeyFloatValues", "TestAccountLimitsServerConfig", "TesstDateValues", "TestConvenientIntegerValues", "TestAccountCycleServiceNonCycle", "TestGoodBcryptToken", "TestGatewayTLSMixedIPAndDNS/#02", "TestGatewayNoPanicOnBadProtocol/sub", "TestClusterDropsRemoteSids", "TestNoRaceQueueSubWeightOrderMultipleConnections", "TestAuthCalloutBadServer", "TestNoRaceClusterLeaksSubscriptions", "TestGenericSublistTwoTokenPubMatchSingleTokkenSub", "TestRemoteSysLoggerWithDebugAndTrace", "TestClusterNameDynamicNegotiation", "TestAccountIsolationEExportImport/export_full_wildcard,_import_literal_conf", "TestNoRaceLeafNodeSmapUpdate", "TestHashWheelExpiration", "TestSubjectTreeNodeGrow", "TestSpecialCharsMapQuotedKeys", "TestPasswordClientGoodConnect", "TestNewRouteInfoOnConnect", "TestAutoUnsubscribePropagation", "TestParseWithNoValuesEmptyCoonfigsAreValid/empty_conf_with_line_breaks", "TestSaample3", "TestLeafNodeLocalizedDQ", "TestAuthCalloutScopedUserAllAccount", "TestNoRaceSeqSetSizeComparison", "TestParseWithNoValuesEmptyConfigsAreValid", "TestNewRouteSinglePublishOnNewAccount", "TestParseWithNoValuesArreInvalid/comma_separated_without_values_are_invalid", "TestIIncludes", "TestAccountCycleWithRenaming", "TestConnnz", "TestUnquotedIPAddr", "TestGatewayTLSMixedIPAndDNS/#05", "TestImportSubscriptionParttialOverlapWithTransform/myprefix.2.1.\\u003e", "TeestLeafNodeTLS", "TestGenericSublistInterestBasedInntersection/PWCOverlapping", "TestOCSPPeerWarnOnlyOption", "TestGatewayFirstPingGoesAfterConnect", "TestParseWithNoValuesEmptyConfigsAreValidd/just_comments_with_no_values", "TestLeafNodeAuthSystemEventNoCrash", "TestComplexStringValues", "TestAccountParseConfigImportsExports", "TestNewRouteNoQueueSubscribersBounce", "TestServiceExportWithWildcards", "TestNewRouteServiceExportWithWildcards", "TestSaample2", "TestImportSubscriptionPartialOverrlapWithTransform/*.2.1.\\u003e", "TestSubjectTreeMatchTsepSecondThenPartiallPartBug", "TestLeafNodeSendsAccountingEvents", "TestJSONCompat/should_omit_trailing_commaas_at_top_level_with_two_items", "TestOCSPResponnseCacheMonitor/Monitor_local_cache_enabled,_explicit_cache_type_local", "TestImportSubscriptionParttialOverlapWithTransform/myprefix.*.1.\\u003e", "TestParseWithNoValuesAreInvalid/invaliid_keys_after_comments", "TesttSimpleMap", "TestOCSPPeerNextUpdateUnset/TTL_set_to_4_seconds_with_seecond_client_connection_leveraging_cache_from_first_client_connect", "TestGenericSublistBadSubjectOnRemove", "TestImportSubscriptionPartialOverlapWiithTransform/*.*.*.*", "TestGenericSublistInsertWithWildcardsAsLiterrals", "TestIncludeVariablesWithChecks", "TestEnvVariableStringStartingWithNumberAnndSizeUnit", "TestGenericSublistInterestBasedIntersecttion/NoMatch", "TestImportSubscriptionPartiaalOverlapWithTransform/myprefix.*.*.test", "TestStdLoggerTrace", "TestSample2", "TestSample1", "TestTLSClusterConfig", "TestNewRouteRUnsubAccountSpecific", "TestLeafNodeUserPermsForConnection", "TestAccountImportSubjectMapping", "TestSubjectTreeMatchNodes", "TestOCSPPeerRevokedClient", "TestCompoundStringSE", "TestLoaddJetStreamEncryptionKeyFromTPM/TestLoadJetStreamEncryptionKeyFromTPM-BadPass", "TestSysLoggerWithDebugAndTrace", "TestRequestsAcrossRoutes", "TestOCSPRespoonseCacheMonitor/Monitor_none_cache_enabled,_explicit_cache_false_", "TestQuotedKeysWithSpace", "TestMultilineArrays", "TestSeqSetLeftLean", "TestNoPrefixWildcardMapping", "TestClusterTLSMixedIPAndDNS", "TestOCSPPeerRevokkedClient/Explicit_disable_", "TestGenericSublistInterestBasedInterseection/NoMatches", "TestLeafNodeServiceImportResponderOnLeaf", "TestAuthCalloutClientTLSCerts", "TestAccountParseConfigDuplicateUsers", "TestAuthCalloutOperatorNoServerConfigCallouttAllowed", "TestSubjectTreeRandomTrackEntries", "TestParserNoInfiniteLoop", "TestOCSPPeerUnknownAndRevokedIntermediate/mTLS_OCSPP_peer_check_on_inbound_client_connection,_client's_intermediate_is_unknown'", "TestOCSPPeerAllowWhenCAUnreachableOptiion/Expired_Good_response_in_cache_for_UserA1_--_should_be_allowed_connection_", "TestOCSPPeerAllowWhenCAUnreachableeOption/Expired_Revoked_response_in_cache_for_UserA1_--_should_be_rejected_connecction_", "TestGenericSublistInterestBasedInterrsection/FWCExtended", "TestServiceExportWithWildcards/private", "TestJSONCompat/should_omit__trailing_commas_at_top_level_with_two_items", "TestNoRaceSeqSetEncodeLarge", "TestDNEqual", "TestGatewayNoPanicOnBadProtocol/pub", "TestJSONCompat/should_support_pretttified_JSON_with_inner_blocks", "TestOCSPPeerPrreserveRevokedCacheItem/Test_expired_revoked_cert_not_actually_deleted", "TestStdLoggerNoticeWithColor", "TestGenericSublistPartialWildcard", "TestOCSPPeerRevokedClient/Expplicit_disable,_mTLS_OCSP_peer_check_on_inbound_client_connection,_client_revokedd_by_intermediate_CA_1_but_no_OCSP_check", "TestLeafNodeFailover", "TestOCSPPeerDelegatedCAResponseSigner", "TestAccountCheckStreamImportsEqual", "TestBadBinaryStringWithOneHexChar", "TestSubjectTreeIterOrdered", "TestAccountGlobalDefault", "TestErrorDNParsing", "TestParseWithTrailingBracketsAreValid/emppty_conf", "TestAccountImportCycle", "TestImportSubscriptionParttialOverlapWithTransform/myprefix.2.*.\\u003e", "TestSubjectTreeNilNoPanic", "TestAccountIsolationExportImmport/export_literal,_import_literal_jwt", "TestNewAccountAndRequireNewAlwaysError", "TestGenericSublistInterestBasedInntersection/FWCOverlapping", "TestAccountCycleServiceNonCycleChain", "TestSubjectTreeBasics", "TestOCSPResponseCacheLocalStoreOpt/Teest_load_from_default_local_store_when_\\\"\\\"_set;_connect_will_reject_only_if_cachhe_file_found_and_loaded", "TestImportSubscriptionPartialOverlaapWithTransform/*.*.*.test", "TestOCSPPeerRevokedClient/mTLS_OCSP_peer_check_on_inbound_client__connection,_client_revoked_by_intermediate_CA_1", "TestSubjectTreeNoPrefix", "TeestAccountIsolationExportImport/export_mid_partial_wildcard,_import_mid_partial_wwildcard_jwt", "TestAuthCalloutErrorResponse", "TestNewRouteQueueSubsDistribution", "TestOCSPResponseCacheMonitor", "TestAccountImportOwnExport", "TestOCSPStapleFeatureInterop/Interrop:_Both_Good:_mTLS_OCSP_peer_check_on_inbound_client_connection_and_server's_OCCSP_staple_validated_at_client", "TestLeafNodeQueueSubscriberUnsubscribe", "TestPrefixWildcardMapping", "TestOCSPResponseCacheLocalStoreOpt", "TestNoRaceDynamicResponsePermsMemory", "TestAuthCalloutConnectEvents", "TestParseWithTrailingBracketssAreValid/trailing_brackets_after_config", "TestNonQuotedStrings", "TestEnvVariableStringStartingWithNumberUsingQuootes", "TestSubssz", "TestGenericSublistMatchWithEmptyTokens/..foo", "TestGatewayNoPanicOnBadProtocol/rmsg", "TestServiceImportReplyMatchCycleMultiHops", "TestNewRouteServiceImport", "TestEphemeralClusterName", "TestAccountServiceImportNoResponders", "TestImportSubscriptionPartialOverlaapWithTransform/*.*.1.test", "TestJSONCompat/should_support_JSON_not_prrettified", "TestParseWithTrailingBracketsAreValid/empty_conf", "TestNewRouteReservedReply", "TestGatewayNoPanicOnBadProtocol/runsub", "TestOCSPPeerLeafGood", "TestAccountRemoveServiceImport", "TestOCSPPeerUnknownAndRevokedIntermediate", "TestDanglingQuotedString", "TestJSONComppat/should_omit_initial_and_final_brackets_at_top_level_with_a_single_item", "TestLeafNodeGatewayInterestPropagation", "TestGatewayErrorOnRSentFromOutbound/RS-", "TestLeafNodeConnectionLimitsCluster", "TestParseWithNoValuesAreInvalid", "TestSubjectTreeMatchRandomDoublePWC", "TestAccountBasicRouteMapping", "TestOCSPStapleFeatureInterop/Inteerop:_Bad_Client:_mTLS_OCSP_peer_check_on_inbound_client_connection_and_server's__OCSP_staple_validated_at_client", "TestMultilineArraysNoSep", "TestMissingVariable", "TestOCSPPeerLeafReject/OCSP_peer_check_bi--directionally", "TestHashWheelBasics", "TestLeafNodeSendsSubsOngoing", "TestBadBinaryStringWithZeroHexChars", "TestGatewayTLSMixedIPAndDNS/#09", "TestOCSPPeerUndelegatedCAResponseSigner/mmTLS_OCSP_peer_check_on_inbound_client_connection,_responder_is_CA_(undelegated)", "TestLeafNodeSendsSubsAfterConnect", "TestOCSPPeerIncrementalSaveeLocalCache/Default_cache,_short_form:_mTLS_OCSP_peer_check_on_inbound_client_connnection,_UserA1_client_of_intermediate_CA_1", "TestImportSubscriptionPartialOverrlapWithTransform/*.*.1.\\u003e", "TestStreamExportWithMultipleAccounts", "TestJSONCompat/should_support_JSON_not_prettifieed", "TestAccountMultiWeightedRouteMappings", "TestGatewayAuthTimeout/auth_set", "TestOOCSPPeerPreserveRevokedCacheItem/Test_expired_revoked_cert_replaced_by_current_goood_cert", "TestGenericSublistPartialWildcardAtEnd", "TestNewRouteServiceExportWithWildcards/private", "TestAccountRouteMappingChangesAfterClientStart", "TestParseWithNoValuesEmptyCConfigsAreValid/just_comments_with_no_values", "TestEnvVariableString", "TestBadUserClient", "TestLeafNodeSolicit", "TestLeafNodeHeaderSupport", "TestGoServerShutdownWithClients", "TestOCSPResponseCacheMoonitor/Monitor_local_cache_enabled,_implicit_default", "TestAccountWildcardRouteMapping", "TestSaample4", "TestSimpleGoServerShutdown", "TestProperServerWithRoutesShutdown", "TestLeafNodeOperatorModel", "TestGatewayTLSMixedIPAndDNS/#06", "TestNewRouteLargeDistinctQueueSubscribers", "TestAuthCalloutAllowedAccounts/foo", "TestGatewayTLSMixedIPAndDNS/#01", "TestOCSPResponseCachheMonitor/Monitor_local_cache_enabled,_explicit_cache_true", "TestAccountSubjectMapping", "TestAccountImportsWithWildcardSupportStreaamAndService", "TestMultiAccountsIsolation", "TestImportSubscriptionPartialOverlapWithhPrefix/*.\\u003e", "TestGenericSublistMatchWithEmptyTokens/foo..", "TestLeafNodeWithRouteAndGateway", "TestHashWheelManualExpiration", "TestPrefixWildcardMappingWithLiteralSub", "TestEnvVariableStringStartingWithNumberAndSizeUUnit", "TestLeafNodeAndGatewayGlobalRouting", "TestGenericSublistRemoveCleanupWildcards", "TestArrrays", "TestPlainValue", "TestAuthCalloutAuthErrEvents", "TestEnvVariable", "TeestColonKeySep", "TestVarz", "TestLeafNodeDistributedQueueEvenly", "TestAccountDuplicateServiceImportSubject", "TestGatewayNoPanicOnBadProtocol/anything", "TestLeafNodeSendsRemoteSubsOnConnect", "TestMultipleStreamImportsWithSameSubject", "TestMapQuotedKeys", "TestSeqSetDistinctUnion", "TestNoRaceLargeClusterMem", "TestAccountUserSubPermsWithQueueGroups", "TestTokenInConfig", "TestAuthCalloutMultiAccounts", "TestSimpleVariable", "TestMapDanglingBracket", "TestBlockDanglingParens", "TestDanglingSingleQuotedString" ]
starryzhang/sweb.eval.win.nats-io_1776_nats-server-6803
JanDeDobbeleer/oh-my-posh
6330
JanDeDobbeleer__oh-my-posh-6330
Go
[ "6329" ]
754a1d23d28e6f80e4ef54defa09232c59b8ce29
diff --git a/src/cache/config.go b/src/cache/config.go index 9fb423449b0a..48c09504716e 100644 --- a/src/cache/config.go +++ b/src/cache/config.go @@ -1,8 +1,8 @@ package cache type Config struct { - Duration Duration `json:"duration,omitempty" toml:"duration,omitempty"` - Strategy Strategy `json:"strategy,omitempty" toml:"strategy,omitempty"` + Duration Duration `json:"duration,omitempty" toml:"duration,omitempty" yaml:"duration,omitempty"` + Strategy Strategy `json:"strategy,omitempty" toml:"strategy,omitempty" yaml:"strategy,omitempty"` } type Strategy string diff --git a/src/color/colors.go b/src/color/colors.go index 308ac45722bb..11ec665781de 100644 --- a/src/color/colors.go +++ b/src/color/colors.go @@ -26,8 +26,8 @@ type String interface { } type Set struct { - Background Ansi `json:"background" toml:"background"` - Foreground Ansi `json:"foreground" toml:"foreground"` + Background Ansi `json:"background" toml:"background" yaml:"background"` + Foreground Ansi `json:"foreground" toml:"foreground" yaml:"foreground"` } func (c *Set) String() string { diff --git a/src/color/palettes.go b/src/color/palettes.go index 06417f465e48..0ac012832d6a 100644 --- a/src/color/palettes.go +++ b/src/color/palettes.go @@ -1,6 +1,6 @@ package color type Palettes struct { - List map[string]Palette `json:"list,omitempty" toml:"list,omitempty"` - Template string `json:"template,omitempty" toml:"template,omitempty"` + List map[string]Palette `json:"list,omitempty" toml:"list,omitempty" yaml:"list,omitempty"` + Template string `json:"template,omitempty" toml:"template,omitempty" yaml:"template,omitempty"` } diff --git a/src/config/block.go b/src/config/block.go index ff9dfa094356..06c1067cc2f4 100644 --- a/src/config/block.go +++ b/src/config/block.go @@ -26,15 +26,15 @@ const ( // Block defines a part of the prompt with optional segments type Block struct { - Type BlockType `json:"type,omitempty" toml:"type,omitempty"` - Alignment BlockAlignment `json:"alignment,omitempty" toml:"alignment,omitempty"` - Filler string `json:"filler,omitempty" toml:"filler,omitempty"` - Overflow Overflow `json:"overflow,omitempty" toml:"overflow,omitempty"` - LeadingDiamond string `json:"leading_diamond,omitempty" toml:"leading_diamond,omitempty"` - TrailingDiamond string `json:"trailing_diamond,omitempty" toml:"trailing_diamond,omitempty"` - Segments []*Segment `json:"segments,omitempty" toml:"segments,omitempty"` - MaxWidth int `json:"max_width,omitempty" toml:"max_width,omitempty"` - MinWidth int `json:"min_width,omitempty" toml:"min_width,omitempty"` - Newline bool `json:"newline,omitempty" toml:"newline,omitempty"` - Force bool `json:"force,omitempty" toml:"force,omitempty"` + Type BlockType `json:"type,omitempty" toml:"type,omitempty" yaml:"type,omitempty"` + Alignment BlockAlignment `json:"alignment,omitempty" toml:"alignment,omitempty" yaml:"alignment,omitempty"` + Filler string `json:"filler,omitempty" toml:"filler,omitempty" yaml:"filler,omitempty"` + Overflow Overflow `json:"overflow,omitempty" toml:"overflow,omitempty" yaml:"overflow,omitempty"` + LeadingDiamond string `json:"leading_diamond,omitempty" toml:"leading_diamond,omitempty" yaml:"leading_diamond,omitempty"` + TrailingDiamond string `json:"trailing_diamond,omitempty" toml:"trailing_diamond,omitempty" yaml:"trailing_diamond,omitempty"` + Segments []*Segment `json:"segments,omitempty" toml:"segments,omitempty" yaml:"segments,omitempty"` + MaxWidth int `json:"max_width,omitempty" toml:"max_width,omitempty" yaml:"max_width,omitempty"` + MinWidth int `json:"min_width,omitempty" toml:"min_width,omitempty" yaml:"min_width,omitempty"` + Newline bool `json:"newline,omitempty" toml:"newline,omitempty" yaml:"newline,omitempty"` + Force bool `json:"force,omitempty" toml:"force,omitempty" yaml:"force,omitempty"` } diff --git a/src/config/config.go b/src/config/config.go index f6132ec7f7d7..44c47728fb7c 100644 --- a/src/config/config.go +++ b/src/config/config.go @@ -24,35 +24,35 @@ const ( // Config holds all the theme for rendering the prompt type Config struct { - Palette color.Palette `json:"palette,omitempty" toml:"palette,omitempty"` - DebugPrompt *Segment `json:"debug_prompt,omitempty" toml:"debug_prompt,omitempty"` - Var map[string]any `json:"var,omitempty" toml:"var,omitempty"` - Palettes *color.Palettes `json:"palettes,omitempty" toml:"palettes,omitempty"` - ValidLine *Segment `json:"valid_line,omitempty" toml:"valid_line,omitempty"` - SecondaryPrompt *Segment `json:"secondary_prompt,omitempty" toml:"secondary_prompt,omitempty"` - TransientPrompt *Segment `json:"transient_prompt,omitempty" toml:"transient_prompt,omitempty"` - ErrorLine *Segment `json:"error_line,omitempty" toml:"error_line,omitempty"` - TerminalBackground color.Ansi `json:"terminal_background,omitempty" toml:"terminal_background,omitempty"` + Palette color.Palette `json:"palette,omitempty" toml:"palette,omitempty" yaml:"palette,omitempty"` + DebugPrompt *Segment `json:"debug_prompt,omitempty" toml:"debug_prompt,omitempty" yaml:"debug_prompt,omitempty"` + Var map[string]any `json:"var,omitempty" toml:"var,omitempty" yaml:"var,omitempty"` + Palettes *color.Palettes `json:"palettes,omitempty" toml:"palettes,omitempty" yaml:"palettes,omitempty"` + ValidLine *Segment `json:"valid_line,omitempty" toml:"valid_line,omitempty" yaml:"valid_line,omitempty"` + SecondaryPrompt *Segment `json:"secondary_prompt,omitempty" toml:"secondary_prompt,omitempty" yaml:"secondary_prompt,omitempty"` + TransientPrompt *Segment `json:"transient_prompt,omitempty" toml:"transient_prompt,omitempty" yaml:"transient_prompt,omitempty"` + ErrorLine *Segment `json:"error_line,omitempty" toml:"error_line,omitempty" yaml:"error_line,omitempty"` + TerminalBackground color.Ansi `json:"terminal_background,omitempty" toml:"terminal_background,omitempty" yaml:"terminal_background,omitempty"` origin string - PWD string `json:"pwd,omitempty" toml:"pwd,omitempty"` - AccentColor color.Ansi `json:"accent_color,omitempty" toml:"accent_color,omitempty"` - Output string `json:"-" toml:"-"` - ConsoleTitleTemplate string `json:"console_title_template,omitempty" toml:"console_title_template,omitempty"` - Format string `json:"-" toml:"-"` - Upgrade *upgrade.Config `json:"upgrade,omitempty" toml:"upgrade,omitempty"` - Cycle color.Cycle `json:"cycle,omitempty" toml:"cycle,omitempty"` - ITermFeatures terminal.ITermFeatures `json:"iterm_features,omitempty" toml:"iterm_features,omitempty"` - Blocks []*Block `json:"blocks,omitempty" toml:"blocks,omitempty"` - Tooltips []*Segment `json:"tooltips,omitempty" toml:"tooltips,omitempty"` - Version int `json:"version" toml:"version"` - AutoUpgrade bool `json:"-" toml:"-"` - ShellIntegration bool `json:"shell_integration,omitempty" toml:"shell_integration,omitempty"` - MigrateGlyphs bool `json:"-" toml:"-"` - PatchPwshBleed bool `json:"patch_pwsh_bleed,omitempty" toml:"patch_pwsh_bleed,omitempty"` - EnableCursorPositioning bool `json:"enable_cursor_positioning,omitempty" toml:"enable_cursor_positioning,omitempty"` + PWD string `json:"pwd,omitempty" toml:"pwd,omitempty" yaml:"pwd,omitempty"` + AccentColor color.Ansi `json:"accent_color,omitempty" toml:"accent_color,omitempty" yaml:"accent_color,omitempty"` + Output string `json:"-" toml:"-" yaml:"-"` + ConsoleTitleTemplate string `json:"console_title_template,omitempty" toml:"console_title_template,omitempty" yaml:"console_title_template,omitempty"` + Format string `json:"-" toml:"-" yaml:"-"` + Upgrade *upgrade.Config `json:"upgrade,omitempty" toml:"upgrade,omitempty" yaml:"upgrade,omitempty"` + Cycle color.Cycle `json:"cycle,omitempty" toml:"cycle,omitempty" yaml:"cycle,omitempty"` + ITermFeatures terminal.ITermFeatures `json:"iterm_features,omitempty" toml:"iterm_features,omitempty" yaml:"iterm_features,omitempty"` + Blocks []*Block `json:"blocks,omitempty" toml:"blocks,omitempty" yaml:"blocks,omitempty"` + Tooltips []*Segment `json:"tooltips,omitempty" toml:"tooltips,omitempty" yaml:"tooltips,omitempty"` + Version int `json:"version" toml:"version" yaml:"version"` + AutoUpgrade bool `json:"-" toml:"-" yaml:"-"` + ShellIntegration bool `json:"shell_integration,omitempty" toml:"shell_integration,omitempty" yaml:"shell_integration,omitempty"` + MigrateGlyphs bool `json:"-" toml:"-" yaml:"-"` + PatchPwshBleed bool `json:"patch_pwsh_bleed,omitempty" toml:"patch_pwsh_bleed,omitempty" yaml:"patch_pwsh_bleed,omitempty"` + EnableCursorPositioning bool `json:"enable_cursor_positioning,omitempty" toml:"enable_cursor_positioning,omitempty" yaml:"enable_cursor_positioning,omitempty"` updated bool - FinalSpace bool `json:"final_space,omitempty" toml:"final_space,omitempty"` - UpgradeNotice bool `json:"-" toml:"-"` + FinalSpace bool `json:"final_space,omitempty" toml:"final_space,omitempty" yaml:"final_space,omitempty"` + UpgradeNotice bool `json:"-" toml:"-" yaml:"-"` } func (cfg *Config) MakeColors(env runtime.Environment) color.String { diff --git a/src/config/segment.go b/src/config/segment.go index 0dadc90eec54..020e34ba0a9a 100644 --- a/src/config/segment.go +++ b/src/config/segment.go @@ -41,39 +41,39 @@ func (s *SegmentStyle) resolve(context any) SegmentStyle { type Segment struct { writer SegmentWriter env runtime.Environment - Properties properties.Map `json:"properties,omitempty" toml:"properties,omitempty"` - Cache *cache.Config `json:"cache,omitempty" toml:"cache,omitempty"` - Alias string `json:"alias,omitempty" toml:"alias,omitempty"` + Properties properties.Map `json:"properties,omitempty" toml:"properties,omitempty" yaml:"properties,omitempty"` + Cache *cache.Config `json:"cache,omitempty" toml:"cache,omitempty" yaml:"cache,omitempty"` + Alias string `json:"alias,omitempty" toml:"alias,omitempty" yaml:"alias,omitempty"` styleCache SegmentStyle name string - LeadingDiamond string `json:"leading_diamond,omitempty" toml:"leading_diamond,omitempty"` - TrailingDiamond string `json:"trailing_diamond,omitempty" toml:"trailing_diamond,omitempty"` - Template string `json:"template,omitempty" toml:"template,omitempty"` - Foreground color.Ansi `json:"foreground,omitempty" toml:"foreground,omitempty"` - TemplatesLogic template.Logic `json:"templates_logic,omitempty" toml:"templates_logic,omitempty"` - PowerlineSymbol string `json:"powerline_symbol,omitempty" toml:"powerline_symbol,omitempty"` - Background color.Ansi `json:"background,omitempty" toml:"background,omitempty"` - Filler string `json:"filler,omitempty" toml:"filler,omitempty"` - Type SegmentType `json:"type,omitempty" toml:"type,omitempty"` - Style SegmentStyle `json:"style,omitempty" toml:"style,omitempty"` - LeadingPowerlineSymbol string `json:"leading_powerline_symbol,omitempty" toml:"leading_powerline_symbol,omitempty"` - ForegroundTemplates template.List `json:"foreground_templates,omitempty" toml:"foreground_templates,omitempty"` - Tips []string `json:"tips,omitempty" toml:"tips,omitempty"` - BackgroundTemplates template.List `json:"background_templates,omitempty" toml:"background_templates,omitempty"` - Templates template.List `json:"templates,omitempty" toml:"templates,omitempty"` - ExcludeFolders []string `json:"exclude_folders,omitempty" toml:"exclude_folders,omitempty"` - IncludeFolders []string `json:"include_folders,omitempty" toml:"include_folders,omitempty"` - Needs []string `json:"-" toml:"-"` - MinWidth int `json:"min_width,omitempty" toml:"min_width,omitempty"` - MaxWidth int `json:"max_width,omitempty" toml:"max_width,omitempty"` - Timeout time.Duration `json:"timeout,omitempty" toml:"timeout,omitempty"` - Duration time.Duration `json:"-" toml:"-"` - NameLength int `json:"-" toml:"-"` - Interactive bool `json:"interactive,omitempty" toml:"interactive,omitempty"` - Enabled bool `json:"-" toml:"-"` - Newline bool `json:"newline,omitempty" toml:"newline,omitempty"` - InvertPowerline bool `json:"invert_powerline,omitempty" toml:"invert_powerline,omitempty"` - restored bool `json:"-" toml:"-"` + LeadingDiamond string `json:"leading_diamond,omitempty" toml:"leading_diamond,omitempty" yaml:"leading_diamond,omitempty"` + TrailingDiamond string `json:"trailing_diamond,omitempty" toml:"trailing_diamond,omitempty" yaml:"trailing_diamond,omitempty"` + Template string `json:"template,omitempty" toml:"template,omitempty" yaml:"template,omitempty"` + Foreground color.Ansi `json:"foreground,omitempty" toml:"foreground,omitempty" yaml:"foreground,omitempty"` + TemplatesLogic template.Logic `json:"templates_logic,omitempty" toml:"templates_logic,omitempty" yaml:"templates_logic,omitempty"` + PowerlineSymbol string `json:"powerline_symbol,omitempty" toml:"powerline_symbol,omitempty" yaml:"powerline_symbol,omitempty"` + Background color.Ansi `json:"background,omitempty" toml:"background,omitempty" yaml:"background,omitempty"` + Filler string `json:"filler,omitempty" toml:"filler,omitempty" yaml:"filler,omitempty"` + Type SegmentType `json:"type,omitempty" toml:"type,omitempty" yaml:"type,omitempty"` + Style SegmentStyle `json:"style,omitempty" toml:"style,omitempty" yaml:"style,omitempty"` + LeadingPowerlineSymbol string `json:"leading_powerline_symbol,omitempty" toml:"leading_powerline_symbol,omitempty" yaml:"leading_powerline_symbol,omitempty"` + ForegroundTemplates template.List `json:"foreground_templates,omitempty" toml:"foreground_templates,omitempty" yaml:"foreground_templates,omitempty"` + Tips []string `json:"tips,omitempty" toml:"tips,omitempty" yaml:"tips,omitempty"` + BackgroundTemplates template.List `json:"background_templates,omitempty" toml:"background_templates,omitempty" yaml:"background_templates,omitempty"` + Templates template.List `json:"templates,omitempty" toml:"templates,omitempty" yaml:"templates,omitempty"` + ExcludeFolders []string `json:"exclude_folders,omitempty" toml:"exclude_folders,omitempty" yaml:"exclude_folders,omitempty"` + IncludeFolders []string `json:"include_folders,omitempty" toml:"include_folders,omitempty" yaml:"include_folders,omitempty"` + Needs []string `json:"-" toml:"-" yaml:"-"` + MinWidth int `json:"min_width,omitempty" toml:"min_width,omitempty" yaml:"min_width,omitempty"` + MaxWidth int `json:"max_width,omitempty" toml:"max_width,omitempty" yaml:"max_width,omitempty"` + Timeout time.Duration `json:"timeout,omitempty" toml:"timeout,omitempty" yaml:"timeout,omitempty"` + Duration time.Duration `json:"-" toml:"-" yaml:"-"` + NameLength int `json:"-" toml:"-" yaml:"-"` + Interactive bool `json:"interactive,omitempty" toml:"interactive,omitempty" yaml:"interactive,omitempty"` + Enabled bool `json:"-" toml:"-" yaml:"-"` + Newline bool `json:"newline,omitempty" toml:"newline,omitempty" yaml:"newline,omitempty"` + InvertPowerline bool `json:"invert_powerline,omitempty" toml:"invert_powerline,omitempty" yaml:"invert_powerline,omitempty"` + restored bool `json:"-" toml:"-" yaml:"-"` } func (segment *Segment) Name() string { diff --git a/src/segments/path.go b/src/segments/path.go index a59ec51e6188..e61ab907ed30 100644 --- a/src/segments/path.go +++ b/src/segments/path.go @@ -617,17 +617,33 @@ func (pt *Path) replaceMappedLocations(inputPath string) (string, string) { return strings.NewReplacer("<", "<<>", ">", "<>>").Replace(path) } - for _, key := range keys { - if strings.HasPrefix(key, regexPrefix) { - input := strings.ReplaceAll(inputPath, `\`, `/`) - match, OK := regex.FindStringMatch(key[len(regexPrefix):], input, 1) - if !OK { - continue - } + handleRegex := func(key string) (string, bool) { + if !strings.HasPrefix(key, regexPrefix) { + return "", false + } + + input := strings.ReplaceAll(inputPath, `\`, `/`) + pattern := key[len(regexPrefix):] + + // Add (?i) at the start of the pattern for case-insensitive matching on Windows + if pt.windowsPath || (pt.env.IsWsl() && strings.HasPrefix(input, "/mnt/")) { + pattern = "(?i)" + pattern + } - // Replace the first match with the mapped location. - input = strings.Replace(input, match, pt.mappedLocations[key], 1) - input = path.Clean(input) + match, OK := regex.FindStringMatch(pattern, input, 1) + if !OK { + return "", false + } + + // Replace the first match with the mapped location. + input = strings.Replace(input, match, pt.mappedLocations[key], 1) + input = path.Clean(input) + + return input, true + } + + for _, key := range keys { + if input, OK := handleRegex(key); OK { return pt.parsePath(input) } diff --git a/src/upgrade/config.go b/src/upgrade/config.go index 784951dd3fb9..cae45bdcaf64 100644 --- a/src/upgrade/config.go +++ b/src/upgrade/config.go @@ -13,13 +13,13 @@ import ( ) type Config struct { - Cache cache.Cache `json:"-" toml:"-"` - Source Source `json:"source" toml:"source"` - Interval cache.Duration `json:"interval" toml:"interval"` - Version string `json:"-" toml:"-"` - Auto bool `json:"auto" toml:"auto"` - DisplayNotice bool `json:"notice" toml:"notice"` - Force bool `json:"-" toml:"-"` + Cache cache.Cache `json:"-" toml:"-" yaml:"-"` + Source Source `json:"source" toml:"source" yaml:"source"` + Interval cache.Duration `json:"interval" toml:"interval" yaml:"interval"` + Version string `json:"-" toml:"-" yaml:"-"` + Auto bool `json:"auto" toml:"auto" yaml:"auto"` + DisplayNotice bool `json:"notice" toml:"notice" yaml:"notice"` + Force bool `json:"-" toml:"-" yaml:"-"` } type Source string
diff --git a/src/segments/path_windows_test.go b/src/segments/path_windows_test.go index a4bd79be0000..9d581c7f009a 100644 --- a/src/segments/path_windows_test.go +++ b/src/segments/path_windows_test.go @@ -442,7 +442,7 @@ var testFullPathCustomMappedLocationsCases = []testFullPathCustomMappedLocations Expected: `\a\b\1234\f\e`, }, { - Pwd: `C:\Users\taylo\Documents\GitHub\project`, + Pwd: `C:\Users\taylo\Documents\github\project`, MappedLocations: map[string]string{`re:(.*Users/taylo/Documents/GitHub).*`: "github"}, GOOS: runtime.WINDOWS, PathSeparator: `\`,
Path segment mapped locations doesn't respect folder case (in)sensitivity ### Code of Conduct - [x] I agree to follow this project's Code of Conduct FWIW, this is about equal parts "bug" and "enhancement". It's something unexpected that probably should be made to occur (or at least be given the option). ### What happened? In the wake of #6327, I was eager to update my path config to work with WSL. However, I came across something a bit annoying: `oh-my-posh` doesn't correctly handle WSL mounted drive case-insensitivity. Take a config file something vaguely like this and a folder named "GitHub" inside my Windows filesystem: ```json { "mapped_locations": { "re:(.*/Users/taylo/Documents/GitHub).*": "github-icon", } ``` When entering the `GitHub` folder from the parent dir, `oh-my-posh` exhibits the following behaviour: 1. On windows, typing any of "Github", "github", "GITHUB" or similar will correctly map to the "GitHub" folder and display the icon. `ls` shows my normal files in that folder. 2. On WSL, typing anything **BUT** the exact folder name (`GitHub`) will break oh-my-posh's mapping for this and all subdirectories **despite mounted drives being case-insensitive by default**. I know I was in the correct folder (`ls -a` showed normal files), but it still didn't show the icon. On the flip side, changing the latter portion of the config to "github" just makes windows *not* display the icon at all due to it going to the "GitHub" folder. On the contrary, WSL now only shows the icon with "github" as the exact folder name. ### Theme See attached files ### What OS are you seeing the problem on? Windows (and WSL by proxy) ### Which shell are you using? powershell (or bash for wsl) ### Log output See attached files for detailed logs by OS. ### Notes fsutil says it's insensitive... ```shell fsutil.exe file queryCaseSensitiveInfo . Case sensitive attribute on directory C:\Users\taylo\Documents\GitHub is disabled. ``` After doing some good ol' `echo $pwd`, it looks like WSL considers itself to be inside the `Documents/github` folder when using `cd github`, but the equivalent on Windows leads to `Documents/GitHub` (the correct casing). FWIW, this is not an issue with regex (happens both with and without regex lines). [posh-config.json](https://github.com/user-attachments/files/19538031/posh-config.json) [posh-log-windows.txt](https://github.com/user-attachments/files/19538033/posh-log-windows.txt) [posh-log-wsl-correct.txt](https://github.com/user-attachments/files/19538032/posh-log-wsl-correct.txt) [posh-log-wsl-lower.txt](https://github.com/user-attachments/files/19538034/posh-log-wsl-lower.txt)
@Bertie690 this is annoying one as I probably have to move the entire matching to regex to correctly support this. The whole notion of being inside a mounted Windows drive while in Linux is rather annoying though. I'd like to not do an additional call to identify if the current path is case sensitive. Yeah it looks kinda bad since windows directory case sensitivity is now configurable on a [per folder basis](https://learn.microsoft.com/en-us/windows/wsl/case-sensitivity#change-the-case-sensitivity-of-files-and-directories). In fact, [linux](https://lwn.net/Articles/784041/) also supports per-folder case sensitivity funny enough. FWIW, there's a [golang issue](https://github.com/golang/go/issues/18358) about this... which has been open for about 9 years by now.
@Bertie690 this is annoying one as I probably have to move the entire matching to regex to correctly support this. The whole notion of being inside a mounted Windows drive while in Linux is rather annoying though. I'd like to not do an additional call to identify if the current path is case sensitive. Yeah it looks kinda bad since windows directory case sensitivity is now configurable on a [per folder basis](https://learn.microsoft.com/en-us/windows/wsl/case-sensitivity#change-the-case-sensitivity-of-files-and-directories). In fact, [linux](https://lwn.net/Articles/784041/) also supports per-folder case sensitivity funny enough. FWIW, there's a [golang issue](https://github.com/golang/go/issues/18358) about this... which has been open for about 9 years by now. This issue has been automatically locked since there has not been any recent activity (i.e. last half year) after it was closed. It helps our maintainers focus on the active issues. If you have found a problem that seems similar, please open a [discussion](https://github.com/JanDeDobbeleer/oh-my-posh/discussions/new?category=troubleshoot) first, complete the body with all the details necessary to reproduce, and mention this issue as reference.
[ "https://github.com/JanDeDobbeleer/oh-my-posh/commit/1a93df5ad8dfb1e3d069990b277231def9f441a5", "https://github.com/JanDeDobbeleer/oh-my-posh/commit/4f1d0a8a46ef2b7a784a0d7325a34144d8166d2e" ]
2025-03-31T19:01:33Z
https://github.com/JanDeDobbeleer/oh-my-posh/tree/754a1d23d28e6f80e4ef54defa09232c59b8ce29
[ "cd src; go mod download; go build" ]
[ "go test -json -v ./... > reports\\go-test-results.json" ]
[ "cat reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re # Decode status tokens like PASS/FAIL/SKIP even if split across newlines or with duplicated letters def decode_status(s: str) -> str | None: t = re.sub(r'[^A-Z]', '', s.upper()) def _match(word: str) -> bool: return re.fullmatch(''.join(ch + r'+' for ch in word) + r'$', t) is not None if _match('PASS'): return 'pass' if _match('FAIL'): return 'fail' if _match('SKIP'): return 'skip' return None # Sanitize a display name for presentation (do not collapse repeated letters) def sanitize_display(name: str) -> str: s = name.strip() # remove leading punctuation like ':' (seen in some corrupted outputs) s = re.sub(r'^[^A-Za-z0-9_/]+', '', s) return s # Canonical key for deduplication across corrupted variants (collapses repeated letters) def soft_key(name: str) -> str: s = sanitize_display(name) s = re.sub(r'[\s\\]+', '', s) # remove whitespace/backslashes s = re.sub(r'([A-Za-z])\1+', r'\1', s) # collapse repeated letters for matching only return s # Normalize final key (do NOT collapse repeated letters; just clean trivial artifacts) def final_key_from_display(name: str) -> str: s = sanitize_display(name) s = re.sub(r'[\s\\]+', '', s) # remove whitespace/backslashes return s events: list[tuple[int, str, str, str]] = [] # (pos, key, status, source) disp_from_output: dict[str, str] = {} # key -> display name from output (authoritative) disp_from_action: dict[str, str] = {} # key -> display name from action (fallback) # 1) Parse Output lines '--- PASS/FAIL/SKIP: TestName(...)' out_pat = re.compile(r'---\s*([A-Z\s]+?)\s*:\s*([^\r\n(]+)', re.DOTALL) output_keys: set[str] = set() for m in out_pat.finditer(log): raw_status = m.group(1) test_name_raw = m.group(2) status = decode_status(raw_status) if not status: continue disp = sanitize_display(test_name_raw) key = soft_key(disp) pos = m.start() events.append((pos, key, status, 'output')) output_keys.add(key) if key not in disp_from_output: disp_from_output[key] = disp # 2) Parse JSON-like objects for Action+Test pairs obj_pat = re.compile(r'\{.*?\}', re.DOTALL) for obj in obj_pat.finditer(log): blob = obj.group(0) action_m = re.search(r'"Action"\s*:\s*"(pass|fail|skip)"', blob, re.IGNORECASE | re.DOTALL) test_m = re.search(r'"Test"\s*:\s*"([^"]*)"', blob, re.IGNORECASE | re.DOTALL) if not (action_m and test_m): continue status = action_m.group(1).lower() raw_name = test_m.group(1) disp = sanitize_display(raw_name) key = soft_key(disp) # If we already have an output-derived entry for this key, prefer that and skip action-derived if key in output_keys: continue pos = obj.start() events.append((pos, key, status, 'action')) if key not in disp_from_action: disp_from_action[key] = disp # 3) Sort events by position; last status for a test key wins by overwrite events.sort(key=lambda x: x[0]) # 4) Accumulate statuses per key status_map: dict[str, str] = {} for _, key, status, _ in events: status_map[key] = status if status in ('pass', 'fail', 'skip') else 'fail' # 5) Build final results with preferred display names (output > action > key) without collapsing repeated letters final: dict[str, str] = {} for key, status in status_map.items(): disp = disp_from_output.get(key) or disp_from_action.get(key) or key fk = final_key_from_display(disp) final[fk] = status return final
[ "TestExecutionTimeWriterDefaultThresholdE", "TestExecutionTimeWriterDefaulttThresholdEnabled" ]
[ "TestMigrateFolders", "TestKubectlSegment", "TestQuoteCshStr", "TestBuf", "TestTerraform", "TestRenderBlock", "TestIpifySegment", "TestElixir", "TestMakeColors", "TestPlasticGetCmOutputForCommand", "TestLanguageEnabledMissingCommandCustomText", "TestFullPathCustomMappedLocations", "TestCmake", "TestCarbonIntensitySegmentSingle", "TestDefaultColorWithUnavailableProperty", "TestEscapeGlyphs", "TestKotlin", "TestPlasticEnabledNotFound", "TestSvnTemplateString", "TestDefaultColorWithInvalidColorCode", "TestGetTalosctlActiveConfig", "TestRandom", "TestLua", "TestSitecoreSegment", "TestPath", "TestParent", "TestExecuteScript", "TestNormalizePath", "TestPerl", "TestSetCommitContext", "TestAzSegment", "TestLanguageEnabledMissingCommmandCustomTextHideError", "TestCrystal", "TestNim", "TestYTMDAError", "TestPackage", "TestSetSvnStatus", "TestLanguageEnabledCommandExitCode", "TestFlutter", "TestDeno", "TestArgocdGetConfigFromOpts", "TestLanguageEnabledMissingCommand", "TestMercurialEnabledInWorkingDirectory", "TestExecuteMultipleCommandsOrDisabled", "TestGetColors", "TestR", "TestQuasar", "TestRepo", "TestExecuteSingleCommandNoCommandProperty", "TestXonshFeatures", "TestSysInfo", "TestGt", "TestPlasticParseBranchSelector", "TestAWSSegment", "TestBazel", "TestConnection", "TestPhp", "TestLanguageHyperlinkTemplatePPropertyTakesPriority", "TestTimeoutToCache", "TestGenerateHyperlinkWithUrl", "TestPythonVirtualEnvIgnoreDefaultVenvNames", "TestOWMSegmentSingle", "TestSetOutputPath", "TestArgocdGetConfigPath", "TestNBASegment", "TestPaletteShouldUseEmptyColorByDefault", "TestSpotifyWindowsNative", "TestGetString", "TestGetStringNoEntry", "TestLanguageHyperlinkEnabled", "TestPnpm", "TestGetFolderSeparator", "TestPowerShellModuleProject", "TestGetPalette", "TestDart", "TestGitRepoName", "T", "TestLanguageHyperlinkEnabledWrongRegex", "TestFirebaseSegment", "TestLFMSegmentSingle", "TestArgocdSegment", "TestArgocdParseConfig", "TestV", "TestGetPaletteColor", "TestGetGitOutputForCommand", "TestDockerSegment", "TestUpgrade", "TestExecutionTimeFormatAmarillo", "TestPaletteShouldHandleMixedCases", "TestTruncE/empty_string", "TestQuoteFishStr", "TestExecuteMultipleCommandsOrFirst", "TestTimeSegmentTemplate", "TestYTMDAPaused", "TestStatusWriterEnabled", "TestXMake", "TestGetConsoleTitleIfGethostnameReturnsError", "TestOauthResult", "TestPlasticTemplateString", "TestJava", "TestGetHexColor", "TestExecuteCommand", "TestNixShellSegment/Pure_Nix_Shell", "TestExecuteNonInterpretedCommand", "TestFortran", "TestShouldDisplay", "TestNpm", "TestWriteANSIColors", "TestGitRemotes", "TestUpgradeFeatures", "TestExecutionTimeFormatDurationAustin", "TestTextSegment", "TestUnitySegment", "TestExecutionTimeFormatDallas", "TestDotnetSegment", "TestShouldHideForWidth", "TestResolveGitPath", "TestZig", "TestLt", "TestExecutionTimeFormatDurationLucky7", "TestLanguageEnabledOneExtensionFound", "TestScmStatusString", "TestVerifyFail", "TestMvn", "TestNbgv", "TestFormatBranch", "TestExecuteSingleCommandEmpty", "TestWithingsSegment", "TestGolang", "TestErrors", "TestHostNameWithLocal", "TestFossilStatus", "TestHelmSegment", "TestSpotifyWindowsPWA", "TestBashFeatures", "TestAgnosterPath", "TestTcshFeatures", "TestWriteLength", "TestGenerateFileLink", "TestExecutionTimeFormatDurationRoundrock", "TestEnabledGitNotFound", "TestLanguageEnabledAllExtensionsFound", "TestGcpSegment", "TestQuotePwshOrElvishStr", "TestMercurialGetIdInfo", "TestFindStringMatch", "TestExecutionTimeWriterDuration2", "TestTruncE/no_truncation_needed", "TestLanguageEnabledMissingCommandC", "TestLanguageEnabledSecondCommand", "TestUnitySegmentCSharpWebRequest", "TestResolveEmptyGitPath", "TestAzdSegment", "TestDirMatchesOneOfRegexInvertedNonEscaped", "TestFullAndFolderPath", "TestTrunc", "TestEscapeLuaStr", "TestExecuteMultipleCommandsAnd", "TestRenderTemplateEnvVar", "TestGenerateHyperlinkNoUrl", "TestUseMappedShellNames", "TestJulia", "TestPulumi", "TestRequestResult", "TestPythonVirtualEnvIgnoreCustomVenvNames", "TestYarn", "TestPaletteShouldResolveRecursiveReference", "TestHasCommand", "TestPlasticParseChangesetSelector", "TestExecutionTimeFormatHouston", "TestPlasticGetHeadChangeset", "TestNuspecPackage", "TestQuoteNuStr", "TestRenderTemplate", "TestGetTitle", "TestExecutionTimeFormatGalveston", "TestSwift", "TestTruncE/negative_length", "TestGetStashContextZeroEntries", "TestEnabledInWorktree", "TestTruncE", "TestGlob", "TestNixShellSegment/No_Nix_Shell", "TestVerify", "TestPlasticEnabledInWorkspaceDirectory", "TestSpotifyStringPlayingSong", "TestPaletteShouldHandleEmptyKey", "TestUrl", "TestShouldIncludeFolder", "TestSvnEnabledToolNotFound", "TestGetActiveConfig", "TestGetAnsiFromColorString", "TestBrewfatherSegment", "TestGitUpstream", "TestAgnosterLeftPath", "TestHResult", "TestLanguageDisabledNoFiles", "TestGetFirebaseActiveConfig", "TestCanWriteRPrompt", "TestLanguageEnabledInHome", "TestGetCodePoints", "TestPythonTemplate", "TestVala", "TestCanUpgrade", "TestLanguageEnabledNoVersionData", "TestMapBatteriesState", "TestHaskell", "TestNixShellSegment/Impure_Nix_Shell", "TestYTMDAPlaying", "TestFishFeatures", "TestMapSegmentWriterCannotMap", "TestPaletteShouldIgnoreNonPaletteColors", "TestCFTargetSegment", "TestCanRenderSegment", "TestGitUntrackedMode", "TestScmStatusChanged", "TestTruncE/normal_truncation", "TestExecutionTimeWriterDuration", "TestPlasticMergePending", "TestParseTestConfig", "TestWTTrackedTime", "TestZshFeatures", "TestLanguageInnerHyperlink", "TestDotnetProject", "TestUI5Tooling", "TestNodeInContext", "TestNSSegment", "TestGetFloat64PropertyNotInMap", "TestFormatStatus", "TestTalosctlSegment", "TestYTMDAStopped", "TestGetBoolPropertyNotInMap", "TestMercurialEnabledToolNotFound", "TestIsMajorUpgrade", "TestDirMatchesOneOfRegexInverted", "TestGitIgnoreSubmodules", "TestCFSegment", "TestNuFeatures", "TestSetGitHEADContextClean", "TestPythonPythonInContext", "TestNixShellSegment/Unknown_Nix_Shell", "TestGetStringNoTextEntry", "TestPlasticStatusCounts", "TestTruncE/invalid_length_type", "TestPlasticStatusChanged", "TestWriteCurrentShell", "TestElvishFeatures", "TestEnabledInWorkingDirectory", "TestNixShellSegment", "TestExecuteMultipleCommandsAndDisabled", "TestQuotePosixStr", "TestEnabledInBareRepo", "TestMojoTemplate", "TestExecuteMultipleCommandsOrSecond", "TestPlasticParseLabelSelector", "TestPaletteShouldReturnErrorOnMissingColor", "TestBun", "TestPrintPWD", "TestSetPrettyHEADName", "TestRuby", "TestPatchTemplateStruct", "TestOneOf", "TestOSInfo", "TestOWMSegmentIcons", "TestLanguageEnabledMismatch", "TestExecutionTimeFormatGalvestonMs", "TestRoundSeconds", "TestNodeMatchesVersionFile", "TestOCaml", "TestPaletteShouldResolveColorFromTestPalette", "TestPoshGitSegment", "TestSetGitStatus", "TestLanguageFilesFoundButNoCommmandAndVersionAndDontDisplayVersion", "TestPatchTemplate", "TestPlasticStatusBehind", "TestLanguageFilesFoun", "TestShouldFill", "TestCdsSegment", "TestGetFloat64", "TestSeconds", "TestGitCleanSSHURL", "TestWinReg", "TestHostNameWithLan", "TestSetHeadContext", "TestLanguageFilesFoundButNoCommmandAndVersionAndDisplayVersion", "TestSplitPath", "TestSetDir", "TestLanguageFilesFoundButNoCommmandAndNoVersion", "TestSvnEnabledInWorkingDirectory", "TestSessionSegmentTemplate", "TestParsePoshGitHEAD", "TestNormalHostName", "TestNodePackageVersion", "TestLanguageEnabledNoVersion", "TestQuotePythonStr", "TestExecutionTimeFormatDurationRound", "TestGitCommit", "TestLanguageFilesFoundBut", "TestEvaluateNeeds", "TestGitversion", "TestStravaSegment", "TestLanguageDisabledInHome", "TestPlasticParseStatusChangeset", "TestLanguageHyperlinkTemplatePropert", "TestGitTemplateString", "TestPlasticParseIntPattern", "TestAnsiRender", "TestGetConfigDirectory", "TestAgnosterPathStyles", "TestGetBool", "TestSegmentContains", "TestLanguageEnabledSecondExtensionFound", "TestCmdFeatures", "TestPlasticParseSmartbranchSelector", "TestPwshFeatures", "TestGetMaxWidth", "TestUmbracoSegment", "TestGetColor", "TestLanguageFilesFoundButNoCommandAndNoV", "TestGetBoolInvalidProperty", "TestTruncE/zero_length", "TestGetBranchStatus", "TestRust", "TestTruncE/unicode_characters", "TestMapSegmentWriterCanMap", "TestPlasticStatus", "TestDirMatchesOneOf", "TestSpotifyStringStoppedSong" ]
starryzhang/sweb.eval.win.jandedobbeleer_1776_oh-my-posh-6330
hashicorp/packer
13388
hashicorp__packer-13388
Go
[ "12918" ]
4cd7ad4721cd3aba078482cabe9b01de8202dfa2
diff --git a/go.mod b/go.mod index 7b231ff0850..4ec3e10a0f0 100644 --- a/go.mod +++ b/go.mod @@ -23,7 +23,7 @@ require ( github.com/hashicorp/go-version v1.6.0 github.com/hashicorp/hcl/v2 v2.19.1 github.com/hashicorp/hcp-sdk-go v0.136.0 - github.com/hashicorp/packer-plugin-sdk v0.6.0 + github.com/hashicorp/packer-plugin-sdk v0.6.2 github.com/jehiah/go-strftime v0.0.0-20171201141054-1d33003b3869 github.com/klauspost/compress v1.13.6 github.com/klauspost/pgzip v1.2.5 @@ -44,14 +44,14 @@ require ( github.com/zclconf/go-cty v1.13.3 github.com/zclconf/go-cty-yaml v1.0.1 golang.org/x/crypto v0.36.0 // indirect - golang.org/x/mod v0.19.0 + golang.org/x/mod v0.24.0 golang.org/x/net v0.38.0 golang.org/x/oauth2 v0.27.0 golang.org/x/sync v0.12.0 golang.org/x/sys v0.31.0 // indirect golang.org/x/term v0.30.0 // indirect golang.org/x/text v0.23.0 - golang.org/x/tools v0.23.0 + golang.org/x/tools v0.31.0 google.golang.org/api v0.150.0 // indirect google.golang.org/grpc v1.59.0 ) @@ -75,7 +75,7 @@ require ( github.com/Masterminds/goutils v1.1.1 // indirect github.com/Masterminds/semver/v3 v3.1.1 // indirect github.com/Masterminds/sprig/v3 v3.2.1 // indirect - github.com/Microsoft/go-winio v0.6.1 // indirect + github.com/Microsoft/go-winio v0.6.2 // indirect github.com/ProtonMail/go-crypto v1.1.3 // indirect github.com/agext/levenshtein v1.2.3 // indirect github.com/anchore/go-struct-converter v0.0.0-20221118182256-c68fdcfa2092 // indirect @@ -180,7 +180,7 @@ require ( go.opentelemetry.io/otel/metric v1.17.0 // indirect go.opentelemetry.io/otel/trace v1.17.0 // indirect golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 // indirect - golang.org/x/time v0.3.0 // indirect + golang.org/x/time v0.11.0 // indirect golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 // indirect google.golang.org/genproto v0.0.0-20231016165738-49dd2c1f3d0b // indirect google.golang.org/genproto/googleapis/api v0.0.0-20231016165738-49dd2c1f3d0b // indirect diff --git a/go.sum b/go.sum index ff9337cb3ab..3e910fce997 100644 --- a/go.sum +++ b/go.sum @@ -28,8 +28,8 @@ github.com/Masterminds/semver/v3 v3.1.1/go.mod h1:VPu/7SZ7ePZ3QOrcuXROw5FAcLl4a0 github.com/Masterminds/sprig/v3 v3.2.1 h1:n6EPaDyLSvCEa3frruQvAiHuNp2dhBlMSmkEr+HuzGc= github.com/Masterminds/sprig/v3 v3.2.1/go.mod h1:UoaO7Yp8KlPnJIYWTFkMaqPUYKTfGFPhxNuwnnxkKlk= github.com/Microsoft/go-winio v0.5.2/go.mod h1:WpS1mjBmmwHBEWmogvA2mj8546UReBk4v8QkMxJ6pZY= -github.com/Microsoft/go-winio v0.6.1 h1:9/kr64B9VUZrLm5YYwbGtUJnMgqWVOdUAXu6Migciow= -github.com/Microsoft/go-winio v0.6.1/go.mod h1:LRdKpFKfdobln8UmuiYcKPot9D2v6svN5+sAH+4kjUM= +github.com/Microsoft/go-winio v0.6.2 h1:F2VQgta7ecxGYO8k3ZZz3RS8fVIXVxONVUPlNERoyfY= +github.com/Microsoft/go-winio v0.6.2/go.mod h1:yd8OoFMLzJbo9gZq8j5qaps8bJ9aShtEA8Ipt1oGCvU= github.com/ProtonMail/go-crypto v1.1.3 h1:nRBOetoydLeUb4nHajyO2bKqMLfWQ/ZPwkXqXxPxCFk= github.com/ProtonMail/go-crypto v1.1.3/go.mod h1:rA3QumHc/FZ8pAHreoekgiAbzpNsfQAosU5td4SnOrE= github.com/agext/levenshtein v1.2.3 h1:YB2fHEn0UJagG8T1rrWknE3ZQzWM06O8AMAatNn7lmo= @@ -303,8 +303,8 @@ github.com/hashicorp/logutils v1.0.0/go.mod h1:QIAnNjmIWmVIIkWDTG1z5v++HQmx9WQRO github.com/hashicorp/mdns v1.0.4/go.mod h1:mtBihi+LeNXGtG8L9dX59gAEa12BDtBQSp4v/YAJqrc= github.com/hashicorp/memberlist v0.5.0 h1:EtYPN8DpAURiapus508I4n9CzHs2W+8NZGbmmR/prTM= github.com/hashicorp/memberlist v0.5.0/go.mod h1:yvyXLpo0QaGE59Y7hDTsTzDD25JYBZ4mHgHUZ8lrOI0= -github.com/hashicorp/packer-plugin-sdk v0.6.0 h1:v8JdmM1PkkHu3gIUs63UcsgGlD0U3m/7DWG6PxcmOPw= -github.com/hashicorp/packer-plugin-sdk v0.6.0/go.mod h1:bDCCzvZ6lUJjrY7eI+i9lYmGs9NSymdFFQiGluF8dEg= +github.com/hashicorp/packer-plugin-sdk v0.6.2 h1:XRIJTcHa9AN13ZvVjL+RpwxEz+yYT7qJ5PA2REViJZ0= +github.com/hashicorp/packer-plugin-sdk v0.6.2/go.mod h1:mOuey53XeLIIpdOQnREjEBYCndipO7piU+EJAstQq1k= github.com/hashicorp/serf v0.10.1 h1:Z1H2J60yRKvfDYAOZLd2MU0ND4AH/WDz7xYHDWQsIPY= github.com/hashicorp/serf v0.10.1/go.mod h1:yL2t6BqATOLGc5HF7qbFkTfXoPIY0WZdWHfEvMqbG+4= github.com/hashicorp/vault/api v1.14.0 h1:Ah3CFLixD5jmjusOgm8grfN9M0d+Y8fVR2SW0K6pJLU= @@ -595,8 +595,8 @@ golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHl golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o= golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY= golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= -golang.org/x/mod v0.19.0 h1:fEdghXQSo20giMthA7cd28ZC+jts4amQ3YMXiP5oMQ8= -golang.org/x/mod v0.19.0/go.mod h1:hTbmBsO62+eylJbnUtE2MGJUyE7QWk4xUqPFrRgJ+7c= +golang.org/x/mod v0.24.0 h1:ZfthKaKaT4NrhGVZHO1/WDTwGES4De8KtWO0SIbNJMU= +golang.org/x/mod v0.24.0/go.mod h1:IXM97Txy2VM4PJ3gI61r1YEk/gAj6zAHN3AdZt6S9Ww= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= @@ -680,8 +680,8 @@ golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= golang.org/x/text v0.23.0 h1:D71I7dUrlY+VX0gQShAThNGHFxZ13dGLBHQLVl1mJlY= golang.org/x/text v0.23.0/go.mod h1:/BLNzu4aZCJ1+kcD0DNRotWKage4q2rGVAg4o22unh4= -golang.org/x/time v0.3.0 h1:rg5rLMjNzMS1RkNLzCG38eapWhnYLFYXDXj2gOlr8j4= -golang.org/x/time v0.3.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= +golang.org/x/time v0.11.0 h1:/bpjEDfN9tkoN/ryeYHnv5hcMlc8ncjMcM4XBk5NWV0= +golang.org/x/time v0.11.0/go.mod h1:CDIdPxbZBQxdj6cxyCIdrNogrJKMJ7pr37NYpMcMDSg= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY= @@ -691,8 +691,8 @@ golang.org/x/tools v0.0.0-20190907020128-2ca718005c18/go.mod h1:b+2E5dAYhXwXZwtn golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc= -golang.org/x/tools v0.23.0 h1:SGsXPZ+2l4JsgaCKkx+FQ9YZ5XEtA1GZYuoDjenLjvg= -golang.org/x/tools v0.23.0/go.mod h1:pnu6ufv6vQkll6szChhK3C3L/ruaIv5eBeztNG8wtsI= +golang.org/x/tools v0.31.0 h1:0EedkvKDbh+qistFTd0Bcwe/YLh4vHwWEkiI0toFIBU= +golang.org/x/tools v0.31.0/go.mod h1:naFTU+Cev749tSJRXJlna0T3WxKvb1kWEx15xA4SdmQ= golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 h1:H2TDz8ibqkAF6YGhCdN3jS9O0/s90v0rJh3X/OLHEUk= diff --git a/hcl2template/types.build.provisioners.go b/hcl2template/types.build.provisioners.go index b08eca59f63..af846807c70 100644 --- a/hcl2template/types.build.provisioners.go +++ b/hcl2template/types.build.provisioners.go @@ -186,6 +186,16 @@ func (cfg *PackerConfig) startProvisioner(source SourceUseBlock, pb *Provisioner builderVars["packer_force"] = strconv.FormatBool(cfg.force) builderVars["packer_on_error"] = cfg.onError + sensitiveVars := make([]string, 0, len(cfg.InputVariables)) + + for key, variable := range cfg.InputVariables { + if variable.Sensitive { + sensitiveVars = append(sensitiveVars, key) + } + } + + builderVars["packer_sensitive_variables"] = sensitiveVars + hclProvisioner := &HCL2Provisioner{ Provisioner: provisioner, provisionerBlock: pb, diff --git a/hcl2template/types.hcl_post-processor.go b/hcl2template/types.hcl_post-processor.go index b9d200758de..1d1da3a676f 100644 --- a/hcl2template/types.hcl_post-processor.go +++ b/hcl2template/types.hcl_post-processor.go @@ -21,7 +21,7 @@ type HCL2PostProcessor struct { PostProcessor packersdk.PostProcessor postProcessorBlock *PostProcessorBlock evalContext *hcl.EvalContext - builderVariables map[string]string + builderVariables map[string]interface{} } func (p *HCL2PostProcessor) ConfigSpec() hcldec.ObjectSpec { diff --git a/hcl2template/types.hcl_provisioner.go b/hcl2template/types.hcl_provisioner.go index b607a0092a2..7fc84222e4c 100644 --- a/hcl2template/types.hcl_provisioner.go +++ b/hcl2template/types.hcl_provisioner.go @@ -21,7 +21,7 @@ type HCL2Provisioner struct { Provisioner packersdk.Provisioner provisionerBlock *ProvisionerBlock evalContext *hcl.EvalContext - builderVariables map[string]string + builderVariables map[string]interface{} override map[string]interface{} } diff --git a/hcl2template/types.packer_config.go b/hcl2template/types.packer_config.go index 17039e82aa4..8f439788f0b 100644 --- a/hcl2template/types.packer_config.go +++ b/hcl2template/types.packer_config.go @@ -827,6 +827,14 @@ func (cfg *PackerConfig) GetBuilds(opts packer.GetBuildsOptions) ([]*packer.Core pcb.PostProcessors = pps pcb.Prepared = true + pcb.SensitiveVars = make([]string, 0, len(cfg.InputVariables)) + + for key, variable := range cfg.InputVariables { + if variable.Sensitive { + pcb.SensitiveVars = append(pcb.SensitiveVars, key) + } + } + // Prepare just sets the "prepareCalled" flag on CoreBuild, since // we did all the prep here. _, err := pcb.Prepare() diff --git a/hcl2template/types.source.go b/hcl2template/types.source.go index 46b9caac98e..320b5925f24 100644 --- a/hcl2template/types.source.go +++ b/hcl2template/types.source.go @@ -147,8 +147,8 @@ func (cfg *PackerConfig) startBuilder(source SourceUseBlock, ectx *hcl.EvalConte } // These variables will populate the PackerConfig inside of the builders. -func (source *SourceUseBlock) builderVariables() map[string]string { - return map[string]string{ +func (source *SourceUseBlock) builderVariables() map[string]interface{} { + return map[string]interface{}{ "packer_build_name": source.Name, "packer_builder_type": source.Type, } diff --git a/packer/build.go b/packer/build.go index 4a311461e96..aab50ab62f2 100644 --- a/packer/build.go +++ b/packer/build.go @@ -42,6 +42,7 @@ type CoreBuild struct { CleanupProvisioner CoreBuildProvisioner TemplatePath string Variables map[string]string + SensitiveVars []string // Indicates whether the build is already initialized before calling Prepare(..) Prepared bool @@ -175,6 +176,7 @@ func (b *CoreBuild) Prepare() (warn []string, err error) { common.OnErrorConfigKey: b.onError, common.TemplatePathKey: b.TemplatePath, common.UserVariablesConfigKey: b.Variables, + common.SensitiveVarsConfigKey: b.SensitiveVars, } // Prepare the builder diff --git a/packer/core.go b/packer/core.go index 70a8af761bc..8be8e61b2bf 100644 --- a/packer/core.go +++ b/packer/core.go @@ -494,6 +494,11 @@ func (c *Core) Build(n string) (*CoreBuild, error) { postProcessors = append(postProcessors, current) } + var sensitiveVars []string + for _, sensitive := range c.Template.SensitiveVariables { + sensitiveVars = append(sensitiveVars, sensitive.Key) + } + // TODO hooks one day // Return a structure that contains the plugins, their types, variables, and @@ -508,6 +513,7 @@ func (c *Core) Build(n string) (*CoreBuild, error) { CleanupProvisioner: cleanupProvisioner, TemplatePath: c.Template.Path, Variables: c.variables, + SensitiveVars: sensitiveVars, } //configBuilder.Name is left uninterpolated so we must check against diff --git a/provisioner/powershell/provisioner.go b/provisioner/powershell/provisioner.go index 901707c22a2..990f133088a 100644 --- a/provisioner/powershell/provisioner.go +++ b/provisioner/powershell/provisioner.go @@ -535,7 +535,16 @@ func (p *Provisioner) createFlattenedEnvVars(elevated bool) (flattened string) { keyValue := strings.SplitN(envVar, "=", 2) // Escape chars special to PS in each env var value escapedEnvVarValue := psEscape.Replace(keyValue[1]) - if escapedEnvVarValue != keyValue[1] { + + isSensitive := false + for _, sensitiveVar := range p.config.PackerSensitiveVars { + if strings.EqualFold(sensitiveVar, keyValue[0]) { + isSensitive = true + break + } + } + + if escapedEnvVarValue != keyValue[1] && !isSensitive { log.Printf("Env var %s converted to %s after escaping chars special to PS", keyValue[1], escapedEnvVarValue) }
diff --git a/hcl2template/types.build.hcp_packer_registry_test.go b/hcl2template/types.build.hcp_packer_registry_test.go index 5238c08c224..ada7b89b169 100644 --- a/hcl2template/types.build.hcp_packer_registry_test.go +++ b/hcl2template/types.build.hcp_packer_registry_test.go @@ -56,6 +56,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, }, false, @@ -110,6 +111,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, &packer.CoreBuild{ BuildName: "build2", @@ -119,6 +121,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, }, false, @@ -173,6 +176,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, &packer.CoreBuild{ BuildName: "build2", @@ -182,6 +186,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, }, false, @@ -237,6 +242,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, &packer.CoreBuild{ BuildName: "build2", @@ -246,6 +252,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, }, false, @@ -292,6 +299,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, }, false, @@ -339,6 +347,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, BuilderType: "virtualbox-iso", + SensitiveVars: []string{}, }, }, false, @@ -399,6 +408,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, BuilderType: "virtualbox-iso", + SensitiveVars: []string{}, }, }, false, @@ -605,6 +615,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, }, false, @@ -652,6 +663,7 @@ func Test_ParseHCPPackerRegistryBlock(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, BuilderType: "null", + SensitiveVars: []string{}, }, }, false, diff --git a/hcl2template/types.build_test.go b/hcl2template/types.build_test.go index 5244712e2ea..497f78cbba2 100644 --- a/hcl2template/types.build_test.go +++ b/hcl2template/types.build_test.go @@ -106,7 +106,8 @@ func TestParse_build(t *testing.T) { }, true, true, []*packer.CoreBuild{&packer.CoreBuild{ - Provisioners: []packer.CoreBuildProvisioner{}, + Provisioners: []packer.CoreBuildProvisioner{}, + SensitiveVars: []string{}, }}, false, nil, @@ -148,7 +149,9 @@ func TestParse_build(t *testing.T) { Builds: nil, }, true, true, - []*packer.CoreBuild{&packer.CoreBuild{}}, + []*packer.CoreBuild{&packer.CoreBuild{ + SensitiveVars: []string{}, + }}, false, nil, }, @@ -190,6 +193,7 @@ func TestParse_build(t *testing.T) { true, true, []*packer.CoreBuild{&packer.CoreBuild{ PostProcessors: [][]packer.CoreBuildPostProcessor{}, + SensitiveVars: []string{}, }}, true, nil, @@ -289,11 +293,12 @@ func TestParse_build(t *testing.T) { false, false, []*packer.CoreBuild{ &packer.CoreBuild{ - Type: "virtualbox-iso.ubuntu-1204", - BuilderType: "virtualbox-iso", - Prepared: true, - Builder: emptyMockBuilder, - Provisioners: []packer.CoreBuildProvisioner{}, + Type: "virtualbox-iso.ubuntu-1204", + BuilderType: "virtualbox-iso", + Prepared: true, + Builder: emptyMockBuilder, + Provisioners: []packer.CoreBuildProvisioner{}, + SensitiveVars: []string{}, PostProcessors: [][]packer.CoreBuildPostProcessor{ { { @@ -324,11 +329,12 @@ func TestParse_build(t *testing.T) { }, }, &packer.CoreBuild{ - Type: "amazon-ebs.aws-ubuntu-16.04", - BuilderType: "amazon-ebs", - Prepared: true, - Builder: emptyMockBuilder, - Provisioners: []packer.CoreBuildProvisioner{}, + Type: "amazon-ebs.aws-ubuntu-16.04", + BuilderType: "amazon-ebs", + Prepared: true, + Builder: emptyMockBuilder, + Provisioners: []packer.CoreBuildProvisioner{}, + SensitiveVars: []string{}, PostProcessors: [][]packer.CoreBuildPostProcessor{ { { @@ -407,10 +413,11 @@ func TestParse_build(t *testing.T) { false, false, []*packer.CoreBuild{ &packer.CoreBuild{ - Type: "virtualbox-iso.ubuntu-1204", - BuilderType: "virtualbox-iso", - Prepared: true, - Builder: emptyMockBuilder, + Type: "virtualbox-iso.ubuntu-1204", + BuilderType: "virtualbox-iso", + Prepared: true, + Builder: emptyMockBuilder, + SensitiveVars: []string{}, Provisioners: []packer.CoreBuildProvisioner{ { PType: "shell", @@ -438,10 +445,11 @@ func TestParse_build(t *testing.T) { PostProcessors: [][]packer.CoreBuildPostProcessor{}, }, &packer.CoreBuild{ - Type: "amazon-ebs.aws-ubuntu-16.04", - BuilderType: "amazon-ebs", - Prepared: true, - Builder: emptyMockBuilder, + Type: "amazon-ebs.aws-ubuntu-16.04", + BuilderType: "amazon-ebs", + Prepared: true, + Builder: emptyMockBuilder, + SensitiveVars: []string{}, Provisioners: []packer.CoreBuildProvisioner{ { PType: "file", @@ -499,10 +507,11 @@ func TestParse_build(t *testing.T) { false, false, []*packer.CoreBuild{ &packer.CoreBuild{ - Type: "virtualbox-iso.ubuntu-1204", - BuilderType: "virtualbox-iso", - Prepared: true, - Builder: emptyMockBuilder, + Type: "virtualbox-iso.ubuntu-1204", + BuilderType: "virtualbox-iso", + Prepared: true, + Builder: emptyMockBuilder, + SensitiveVars: []string{}, Provisioners: []packer.CoreBuildProvisioner{ { PType: "shell", @@ -570,6 +579,7 @@ func TestParse_build(t *testing.T) { Builder: emptyMockBuilder, Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, + SensitiveVars: []string{}, }, }, false, @@ -620,12 +630,13 @@ func TestParse_build(t *testing.T) { false, false, []*packer.CoreBuild{ &packer.CoreBuild{ - BuildName: "test-build", - Type: "virtualbox-iso.ubuntu-1204", - BuilderType: "virtualbox-iso", - Prepared: true, - Builder: emptyMockBuilder, - Provisioners: []packer.CoreBuildProvisioner{}, + BuildName: "test-build", + Type: "virtualbox-iso.ubuntu-1204", + BuilderType: "virtualbox-iso", + Prepared: true, + Builder: emptyMockBuilder, + Provisioners: []packer.CoreBuildProvisioner{}, + SensitiveVars: []string{}, PostProcessors: [][]packer.CoreBuildPostProcessor{ { { @@ -679,11 +690,12 @@ func TestParse_build(t *testing.T) { false, false, []*packer.CoreBuild{ &packer.CoreBuild{ - BuildName: "build-name-test", - Type: "virtualbox-iso.ubuntu-1204", - BuilderType: "virtualbox-iso", - Prepared: true, - Builder: emptyMockBuilder, + BuildName: "build-name-test", + Type: "virtualbox-iso.ubuntu-1204", + BuilderType: "virtualbox-iso", + Prepared: true, + Builder: emptyMockBuilder, + SensitiveVars: []string{}, Provisioners: []packer.CoreBuildProvisioner{ { PName: "build-name-test", diff --git a/hcl2template/types.datasource_test.go b/hcl2template/types.datasource_test.go index d0125974d7d..e066a8f3243 100644 --- a/hcl2template/types.datasource_test.go +++ b/hcl2template/types.datasource_test.go @@ -61,6 +61,7 @@ func TestParse_datasource(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, @@ -150,6 +151,7 @@ func TestParse_datasource(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, diff --git a/hcl2template/types.packer_config_test.go b/hcl2template/types.packer_config_test.go index 56658120189..6d62ab0da51 100644 --- a/hcl2template/types.packer_config_test.go +++ b/hcl2template/types.packer_config_test.go @@ -206,9 +206,10 @@ func TestParser_complete(t *testing.T) { false, false, []*packer.CoreBuild{ &packer.CoreBuild{ - Type: "virtualbox-iso.ubuntu-1204", - BuilderType: "virtualbox-iso", - Prepared: true, + Type: "virtualbox-iso.ubuntu-1204", + BuilderType: "virtualbox-iso", + Prepared: true, + SensitiveVars: []string{}, Builder: &MockBuilder{ Config: MockConfig{ NestedMockConfig: NestedMockConfig{ @@ -318,9 +319,10 @@ func TestParser_complete(t *testing.T) { }, }, &packer.CoreBuild{ - Type: "amazon-ebs.ubuntu-1604", - BuilderType: "amazon-ebs", - Prepared: true, + Type: "amazon-ebs.ubuntu-1604", + BuilderType: "amazon-ebs", + Prepared: true, + SensitiveVars: []string{}, Builder: &MockBuilder{ Config: MockConfig{ NestedMockConfig: NestedMockConfig{ diff --git a/hcl2template/types.source_test.go b/hcl2template/types.source_test.go index 5acf156380b..15e1d2b3ad6 100644 --- a/hcl2template/types.source_test.go +++ b/hcl2template/types.source_test.go @@ -59,6 +59,7 @@ func TestParse_source(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, diff --git a/hcl2template/types.variables_test.go b/hcl2template/types.variables_test.go index 07fb8c2a517..30fb457aed6 100644 --- a/hcl2template/types.variables_test.go +++ b/hcl2template/types.variables_test.go @@ -133,6 +133,7 @@ func TestParse_variables(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{"super_secret_password"}, }, }, false, @@ -305,6 +306,7 @@ func TestParse_variables(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, @@ -393,6 +395,7 @@ func TestParse_variables(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, @@ -459,6 +462,7 @@ func TestParse_variables(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, @@ -502,6 +506,7 @@ func TestParse_variables(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, @@ -594,6 +599,7 @@ func TestParse_variables(t *testing.T) { }, }, PostProcessors: [][]packer.CoreBuildPostProcessor{}, + SensitiveVars: []string{}, }, }, false, @@ -651,6 +657,7 @@ func TestParse_variables(t *testing.T) { Provisioners: []packer.CoreBuildProvisioner{}, PostProcessors: [][]packer.CoreBuildPostProcessor{}, Prepared: true, + SensitiveVars: []string{}, }, }, false, diff --git a/packer/build_test.go b/packer/build_test.go index c15eec5b570..9f572101d22 100644 --- a/packer/build_test.go +++ b/packer/build_test.go @@ -39,8 +39,9 @@ func testBuild() *CoreBuild { {&MockPostProcessor{ArtifactId: "pp"}, "testPP", "testPPName", cty.Value{}, make(map[string]interface{}), boolPointer(true)}, }, }, - Variables: make(map[string]string), - onError: "cleanup", + Variables: make(map[string]string), + onError: "cleanup", + SensitiveVars: []string{"sensitive_var"}, } } @@ -54,6 +55,7 @@ func testDefaultPackerConfig() map[string]interface{} { common.OnErrorConfigKey: "cleanup", common.TemplatePathKey: "", common.UserVariablesConfigKey: make(map[string]string), + common.SensitiveVarsConfigKey: []string{"sensitive_var"}, } } func TestBuild_Name(t *testing.T) {
Sensitive variables are logged when escaped for powershell <!--- Please keep this note for the community ---> #### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> #### Overview of the Issue When sensitive variables contain characters that require escaping the logs will print that sensitive variable in its escaped form. #### Reproduction Steps Run example from powershell with PACKER_LOG=1: ``` $Env:PACKER_LOG=1;& .\packer.exe build -var password="abc`$123" password.pkr.hcl ``` ### Packer version Packer v1.10.2 ### Simplified Packer Template ``` variable "password" { type = string sensitive = true } source "file" "basic-example" { content = "Lorem ipsum dolor sit amet" target = "dummy_artifact" } build { sources = ["sources.file.basic-example"] provisioner "powershell" { environment_vars = [ "PASSWORD=${var.password}", ] inline = ["echo foo"] } } ``` ### Operating system and Environment details Windows Server 2022 ### Log Fragments and crash.log files ``` 2024/04/12 10:11:48 packer.exe plugin: Env var <sensitive> converted to abc`$123 after escaping chars special to PS ``` [Full Logs](https://gist.github.com/zinkj/813d23131dc112aa0c75a52c7ad4fb83)
Hi @zinkj, Thanks for the report, looking at the problem however, I'm not sure we'll be able to offer a good solution with the current architecture regarding log filtering. The way we do things re:sensitive variables is essentially by `strings.Replace(sensitiveVariable, "<sensitive>", -1)`, which in effect if the variable gets escaped one way or another, won't match anymore. We don't have agency on what gets printed by custom code, and it wouldn't be feasible to support every possible escaping scheme under the sun, therefore I'm not sure we have a good way to handle cases like these, at least without seriously rethinking/refactoring how this gets printed out. I'll keep this issue open for now, but this seems like unlikely to happen in the short/medium term, sorry.
Hi @zinkj, Thanks for the report, looking at the problem however, I'm not sure we'll be able to offer a good solution with the current architecture regarding log filtering. The way we do things re:sensitive variables is essentially by `strings.Replace(sensitiveVariable, "<sensitive>", -1)`, which in effect if the variable gets escaped one way or another, won't match anymore. We don't have agency on what gets printed by custom code, and it wouldn't be feasible to support every possible escaping scheme under the sun, therefore I'm not sure we have a good way to handle cases like these, at least without seriously rethinking/refactoring how this gets printed out. I'll keep this issue open for now, but this seems like unlikely to happen in the short/medium term, sorry. I'm going to lock this issue because it has been closed for _30 days_ ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
[ "https://github.com/hashicorp/packer/commit/f70933f6b52a6e725c2e9895581350299ff16d0e", "https://github.com/hashicorp/packer/commit/04dc274eaa3415baf168737c22c7202c8218f114", "https://github.com/hashicorp/packer/commit/99b8f98a8b354d0d37c4568b9e938df6999a2c0b", "https://github.com/hashicorp/packer/commit/24d73a2b6acb1db4cd652abd1691493f35c350a9" ]
2025-06-02T11:00:55Z
https://github.com/hashicorp/packer/tree/4cd7ad4721cd3aba078482cabe9b01de8202dfa2
[ "go mod download ; go build ./..." ]
[ "go test -json -v ./... > reports\\go-test-results.json" ]
[ "cat reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re from difflib import SequenceMatcher results: dict[str, str] = {} def clean(name: str) -> str: if not name: return "" # Replace escaped newlines and carriage returns name = name.replace("\\n", " ").replace("\\r", " ") # Replace real newlines/tabs with spaces name = re.sub(r"[\r\n\t]+", " ", name) # Collapse multiple spaces name = re.sub(r"[ ]{2,}", " ", name) return name.strip() # Collect all test names observed in JSON to use as canonical references observed_tests: set[str] = set() test_field_re = re.compile(r'"Test"\s*:\s*"(.+?)"', re.DOTALL) for m in test_field_re.finditer(log): observed_tests.add(clean(m.group(1))) # Build a lookup normalized by removing spaces for fuzzy matching observed_key_map: dict[str, str] = {} for t in observed_tests: observed_key_map[re.sub(r"\s+", "", t)] = t def best_match(name: str) -> str: n = clean(name) if n in observed_tests: return n key = re.sub(r"\s+", "", n) if key in observed_key_map: return observed_key_map[key] # Fuzzy match against observed keys best = n best_ratio = 0.0 for k, orig in observed_key_map.items(): ratio = SequenceMatcher(None, key, k).ratio() if ratio > best_ratio: best_ratio = ratio best = orig return best if best_ratio >= 0.8 else n # Primary: derive status from output events containing '--- PASS/FAIL/SKIP:' out_status_re = re.compile( r'"Action"\s*:\s*"output".*?"Test"\s*:\s*"(.+?)".*?"Output"\s*:\s*"(?:[^"]*?)---\s*(PASS|FAIL|SKIP)\s*:', re.DOTALL ) for m in out_status_re.finditer(log): name = clean(m.group(1)) status_kw = m.group(2).upper() status = "pass" if status_kw == "PASS" else ("fail" if status_kw == "FAIL" else "skip") results[name] = status # Fallback: JSON action/test pairs act_pair_re = re.compile( r'"Action"\s*:\s*"(pass|fail|skip)".*?"Test"\s*:\s*"(.+?)"' r'|' r'"Test"\s*:\s*"(.+?)".*?"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE | re.DOTALL ) for m in act_pair_re.finditer(log): if m.group(1) and m.group(2): status_kw = m.group(1).lower() raw_name = m.group(2) elif m.group(3) and m.group(4): status_kw = m.group(4).lower() raw_name = m.group(3) else: continue name = clean(raw_name) status = "pass" if status_kw == "pass" else ("fail" if status_kw == "fail" else "skip") results.setdefault(name, status) # Extra fallback: parse plain text status lines and map to best observed test name text_status_re = re.compile(r'---\s+(PASS|FAIL|SKIP):\s+(.+?)\s*\(', re.DOTALL) for m in text_status_re.finditer(log): status_kw = m.group(1).upper() raw_name = m.group(2) name = best_match(raw_name) status = "pass" if status_kw == "PASS" else ("fail" if status_kw == "FAIL" else "skip") results.setdefault(name, status) return results
[ "TestNewRegisterProperBuildName/ /single_build_block_with_single_source", "TestBase64Gzip/base64gzip(ct ty.StringVal(\\", "TestValidateCommand/test-fixtures\\\\version n_req\\\\wrong_field_name", "TestSum/sum(cty.SetVal([]cty.V Value{cty.NumberIntVal(3),_cty.NumberFloatVal(10.2),_cty.NumberFloatVal(2340.8)}) ))", "TestSum/sum(cty.NumberIntVal(1 12))", "TestProvisionerProvision_DownloadsM MultipleFilesToFolder", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberFloatVal(10.2),_cty.NumberFloatVal(19.4),_cty.NumberFloatVal(5.7 7)}))", "TestBuild/hcl_-_valid_validation_rule_for_def fault_value", "TestValidateCommand_SyntaxOnly/test-fixtures\\ \\\\validate-invalid\\\\bad_provisioner.json", "Test_IsHCPDisabled/registry_set_wit th_off", "TestProvisionerProvision_SendsFileM MultipleFilesToFolder", "Test_IsHCPDisabled/registry_set_wit th_1", "TestSum/sum(cty.ListValEmpty(c cty.Number))", "TestPackerConfig_ParseProvisionerBloc ck", "TestBuild/var-args:_hcl_-_auto_varfile_sets_a a_chocolate_env_var", "TestBuildCmd/hcl_-_exclude_post-processor,_e expect_no_warning", "TestParse_variables/valid_validation_ _block_-_invalid_default", "TestParser_ValidateFilterOption", "TestBuild/var-args:_hcl_-_nonexistent_json_va ar_file_errs", "Test_IsHCPDisabled/registry_set_wit th_0", "TestValidateCommand_SyntaxOnly/test-fixtures\\ \\\\validate\\\\build.pkr.hcl", "TestSum/sum(cty.SetVal([]cty y.Value{cty.NumberIntVal(-123),_cty.NumberIntVal(-50),_cty.NumberIntVal(-20),_cty y.NumberIntVal(-4),_cty.NumberIntVal(-2)}))", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberIntVal(1),_cty.NumberIntVal(2),_cty.NumberIntVal(3)}))", "TestSum/sum(cty.SetVal([]cty.V Value{cty.NumberIntVal(2)}))", "TestPostProcessorPrepare_ _Script", "TestProvisionerPrepare e_ConfigRetryTimeout", "TestAllTrue/alltrue(cty.List tVal([]cty.Value{cty.True}))", "TestSum/sum(cty.SetVal([]cty y.Value{cty.NumberIntVal(2)}))", "TestRequirement_InstallLatest t/already-installed-same-api-version", "TestProvisionerPrepare_D Defaults", "TestConfigValueFromHCL2/cty.False", "TestBuildPrepare_BuilderWarnings", "TestBuildCmd/hcl_-_build_block_without_sourc ce", "TestAllTrue/alltrue(cty.Null lVal(cty.List(cty.Bool)))", "Test_IsHCPDisabled/registry_set_wit th_OFF", "TestLength/Length(cty.SetVal([ []cty.Value{cty.True}))", "TestValidateCommand_SyntaxOnly/test-fixtures\\ \\\\validate-invalid\\\\broken.json", "TestValidateCommand_SkipDatasourceExecution", "TestValidateCommand_SyntaxOnly/test-fixtures\\ \\\\validate-invalid\\\\missing_build_block.pkr.hcl", "TestProvisionerProvision_SendsFil leMultipleFilesToFolder", "TestAnyTrue/anytrue(cty.List tVal([]cty.Value{cty.True}))", "TestSum/sum(cty.TupleVal([]cty y.Value{cty.NumberIntVal(12),_cty.StringVal(\\", "TestSum/sum(cty.MapVal(map[str ring]cty.Value{\\", "Test_LessInstallList/v1.2.2-d dev_\\u003c_v1.2.2_=\\u003e_true", "TestReadFromHCLBuildBlock/co onfigure_bucket_using_only_hcp_packer_registry_block", "TestHCL2PostProcessorForceFlag", "TestSum/sum(cty.SetVal([]cty.V Value{cty.NumberIntVal(-123),_cty.NumberIntVal(-50),_cty.NumberIntVal(-20),_cty.N NumberIntVal(-4),_cty.NumberIntVal(-2)}))", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberIntVal(1476),_cty.NumberIntVal(2093),_cty.NumberIntVal(2.092495e e+06),_cty.NumberIntVal(6.4589234e+07),_cty.NumberIntVal(234)}))", "TestAnyTrue/anytrue(cty.Null lVal(cty.List(cty.Bool)))", "TestSum/sum(cty.UnknownVal(cty y.Number))", "TestProvisioner_Provision/timeout", "TestBuildCmd/hcl_-_undefined_var_set_in_pkrv vars", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberIntVal(10),_cty.NumberIntVal(-19),_cty.NumberIntVal(5)}))", "Test_LessInstallList/v1.2.2_\\ \\u003c_v1.2.1_=\\u003e_false", "TestVariables_collectVariableValues/b bool", "Test_IsHCPDisabled/registry_set_w with_off", "Test_PackerPluginSuite", "TestSum/sum(cty.TupleVal([]c cty.Value{cty.NumberIntVal(12),_cty.StringVal(\\", "TestValidateCommand_SyntaxOnly/test-fixtures\\ \\\\validate\\\\build_with_vars.pkr.hcl", "TestLength/Length(cty.SetValEm mpty(cty.Number))", "Test_IsHCPDisabled/registry_set_w with_1", "TestSum/sum(cty.ListVal([]ct ty.Value{cty.StringVal(\\", "TestRequirement_InstallLatest t/already-installed-compatible-api-minor-version", "TestAccDatasource_HC CPPackerIteration", "Test_IsHCPDisabled/registry_set_w with_OFF", "TestValidateCommand_SkipDatasourceExecutio on", "TestParse_variables/valid_validation_ _block", "TestSum/sum(cty.ListValEmpty y(cty.Number))", "TestBuildCommand_RunContext_CtxCancel/canc cel_2_locked_builds_-_debug_-_parallel=false", "Test_ParseHCPPackerRegistryBlock/top_ _level_and_build_block", "TestBuildCmd/hcl_-_build_block_without_sou urce", "TestAllTrue/alltrue(cty.List tVal([]cty.Value{cty.True,_cty.False}))" ]
[ "TestValidateCommand/test-fixtures\\\\hcl\\\\da ata-source-validation.pkr.hcl", "TestIndex/index(cty.ListVal([] ]cty.Value{cty.NumberIntVal(1),_cty.NumberIntVal(2),_cty.NumberIntVal(3)}),_cty.N NumberIntVal(2))", "TestCheckErrorCode/old_format,_co ode_doesn't_match_what_is_looked_for", "TestFixerISOMD5_Impl", "TestVariables_collectVariableValues/v value_not_corresponding_to_type_-_argv", "TestProvisionerPrepare_Debu ugMode", "TestValidateCommand/test-fixtures\\\\hcl\\\\valid dation\\\\wrong_pause_before.pkr.hcl", "Test_PackerPluginSuite/TestP PluginsRemoveWithNoArguments/plugins_remove_with_no_options_returns_non-zero_with h_help_text", "TestBucket_UpdateLabelsForBuild d/bucket_build_labels_and_build_specific_label", "Test_PackerPluginSuite/Test tPackerInitWithNonGithubSource/manually_install_plugin_to_the_expected_source", "TestBuilderFileAcc_copy", "TestBucket_UpdateLabelsForBuild d/no_bucket_or_build_specific_labels", "TestGraph_empty", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#02", "TestBuildCommand_HCLOnlyExceptOptions/[-only= =*chocolate*_-only=*vanilla*]", "TestProvisionerPrepare_Inv validKey", "TestAnyTrue/anytrue(cty.List tVal([]cty.Value{cty.UnknownVal(cty.Bool)}))", "TestBuildCommand_ParseArgs/[-parallel-builds= =10_file.json]", "TestNewRegisterProperBuildNa ame/single_build_block_with_2_sources", "TestValidateCommand/test-fixtures\\\\hcl\\\\loca al-ds-validate.pkr.hcl", "Test_PackerPluginSuite/TestL LoadingOrder/JSON_validate_-_No_required_plugins,_1.0.10_is_the_most_recent_and_s should_load", "TestPostProcessorPrepar re_ExecuteCommand", "TestConfigValueFromHCL2", "Test_PackerDAGSuite/TestMalform medDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=true_./te emplates/malformed_data_dep.pkr.hcl", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#04", "TestProvisionerCorrectlyInter rpolatesValidExitCodes", "TestFixerScalewayAccessKey_Fix_Impl", "TestGraph_hashcode", "TestBucket_UpdateLabelsForBu uild", "TestBuild/hcl_-_var_with_default_value_emp pty_object/list_can_be_set", "Test_hcl2_upgrade/ami_test", "TestParse_variables/invalid_default_type e", "TestStartsWith/StartsWith(cty. .StringVal(\\", "TestClient_Start_Timeout", "Test_LessInstallList/v1.2.3_x x5.0_\\u003c_v1.2.3_x4.15_=\\u003e_false", "TestBuildWithNonExistingBuilder", "TestBuildExceptFileCommaFlags/JSON:_except_bu uild_and_post-processor", "TestBuild_Prepare_Debug", "TestProvisionerProvision_I Inline", "TestWriteUnknownPlaceholderValues/T TestWriteUnknownPlaceholderValues#13", "TestCoreBuild_basic", "Test_PackerPluginSuite/TestI InstallNonCanonicalPluginVersion", "Test_commands/packer_[inspect_-var=fruit=ban nana_test-fixtures\\\\var-arg\\\\fruit_builder.pkr.hcl]", "Test_LessInstallList/v1.2.2_\\ \\u003c_v1.2.2-dev_=\\u003e_false", "TestParse_build/nonexistent_provisioner r", "TestBuilder_NoExist", "TestPostProcessorPrepare_E EnvironmentVars", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#08", "TestPackerConfig_required_plugin_pars se/required_plugin_forked", "TestBuild/var-args:_hcl_-_json_varfile_set ts_a_apple_env_var", "TestValidateCommandExcept/HCL2:_fail_validati ion_except_build_and_post-processor", "TestPluginName", "TestProvisionerProvision_Sc cripts", "TestProvisionerQuote_Environm mentVars", "Test_ParseHCPPackerRegistryBlock/bucket t_name_OK_multiple_block_multiple_declaration", "TestBuild_Prepare", "TestProvisioner_createFlatt tenedElevatedEnvVars_windows", "TestProvisionerPrepare_InvalidSourc ce", "TestProvisionerProvision_Paus seAfter", "Test_ParseHCPPackerRegistryBlock/bucket_ _name_as_variable", "Test_console/echo_\\\"1_+_5\\\"_|_p packer_[console_--config-type=hcl2]", "Test_ParseHCPPackerRegistryBlock/buck ket_name_OK", "TestBuild/hcl_-_using_build_variables_in_pos st-processor", "TestFixerParallelsDeprecations_Fix_guest_os_dist tribution", "TestBucket_PopulateVersion/popu ulating_version_with_existing_incomplete_build_should_update_bucket_build_labels", "TestFixerCreateTime_Impl", "TestUpdateBuildStatus", "TestParser_no_init/invalid_short_sour rce.pkr.hcl", "TestContentSourceConflict", "TestBuild/hcl_-_dynamic_source_blocks_in_a a_build_block", "Test_ParseHCPPackerRegistryBlock/bucket t_name_invalid_chars", "TestFixerVirtualBoxRename_impl", "TestPluginParseSourceString/invali id:_reject_because_query_non_nil", "TestProvisionerProvision_Scri ipts", "TestSetFilter", "TestParse_datasource/cyclic_dependency_ _between_data_sources", "TestGetInfoForWindows/ /Invalid_version_info", "TestBuildCmd/hcl_-_undefined_var_set_in_pk krvars", "TestPluginParts/valid_with_four_p parts", "TestProvisionerPrepare_extrac ctScript", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#16", "TestTemplateFile/TemplateFile( (cty.StringVal(\\", "TestCoreBuild_provOverride", "TestCoreBuild_IgnoreTemplateVariables", "TestBuild/var-args:_json_-_arg_sets_a_pear r_env_var", "TestFix_invalidTemplate", "Test_PackerPluginSuite/Te estPluginsRemoveWithSourceAddress", "TestClient", "TestVariables_collectVariableValues/bool l", "TestFixerParallelsHeadless_Impl", "TestPackerConfig_ParseProvisionerBlock/s success_-_provisioner_is_valid", "Test_LessInstallList/v1.2.2_\\u0 003c_v1.2.1_=\\u003e_false", "Test_PackerPluginSuite/Test tInstallPluginWithMetadata", "TestParse_variables/basic_variables", "TestProvisioner_RemotePathOverri idesRemotePathAndRemoteFile", "Test_PackerPluginSuite/Test tPackerInitWithNonGithubSource", "TestSum/sum(cty.ListVal([]ct ty.Value{cty.NumberFloatVal(-10.2),_cty.NumberFloatVal(-19.4),_cty.NumberFloatVal l(-5.7)}))", "TestGetOldestProject/Only_one_pro oject,_project_exists,_success", "TestProvisionerPrepare_InvalidSou urce", "TestPluginParseSourceString/inval lid:_two_components_in_name", "TestInitialize_ExistingBucketCo ompleteVersion", "TestProvisionerPrepare_Scr riptAndInline", "TestPluginsInstallCommand_Run/install-newer-v version", "TestVariables_collectVariableValues", "TestInitCommand_Run/already-installed-upgrad de/-subtest-0", "TestProvision_createCommandTex xt", "Test_LessInstallList/v1.2.3_x5. .0_\\u003c_v1.2.3_x5.0_=\\u003e_false", "TestFixerProxmoxType_Fix", "TestPluginParts/valid_with_two_par rts", "Test_ParseHCPPackerRegistryBlock/buck ket_name_left_empty", "Test_LessInstallList/v1.2.2_\\u00 03c_v1.2.1_=\\u003e_false", "Test_PackerCoreSuite/TestLo ocalDuplicates/duplicate_local_detection_with_console_command_-_expect_error", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#18", "Test t_console/echo_\\\"help\\\"_|_packer_[console_--config-type=hcl2_--use-sequential-eva aluation]", "TestStringSlice_Set", "TestSum/sum(cty.ListVal([]cty. .Value{cty.StringVal(\\", "TestSum/sum(cty.SetVal([]cty.V Value{cty.NumberIntVal(10),_cty.NumberIntVal(25),_cty.NumberIntVal(30)}))", "TestBuildExceptFileCommaFlags/HCL2:_except t_build_and_post-processor", "TestLength/Length(cty.String gVal(\\", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate\\ ull_var.json", "TestCoreBuild_nonExist", "TestConfigValueFromHCL2/cty.NumberI IntVal(12)", "TestBuildCommand_ParseArgs/[-parallel-buil lds=1_-parallel-builds=5_otherfile.json]", "TestProvisionerProvision_Uplo oadFails", "Test_PackerDAGSuite/TestMalfor rmedDependency", "TestBuild/hcl_-_recursive_local_using_input_ _var", "TestBuildCommand_RunContext_CtxCancel/cancel l_1_locked_build_-_debug_-_parallel=false", "TestSum/sum(cty.ListVal([]cty. .Value{cty.UnknownVal(cty.Number)}))", "TestProvisionerProvision_Sk kipClean", "TestSetDifference/2-B_has_extra_element ts", "TestParse_build/post-processor_with_onl ly_and_except", "TestProvisionerProvision_SendsFileMu ultipleFilesToFolder", "Test_PackerDAGSuite", "TestUnixReader_unixOnly", "Test_commands/packer_[inspect_-var=fruit=p peach_-var=other_default_from_env=apple_test-fixtures\\\\hcl\\\\inspect]", "TestProvision_waitForR RestartTimeout", "TestInitCmd/Ensure_init_warns_on_template_wi ithout_required_plugin_blocks", "TestBuildCommand_HCLOnlyExceptOptions/[-exce ept=*ch*]", "TestFixerParallelsHeadless_Fix", "TestNewRegisterProperBuildName", "TestPluginParseSourceString/inval lid:_leading_and_trailing_slashes_are_removed", "TestValidateCommandExcept/HCL2:_validate_exce ept_build_and_post-processor", "Test_ParseHCPPackerRegistryBlock/bucket t_name_OK", "TestProvisioner_createFlattenedEnvV Vars_withEnvVarFormat", "TestFixerSSHDisableAgent_Fix", "TestStringFlag_implements", "TestParse_variables/set_variable_from m_var-file", "TestRetriedProvisioner_impl", "TestLength/ /Length", "TestLength/Length(cty.ListValE Empty(cty.Number))", "TestLength", "TestHCL2Formatter_Format_ShowDiff", "Test_hcl2_upgrade", "Test_PackerPluginSuite/Te estInstallPluginWithMetadata/plugin_with_metadata_should_work_with_validate", "Test_PackerPluginSuite/TestP PluginsRemoveWithNoArguments", "TestValidateCommand/test-fixtures\\\\hcl\\\\loca al-ds-validate.pkr.hcl#01", "TestPluginParseSourceString/inval lid:_reject_because_fragment_present", "TestParse_variables/unknown_variable_ _from_var-file", "TestFixerVagrantPPOverride_Fix", "TestHelperProcess", "Test_PackerPluginSuite/Te estLoadWithOnlyReleaseFlag/run_validate_with_--ignore-prerelease_flag_-_pick_1.0. .0", "TestParse_variables/provisioner_variabl le_decoding", "TestFixerGalaxyCommand_Fix", "Test_PackerPluginSuite/Te estLoadWithSHAMismatches", "TestPostProcessorPrepare_S Scripts", "TestPluginParts/valid_with_two_pa arts", "Test_PackerPluginSuite/Test tLoadWithLegacyPluginName/multiple_plugins_installed:_1.0.0_in_plugin_dir_with_su um,_one_in_workdir_(no_version)._Should_load_1.0.0", "Test_PackerPluginSuite/Te estLoadWithOnlyReleaseFlag", "TestPostProcessor_Implemen ntsPostProcessor", "TestPostProcessor_NoExist", "TestProvisionerProvision_SendsFileM MultipleFiles", "TestConfigPrepare/config_with h_sbom_name_as_interpolated_value,_without_it_in_context,_replace_with_a_placehol lder", "TestProvisionerPrepare_Pwsh", "TestBuildCommand_HCLOnlyExceptOptions/[-on nly=file.cherry]", "Test_PackerPluginSuite/Test tInstallPluginWithPath/install_plugin_with_pre-release_only", "TestStringSlice_Set/basic", "TestParse_build/post-processor_with_only y_and_except", "TestNewRegisterProperBuildNa ame/multiple_build_block_with_same_source_but_with_different_build_name", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate\\\\build.json", "TestPostProcessorPrepar re_Script", "TestSum/sum(cty.ListVal([]ct ty.Value{cty.NullVal(cty.Number)}))", "Test_PackerDAGSuite/TestWithBo othDataLocalMixedOrder/validate:_evaluating_sequentially_-_failure_expected", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#01", "TestBuild/var-args:_hcl_-_nonexistent_hcl_va ar_file_errs", "TestMachineReadableUi", "TestBuild/hcl_-_recipes_-_only_recipes", "TestVersion_Initialize/using_gi it_fingerprint", "TestProvisionerPrepare_ScriptA AndScripts", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#07", "TestValidateCommand/test-fixtures\\\\version_r req\\\\wrong_field_name", "TestDecodeConfig", "TestCheckErrorCode/new_format,_code e_matches_what_is_looked_for", "Test_PackerPluginSuite/Test tPluginsRemoveWithLocalPath/plugins_installed_after_calling_plugins_remove_output ts_remaining_installed_plugins", "TestBuild/var-args:_hcl_-_arg_sets_a_tomato_ _env_var", "TestFixerSSHTimout_Fix", "TestPostProcessor_Impleme entsPostProcessor", "TestBucket_PopulateVersion/pop pulating_version_with_existing_incomplete_build_and_no_bucket_build_labels_does_n nothing", "TestBuildCommand_HCLOnlyExceptOptions/[-exce ept=*chocolate*]", "TestBucket_PopulateVersion", "TestParse_datasource", "TestProvisioner_createFlat ttenedEnvVars_windows", "Test_PackerPluginSuite/TestL LoadWithLegacyPluginName/multiple_plugins_installed:_one_with_no_version_in_path, ,_one_with_qualified_name._Should_pick-up_the_qualified_one_only.", "TestParse_variables/unset_unused_variab ble", "Test_PackerPluginSuite/Test tLoadWithOnlyReleaseFlag", "TestIndex/index(cty.ListVal([] ]cty.Value{cty.NumberIntVal(1),_cty.NumberIntVal(2),_cty.NumberIntVal(3)}),_cty.S StringVal(\\", "TestProvisionerPrepare_InvalidKey", "TestValidateCommandOKVersion", "Test_PackerPl luginSuite", "TestProvision_waitForC CommunicatorWithCancel", "Test_commands/packer_[inspect_test-fixtures\\ \\\\hcl-inspect-with-sensitive-vars]", "TestProvisionerPrepare_Elevat ted", "TestPostProcessorPrepare_ _ExecuteCommand", "TestGetOldestProject/No_projects,_sh hould_error", "TestValidateCommand/test-fixtures\\\\validat te\\\\circular_error.pkr.hcl", "Test_ParseHCPPackerRegistryBlock/bucket t_name_as_variable", "TestProvisionerPrepare_Scri iptAndScripts", "TestFixerAmazonTemporarySecurityCIDRs_Impl", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberIntVal(1e+500),_cty.NumberIntVal(1e+500)}))", "TestFixerVirtualBoxRenameFix_provisionerOverride", "Test_PackerPluginSuite/Test tLoadWithLegacyPluginName", "TestTemplateFile/Temp plateFile", "TestPluginParseSourceString/inv valid:_plugin_name_contains_packer-", "TestValidateCommand/test-fixtures\\\\version n_req\\\\base_success", "TestProvisioner_RemotePathSetVia aRemotePathAndRemoteFile", "TestValidateCommand/test-fixtures\\\\version_r req\\\\base_success", "TestProvisionHook_Impl", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues", "TestBuildCommand_HCLOnlyExceptOptions/[-exce ept=my_build.file.chocolate]", "Test_ParseHCPPackerRegistryBlock", "Test_PackerPluginSuite/Test tPluginsRemoveWithLocalPath/plugins_remove_with_fake_local_path_exits_with_a_non- -zero_code", "TestProvisioner_Provision/valid_sle eep", "TestLength/Length(cty.StringVa al(\\", "TestValidateCommand/test-fixtures\\\\validate- -invalid\\\\bad_provisioner.json", "TestValidateCommand/test-fixtures\\\\validate\\ \\\\circular_error.pkr.hcl", "Test_PackerCoreSuite/TestLocal lDuplicates/duplicate_local_detection_with_validate_command_-_expect_error", "TestLegacyIsotime_inputs/legacy y_isotime(cty.StringVal(\\", "TestNewRegisterProperBuildName e/single_build_block_with_single_source", "Test_ParseHCPPackerRegistryBlock/bucket t_name_too_short", "TestProvisionerProvision n_ScriptsWithEnvVars", "TestChecksumSHA1", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#15", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate\\\\var_foo_with_no_default.pkr.hcl", "TestParser_no_init/duplicate_required_pl lugin_accessor_fails", "TestFixerSSHDisableAgent_Impl", "TestBuild/hcl_-_invalid_setting_from_varfi ile", "TestMultiPlugin_defaultName_each_plugin_type", "TestBuild/var-args:_hcl_-_auto_varfile_and_j json_-auto_varfile_sets_the_value_in_json_auto_varfile", "Test_PackerPluginSuite/Test tLoadingOrder/HCL2_validate_-_With_required_plugins,_1.0.10_is_the_most_recent_an nd_should_load", "TestFmtParseError", "TestBuildCommand_HCLOnlyExceptOptions/[-only y=chocolate]", "TestProvisionerPrepare_ext tractScript", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberIntVal(5),_cty.NullVal(cty.Number)}))", "TestNewRegisterProperBuildNa ame/single_build_block_with_name_and_with_single_source", "TestUpdateBuildStatus_DONENoIm mages", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#09", "TestVariables_collectVariableValues/u undefined_but_set_value_-_argv", "TestNewRegisterProperBuildNa ame/single_build_block_with_3_sources", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#05", "TestIndex/index(cty.ListVal([] ]cty.Value{cty.NumberIntVal(1),_cty.NumberIntVal(2),_cty.NumberIntVal(3)}),_cty.N NumberIntVal(4))", "Test_PackerPluginSuite/Te estLoadWithOnlyReleaseFlag/run_validate_without_--ignore-prerelease_flag_-_pick_1 1.0.1-dev_by_default", "Test_PackerPluginSuite/Te estPluginsRemoveWithLocalPath", "TestProgressTracking_multi_open_close", "TestPostProcessorPrepare_ _ScriptAndInline", "TestGetInfoForWindows/ /Valid_version_info", "TestBuild_Run_Artifacts", "TestWriteUnknownPlaceholderValues/T TestWriteUnknownPlaceholderValues#17", "Test_PackerPluginSuite/TestP PluginPathEnvvarWithMultiplePaths", "TestParse_source/untyped_source", "TestPluginParseSourceString/invali id:_trailing_slash", "TestFlag", "TestProvisionerProvision_SendsFil leMultipleFiles", "TestBuildCommand_RunContext_CtxCancel/cancel_ _1_pending_build_-_parallel=true", "TestFixerQEMUDiskSize_impl", "TestProvisionerPrepare_S Scripts", "TestProvisionerPrepare_Co onfigErrors", "TestRequirement_InstallLatest t/ignore-incompatible-higher-protocol-version", "TestArchive/bzip2", "Test_LessInstallList/v1.2.3_\\u0 003c_v1.2.2-dev_=\\u003e_false", "TestProvisionerProvision_SendsFil leMultipleDirs", "TestBuild/var-args:__apple_hcl_var_file_then_ _banana_json_var_file_sets_banana_env_var", "TestGetOldestProject/No_projects, ,_should_error", "TestPostProcessor_Impl", "TestInitialize_UnsetTemplateTy ypeError", "Test_PackerPluginSuite/Te estPluginPathEnvvarWithMultiplePaths/load_plugin_with_two_dirs_-_not_supported_an nymore,_should_error", "TestDetectFilename", "TestAllTrue/alltrue(cty.ListVa al([]cty.Value{cty.False}))", "TestLength/Length(cty.UnknownV Val(cty.EmptyTuple))", "TestGetInfoForWindows s/Valid_version_info", "TestSum/sum(cty.SetVal([]cty.V Value{cty.NumberIntVal(-19),_cty.NumberIntVal(5),_cty.NumberIntVal(10)}))", "TestBuild_Prepare_SkipWhenBuilderAlreadyIni itialized", "TestBuild/hcl_-_invalid_cmd_", "Test_PackerDAGSuite/TestWithBo othDataLocalMixedOrder/build:_evaluating_sequentially_-_failure_expected", "TestStartsWith/StartsWith(ct ty.StringVal(\\", "TestBuildCommand_HCLOnlyExceptOptions/[-on nly=my_build.file.chocolate]", "Test_ParseHCPPackerRegistryBlock/buck ket_name_OK_multiple_block_multiple_declaration", "TestParse_build/variable_interpolation_ _for_build_name_and_description", "TestBuild/hcl_-_using_build_variables_in_p post-processor", "TestParse_variables/unset_used_variable", "Test_LessInstallList/v1.2.2_\\u0 003c_v1.2.2-dev_=\\u003e_false", "TestFixerVirtualBoxGAAttach_Fix", "TestCheckErrorCode/old_format,_code e_doesn't_match_what_is_looked_for", "TestCoreBuild_buildTypeVar", "TestSensitiveVars", "TestProvisionerPrepare_Inva alidKey", "TestBuild/var-args:_hcl_-_nonexistent_hcl_ _var_file_errs", "TestProvisioner_createFlatten nedElevatedEnvVars_windows", "TestGetOldestProject/Multiple_projec cts,_pick_the_oldest", "TestBuild/hcl_-_valid_cmd_", "TestIndex", "TestValidateCommandExcept", "TestReadFromHCLBuildBlock/confi igure_bucket_using_only_hcp_packer_registry_block", "TestFixerCommConfig_Impl", "TestInitialize_ExistingBucketNe ewVersion", "TestSetDifference/2-B_has_extra_eleme ents", "Test_ParseHCPPackerRegistryBlock/bucket t_name_OK_multiple_block_second_build_block", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=false_./t templates/malformed_data_dep.pkr.hcl", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#12", "Test_consol le/echo_\\\"path.cwd\\\"_|_packer_[console_test-fixtures\\\\var-arg\\\\map.pkr.hcl]", "TestValidateCommand_VarFilesWarnOnUndeclared", "TestMultiStringFlag", "TestParse_datasource/nonexistent_source", "TestParse_build/nonexistent_post-proc cessor", "TestProvisionerProvision_Up ploadFails", "TestBucket_CreateInitialBuildF ForVersion", "TestPluginParseSourceString/invali id:_17_components,_too_many_parts_to_URL", "TestRequirement_InstallLatest/al lready-installed-compatible-api-minor-version", "TestBuild_Prepare_SkipWhenBuilderAlreadyIniti ialized", "Test_ParseHCPPackerRegistryBlock/long_h hcp_packer_registry.description", "TestValidateCommand/test-fixtures\\\\version_r req\\\\base_failure", "Test_PackerPluginSuite/Te estPluginsRemoveWithSourceAddress/plugins_remove_with_source_address_removes_all_ _installed_plugin_versions", "TestConfigValueFromHCL2/cty.True", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#13", "TestBuildCommand_HCLOnlyExceptOptions/[-only y=*chocolate*]", "TestValidateCommand/test-fixtures\\\\validat te\\\\invalid_block_type.pkr.hcl", "TestFixerVirtualBoxRename_Fix", "TestPluginParseSourceString/inv valid:_reject_because_scheme_specified", "TestBuildCmd/hcl_-_exclude_post-processor, ,_expect_no_warning", "TestBucket_UpdateLabelsForBuil ld_withMultipleBuilds", "TestArtifact_ImplementsArt tifact", "Test_ParseHCPPackerRegistryBlock/invali id_hcp_packer_registry_config", "TestParser_no_init/working_build_with_i imports", "Test_ParseHCPPackerRegistryBlock/bucket t_name_OK_multiple_block", "TestValidateCommand/test-fixtures\\\\hcl\\\\lo ocal-ds-validate.pkr.hcl#01", "Test_cons sole/echo_\\\"var.images\\\"_|_packer_[console_test-fixtures\\\\var-arg\\\\map.pkr.hcl]", "TestBucket_UpdateLabelsForBuil ld", "TestRequirement_InstallLatest/a already-installed-compatible-api-minor-version", "TestSum/sum(cty.SetVal([]cty.V Value{cty.StringVal(\\", "TestBuild_Name", "TestProvisionerPrepare_Invali idDebugMode", "TestProvisionerProvision n_WaitForRestartFail", "Test_PackerPluginSuite/Test tLoadWithSHAMismatches", "TestFixerGalaxyCommand_Impl", "TestParse_source/two_basic_sources", "TestMultiPlugin_describe_installed_for_invali id/Plugins_missing_checksums", "TestBucket_PopulateVersion/popu ulating_version_with_completed_build_should_not_modify_any_labels", "TestGraphStronglyConnected_three", "Test_hcl2_upgrade/error-cleanup-provisioner", "TestAllTrue/alltrue(cty.List tVal([]cty.Value{cty.UnknownVal(cty.Bool)}))", "TestBuild_RunBeforePrepare", "TestStartsWith/StartsWith(cty. .UnknownVal(cty.String),_cty.StringVal(\\", "TestProvisioner_RemotePathSetViaRe emotePathAndRemoteFile", "TestProvisionerProvision_SendsFil le", "TestAnyTrue/anytrue", "TestProvisionerProvision n_Success", "Test_hcl2_upgrade/variables-with-variables", "Test_PackerPluginSuite/Te estInstallNonCanonicalPluginVersion", "TestBuildCmd/hcl_-_build_block_without_source e", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#06", "Test tAllTrue/alltrue", "TestNewRegisterProperBuildName e/single_build_block_with_name_and_multiple_sources", "TestSum/sum(cty.ListVal([]ct ty.Value{cty.NumberIntVal(5),_cty.NullVal(cty.Number)}))", "TestSetDifference", "TestNewRegisterProperBuildName e/single_build_block_with_2_sources", "TestSum/sum", "TestAllTrue/alltrue(cty.ListVa al([]cty.Value{cty.UnknownVal(cty.Bool)}))", "TestUnixReader_impl", "TestValidateCommand", "Test_PackerPluginSuite/Test tLoadingOrder/JSON_build_-_No_required_plugins,_1.0.10_is_the_most_recent_and_sho ould_load", "TestParse_variables/recursive_locals", "TestHook_NoExist", "Test_PackerPluginSuite/Te estPluginsRemoveWithSourceAddress/plugins_remove_with_invalid_source_address_exit ts_with_non-zero_code", "TestBuildCommand_HCLOnlyExceptOptions/[-only y=my_build.file.chocolate]", "TestRandom", "TestCoreBuild_provSkipInclude", "TestFixerAmazonPrivateIP_Impl", "TestNewRegisterProperBuildName e/multiple_build_block_with_same_source_but_with_only_one_declared_build_name", "TestParse_source/used_source_with_unkno own_type_fails", "TestBuildCommand_HCLOnlyExceptOptions/[-ex xcept=*chocolate*_-except=*vanilla*]", "TestVariables_collectVariableValues/v value_not_corresponding_to_type_-_cfg_file", "TestBuildCommand_RunContext_CtxCancel/canc cel_2_locked_builds_-_debug_-_parallel=true", "TestNewRegisterProperBuildName e/single_build_block_with_name_and_with_single_source", "TestInitCommand_Run/unsupported-non-github-s source-address", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#14", "TestProvisionerProvision_Inva alidExitCodes", "Test_PackerPluginSuite/Te estLoadPluginWithMetadataInName/try_listing_plugins_with_metadata_in_name_-_repor rt_none", "TestBuild/var-args:__apple_hcl_var_file_th hen_banana_json_var_file_sets_banana_env_var", "Test_console/echo_\\\"help\\\"_|_pac cker_[console_--config-type=hcl2]", "Test_PackerPluginSuite/Test tLoadWithLegacyPluginName/multiple_plugins_installed:_one_with_no_version_in_path h,_one_with_qualified_name._Should_pick-up_the_qualified_one_only.", "Test_PackerPluginSuite/Te estLoadWithLegacyPluginName", "TestLength/Length(cty.UnknownV Val(cty.List(cty.Bool)))", "TestBuild/var-args:_json_-_arg_sets_a_pear_e env_var", "TestProvisionerAndPostProcessorOnlyExcept/ /hcl_-_only_one_source_build", "Test_IsHCPDisabled/registry_set_with h_off", "TestPluginName/invalid_name_with_p prefix", "TestNewRegisterProperBuildNa ame/single_build_block_with_multiple_identical_sources_create_conflict", "TestFixerHypervDeprecations_impl", "TestAllTrue/alltrue(cty.Unknow wnVal(cty.List(cty.Bool)))", "TestProvisionerProvision_In nline", "TestVariables_collectVariableValues/inva alid_env_var", "TestFmt_Recursive/nested_formats_recursively", "TestValidateCommand/test-fixtures\\\\validate\\ \\\\invalid_block_type.pkr.hcl", "TestInitialize_ExistingBucke etCompleteVersion", "TestGetOldestProject/Only_one_proje ect,_project_exists,_success", "Test_PackerPluginSuite/TestP PluginsRemoveWithSourceAddressAndVersion/plugins_remove_with_source_address_and_v version_removes_only_the_versioned_plugin", "Test_PackerPluginSuite/Te estPluginsRemoveWithLocalPath/plugins_installed_after_calling_plugins_remove_outp puts_remaining_installed_plugins", "TestLength/Length(cty.EmptyT TupleVal)", "TestBuild/var-args:_json_-_json_varfile_se ets_an_apple_env_var", "TestCheckErrorCode/bad_format,_shou uld_always_be_false", "Test_PackerPluginSuite/TestL LoadingOrder/HCL2_build_-_With_required_plugins,_1.0.10_is_the_most_recent_and_sh hould_load", "TestBuild/hcl_-_using_variables_in_build_bloc ck", "Test_PackerDAGSuite/TestWithBo othDataLocalMixedOrder/build:_evaluating_with_DAG_-_success_expected", "TestLength/Length(cty.MapVal l(map[string]cty.Value{\\", "TestPluginParseSourceString/invali id:_only_one_component,_rejected", "TestVariables_collectVariableValues/str ring", "TestParse_build/provisioner_with_only_an nd_except", "TestSetDifference/1-A_has_extra_eleme ents", "TestGetInfoForWindows s/Invalid_version_info", "TestPostProcessorPrepare_ _EnvironmentVars", "TestBuild/var-args:_banana_json_var_file_the en_hcl_var_file_sets_apple_env_var", "TestProvisionerProvision_S Scripts", "TestVersion_Initialize/using_fi ingerprint_env_variable", "TestWriteUnknownPlaceholderValues/T TestWriteUnknownPlaceholderValues#11", "Test_PackerPluginSuite/TestW WithLegacyConfigAndComponents/build_simple_JSON_template_with_config.json_and_com mponents_defined", "Test_PackerPluginSuite/Test tLoadingOrder/HCL2_build_-_With_required_plugins,_1.0.9_is_pinned,_so_1.0.9_shoul ld_be_used", "TestBuildCommand_RunContext_CtxCancel/cance el_1_locked_build_-_debug_-_parallel=true", "TestBuild/var-args:_hcl_-_nonexistent_json_v var_file_errs", "TestPluginParseSourceString/inval lid:_trailing_slash", "Test_PackerPluginSuite/Test tLoadWithOnlyReleaseFlag/run_build_without_--ignore-prerelease_flag_-_pick_1.0.1- -dev_by_default", "TestProvisionerRemotePathDefault tsSuccessfully", "TestProvisionerProvision_ _CustomCommand", "TestBuildCommand_ParseArgs/[-parallel-builds s=1_-parallel-builds=5_otherfile.json]", "Test_PackerPluginSuite/Test tLoadPluginWithMetadataInName", "TestDebuggedProvisionerPrepare", "TestAccShellProvisioner_basic", "TestProvision_createCommandTex xtNoneExecutionPolicy", "TestParse_build/use_build.name_in_provis sioner_block", "TestStar rtsWith/StartsWith", "TestBucket_PopulateVersion/popu ulating_version_with_existing_build_should_only_modify_bucket_build_labels", "TestBuild/hcl_-_valid_cmd_(_invalid_varfile_ _bypased_)", "TestFixerVMwareCompaction_impl", "TestParse_build/untyped_post-processo or", "TestGetInfoForWindows", "TestBuildCommand_HCLOnlyExceptOptions/[-exce ept=*chocolate*_-except=*vanilla*]", "Test_PackerPluginSuite/TestL LoadWithSHAMismatches/move_plugin_with_right_name,_invalid_SHA256SUM,_should_reje ect", "TestBuildCommand_RunContext_CtxCancel/cancel l_1_locked_build_-_debug_-_parallel=true", "Test_PackerPl luginSuite/TestSourceNotExisting", "TestProvisionerAndPostProcessorOnlyExcept/ /json_-_only_unnamed_build", "TestPackerConfig_required_plugin_parse", "TestCheckErrorCode/new_format,_code e_doesn't_match_what_is_looked_for", "TestFixerAzureExcludeFromLatest", "TestLegacyIsotime_inputs", "TestFixerISOChecksumTypeAndURL_Fix", "Test_IsHCPDisabled/registry_set_w with_0", "TestNoFilename", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate-invalid\\\\broken.json", "TestClient_Stdin", "TestFixerManifestPPFilename_Fix", "TestBuildStdin", "TestProvisionerPrepare_Inva alidDebugMode", "TestProvisionerRemotePathDefaultsS Successfully", "TestInitialize_NewBucketNewV Version", "TestValidateCommand/test-fixtures\\\\hcl\\\\vali idation\\\\wrong_pause_before.pkr.hcl", "TestFixerHypervDeprecations_Fix", "TestPostProcessorPrepare_S ScriptAndScripts", "TestBasicEdgeHashcode_pointer", "TestBuild/hcl_-_'except'_a_build_block", "TestExcludeHelpFunc", "Test_ParseHCPPackerRegistryBlock/buck ket_labels_and_build_labels_as_variables", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=false_ _./templates/malformed_data_dep.pkr.hcl", "TestProvisionerProvision n_Scripts", "TestBucket_UpdateLabelsForBuil ld/bucket_build_labels", "TestBuild/hcl_-_variables_can_be_used_in_sha ared_post-processor_fields", "TestCoreBuildNames", "TestCoreBuild_buildNameIntepolation", "TestValidateCommand/test-fixtures\\\\validat te\\\\invalid_packer_block.pkr.hcl", "TestBasicUi_ImplUi", "TestArchive/tar.gz", "TestVariables_collectVariableValues/d defining_a_variable_block_in_a_variables_file_is_invalid_", "TestProvisionerAndPostProcessorOnlyExcept/ /hcl_-_only_other_build", "TestParse_variables/valid_validation_bl lock", "TestAllTrue/alltrue(cty.ListVa al([]cty.Value{cty.True,_cty.False}))", "TestStrContains/includes(cty.S StringVal(\\", "TestFlagJSON_impl", "TestParse_datasource/two_basic_datasourc ces", "TestBuildCommand_ParseArgs/[file.json]", "TestBuildCommand_HCLOnlyExceptOptions/[-on nly=*chocolate*]", "TestProvisioner_RemotePathSetViaRem motePathAndRemoteFile", "TestBucket_UpdateLabelsForBuil ld/no_bucket_or_build_specific_labels", "Test_hcl2_upgrade/placeholders", "Test_build_output/packer_[build_--color=fa alse_test-fixtures\\\\hcl\\ eprepare\\\\shell-local-windows.pkr.hcl]", "TestEndsWith h/EndsWith", "Test_PackerPluginSuite/Te estLoadWithOnlyReleaseFlag/run_build_without_--ignore-prerelease_flag_-_pick_1.0. .1-dev_by_default", "TestFixerAmazonShutdownBehavior", "TestFlagJSON", "TestProvisionerPrepare_Script ts", "TestProvisionHook_cancel", "TestProvisionerCorrectlyInter rpolatesExecutionPolicy", "TestNewRegisterProperBuildName e/single_build_block_with_3_sources", "Test_PackerPluginSuite/TestL LoadWithOnlyReleaseFlag/run_validate_with_--ignore-prerelease_flag_-_pick_1.0.0", "Test_PackerPluginSuite/Te estInstallNonCanonicalPluginVersion/try_listing_plugins_with_non-canonical_versio on_installed_-_report_none", "TestBuild/hcl_-_dynamic_source_blocks_in_a_b build_block", "TestParse_build/invalid_variable_for_bu uild_name", "Test_PackerPluginSuite/TestW WithLegacyConfigAndComponents/validate_simple_JSON_template_with_config.json_and_ _components_defined", "Test_ParseHCPPackerRegistryBlock/bucket t_name_left_empty", "TestCoreBuild_postProcess", "TestParser_no_init/duplicate_required d_plugin_accessor_fails", "TestVariables_collectVariableValues/s string", "Test_PackerPluginSuite/Te estInstallPluginWithPath/install_same_plugin_with_pre-release_+_metadata", "Test_PackerPluginSuite/TestL LoadWithLegacyPluginName/only_legacy_plugins_installed:_expect_build_to_fail/JSON N_template,_without_required_plugins:_should_say_the_component_is_unknown", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#17", "TestBuildWithCleanupScript", "TestGraphEdgesTo", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#11", "TestBuild/var-args:_json_-_auto_varfile_se ets_a_peanut_env_var", "Test_LessInstallList/v1.2.3_x x5.0_\\u003c_v1.2.3_x5.1_=\\u003e_true", "TestBuildCmd/hcl_-_no_build_block_error", "TestBuild/source_name:_HCL", "TestNewRegisterProperBuildName e/multiple_build_block_with_different_source", "TestBuildExceptFileCommaFlags/HCL2-JSON:_exc cept_build_and_post-processor", "TestAccShellProvisioner_basi ic", "TestProvisioner_RemoteFolderSetS Successfully", "TestSetFilter/2-[]interface_{}{7,_8,_9} }", "TestRequirement_InstallLatest/a already-installed-same-api-version", "TestInitCommand_Run/release-with-no-binary", "TestTargetedUI_ImplUi", "TestProvisionerProvisi ion_WaitForRestartFail", "TestProvision_waitForRes startTimeout", "TestBuildCommand_RunContext_CtxCancel/cancel l_1_pending_build_-_parallel=true", "Test_PackerPluginSuite/Te estLoadingOrder/JSON_validate_-_No_required_plugins,_1.0.10_is_the_most_recent_an nd_should_load", "Test_PackerPluginSuite/Te estPluginsRemoveWithLocalPath/plugins_remove_with_fake_local_path_exits_with_a_no on-zero_code", "TestValidateCommand/test-fixtures\\\\validat te-invalid\\\\bad_provisioner.json", "TestProvisionerPrepare_Pwsh h", "TestFixerScalewayAccessKey_Fix", "TestPluginParseSourceString/inval lid:_only_one_component,_rejected", "TestPluginName/valid_minimal_name", "TestAcyclicGraphValidate_cycleSelf", "Test_PackerPluginSuite/Te estLoadWithSHAMismatches/move_plugin_with_right_name,_but_no_SHA256SUM,_should_re eject", "Test_ParseHCPPackerRegistryBlock/top_lev vel_and_build_block", "Tes stEndsWith/EndsWith", "TestBuildCommand_ParseArgs/[-parallel-buil lds=1_file.json]", "Test_hcl2_upgrade/source-name", "Test_LessInstallList/v1.2.1_=_v v1.2.1_=\\u003e_false", "Test_IsHCPDisabled/nothing_set", "TestBuild", "TestBuildCommand_RunContext_CtxCancel/canc cel_in_the_middle_with_2_pending_builds_-_parallel=true", "Test_LessInstallList/v1.2.1_\\ \\u003c_v1.2.2-dev_=\\u003e_true", "Test_PackerDAGSuite/TestWithBo othDataLocalMixedOrder", "TestProvisionerProvision_Inli ine", "TestValidateCommand/test-fixtures\\\\validat te\\\\build.pkr.hcl", "Test_hcl2_upgrade/vsphere_linux_options_an nd_network_interface", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate\\\\build.pkr.hcl", "Test_PackerPluginSuite/Test tPluginsRemoveWithSourceAddress/plugins_remove_with_invalid_source_address_exits_ _with_non-zero_code", "TestBasicUi_Error", "TestFixerISOMD5_Fix", "Test_PackerDAGSuite/TestMalform medDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=false_./t templates/malformed_local_dep.pkr.hcl", "TestRetriedProvisionerPrepare", "TestInitCommand_Run/already-installed-upgrad de", "TestCheckErrorCode/new_format,_co ode_doesn't_match_what_is_looked_for", "TestParse_build/use_build.name_in_post- -processor_block", "TestBuild/var-args:_banana_json_var_file_t then_hcl_var_file_sets_apple_env_var", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NullVal(cty.Number)}))", "TestParse_build/invalid_source", "TestBucket_PopulateVersion/p populating_version_with_completed_build_should_not_modify_any_labels", "Test_PackerPluginSuite/Test tLoadWithSHAMismatches/move_plugin_with_right_name,_but_no_SHA256SUM,_should_reje ect", "TestBuildCommand_HCLOnlyExceptOptions/[-ex xcept=*ch*]", "TestProvisionerCorrectlyInt terpolatesExecutionPolicy", "TestProvisioner_RemoteFileDefaults sToScriptnnnn", "TestFmt_Recursive/nested_no_recursive_format", "TestAllTrue e/alltrue", "TestTemplateFile/TemplateFile", "TestBuild/hcl_-_recursive_local_using_inpu ut_var", "TestBuildCommand_HCLOnlyExceptOptions/[-only y=file.cherry]", "TestLength/Length(cty.MapVal(m map[string]cty.Value{\\", "TestProvisioner_Good", "TestParse_variables/unknown_key", "Test_ParseHCPPackerRegistryBlock/buck ket_name_OK_multiple_block", "TestProvisionerPrepare_Conf fig", "TestPausedProvisionerCancel", "Test_PackerPluginSuite/TestL LoadWithOnlyReleaseFlag/run_build_with_--ignore-prerelease_flag_-_pick_1.0.0", "Test_PackerPluginSuite/Te estLoadingOrder/JSON_build_-_No_required_plugins,_1.0.10_is_the_most_recent_and_s should_load", "TestVariables_collectVariableValues/q quoted_string", "TestFixerAmazonPrivateIP", "Test_LessInstallList/v1.2.3_x5. .0_\\u003c_v1.2.3_x5.1_=\\u003e_true", "TestStrCo ontains/includes", "Test_build_output", "TestProvisionerPrepare_EmptyDestina ation", "TestBuildParallel_2", "TestCoreBuild_basicInterpolated", "TestSum/sum(cty.SetVal([]cty y.Value{cty.StringVal(\\", "TestProvisioner_RemoteFileDefaul ltsToScriptnnnn", "TestInitCmd/Ensure_init_warns_on_template_ _without_required_plugin_blocks", "TestBuilder_Good", "Test_PackerPluginSuite/Te estLoadingOrder/HCL2_validate_-_With_required_plugins,_1.0.10_is_the_most_recent_ _and_should_load", "TestMachineReadableUi_ImplUi", "TestParser_no_init/invalid_inexplicit_s source_2.pkr.hcl", "TestExtractMachineReadable", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#09", "TestPostProcessorPrepar re_ScriptAndInline", "Test_PackerPluginSuite/TestL LoadWithLegacyPluginName", "TestPostProcessorPrepar re_InlineShebang", "TestFixerQEMUHostPort", "Test_PackerPluginSuite/TestW WithLegacyConfigAndComponents/validate_simple_HCL2_template_with_config.json_and_ _components_defined", "TestInitCmd", "TestPackerConfig_required_plugin_pars se/required_plugin", "TestLength/Length(cty.Dynami icVal)", "TestArchive/lz4", "TestFmt", "Test_console/echo_\\\"help\\\"_|_packer_[console]", "TestBuild/hcl_-_valid_cmd_(_invalid_varfil le_bypased_)", "TestBuild/var-args:_hcl_-_hcl_varfile_sets_a a_apple_env_var", "Test_PackerPluginSuite/Test tLoadWithOnlyReleaseFlag/run_validate_without_--ignore-prerelease_flag_-_pick_1.0 0.1-dev_by_default", "TestPostProcessorPrepar re_EnvironmentVars", "Test_PackerPluginSuite/Te estInstallPluginPrerelease", "Test_PackerPluginSuite/Te estPackerInitWithNonGithubSource", "TestPluginName/valid_minimal_name e", "Test_PackerPluginSuite/Test tPluginsRemoveWithSourceAddress/plugins_remove_with_source_address_removes_all_in nstalled_plugin_versions", "TestProvisioner_createFlatt tenedEnvVars_windows", "TestPackerConfig_required_plugin_parse/ /required_plugin", "TestBuild/hcl_-_var_with_default_value_empty y_object/list_can_be_set", "TestProvisionerPrepare_Invali idKey", "Test_PackerPluginSuite/TestW WithLegacyConfigAndComponents/build_simple_HCL2_template_with_config.json_and_com mponents_defined", "TestValidateCommand/test-fixtures\\\\validate\\ \\\\build.json", "TestColoredUi_noColorEnv", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=true_./temp plates/malformed_data_dep.pkr.hcl", "TestPluginParts/valid_with_four r_parts", "TestProvisioner_RemoteFolderDefaul ltsToTmp", "TestProvisionerProvision_Valid dExitCodes", "TestPluginName/invalid_name_with_ _prefix", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=false_./tem mplates/malformed_local_dep.pkr.hcl", "TestValidateCommand/test-fixtures\\\\validat te\\\\build.json", "TestBuildOnlyFileCommaFlags", "TestParser_ValidateFilterOption/*foo*", "Test_commands/packer_[inspect_-var=fruit=b banana_test-fixtures\\\\var-arg\\\\fruit_builder.pkr.hcl]", "TestValidateCommand_SyntaxOnly", "TestProvisioner_Provision", "TestProvisioner_RemoteFileSetSucce essfully", "TestValidateCommand/test-fixtures\\\\validate-i invalid\\\\missing_build_block.pkr.hcl", "TestParse_variables/duplicate_variable", "Test_PackerPluginSuite/Te estPackerInitWithNonGithubSource/try_installing_from_a_non-github_source,_should_ _fail", "TestParse_build/two_error-cleanup-pro ovisioner", "TestNewRegisterProperBuildName e/multiple_build_block_with_same_source_create_conflict", "TestProvision_waitForCom mmunicatorWithCancel", "Test_console/echo_\\\"var.fruit\\\"_|_packer_[console_test-fixtures\\\\var-arg\\\\fruit_ _builder.pkr.hcl]", "TestFixerParallelsDeprecations", "TestBuild/var-args:_json_-_json_varfile_sets s_an_apple_env_var", "TestGetOldestProject/Multiple_proje ects,_different_order,_pick_the_oldest", "TestBuildPrepare_variables_default", "TestInitialize_ExistingBucke etExistingVersion", "TestBucket_PopulateVersion/pop pulating_version_with_existing_incomplete_build_should_add_bucket_build_labels", "Test_PackerPluginSuite/Test tPackerInitWithNonGithubSource/re-run_packer_init_on_same_template,_should_succee ed_silently", "TestBasicUi_Ask", "TestFix_allFixersEnabled", "TestValidateCommand_VarFilesDisableWarnOnUnde eclared/test-fixtures\\\\validate\\\\var-file-tests\\\\basic.pkr.hcl#01", "TestProvisionerProvision_DownloadsMu ultipleFilesToFolder", "TestBuild/hcl_-_variables_can_be_used_in_s shared_post-processor_fields", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=true_./temp plates/malformed_local_dep.pkr.hcl", "TestGraphStronglyConnected_two", "Test_PackerPluginSuite/Test tPluginPathEnvvarWithMultiplePaths", "TestInitialize_NewBucketNewVer rsion", "TestBuildCommand_HCLOnlyExceptOptions/[-only y=*chocolate*_-only=*vanilla*]", "TestValidateCommand/test-fixtures\\\\version n_req\\\\base_failure", "TestBuild/hcl_-_using_variables_in_build_blo ock", "Test_PackerPluginSuite/Test tLoadWithSHAMismatches/move_plugin_with_right_name,_invalid_SHA256SUM,_should_rej ject", "TestValidateCommand/test-fixtures\\\\hcl\\\\va alidation\\\\wrong_pause_before.pkr.hcl", "Test_PackerPluginSuite/Test tLoadWithLegacyPluginName/only_legacy_plugins_installed:_expect_build_to_fail/wit th_required_plugins_-_expect_prompt_for_packer_init", "TestParser_no_init/duplicate_required_p plugin_accessor_fails", "TestCoreBuild_prov", "TestProvisionerPrepare_Elev vated", "TestProvisionerPrepare_Scr ripts", "TestValidateCommandBadVersion", "TestProgressTracking_open_close", "TestProvisionerPrepare_C ConfigErrors", "TestBuildExceptFileCommaFlags/JSON:_except_b build_and_post-processor", "TestParse_variables/set_variable_from_v var-file", "TestProvisionerProvision_SendsFile", "TestProvisionerPrepare_Defaul lts", "TestParse_datasource/duplicate_source", "TestPostProcessorPrepar re_InvalidKey", "TestPostProcessorPrepare_ _InvalidKey", "TestParse_variables/locals_within_anoth her_locals_usage_in_different_files", "TestPluginParseSourceString/inv valid:_plugin_name_contains_packer-plugin-", "TestBuildExceptFileCommaFlags/HCL2-JSON:_e except_build_and_post-processor", "Test_LessInstallList/v1.2.1_\\ \\u003c_v1.2.2_=\\u003e_true", "TestPausedProvisionerPrepare", "TestLength/Length(cty.Unknow wnVal(cty.String))", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate\\\\build_with_vars.pkr.hcl", "TestHCL2Formatter_Format", "TestLength/Length(cty.SetVal l([]cty.Value{cty.True}))", "TestProvision_Cancel", "TestTemplateFile/Templa ateFile", "Test_hcl2_upgrade/variables-only", "TestBuild/var-args:_hcl_-_json_varfile_sets_ _a_apple_env_var", "TestCheckErrorCode", "TestStr rContains/includes", "Test_PackerPluginSuite/Test tInstallNonCanonicalPluginVersion/try_listing_plugins_with_non-canonical_version_ _installed_-_report_none", "TestFixerVSphereNetwork_Fix", "TestConfigPrepare/empty_config,_ _should_error_without_a_source", "Test_ParseHCPPackerRegistryBlock/build_b block_level_deprecated", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#11", "TestSetFilter/1-[]interface_{}{4,_5,_ _6}", "TestProvisionerPrepare_S ScriptAndScripts", "TestBuild/var-args:_hcl_-_auto_varfile_and d_json_-auto_varfile_sets_the_value_in_json_auto_varfile", "TestProvisionerPrepare_Defaults", "Test_hcl2_upgrade/nonexistent", "TestProvisionerPrepare_C ConfigRetryTimeout", "TestValidateCommand/test-fixtures\\\\validate\\ \\\\build_with_vars.pkr.hcl", "TestBuild/json_-_json_varfile_sets_an_appl le_env_var,_override_with_banana_cli_var", "Test_hcl2_upgrade/complete-variables-with- -template-engine", "TestProvisionerPrepare e_InvalidKey", "TestPostProcessorPrepare_D Defaults", "TestParse_build/provisioner_with_pack ker_version_interpolation", "TestFixerHypervVmxcTypo_Fix", "TestNoContent", "TestProvisionerPrepare_I InvalidKey", "TestProvisionerProvision_In nvalidExitCodes", "TestIndex/index(cty.ListVal( ([]cty.Value{cty.StringVal(\\", "Test_hcl2_upgrade/varfile-with-no-variables-b block", "TestProvision_waitForCom mmunicator", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#04", "TestPluginParseSourceString/inv valid:_leading_slashes_are_removed", "Test_PackerPluginSuite/TestP PluginsRemoveWithSourceAddress/plugins_remove_with_incorrect_source_address_exits s_non_found_error", "TestBuild/hcl_-_invalid_cmd_(_valid_varfile_ _bypased_)", "TestBucket_PopulateVersion/pop pulating_version_with_existing_build_should_only_modify_bucket_build_labels", "TestPausedProvisionerProvision", "TestFixerDockerTags", "TestBuild/build_name:_JSON_except_potato", "TestInitialize_ExistingBucketC CompleteVersion", "TestVersionCommand_implements", "TestCore_InterpolateUserVars_VarFile", "Test_hcl2_upgrade/aws-access-config", "TestProvisionerProvision n_Inline", "TestProvision_createCommand dTextNoneExecutionPolicy", "TestProvisionerPrepare_extr ractScript", "Test_ParseHCPPackerRegistryBlock/buck ket_name_as_variable", "Test_PackerPluginSuite/Te estPackerInitWithNonGithubSource/re-run_packer_init_on_same_template,_should_succ ceed_silently", "TestFlattenConfigKeys_nil", "Test_PackerPluginSuite/TestL LoadingOrder/HCL2_validate_-_With_required_plugins,_1.0.9_is_pinned,_so_1.0.9_sho ould_be_used", "TestConfigPrepare/config_with_f full_context_for_interpolation:_success", "TestLength/Length(cty.DynamicV Val)", "TestBuild/var-args:_json_-_auto_varfile_sets s_a_peanut_env_var", "TestParse_build/provisioner_with_only_a and_except", "TestProvisionerPrepare_Scr riptAndScripts", "TestGraphHasVertex", "Test_PackerPluginSuite/Te estLoadingOrder/HCL2_validate_-_With_required_plugins,_1.0.9_is_pinned,_so_1.0.9_ _should_be_used", "TestProvisionerQuote_Env vironmentVars", "Test_hcl2_upgrade/without-annotations", "TestProvisionerPrepare e_ConfigErrors", "TestConfigPrepare_1s", "Test_LessInstallList/v1.2.3_x x5.0_\\u003c_v1.2.3_x5.0_=\\u003e_false", "Test_PackerPluginSuite/Test tInstallPluginWithPath/install_same_plugin_with_pre-release_+_metadata", "Test_PackerPluginSuite/Te estLoadWithLegacyPluginName/only_legacy_plugins_installed:_expect_build_to_fail/J JSON_template,_without_required_plugins:_should_say_the_component_is_unknown", "TestProvisionerProvisi ion_RestartCommandFail", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#02", "TestProvisionerProvision_Pa auseAfter", "TestBuildCmd", "TestParse_build/basic_build_no_src", "TestParser_complete", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#12", "TestAnyTrue/anytrue(cty.NullVa al(cty.List(cty.Bool)))", "TestBuild/hcl_-_invalid_setting_from_varfile", "Test_LessInstallList/v1.2.3_x9. .0_\\u003c_v1.2.3_x10.0_=\\u003e_true", "TestPostProcessorPrepare_ _ScriptAndScripts", "TestBuildCommand_HCLOnlyExceptOptions/[-ex xcept=*chocolate*]", "TestBuildCommand_ParseArgs/[-parallel-builds s=1_file.json]", "Test_PackerPluginSuite/Test tLoadPluginWithMetadataInName/try_listing_plugins_with_metadata_in_name_-_report_ _none", "TestHook_Good", "TestSetFilter/2-[]interface_{}{7,_8,_ _9}", "TestBuild/hcl_-_execute_and_use_datasource e", "TestFixerVagrantPPOverride_Impl", "Test_PackerPluginSuite/Te estLoadWithLegacyPluginName/only_legacy_plugins_installed:_expect_build_to_fail", "Test_PackerDAGSuite/TestWithBo othDataLocalMixedOrder/validate:_evaluating_with_DAG_-_success_expected", "TestValidateCommand/test-fixtures\\\\validate\\ \\ ull_var.json", "Test_PackerPluginSuite/Te estPluginsRemoveWithLocalPath/plugins_remove_with_a_local_path_removes_only_the_s specified_plugin", "Test_LessInstallList/v1.2.3_x4. .15_\\u003c_v1.2.3_x5.0_=\\u003e_true", "TestGraph_basic", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=true_. ./templates/malformed_local_dep.pkr.hcl", "TestProvisionerPrepare_Scri iptAndInline", "TestGetOldestProject/Multiple_pro ojects,_pick_the_oldest", "TestValidateCommand/test-fixtures\\\\validate- -invalid\\\\missing_build_block.pkr.hcl", "Test_PackerDAGSuite/TestWithBot thDataLocalMixedOrder", "TestDatasource_Good", "TestFixerDockerTags_Fix", "Test_LessInstallList/v1.2.3_\\ \\u003c_v1.2.2-dev_=\\u003e_false", "TestSetFilter/1-[]interface_{}{4,_5,_6}", "TestTest_preCheck", "TestProvisionerPrepare_Enviro onmentVars", "TestSetFilter/0-[]interface_{}{1,_2,_ _3}", "TestValidateCommand_VarFilesDisableWarnOnUnde eclared/test-fixtures\\\\validate\\\\var-file-tests\\\\basic.pkr.hcl", "TestCheckErrorCode/old_format,_code_ _matches_what_is_looked_for", "TestProvisionerProvision_Va alidExitCodes", "TestBuild_Prepare_Twice", "TestBuildCommand_ParseArgs/[-parallel-buil lds=5_file.json]", "TestProvisionHook_nilComm", "Test_LessInstallList/v1.2.2-dev v_\\u003c_v1.2.2_=\\u003e_true", "TestBuild/hcl_-_invalid_cmd_(_valid_varfil le_bypased_)", "TestValidateCommand/test-fixtures\\\\hcl\\\\lo ocal-ds-validate.pkr.hcl", "TestProvisionerAndPostProcessorOnlyExcept/hc cl_-_only_one_source_build", "TestSetDifference/1-A_has_extra_element ts", "TestBuild/hcl_-_execute_and_use_datasource", "TestCheckErrorCode/bad_format,_sh hould_always_be_false", "TestProvisionerProvision_SendsConten nt", "TestCheckErrorCode/new_format,_co ode_matches_what_is_looked_for", "TestSetFilter/0-[]interface_{}{1,_2,_3}", "TestProvisionerProvisi ion_CustomCommand", "Test_PackerPluginSuite/Te estInstallPluginWithMetadata/install_plugin_with_metadata_in_version", "TestGetOldestProject/No_projects,_s should_error", "TestBuildExceptFileCommaFlags/JSON:_except t_build_and_post-processor", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=false_ _./templates/malformed_local_dep.pkr.hcl", "TestProvisionerPrepare_Config", "TestParse_build", "Test_ParseHCPPackerRegistryBlock/inva alid_hcp_packer_registry_config", "TestInitialize_ExistingBucketE ExistingVersion", "TestFmt_unformattedPKRVarsTemplate", "TestProvisionerProvision_S ScriptsWithEnvVars", "TestFmt_Recursive", "TestProvisionerPrepare_E EnvironmentVars", "TestFixerCleanImageName_Impl", "TestSetDifference/0-same", "Test_PackerPluginSuite/Te estPackerInitWithNonGithubSource/manually_install_plugin_to_the_expected_source", "Test_ParseHCPPackerRegistryBlock/build_ _block_level_deprecated", "Test_PackerPluginSuite/Test tPackerInitWithNonGithubSource/try_installing_from_a_non-github_source,_should_fa ail", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate-invalid\\\\broken.json", "TestCoreBuild_templatePath", "TestBucket_CreateInitialBuil ldForVersion", "TestProvisioner_RemoteFileSetSuc ccessfully", "TestValidateCommand/test-fixtures\\\\validate\\ \\\\var_foo_with_no_default.pkr.hcl", "TestProvisionDownloadMkdirAll", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#01", "TestProvisionerPrepare_Env vironmentVars", "TestAllTrue/alltrue(cty.ListVa al([]cty.Value{cty.UnknownVal(cty.Bool),_cty.UnknownVal(cty.Bool)}))", "TestProvisionerAndPostProcessorOnlyExcept/hc cl_-_only_other_build", "TestProvisionerProvision_Scri iptsWithEnvVars", "TestNullArtifact", "TestConfigPrepare_port", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#07", "TestBucket_UpdateLabelsForBuil ld/bucket_build_labels_and_build_specific_label", "TestParse_variables/valid_validation_bl lock_-_invalid_default", "TestParser_no_init", "TestAllTrue/alltrue(cty.List tVal([]cty.Value{cty.True,_cty.NullVal(cty.Bool)}))", "TestProvision_createCommandTe extNoneExecutionPolicy", "TestBucket_PopulateVersion/pop pulating_version_with_completed_build_should_not_modify_any_labels", "TestParser_no_init/invalid_inexplicit_s source.pkr.hcl", "TestPluginsInstallCommand_Run/already-install led-no-op", "TestFix_invalidTemplateDisableValidation", "TestFixerQEMUHostPort_impl", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=true_./t templates/malformed_local_dep.pkr.hcl", "Test_PackerPluginSuite/Test tPluginsRemoveWithNoArguments/plugins_remove_with_no_options_returns_non-zero_wit th_help_text", "TestParse_build/provisioner_with_packer r_version_interpolation", "TestSta artsWith/StartsWith", "TestCoreBuild_provRetry", "TestParse_datasource/untyped_datasource", "TestConfigPrepare", "TestWriteUnknownPlaceholderValues/T TestWriteUnknownPlaceholderValues#10", "TestVariables_collectVariableValues/u undefined_but_set_value_-_pkrvar_file_-_strict_mode", "TestClient_Stderr", "TestFixerVMwareCompaction_Fix", "TestValidateCommand/test-fixtures\\\\validat te\\\\build_with_vars.pkr.hcl", "TestFmt_unfomattedTemlateDirectory", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=true_./te emplates/malformed_data_dep.pkr.hcl", "TestBuild_Run", "TestFixerCleanImageName_Fix", "TestBuildCommand_ParseArgs/[-parallel-builds s=10_file.json]", "TestBuild/hcl_-_valid_setting_from_varfile e", "Test_PackerPluginSuite/Test tLoadWithOnlyReleaseFlag/run_validate_with_--ignore-prerelease_flag_-_pick_1.0.0", "TestParse_build/nonexistent_provisioner", "TestRetriedProvisionerProvision", "TestLength/Length(cty.MapVal lEmpty(cty.Bool))", "TestBuild/hcl_-_recipes_-_only_lasagna", "TestProvisionerProvision_Download dsMultipleFilesToFolder", "TestProvisionerPrepare_Envi ironmentVars", "Test_PackerPluginSuite/Te estLoadWithLegacyPluginName/only_legacy_plugins_installed:_expect_build_to_fail/w with_required_plugins_-_expect_prompt_for_packer_init", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate\\\\var_foo_with_no_default.pkr.hcl", "TestProvisionerQuote_Envir ronmentVars", "TestArchive", "TestBase64Gzip", "TestFixerVirtualBoxGAAttach_Impl", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=false_./tem mplates/malformed_data_dep.pkr.hcl", "TestLegacyIsotime_empty", "TestSetCopy", "Test_PackerPluginSuite/Test tPluginsRemoveWithNoArguments", "TestArtifact_ImplementsArtif fact", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate-invalid\\\\missing_build_block.pkr.hcl", "Test_commands/packer_[inspect_test-fixtures\\\\ \\hcl-inspect-with-sensitive-vars]", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#18", "TestGraphStronglyConnected", "TestProvisionerQuote_Enviro onmentVars", "TestEnvAndFileVars", "TestProvisionerProvision_Sc criptsWithEnvVars", "TestBucket_UpdateLabelsForBu uild/no_bucket_or_build_specific_labels", "Test_PackerPluginSuite/TestP PluginsRemoveWithLocalPath/plugins_remove_with_incomplete_local_path_exits_with_a a_non-zero_code", "TestGetInfoForWindo ows/Valid_version_info", "Test_fmt_pipe/echo_\\", "TestProvisioner_createFl lattenedEnvVars_windows", "TestNewRegisterProperBuildName e/multiple_build_block_with_same_source_but_with_different_build_name", "TestEndsWith", "TestBasicUi_Say", "Tes stStartsWith/StartsWith", "TestBuildCommand_HCLOnlyExceptOptions/[-ex xcept=my_build.file.chocolate]", "TestParse_build/nonexistent_post-proces ssor", "TestConfigPrepare/config_with_s sbom_name_as_interpolated_value,_without_it_in_context,_replace_with_a_placeholde er", "Test_PackerPluginSuite/Te estLoadingOrder/HCL2_build_-_With_required_plugins,_1.0.10_is_the_most_recent_and d_should_load", "Test_PackerPluginSuite/Test tPluginsRemoveWithLocalPath/plugins_remove_with_incomplete_local_path_exits_with_ _a_non-zero_code", "Test_ParseHCPPackerRegistryBlock/top_le evel_and_build_block", "TestBuild/hcl_-_valid_setting_from_varfile", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#17", "TestBuildCommand_RunContext_CtxCancel/cancel l_2_locked_builds_-_debug_-_parallel=false", "TestInitialize_UnsetTemplate eTypeError", "TestWriteUnknownPlaceholderValues", "TestStringFlagSet", "TestEndsWith/EndsWi ith", "Test_PackerPluginSuite/Te estLoadingOrder/HCL2_build_-_With_required_plugins,_1.0.9_is_pinned,_so_1.0.9_sho ould_be_used", "TestParser_no_init/invalid_inexplicit t_source_2.pkr.hcl", "TestFixerVSphereNetwork_impl", "TestBucket_UpdateLabelsForBu uild/bucket_build_labels_and_build_specific_label", "TestProvisionerPrepare_S ScriptAndInline", "TestCheckErrorCode/old_format,_code e_matches_what_is_looked_for", "TestIndex/index(cty.ListVal([] ]cty.Value{cty.StringVal(\\", "TestBuild/json_-_json_varfile_sets_an_apple_ _env_var,_override_with_banana_cli_var", "TestArchive/zip", "TestFixerVirtualBoxRenameFix_provisionerOverride e", "TestPluginParts/valid,_with_dou uble-slashes_in_the_name", "TestFixerSSHKeyPath_Fix", "TestAccPowershellProvisioner_ _ExitCodes", "TestTemplateFile/Templat teFile", "TestHCL2Formatter_FormatNegativeCases", "TestParse_variables/unknown_variable_fr rom_var-file", "Test_PackerPluginSuite/Te estPluginPathEnvvarWithMultiplePaths", "Test_commands", "TestParse_variables/locals_within_ano other_locals_usage_in_different_files", "TestParse_source/duplicate_source", "TestProvisionerPrepare_InvalidKey y", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#03", "TestProvisionerProvision n_RestartCommandFail", "TestParse_build/two_error-cleanup-provi isioner", "TestTargetedUI", "TestArchive/gz", "TestFixerQEMUDiskSize", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#13", "TestValidateCommand/test-fixtures\\\\validat te\\\\var_foo_with_no_default.pkr.hcl", "TestStrContains/includes(cty y.StringVal(\\", "TestStartsWith/StartsWith(ct ty.UnknownVal(cty.String),_cty.StringVal(\\", "TestProvisionerPrepare_Scri ipt", "Test_commands/packer_[inspect_-var=fruit=pea ach_-var=other_default_from_env=apple_test-fixtures\\\\hcl\\\\inspect]", "TestPluginName/invalid_name_wit th_prefix", "TestInitialize_ExistingBucketN NewVersion", "TestColoredUi_ImplUi", "Test_hcl2_upgrade/unknown_builder", "Test_LessInstallList/v1.2.3_\\u00 03c_v1.2.2-dev_=\\u003e_false", "TestBuild/var-args:_json_-_nonexistent_var_f file_errs", "TestProvisionerProvision_SendsCon ntent", "Test_commands/packer_[inspect_test-fixture es\\\\hcl-inspect-with-sensitive-vars]", "TestBuild/var-args:_hcl_-_auto_varfile_set ts_a_chocolate_env_var", "TestBucket_UpdateLabelsForBuil ld/build_specific_label", "TestValidateCommand_VarFiles", "TestPostProcessorPrepare_ _Scripts", "TestParse_build/untyped_provisioner", "TestTemplateFile", "TestBuild/var-args:_hcl_-_nonexistent_json n_var_file_errs", "Test_LessInstallList/v1.2.3_x x9.0_\\u003c_v1.2.3_x10.0_=\\u003e_true", "TestProvision_waitForC Communicator", "TestProvisioner_createFlatten nedEnvVars_windows", "TestParse_build/named_build", "TestBuildExceptFileCommaFlags/HCL2:_except_b build_and_post-processor", "TestProvisionerPrepare_Scri ipts", "TestBuild/hcl_-_recursive_local_using_an_uns set_input_var", "TestBuild/hcl_-_build.name_accessible", "TestProvision_createCommandTe ext", "TestPostProcessorPrepar re_Scripts", "TestIndex/index(cty.TupleVal([ []cty.Value{cty.NumberIntVal(1),_cty.NumberIntVal(2),_cty.NumberIntVal(3)}),_cty. .NumberIntVal(1))", "TestProvisionerProvision_SendsFileM MultipleDirs", "TestBuildCommand_RunContext_CtxCancel/canc cel_1_locked_build_-_debug_-_parallel=true", "TestProvisionerPrepare_Con nfig", "TestBuild/hcl_-_valid_validation_rule_for_de efault_value", "TestParse_variables/unset_used_variable e", "TestIndex/index", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberFloatVal(+Inf),_cty.NumberFloatVal(-Inf)}))", "Test_PackerPluginSuite/Test tPluginsRemoveWithSourceAddress/plugins_remove_with_incorrect_source_address_exit ts_non_found_error", "TestFix", "TestLength/Length", "TestProvision_createCommand dText", "TestBuildParallel_1", "TestFixerVMwareRename_impl", "TestParse_source", "TestBuild/var-args:_hcl_-_arg_sets_a_tomat to_env_var", "TestSum/sum(cty.UnknownVal(cty y.List(cty.Number)))", "TestBuildSleepTimeout", "TestCompressInterpolation", "TestCompressOptions", "TestHttpDataSource", "TestStartsWith/ /StartsWith", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#10", "TestParse_variables/unset_unused_vari iable", "TestParse_build/use_build.name_in_provi isioner_block", "TestValidateCommand/test-fixtures\\\\validat te-invalid\\\\missing_build_block.pkr.hcl", "Test_ParseHCPPackerRegistryBlock/buck ket_name_OK_multiple_block_second_build_block", "TestStartsWith", "TestNewRegisterProperBuildName e/single_build_block_with_multiple_identical_sources_create_conflict", "TestBase64Gzip/base64gzip(cty. .StringVal(\\", "Test_commands/packer_[inspect_test-fixture es\\\\var-arg\\\\fruit_builder.pkr.hcl]", "TestSetDifference/3-B_is_nil", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#16", "TestPluginsInstallCommand_Run/no-source-ad ddress-provided", "TestCoreValidate", "Test_LessInstallList/v1.2.1_\\u0 003c_v1.2.2-dev_=\\u003e_true", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=true_. ./templates/malformed_data_dep.pkr.hcl", "Test_commands/packer_[inspect_test-fixture es\\\\inspect\\\\unset_var.json]", "TestLength/Length(cty.EmptyTup pleVal)", "TestBuild/hcl_-_recursive_local_using_an_u unset_input_var", "TestPausedProvisionerProvision_waits", "TestAllTrue/alltrue", "TestProvisionerPrepare_Script tAndScripts", "TestCoreBuild_buildNameVar", "TestProvisionerProvision n_CustomCommand", "TestDebuggedProvisionerCancel", "TestArchive/tar", "Test_ParseHCPPackerRegistryBlock/buck ket_name_too_short", "TestParse_source/unnamed_source", "TestVariables_collectVariableValues/v value_not_corresponding_to_type_-_env", "Test_LessInstallList/v1.2.3_x5.9 9_\\u003c_v1.2.3_x5.10_=\\u003e_true", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate-invalid\\\\bad_provisioner.json", "TestProvisioner_RemoteFolderSetSuc ccessfully", "TestBucket_UpdateLabelsForBu uild_withMultipleBuilds", "TestProvisionerPrepare_Script", "TestReadFromHCLBuildBlock/conf figure_bucket_using_only_hcp_packer_registry_block", "Test_ParseHCPPackerRegistryBlock/bucket t_name_too_long", "TestBuild/hcl_-_invalid_setting_from_varfile e", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate\\\\build.pkr.hcl", "TestDatasource_NoExist", "TestPluginParseSourceString/inval lid:_reject_because_query_non_nil", "TestProgressTracking_races", "Test_PackerPluginSuite/Test tLoadWithOnlyReleaseFlag/run_build_with_--ignore-prerelease_flag_-_pick_1.0.0", "TestSetFilter/1-[]interface_{}{4,_5,_6} }", "TestExecutionPolicy_Decode", "TestProvisionerPrepare_Script tAndInline", "Test_PackerPluginSuite/Te estPluginsRemoveWithNoArguments/plugins_remove_with_no_options_returns_non-zero_w with_help_text", "Test_console/echo_\\\"var.list_of_stri ing[0]\\\"_|_packer_[console_-var=list_of_string=[\\\"first\\\"]_test-fixtures\\\\hcl\\\\va ariables\\\\list_of_string]", "TestBuild/hcl_-_recipes", "TestFixerISOChecksumTypeAndURL_Impl", "TestBuildParallel_Timeout", "TestBucket_PopulateVersion/p populating_version_with_existing_incomplete_build_and_no_bucket_build_labels_does s_nothing", "Test_PackerPluginSuite/Te estPluginsRemoveWithSourceAddress/plugins_remove_with_incorrect_source_address_ex xits_non_found_error", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate-invalid\\\\bad_provisioner.json", "Test_PackerPluginSuite/Te estPluginsRemoveWithLocalPath/plugins_remove_with_incomplete_local_path_exits_wit th_a_non-zero_code", "TestAcyclicGraphValidate_cycle", "TestBuild/var-args:_hcl_-_hcl_varfile_sets s_a_apple_env_var", "Test_LessInstallList/v1.2.3_x x4.15_\\u003c_v1.2.3_x5.0_=\\u003e_true", "TestFixerVMwareRename_Fix", "TestAllTrue/alltrue(cty.ListVa al([]cty.Value{cty.True,_cty.NullVal(cty.Bool)}))", "TestInitialize_ExistingBucke etNewVersion", "TestPluginParseSourceString", "TestFilebase64", "TestEndsWith/EndsWith(cty.St tringVal(\\", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues", "TestBuild_Cancel", "TestProvisionerPrepare e_Defaults", "Test_build_output/packer_[build_--color=fals se_test-fixtures\\\\hcl\\ eprepare\\\\shell-local-windows.pkr.hcl]", "TestCompleteBuild", "Test_PackerPluginSuite/Test tPluginsRemoveWithLocalPath", "TestBuild/var-args:_hcl_-_auto_varfile_sets_ _a_chocolate_env_var", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate\\\\build.json", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate-invalid\\\\missing_build_block.pkr.hcl", "TestGetOldestProject/Multiple_proje ects,_pick_the_oldest", "TestPausedProvisioner_impl", "TestValidateCommand_SyntaxOnly/test-fixtures s\\\\validate\\ ull_var.json", "TestProvisionerCorrectlyInt terpolatesValidExitCodes", "Test_PackerPluginSuite/Test tLoadingOrder/HCL2_build_-_With_required_plugins,_1.0.10_is_the_most_recent_and_s should_load", "TestBuildCommand_HCLOnlyExceptOptions/[-on nly=*chocolate*_-only=*vanilla*]", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=true_./te emplates/malformed_local_dep.pkr.hcl", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#06", "TestValidateCommand_SyntaxOnly/test-fixtur res\\\\validate\\\\build_with_vars.pkr.hcl", "Test_PackerDAGSuite/TestWith hBothDataLocalMixedOrder", "Test_PackerPluginSuite/Test tLoadWithLegacyPluginName/only_legacy_plugins_installed:_expect_build_to_fail", "TestBuild/var-args:__apple_hcl_var_file_then n_banana_json_var_file_sets_banana_env_var", "TestProvisioner_RemoteFolderDefa aultsToTmp", "Test_hcl2_upgrade/azure_shg", "TestProvisionerPrepare_C Config", "Test_hcl2_upgrade/escaping", "TestValidateCommand_ShowLineNumForMissing", "TestGetInfoForWindows s", "TestNewRegisterProperBuildNa ame/multiple_build_block_with_different_source", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#15", "Test_PackerDAGSuite/TestMalf formedDependency/Malformed_dep_packer_build_--use-sequential-evaluation=false_./t templates/malformed_local_dep.pkr.hcl", "TestProvisionerPrepare_S Script", "TestBuild/hcl_-_unknown_", "TestBucket_PopulateVersion/p populating_version_with_existing_build_should_only_modify_bucket_build_labels", "TestStart tsWith/StartsWith", "TestBuildCommand_RunContext_CtxCancel/canc cel_1_pending_build_-_parallel=true", "TestBucket_UpdateLabelsForBu uild/bucket_build_labels", "Test_PackerPluginSuite/Test tPluginsRemoveWithLocalPath/plugins_remove_with_a_local_path_removes_only_the_spe ecified_plugin", "TestBuildCommand_RunContext_CtxCancel/cancel l_in_the_middle_with_2_pending_builds_-_parallel=true", "TestProvisionerProvision_Skip pClean", "Test_PackerPluginSuite/Te estLoadWithSHAMismatches/move_plugin_with_right_name,_invalid_SHA256SUM,_should_r reject", "Test_conso ole/echo_\\\"path.root\\\"_|_packer_[console_test-fixtures\\\\var-arg\\\\map.pkr.hcl]", "TestParser_no_init/invalid_short_source e.pkr.hcl", "Test_ParseHCPPackerRegistryBlock/long g_hcp_packer_registry.description", "TestBuild/build_name:_JSON_only_potato", "TestAnyTrue/anytrue(cty.Unknow wnVal(cty.List(cty.Bool)))", "TestLength/Length(cty.MapValEm mpty(cty.Bool))", "TestConfigPrepare/config_with h_full_context_for_interpolation:_success", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#10", "Test_LessInstallList/v1.2.3_x5. .0_\\u003c_v1.2.3_x4.15_=\\u003e_false", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=true_./t templates/malformed_data_dep.pkr.hcl", "TestClientStart_badVersion", "TestHCL2Formatter_Format_Write", "Test_PackerPluginSuite/Te estLoadWithLegacyPluginName/multiple_plugins_installed:_1.0.0_in_plugin_dir_with_ _sum,_one_in_workdir_(no_version)._Should_load_1.0.0", "TestStrContains", "TestBucket_PopulateVersion/p populating_version_with_existing_incomplete_build_should_add_bucket_build_labels", "TestRetriedProvisionerCancelledProvision", "TestParse_datasource/unnamed_source", "TestAllTrue/allt true", "TestCore_InterpolateUserVars", "TestBuildEverything", "TestEndsWith/ /EndsWith", "TestBuilder_implBuilder", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#03", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=false_./ /templates/malformed_local_dep.pkr.hcl", "Test_commands/packer_[inspect_test-fixtures\\ \\\\inspect\\\\unset_var.json]", "TestFixerHypervVmxcTypo_impl", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#14", "TestProvisioner_NoExist", "Test_LessInstallList/v1.2.1_\\u0 003c_v1.2.2_=\\u003e_true", "TestDebuggedProvisioner_impl", "TestSum/sum(cty.ListVal([]cty. .Value{cty.NumberFloatVal(-10.2),_cty.NumberFloatVal(-19.4),_cty.NumberFloatVal(- -5.7)}))", "TestLegacyIsotime_inputs/legac cy_isotime(cty.StringVal(\\", "TestLegacyIsotime_inputs/leg gacy_isotime(cty.StringVal(\\", "TestParse_build/untyped_post-processor", "TestProvisionerProvisi ion_Success", "TestFixerManifestPPFilename_Impl", "Test_PackerDAGSuite/TestMalfor rmedDependency/Malformed_dep_packer_validate_--use-sequential-evaluation=false_./ /templates/malformed_data_dep.pkr.hcl", "TestBuild/var-args:_json_-_nonexistent_var r_file_errs", "TestTest_noEnv", "TestBucket_PopulateVersion/pop pulating_version_with_existing_incomplete_build_should_update_bucket_build_labels s", "TestInitCommand_Run", "TestProvisionerPrepare_Scripts", "TestBasicEdgeHashcode", "TestGetInfoForWindo ows/Invalid_version_info", "TestBucket_UpdateLabelsForBuild d/bucket_build_labels", "TestBuildPrepare_ProvisionerGetsGeneratedMap", "TestPostProcessorPrepare_ _Defaults", "TestIsDoneInterpolating", ": TestSum/sum", "TestSum/sum(cty.ListVal([]ct ty.Value{cty.NumberIntVal(1e+500),_cty.NumberIntVal(1e+500)}))", "TestPluginParts/valid,_with_doubl le-slashes_in_the_name", "TestCoreBuild_provSkip", "TestPostProcessorPrepar re_ScriptAndScripts", "TestSetFilter/2-[]interface_{}{7,_8,_9}", "TestProvisionerProvision_Vali idExitCodes", "TestParse_variables", "TestAllTrue/alltrue(cty.ListVa al([]cty.Value{cty.True}))", "TestNewRegisterProperBuildName e", "TestPluginParts/valid_with_two_ _parts", "TestLength/Length(cty.UnknownV Val(cty.String))", "TestProvisionerPrepare_ValidSourc ce", "TestSetFilter/0-[]interface_{}{1,_2,_3} }", "Test_hcl2_upgrade/minimal", "Test_hcl2_upgrade/complete", "TestGraphHasEdge", "TestValidateCommand/test-fixtures\\\\validate\\ \\\\build.pkr.hcl", "Test_PackerPluginSuite/Te estLoadWithOnlyReleaseFlag/run_build_with_--ignore-prerelease_flag_-_pick_1.0.0", "TestProvisioner_Impl", "TestPackerConfig_ParseProvisionerBloc ck/success_-_provisioner_is_valid", "TestStrC Contains/includes", "TestStrCon ntains/includes", "TestCoreBuild_packerVersion", "Test_LessInstallList/v1.2.3_x x5.9_\\u003c_v1.2.3_x5.10_=\\u003e_true", "TestFlattenConfigKeys_nested", "TestPluginsInstallCommand_Run", "Test_hcl2_upgrade/bundled-plugin-used", "TestPostProcessor_Good", "TestFlag_impl", "Test_fmt_pipe", "TestPackerConfig_ParseProvisionerBlock", "TestParse_build/use_build.name_in_pos st-processor_block", "Test_commands/packer_[inspect_test-fixtures\\ \\\\var-arg\\\\fruit_builder.pkr.hcl]", "TestFixerAmazonTemporarySecurityCIDRs", "TestPostProcessorPrepar re_Defaults", "TestBucket_UpdateLabelsForBu uild/build_specific_label", "TestBase64Gzip/base64gzip", "TestParser_complete/working_build", "TestSum", "Test_commands/packer_[inspe ect_-var=fruit=peach_-var=unknown_string=also_peach_-var=unknown_unknown=[\\\"peach h_too\\\"]_-var=unknown_list_of_string=[\\\"first_peach\\\",_\\\"second_peach\\\"]_test-fix xtures\\\\hcl\\\\inspect\\\\fruit_string.pkr.hcl]", "TestProvisionerPrepare_Def faults", "TestGetOldestProject/Multiple_pro ojects,_different_order,_pick_the_oldest", "TestBuild/hcl_-_test_crash_#11381", "TestAcyclicGraphValidate", "TestBucket_PopulateVersion/p populating_version_with_existing_incomplete_build_should_update_bucket_build_labe els", "TestValidateCommand/test-fixtures\\\\validat te\\ ull_var.json", "TestFixerProxmoxType_Impl", "TestGraphEdgesFrom", "Test_PackerPluginSuite/Te estLoadingOrder", "TestBuildCommand_HCLOnlyExceptOptions", "TestAnyTrue", "TestTemplateFile/TemplateFil le(cty.StringVal(\\", "Test_IsHCPDisabled", "TestReadFromHCLBuildBlock", "TestFixerAmazonEnhancedNetworking", "Test_PackerPluginSuite/Test tPackerInitWithMixedVersions", "Test_LessInstallList", "TestWriteUnknownPlaceholderValues/ /TestWriteUnknownPlaceholderValues#08", "TestGetOldestProject", "TestFixerSSHKeyPath_Impl", "TestBuild/hcl_-_recipes_-_except_carbonara", "TestFixerSSHTimout_Impl", "TestProvisionerPrepare_Script t", "TestFixerAmazonPrivateIPNonBoolean", "TestProvisionerPrepare_Scr ript", "Test_hcl2_upgrade/undeclared-variables", "TestValidateCommand/test-fixtures\\\\hcl\\\\data a-source-validation.pkr.hcl", "TestPluginParts", "TestPluginParseSourceString/inval lid:_reject_because_scheme_specified", "Test_PackerCoreSuite/TestEval lLocalsOrder", "TestProvisionHook", "TestNewRegisterProperBuildNa ame/multiple_build_block_with_same_source_create_conflict", "TestVersion_Initialize", "Test_commands/packer_[inspect_-var=fruit=p peach_-var=unknown_string=also_peach_-var=unknown_unknown=[\\", "TestFixerCreateTime_Fix", "TestBuild/hcl_-_'only'_a_build_block", "TestWriteUnknownPlaceholderValue es/TestWriteUnknownPlaceholderValues#05", "TestPluginParseSourceString/inv valid:_trailing_slash", "Test_commands/packer_[inspect_-var=fruit=pea ach_-var=unknown_string=also_peach_-var=unknown_unknown=[\\", "Test_PackerPluginSuite/Test tLoadWithLegacyPluginName/only_legacy_plugins_installed:_expect_build_to_fail/JSO ON_template,_without_required_plugins:_should_say_the_component_is_unknown", "TestHelperPlugins", "TestProvisionerPrepare_Config g", "TestProvision_uploadEnvVars", "Test_console/echo_\\", "Test_PackerPluginSuite/Te estPluginsRemoveWithNoArguments", "TestStartsWith h/StartsWith", "TestProvision_uploadEnvVars s", "TestFixerCommConfig_Fix", "TestCoreBuild_env", "TestFixerAmazonEnhancedNetworking_Impl", "TestProvisionerProvision_SendsConte ent", "TestAllTrue/alltrue(cty.NullVa al(cty.List(cty.Bool)))", "TestValidateCommand/test-fixtures\\\\validate\\ \\\\invalid_packer_block.pkr.hcl", "Test_LessInstallList/v1.2.3_x5. .9_\\u003c_v1.2.3_x5.10_=\\u003e_true", "Test_PackerPluginSuite/Test tPluginPathEnvvarWithMultiplePaths/load_plugin_with_two_dirs_-_not_supported_anym more,_should_error", "TestBuildCommand_ParseArgs/[-parallel-builds s=5_file.json]", "TestProvisioner_RemotePathOverride esRemotePathAndRemoteFile", "TestPostProcessorPrepare_ _InlineShebang" ]
starryzhang/sweb.eval.win.hashicorp_1776_packer-13388
containers/podman
25522
containers__podman-25522
Go
[ "25234" ]
f8ec74803b6f41352090c027ab6cc21cf4281709
diff --git a/.cirrus.yml b/.cirrus.yml index 00046172e34..d62e8d3e678 100644 --- a/.cirrus.yml +++ b/.cirrus.yml @@ -558,6 +558,44 @@ unit_test_task: always: *logs_artifacts +unit_test_windows_task: + name: "Unit tests on Windows" + alias: unit_test_windows + # Docs: ./contrib/cirrus/CIModes.md (Cirrus Task contexts and runtime modes) + # only when: - main rules (see doc above); or + # - unit test files are changed (contains a false positves such as test/e2e/ + # but that should not be an issue, it only runs when it doesn't have to) + # - actual source code changed + only_if: >- + $CIRRUS_PR == '' || + $CIRRUS_CHANGE_TITLE =~ '.*CI:ALL.*' || + changesInclude('.cirrus.yml', 'Makefile', 'contrib/cirrus/**', 'vendor/**', 'test/tools/**', 'test/registries*.conf', 'hack/**', 'version/rawversion/*') || + changesInclude('winmake.ps1') || + changesInclude('**/*_test.go') || + (changesInclude('**/*.go', '**/*.c', '**/*.h') && !changesIncludeOnly('test/**', 'pkg/machine/e2e/**')) + # Special case, we do not run macos/windows builds on rhel branches. + # Thus the machine task should not be run too, while we use only_if + # everywhere to do so here it would mean we would need duplicate the + # full big only_if condition which is more difficult to maintain so + # use the skip here. + skip: &skip_rhel_release | + $CIRRUS_BRANCH =~ 'v[0-9\.]+-rhel' || + $CIRRUS_BASE_BRANCH =~ 'v[0-9\.]+-rhel' + depends_on: *build + ec2_instance: *windows + timeout_in: 20m + env: + <<: *winenv + TEST_FLAVOR: unit + clone_script: *winclone + main_script: ".\\repo\\contrib\\cirrus\\win-unit-main.ps1" + always: + # Required for `contrib/cirrus/logformatter` to work properly + html_artifacts: + path: ./*.html + type: text/html + + apiv2_test_task: name: "APIv2 test on $DISTRO_NV ($PRIV_NAME)" alias: apiv2_test @@ -760,9 +798,7 @@ podman_machine_windows_task: # everywhere to do so here it would mean we would need duplicate the # full big only_if condition which is more difficult to maintain so # use the skip here. - skip: &skip_rhel_release | - $CIRRUS_BRANCH =~ 'v[0-9\.]+-rhel' || - $CIRRUS_BASE_BRANCH =~ 'v[0-9\.]+-rhel' + skip: *skip_rhel_release depends_on: *build ec2_instance: <<: *windows @@ -1060,6 +1096,7 @@ success_task: - win_installer - docker-py_test - unit_test + - unit_test_windows - apiv2_test - compose_test - local_integration_test diff --git a/Makefile b/Makefile index 36be6988ee8..44706ee8fee 100644 --- a/Makefile +++ b/Makefile @@ -652,7 +652,7 @@ localunit: test/goecho/goecho test/version/version UNIT=1 $(GINKGO) \ -r \ $(TESTFLAGS) \ - --skip-package test/e2e,pkg/bindings,hack,pkg/machine/e2e \ + --skip-package test/e2e,pkg/bindings,hack,pkg/machine/e2e,pkg/machine/wsl \ --cover \ --covermode atomic \ --coverprofile coverprofile \ diff --git a/contrib/cirrus/win-unit-main.ps1 b/contrib/cirrus/win-unit-main.ps1 new file mode 100644 index 00000000000..b945f4a1550 --- /dev/null +++ b/contrib/cirrus/win-unit-main.ps1 @@ -0,0 +1,13 @@ +#!/usr/bin/env powershell + +. $PSScriptRoot\win-lib.ps1 + +if ($Env:CI -eq "true") { + Push-Location "$ENV:CIRRUS_WORKING_DIR\repo" +} else { + Push-Location $PSScriptRoot\..\.. +} + +Run-Command ".\winmake.ps1 localunit" + +Pop-Location diff --git a/pkg/machine/wsl/machine.go b/pkg/machine/wsl/machine.go index 3355f6b2b5d..73650c18eae 100644 --- a/pkg/machine/wsl/machine.go +++ b/pkg/machine/wsl/machine.go @@ -317,12 +317,12 @@ func checkAndInstallWSL(reExec bool) (bool, error) { admin := HasAdminRights() - if !IsWSLFeatureEnabled() { + if !wutil.IsWSLFeatureEnabled() { return false, attemptFeatureInstall(reExec, admin) } skip := false - if reExec && !admin { + if !reExec && !admin { fmt.Println("Launching WSL Kernel Install...") if err := launchElevate(wslInstallKernel); err != nil { return false, err @@ -363,11 +363,11 @@ func attemptFeatureInstall(reExec, admin bool) error { message += "NOTE: A system reboot will be required as part of this process. " + "If you prefer, you may abort now, and perform a manual installation using the \"wsl --install\" command." - if reExec && MessageBox(message, "Podman Machine", false) != 1 { + if !reExec && MessageBox(message, "Podman Machine", false) != 1 { return errors.New("the WSL installation aborted") } - if reExec && !admin { + if !reExec && !admin { return launchElevate("install the Windows WSL Features") } @@ -622,10 +622,6 @@ func obtainGlobalConfigLock() (*fileLock, error) { return lockFile(filepath.Join(lockDir, "podman-config.lck")) } -func IsWSLFeatureEnabled() bool { - return wutil.SilentExec(wutil.FindWSL(), "--set-default-version", "2") == nil -} - func isWSLRunning(dist string) (bool, error) { return wslCheckExists(dist, true) } diff --git a/pkg/machine/wsl/wutil/wutil.go b/pkg/machine/wsl/wutil/wutil.go index bc07ffa2a93..49bc638ac42 100644 --- a/pkg/machine/wsl/wutil/wutil.go +++ b/pkg/machine/wsl/wutil/wutil.go @@ -19,16 +19,26 @@ import ( ) var ( - once sync.Once - wslPath string + onceFind, onceStatus sync.Once + wslPath string + status wslStatus + wslNotInstalledMessages = []string{"kernel file is not found", "The Windows Subsystem for Linux is not installed"} + vmpDisabledMessages = []string{"enable the Virtual Machine Platform Windows feature", "Enable \"Virtual Machine Platform\""} + wslDisabledMessages = []string{"enable the \"Windows Subsystem for Linux\" optional component"} ) +type wslStatus struct { + installed bool + vmpFeatureEnabled bool + wslFeatureEnabled bool +} + func FindWSL() string { // At the time of this writing, a defect appeared in the OS preinstalled WSL executable // where it no longer reliably locates the preferred Windows App Store variant. // // Manually discover (and cache) the wsl.exe location to bypass the problem - once.Do(func() { + onceFind.Do(func() { var locs []string // Prefer Windows App Store version @@ -87,24 +97,44 @@ func SilentExecCmd(command string, args ...string) *exec.Cmd { return cmd } -func IsWSLInstalled() bool { - cmd := SilentExecCmd(FindWSL(), "--status") - out, err := cmd.StdoutPipe() - cmd.Stderr = nil - if err != nil { - return false - } - if err = cmd.Start(); err != nil { - return false - } +func parseWSLStatus() wslStatus { + onceStatus.Do(func() { + status = wslStatus{ + installed: false, + vmpFeatureEnabled: false, + wslFeatureEnabled: false, + } + cmd := SilentExecCmd(FindWSL(), "--status") + out, err := cmd.StdoutPipe() + cmd.Stderr = nil + if err != nil { + return + } + if err = cmd.Start(); err != nil { + return + } + + status = matchOutputLine(out) + + if err := cmd.Wait(); err != nil { + return + } + }) - kernelNotFound := matchOutputLine(out, "kernel file is not found") + return status +} - if err := cmd.Wait(); err != nil { +func IsWSLInstalled() bool { + status := parseWSLStatus() + return status.installed && status.vmpFeatureEnabled +} + +func IsWSLFeatureEnabled() bool { + if SilentExec(FindWSL(), "--set-default-version", "2") != nil { return false } - - return !kernelNotFound + status := parseWSLStatus() + return status.vmpFeatureEnabled } func IsWSLStoreVersionInstalled() bool { @@ -118,13 +148,30 @@ func IsWSLStoreVersionInstalled() bool { return true } -func matchOutputLine(output io.ReadCloser, match string) bool { +func matchOutputLine(output io.ReadCloser) wslStatus { + status := wslStatus{ + installed: true, + vmpFeatureEnabled: true, + wslFeatureEnabled: true, + } scanner := bufio.NewScanner(transform.NewReader(output, unicode.UTF16(unicode.LittleEndian, unicode.UseBOM).NewDecoder())) for scanner.Scan() { line := scanner.Text() - if strings.Contains(line, match) { - return true + for _, match := range wslNotInstalledMessages { + if strings.Contains(line, match) { + status.installed = false + } + } + for _, match := range vmpDisabledMessages { + if strings.Contains(line, match) { + status.vmpFeatureEnabled = false + } + } + for _, match := range wslDisabledMessages { + if strings.Contains(line, match) { + status.wslFeatureEnabled = false + } } } - return false + return status } diff --git a/winmake.ps1 b/winmake.ps1 index 2491b2cb1f2..3b37c8a2d74 100644 --- a/winmake.ps1 +++ b/winmake.ps1 @@ -44,6 +44,14 @@ function Make-Clean{ } } +function Local-Unit { + Build-Ginkgo + $skippackages="hack,internal\domain\infra\abi,internal\domain\infra\tunnel,libpod\lock\shm,pkg\api\handlers\libpod,pkg\api\handlers\utils,pkg\bindings," + $skippackages+="pkg\domain\infra\abi,pkg\emulation,pkg\machine\apple,pkg\machine\applehv,pkg\machine\e2e,pkg\machine\libkrun," + $skippackages+="pkg\machine\provider,pkg\machine\proxyenv,pkg\machine\qemu,pkg\specgen\generate,pkg\systemd,test\e2e,test\utils" + Run-Command "./test/tools/build/ginkgo.exe -vv -r --tags `"$remotetags`" --timeout=15m --trace --no-color --skip-package `"$skippackages`"" +} + function Local-Machine { param ( [string]$files @@ -53,7 +61,7 @@ function Local-Machine { $files = " --focus-file $files " } - Run-Command "./test/tools/build/ginkgo.exe -vv --tags `"$remotetags`" -timeout=90m --trace --no-color $files pkg/machine/e2e/." + Run-Command "./test/tools/build/ginkgo.exe -vv --tags `"$remotetags`" --timeout=90m --trace --no-color $files pkg/machine/e2e/." } # Expect starting directory to be /podman @@ -219,9 +227,7 @@ function Build-Ginkgo{ return } Write-Host "Building Ginkgo" - Push-Location ./test/tools - Run-Command "go build -o build/ginkgo.exe ./vendor/github.com/onsi/ginkgo/v2/ginkgo" - Pop-Location + Run-Command "go build -o ./test/tools/build/ginkgo.exe ./vendor/github.com/onsi/ginkgo/v2/ginkgo" } function Git-Commit{ @@ -287,6 +293,9 @@ switch ($target) { {$_ -in '', 'podman-remote', 'podman'} { Podman-Remote } + 'localunit' { + Local-Unit + } 'localmachine' { if ($args.Count -gt 1) { $files = $args[1] @@ -331,6 +340,9 @@ switch ($target) { Write-Host "Example: Build podman-remote " Write-Host " .\winmake podman-remote" Write-Host + Write-Host "Example: Run all unit tests " + Write-Host " .\winmake localunit" + Write-Host Write-Host "Example: Run all machine tests " Write-Host " .\winmake localmachine" Write-Host
diff --git a/cmd/podman/parse/net_test.go b/cmd/podman/parse/net_test.go index 22421732689..f71dc6ba1fe 100644 --- a/cmd/podman/parse/net_test.go +++ b/cmd/podman/parse/net_test.go @@ -1,3 +1,5 @@ +//go:build !windows + // most of these validate and parse functions have been taken from projectatomic/docker // and modified for cri-o package parse diff --git a/pkg/auth/auth_test.go b/pkg/auth/auth_test.go index 37cf817917d..ccb205c18e1 100644 --- a/pkg/auth/auth_test.go +++ b/pkg/auth/auth_test.go @@ -1,3 +1,5 @@ +//go:build !windows + package auth import ( diff --git a/pkg/machine/machine_windows_test.go b/pkg/machine/machine_windows_test.go index 48f3eafd536..5255a7502b4 100644 --- a/pkg/machine/machine_windows_test.go +++ b/pkg/machine/machine_windows_test.go @@ -3,15 +3,41 @@ package machine import ( + "fmt" "os" "os/exec" "path/filepath" "testing" + "golang.org/x/sys/windows" + "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) +// shortPathToLongPath converts a Windows short path (C:\PROGRA~1) to its +// long path equivalent (C:\Program Files). It returns an error if shortPath +// doesn't exist. +func shortPathToLongPath(shortPath string) (string, error) { + shortPathPtr, err := windows.UTF16PtrFromString(shortPath) + if err != nil { + return "", err + } + len, err := windows.GetLongPathName(shortPathPtr, nil, 0) + if err != nil { + return "", err + } + if len == 0 { + return "", fmt.Errorf("failed to get buffer size for path: %s", shortPath) + } + longPathPtr := &(make([]uint16, len)[0]) + _, err = windows.GetLongPathName(shortPathPtr, longPathPtr, len) + if err != nil { + return "", err + } + return windows.UTF16PtrToString(longPathPtr), nil +} + // CreateNewItemWithPowerShell creates a new item using PowerShell. // It's an helper to easily create junctions on Windows (as well as other file types). // It constructs a PowerShell command to create a new item at the specified path with the given item type. @@ -23,15 +49,21 @@ import ( // - itemType: The type of the item to be created (e.g., "File", "SymbolicLink", "Junction"). // - target: The target for the new item, if applicable. func CreateNewItemWithPowerShell(t *testing.T, path string, itemType string, target string) { - var pwshCmd string + var pwshCmd, pwshPath string + // Look for Powershell 7 first as it allow Symlink creation for non-admins too + pwshPath, err := exec.LookPath("pwsh.exe") + if err != nil { + // Use Powershell 5 that is always present + pwshPath = "powershell.exe" + } pwshCmd = "New-Item -Path " + path + " -ItemType " + itemType if target != "" { pwshCmd += " -Target " + target } - cmd := exec.Command("pwsh", "-Command", pwshCmd) + cmd := exec.Command(pwshPath, "-Command", pwshCmd) cmd.Stdout = os.Stdout cmd.Stderr = os.Stderr - err := cmd.Run() + err = cmd.Run() require.NoError(t, err) } @@ -45,13 +77,16 @@ func CreateNewItemWithPowerShell(t *testing.T, path string, itemType string, tar // with filepath.EvalSymlink(). func TestEvalSymlinksOrClean(t *testing.T) { // Create a temporary directory to store the normal file - normalFileDir := t.TempDir() + normalFileDir, err := shortPathToLongPath(t.TempDir()) + require.NoError(t, err) // Create a temporary directory to store the (hard/sym)link files - linkFilesDir := t.TempDir() + linkFilesDir, err := shortPathToLongPath(t.TempDir()) + require.NoError(t, err) // Create a temporary directory where the mount point will be created - mountPointDir := t.TempDir() + mountPointDir, err := shortPathToLongPath(t.TempDir()) + require.NoError(t, err) // Create a normal file normalFile := filepath.Join(normalFileDir, "testFile") diff --git a/pkg/machine/wsl/wutil/wutil_test.go b/pkg/machine/wsl/wutil/wutil_test.go new file mode 100644 index 00000000000..4b7bd6af479 --- /dev/null +++ b/pkg/machine/wsl/wutil/wutil_test.go @@ -0,0 +1,145 @@ +//go:build windows + +package wutil + +import ( + "github.com/stretchr/testify/assert" + "golang.org/x/text/encoding/unicode" + "io" + "strings" + "testing" +) + +const ( + WSL1InstalledWithWSLAndVMPEnabled = `Default Version: 1` + WSL2InstalledWithWSLAndVMPEnabled = `Default Version: 2` + WSL1NotInstalled = `Default Version: 1 + +The Windows Subsystem for Linux kernel can be manually updated with 'wsl --update', but automatic updates cannot occur due to your system settings. +To receive automatic kernel updates, please enable the Windows Update setting: 'Receive updates for other Microsoft products when you update Windows'. +For more information please visit https://aka.ms/wsl2kernel. + +The WSL 2 kernel file is not found. To update or restore the kernel please run 'wsl --update'.` + WSL2NotInstalled = `The Windows Subsystem for Linux is not installed. You can install by running 'wsl.exe --install'. +For more information please visit https://aka.ms/wslinstall` + WSL2InstalledWithWSLDisabled = `Default Version: 2 +WSL1 is not supported with your current machine configuration. +Please enable the "Windows Subsystem for Linux" optional component to use WSL1.` + WSL2InstalledWithVMPDisabled = `Default Version: 2 +WSL2 is not supported with your current machine configuration. +Please enable the "Virtual Machine Platform" optional component and ensure virtualization is enabled in the BIOS. +Enable "Virtual Machine Platform" by running: wsl.exe --install --no-distribution +For information please visit https://aka.ms/enablevirtualization` + WSL2InstalledWithWSLAndVMPDisabled = `Default Version: 2 +WSL1 is not supported with your current machine configuration. +Please enable the "Windows Subsystem for Linux" optional component to use WSL1. +WSL2 is not supported with your current machine configuration. +Please enable the "Virtual Machine Platform" optional component and ensure virtualization is enabled in the BIOS. +Enable "Virtual Machine Platform" by running: wsl.exe --install --no-distribution +For information please visit https://aka.ms/enablevirtualization` + WSL1InstalledWithVMPDisabled = `Default Version: 1 +Please enable the Virtual Machine Platform Windows feature and ensure virtualization is enabled in the BIOS. +For information please visit https://aka.ms/enablevirtualization` + WSL1InstalledWithWSLDisabled = `Default Version: 1 +WSL1 is not supported with your current machine configuration. +Please enable the "Windows Subsystem for Linux" optional component to use WSL1.` +) + +func TestMatchOutputLine(t *testing.T) { + tests := []struct { + winVariant string + statusOutput string + want wslStatus + }{ + { + "WSL1 configured and both Virtual Machine Platform enabled and Windows Subsystem for Linux are enabled", + WSL1InstalledWithWSLAndVMPEnabled, + wslStatus{ + installed: true, + vmpFeatureEnabled: true, + wslFeatureEnabled: true, + }, + }, + { + "WSL2 configured and both Virtual Machine Platform enabled and Windows Subsystem for Linux enabled", + WSL2InstalledWithWSLAndVMPEnabled, + wslStatus{ + installed: true, + vmpFeatureEnabled: true, + wslFeatureEnabled: true, + }, + }, + { + "WSL not installed (was previously configured as version 1)", + WSL1NotInstalled, + wslStatus{ + installed: false, + vmpFeatureEnabled: true, + wslFeatureEnabled: true, + }, + }, + { + "WSL not installed (was previously configured as version 2)", + WSL2NotInstalled, + wslStatus{ + installed: false, + vmpFeatureEnabled: true, + wslFeatureEnabled: true, + }, + }, + { + "WSL2 configured and Virtual Machine Platform is enabled but Windows Subsystem for Linux is disabled", + WSL2InstalledWithWSLDisabled, + wslStatus{ + installed: true, + vmpFeatureEnabled: true, + wslFeatureEnabled: false, + }, + }, + { + "WSL2 configured and Virtual Machine Platform is disabled but Windows Subsystem for Linux is enabled", + WSL2InstalledWithVMPDisabled, + wslStatus{ + installed: true, + vmpFeatureEnabled: false, + wslFeatureEnabled: true, + }, + }, + { + "WSL2 configured and both Virtual Machine Platform and Windows Subsystem for Linux are disabled", + WSL2InstalledWithWSLAndVMPDisabled, + wslStatus{ + installed: true, + vmpFeatureEnabled: false, + wslFeatureEnabled: false, + }, + }, + { + "WSL1 configured and Virtual Machine Platform is disabled but Windows Subsystem for Linux is enabled", + WSL1InstalledWithVMPDisabled, + wslStatus{ + installed: true, + vmpFeatureEnabled: false, + wslFeatureEnabled: true, + }, + }, + { + "WSL1 configured and Virtual Machine Platform is enabled but Windows Subsystem for Linux is disabled", + WSL1InstalledWithWSLDisabled, + wslStatus{ + installed: true, + vmpFeatureEnabled: true, + wslFeatureEnabled: false, + }, + }, + } + for _, tt := range tests { + t.Run(tt.winVariant, func(t *testing.T) { + encoder := unicode.UTF16(unicode.LittleEndian, unicode.UseBOM).NewEncoder() + encodedOutput, err := encoder.String(tt.statusOutput) + assert.Nil(t, err) + reader := io.NopCloser(strings.NewReader(encodedOutput)) + assert.Equal(t, tt.want, matchOutputLine(reader)) + }) + } +} diff --git a/pkg/util/utils_test.go b/pkg/util/utils_test.go index 37795d31111..b582b51ecc9 100644 --- a/pkg/util/utils_test.go +++ b/pkg/util/utils_test.go @@ -3,6 +3,7 @@ package util import ( "fmt" "math" + "runtime" "sort" "testing" "time" @@ -827,6 +828,9 @@ func TestProcessOptions(t *testing.T) { } func TestGetRootlessPauseProcessPidPath(t *testing.T) { + if runtime.GOOS == "windows" { + t.Skip("Not implemented on Windows") + } dir, err := GetRootlessPauseProcessPidPath() assert.NoError(t, err) assert.NotEqual(t, dir, "libpod/tmp/pause.pid")
Command `machine init` fails to check if WSL is installed ### Issue Description Podman tries to import the machine-os into WSL even when it's impossible because the Windows features `Microsoft-Windows-Subsystem-Linux` and `VirtualMachinePlatform` aren't enabled. This is a regression observed with the latest version of the [WSL client](https://github.com/microsoft/WSL) (2.3.26.0 or later). ### Steps to reproduce the issue Steps to reproduce the issue 1. Make sure to have latest version WSL (`wsl --update`) 2. Disable the Windows features `Microsoft-Windows-Subsystem-Linux` and `VirtualMachinePlatform` 3. Run `podman machine init` ### Describe the results you received ```log Extracting compressed file: podman-machine-default-amd64: done Importing operating system into WSL (this may take a few minutes on a new WSL install)... Import in progress, this may take a few minutes. The operation could not be started because a required feature is not installed. Error code: Wsl/Service/RegisterDistro/CreateVm/HCS/HCS_E_SERVICE_NOT_AVAILABLE Error: the WSL import of guest OS failed: command C:\Users\mario\AppData\Local\Microsoft\WindowsApps\wsl.exe [--import podman-machine-default C:\Users\mario\.local\share\containers\podman\machine\wsl\wsldist\podman-machine-default C:\Users\mario\.local\share\containers\podman\machine\wsl\podman-machine-default-amd64 --version 2] failed: exit status 0xffffffff ``` ### Describe the results you expected The command should NOT try to import the machine OS in WSL and [propose to install WSL to the user](https://github.com/containers/podman/blob/4bd6bc9f3ccac4d3bd79c4a3eb8fb09e05604a06/pkg/machine/wsl/machine.go#L356): ```log WSL is not installed on this system, installing it. NOTE: A system reboot will be required as part of this process. If you prefer, you may abort now, and perform a manual installation using the "wsl --install" command. ``` ### podman info output ```yaml OS: windows/amd64 provider: wsl version: 5.4.0-dev ``` ### Podman in a container No ### Privileged Or Rootless None ### Upstream Latest Release Yes ### Additional environment details Additional environment details ### Additional information Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting
Currently, there is only one way to directly determine whether a certain feature is enabled in Windows: ```shell Get-WindowsOptionalFeature -Online -FeatureName VirtualMachinePlatform Get-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux ``` However, this method requires administrative privileges, and asking users for administrative permissions at every startup is generally unacceptable. We encountered this in our requirements as well. After testing, we found a workaround to make the judgment, and the relevant code is: https://github.com/oomol-lab/ovm-win/blob/0c27841224d2daa8f96d789ee3e1a32105858f7d/pkg/wsl/check.go#L243-L294 I'm not sure if podman needs a check like this. If it does, I can submit a related PR. By the way, just checking the Feature is not enough. It's also necessary to check if BIOS virtualization is enabled, if the WSL version is too low, and if the user has modified the kernel configuration in .wslconfig. Thank you @BlackHole1. I am about to submit a PR that uses a similar approach (look for sentences in `wsl --status`), and I will cc you. I would be happy if you could look at it. My approach has one main difference: from my tests, the `VirtualMachinePlatform` is sufficient to run WSL2, and the `Microsoft-Windows-Subsystem-Linux` is no longer required.
Currently, there is only one way to directly determine whether a certain feature is enabled in Windows: ```shell Get-WindowsOptionalFeature -Online -FeatureName VirtualMachinePlatform Get-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux ``` However, this method requires administrative privileges, and asking users for administrative permissions at every startup is generally unacceptable. We encountered this in our requirements as well. After testing, we found a workaround to make the judgment, and the relevant code is: https://github.com/oomol-lab/ovm-win/blob/0c27841224d2daa8f96d789ee3e1a32105858f7d/pkg/wsl/check.go#L243-L294 I'm not sure if podman needs a check like this. If it does, I can submit a related PR. By the way, just checking the Feature is not enough. It's also necessary to check if BIOS virtualization is enabled, if the WSL version is too low, and if the user has modified the kernel configuration in .wslconfig. Thank you @BlackHole1. I am about to submit a PR that uses a similar approach (look for sentences in `wsl --status`), and I will cc you. I would be happy if you could look at it. My approach has one main difference: from my tests, the `VirtualMachinePlatform` is sufficient to run WSL2, and the `Microsoft-Windows-Subsystem-Linux` is no longer required.
[ "https://github.com/containers/podman/commit/87421d95084486448f85f776529a688a852d902c", "https://github.com/containers/podman/commit/af29bb5b6ed0c779d4f2a89186578d3666849458" ]
2025-03-10T18:34:48Z
https://github.com/containers/podman/tree/f8ec74803b6f41352090c027ab6cc21cf4281709
[ "go mod download ; New-Item -ItemType Directory -Force -Path .\\bin\\windows ; $env:CGO_ENABLED=0; go build -tags \"remote exclude_graphdriver_btrfs btrfs_noversion exclude_graphdriver_devicemapper containers_image_openpgp\" -o .\\bin\\windows\\podman.exe .\\cmd\\podman" ]
[ "go test -json -v -tags \"remote exclude_graphdriver_btrfs btrfs_noversion exclude_graphdriver_devicemapper containers_image_openpgp\" ./... > reports/go-test-results.json" ]
[ "cat reports/go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re from difflib import SequenceMatcher results: dict[str, str] = {} # Precedence: fail > skip > pass def update_status(key: str, status: str): prev = results.get(key) if prev is None: results[key] = status return if prev == "fail": return if status == "fail": results[key] = "fail" return if prev == "skip": return if status == "skip": results[key] = "skip" return # pass after pass -> no change # JSON object matcher; logs have one JSON object per line but may be wrapped obj_re = re.compile(r'\{.*?\}', re.S) # Field extractors action_re = re.compile(r'"Action"\s*:\s*"([^"]+)"', re.I | re.S) pkg_re = re.compile(r'"Package"\s*:\s*"([^"]+)"', re.I | re.S) test_re = re.compile(r'"Test"\s*:\s*"([^"]+)"', re.I | re.S) output_re = re.compile(r'"Output"\s*:\s*"(.*)"', re.I | re.S) # Ginkgo [It] status ginkgo_re = re.compile(r'\[(PASS|FAIL|SKIP)\][^\[]*\[It\]\s+([^\n"]+)', re.I) # Build flexible keyword allowing inserted whitespace/newlines def kw(word: str) -> str: return r'\s*'.join(list(word)) # Status line patterns robust to wrapping and embedded newlines in name # We'll parse from a per-package concatenated output buffer, # so lines won't be split across objects. status_res = { "pass": re.compile(r'-{3}\s*' + kw('PASS') + r'\s*:\s*(.+?)(?:\s*\([^)]*\))?(?:\r?\n|$)', re.I | re.S), "fail": re.compile(r'-{3}\s*' + kw('FAIL') + r'\s*:\s*(.+?)(?:\s*\([^)]*\))?(?:\r?\n|$)', re.I | re.S), "skip": re.compile(r'-{3}\s*' + kw('SKIP') + r'\s*:\s*(.+?)(?:\s*\([^)]*\))?(?:\r?\n|$)', re.I | re.S), } # RUN lines robust to wrapping and embedded newlines in name run_re = re.compile(r'={3}\s*' + kw('RUN') + r'\s+(.+?)(?:\r?\n|$)', re.I | re.S) def strip_ansi(s: str) -> str: return re.sub(r'(?:\\u001b|\x1b)\[[0-9;]*m', '', s) def sanitize_pkg(s: str) -> str: s = strip_ansi(s) # Remove whitespace introduced by wraps s = re.sub(r'\s+', '', s) # Normalize various corruptions of github.com # Replace github.<garbage>com with github.com s = re.sub(r'github\.[^/]*?com', 'github.com', s) # Collapse any multiple dots s = re.sub(r'github\.\.+com', 'github.com', s) # Fix repeats like github.commm s = re.sub(r'github\.com+', 'github.com', s) # Fix ccom/coom variants s = re.sub(r'github\.c+o+m', 'github.com', s) # Collapse duplicate slashes s = re.sub(r'/+', '/', s) return s.strip() def sanitize_test(s: str) -> str: s = strip_ansi(s) # Normalize escapes into actual newlines/tabs for easier stripping s = s.replace('\\r\\n', '\n').replace('\\n', '\n').replace('\\t', '\t') # Remove timing substrings anywhere, e.g. " (0.00s)" s = re.sub(r'\s*\(\d+\.\d+s\)\s*', '', s) # Keep '/' and '_' but remove surrounding spaces/newlines s = re.sub(r'\s*/\s*', '/', s) s = re.sub(r'\s*_\s*', '_', s) # Remove all remaining whitespace (spaces, tabs, newlines) inside names from wraps s = re.sub(r'[ \t\r\n]+', '', s) # Collapse multiple underscores s = re.sub(r'_{2,}', '_', s) return s.strip() def clean_name_from_output(name: str) -> str: # Convert escapes and remove timing, then strip wrap whitespace name = name.replace('\\"', '"') name = name.replace('\\r\\n', '\n').replace('\\n', '\n').replace('\\t', '\t') return sanitize_test(name) # Collect canonical test names per package canon: dict[str, set[str]] = {} def add_canon(pkg: str, test_name: str): if not pkg or not test_name: return canon.setdefault(pkg, set()).add(test_name) def resolve_to_canon(pkg: str, maybe: str) -> str: maybe = sanitize_test(maybe) if not pkg: return maybe cset = canon.get(pkg) if not cset: return maybe if maybe in cset: return maybe # Prefer candidates that contain the fragment or share prefix best = None best_score = 0.0 for cand in cset: # direct containment check if maybe and (maybe in cand or cand in maybe): score = 1.0 * len(maybe) / max(len(cand), 1) else: score = SequenceMatcher(None, maybe, cand).ratio() if score > best_score: best_score = score best = cand if best is not None and best_score >= 0.6: return best return maybe # Accumulate per-package output text to handle splits across JSON objects outbuf: dict[str, str] = {} objs = list(obj_re.finditer(log)) for m in objs: obj = m.group(0) pkg_m = pkg_re.search(obj) pkg = sanitize_pkg(pkg_m.group(1)) if pkg_m else None out_m = output_re.search(obj) if pkg and out_m: out = out_m.group(1) # Normalize escapes and quotes out = out.replace('\\"', '"') out = out.replace('\\r\\n', '\n').replace('\\n', '\n').replace('\\t', '\t') outbuf[pkg] = outbuf.get(pkg, '') + out # First pass over concatenated outputs: parse RUN and status lines, and Ginkgo It statuses for pkg, out in outbuf.items(): # RUN lines -> canonical names for rm in run_re.finditer(out): tname = clean_name_from_output(rm.group(1)) if pkg and tname: add_canon(pkg, tname) # Status lines for status, sre in status_res.items(): for sm in sre.finditer(out): raw_name = sm.group(1) name = clean_name_from_output(raw_name) name = resolve_to_canon(pkg, name) if pkg and name: key = f"{pkg}::{name}" update_status(key, status) # Ginkgo [It] statuses (if present) for sm in ginkgo_re.finditer(out): st_word = sm.group(1).upper() spec = sanitize_test(sm.group(2)) status = "pass" if st_word == "PASS" else ("fail" if st_word == "FAIL" else "skip") if pkg and spec: key = f"{pkg}::{spec}" update_status(key, status) # Second pass: use Action with Test field for m in objs: obj = m.group(0) act_m = action_re.search(obj) if not act_m: continue act = act_m.group(1).strip().lower() if act not in ("pass", "fail", "skip"): continue pkg_m = pkg_re.search(obj) pkg = sanitize_pkg(pkg_m.group(1)) if pkg_m else None test_m = test_re.search(obj) if not test_m: continue raw_name = test_m.group(1) name = resolve_to_canon(pkg, raw_name) if pkg and name: key = f"{pkg}::{name}" update_status(key, act) return results
[ "github.com/containers/podman/v5/cmd/podman/containers::Test_portsToString/single_published_port", "github.com/containers/podman/v5/cmd/podman/containers::Test", "github.com/containers/podman/v5/cmd/podman/containers::Test_por" ]
[ "github.com/containers/podman/v5/pkg/specgen::TestP", "github.com/containers/podman/v5/pkg/util::TestProcessOptions/default_bind_mount", "github.com/containers/podman/v5/pkg/specgenutil::Test_verifyExpose/high_to_low_should_fail", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@4", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@512", "github.com/containers/podman/v5/pkg/specgenutil::TestCreateExpose/range_inverted_should_fail", "github.com/containers/podman/v5/pkg/util::TestBreakInsert2", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@4096", "github.com/containers/podman/v5/pkg/env::Test_parseEnv/BadOnlyDelim", "github.com/containers/podman/v5/pkg/systemd/parser::TestRanges_Roundtrip", "github.com/containers/podman/v5/pkg/machine/compression::Test_Decompress/xz_with_trailing_zeros", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/from_pod_mode", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@8192", "github.com/containers/podman/v5/pkg/machine/compression::Test_compressionFromFile/bz2", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@128", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@8192", "github.com/containers/podman/v5/pkg/specgenutil::Test_verifyExpose/single_port_with_tcp", "github.com/containers/podman/v5/libpod/logs::TestGetTailLog", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/\\\\u0000_acceptNul=true", "github.com/containers/podman/v5/pkg/machine/compression::TestCopyFile", "github.com/containers/podman/v5/pkg/signal::TestParseSignal/Case_does_not_matter", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@512", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/invalid_octal_792", "github.com/containers/podman/v5/cmd/podman/containers::Test_portsToString/two_published_ports", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/no_network_mode", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_zeroes@4", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@4", "github.com/containers/podman/v5/pkg/signal::TestParseSysSignalToName/garbage_should_fail", "github.com/containers/podman/v5/pkg/util::TestGetAvailableIDRanges", "github.com/containers/podman/v5/pkg/specgenutil::Test_validChownFlag/case-insensitive_true", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@32", "github.com/containers/podman/v5/pkg/machine/connection::Test_makeSSHURL/Good_no_port", "github.com/containers/podman/v5/pkg/machine/ocipull::Test_extr", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/default_mode", "github.com/containers/podman/v5/cmd/podman/common::TestPodOptions", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_zeroes@64", "github.com/containers/podman/v5/pkg/systemd/parser::FuzzParser", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@131072", "github.com/containers/podman/v5/pkg/domain/utils::TestParseSCPArgs", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@8192", "github.com/containers/podman/v5/pkg/domain/utils::TestToURLValues", "github.com/containers/podman/v5/pkg/machine/compression::TestImageCompression_String/gz", "github.com/containers/podman/v5/pkg/timetype::TestParseTimestamps", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@32768", "github.com/containers/podman/v5/pkg/signal::TestParseSignalNameOrNumber/Kill_should_work", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@64", "github.com/containers/podman/v5/libpod/logs::TestGetTailLog/partial_line_at_the_end", "github.com/containers/podman/v5/cmd/podman/containers::Test_portsToString/published_port_range", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_zeroes@1", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@262144", "github.com/containers/podman/v5/pkg/env::TestMap", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_KindWithCompression", "github.com/containers/podman/v5/pkg/machine/qemu::TestUSBParsing", "github.com/containers/podman/v5/pkg/domain/utils::TestValidateSCPArgs/test_source_image_is_", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@32", "github.com/containers/podman/v5/pkg/timetype::TestGetTimestamp", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/too_short_77", "github.com/containers/podman/v5/pkg/machine/compression::TestImageCompression_String/xz", "github.com/containers/podman/v5/pkg/domain/utils::TestValidateSCPArgs/test_target_image_is_", "github.com/containers/podman/v5/pkg/specgen::TestNewSpecGeneratorWithRootfs", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/empty_input", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@32", "github.com/containers/podman/v5/pkg/specgenutil::Test_verifyExpose/good_port_range", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_iterated@2", "github.com/containers/podman/v5/pkg/env::Test_parseEnv/GoodNoValue", "github.com/containers/podman/v5/pkg/util::TestBreakInsert4", "github.com/containers/podman/v5/pkg/systemd/parser::TestExtractFirstWordUnescapes", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/empty_string_as_input", "github.com/containers/podman/v5/pkg/machine/ocipull::Test_extractKindAndCompression/qcow2", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@65536", "github.com/containers/podman/v5/pkg/domain/utils::TestToURLValues/Good", "github.com/containers/podman/v5/pkg/systemd/parser::FuzzParser/seed#0", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/bridge_mode_wi", "github.com/containers/podman/v5/cmd/podman/containers::Test_portsToString/exposed_port", "github.com/containers/podman/v5/pkg/specgenutil::Test_validChownFlag/lower-case_true", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@524288", "github.com/containers/podman/v5/cmd/podman/containers::Test_portsToString/exposed_port_range", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@16", "github.com/containers/podman/v5/pkg/specgenutil::Test_parseAndValidatePort/#00", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_iterated2@2", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@2", "github.com/containers/podman/v5/pkg/env::Test_parseEnv/Good", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/invalid_hex_\\\\u12v1A", "github.com/containers/podman/v5/pkg/machine/qemu::TestUSBParsing/Bad_vendor_and_product,_n", "github.com/containers/podman/v5/cmd/rootlessport::TestDualStackSplit", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@4096", "github.com/containers/podman/v5/pkg/machine/ocipull::Test_", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/bridge_mode_with_", "github.com/containers/podman/v5/pkg/machine/shim::Test_validateDestinationPaths//foobar_OK", "github.com/containers/podman/v5/pkg/specgenutil::TestCreateExpose/single_port", "github.com/containers/podman/v5/pkg/machine/ocipull::Test_extractKindAndCompression", "github.com/containers/podman/v5/pkg/annotations::TestValidateAnnotations", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@4", "github.com/containers/podman/v5/pkg/machine/define::Test_artifact_String/applehv", "github.com/containers/podman/v5/pkg/machine/shim::Test_validateDestinationPaths/Expec", "github.com/containers/podman/v5/pkg/machine/provider::TestBadSupportedProviders", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@2048", "github.com/containers/podman/v5/pkg/machine/shim::Test_validateDestinationPaths", "github.com/containers/podman/v5/pkg/specgen::T", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_zeroes@16", "github.com/containers/podman/v5/pkg/machine/compression::Test_compressionFromFile/gzip", "github.com/containers/podman/v5/pkg/machine::TestEvalSymlinksOrClean/File_under", "github.com/containers/podman/v5/pkg/specgenutil::TestCreateExpose/simple_range_udp", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_iterated2@4", "github.com/containers/podman/v5/pkg/util::TestCoresToPeriodAndQuota", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_iterated2@1", "github.com/containers/podman/v5/pkg/signal::TestParseSysSignalToName/Kill_should_work", "github.com/containers/podman/v5/pkg/env::TestJoin/GoodJoin", "github.com/containers/podman/v5/cmd/podman/containers::Test_portsToString/no_ports", "github.com/containers/podman/v5/pkg/machine::TestEvalSymlinksOrClean/Bad_separators_in_path", "github.com/containers/podman/v5/pkg/machine/compression::Test_compressionFromFile/xz", "github.com/containers/podman/v5/pkg/machine/qemu::TestUSBParsing/Good_vendor_and_product", "github.com/containers/podman/v5/pkg/trust::TestDescriptionsOfPolicyRequirements", "github.com/containers/podman/v5/pkg/domain/utils::TestToLibpodFilters/GoodURLValue", "github.com/containers/podman/v5/pkg/specgenutil::Test_verifyExpose/single_port_with_udp", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@131072", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@524288", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/too_short_\\\\x1", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@16384", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_contents@4", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_zeroes@2", "github.com/containers/podman/v5/pkg/env::TestSli", "github.com/containers/podman/v5/pkg/bindings/images::TestBuildNotMatchStatusMessage", "github.com/containers/podman/v5/pkg/util::TestProcessOptions/conflicting_option_ro/rw", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/\\\\u2a00", "github.com/containers/podman/v5/pkg/trust::TestPolicyDescription", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_KindWithCompression/qcow2", "github.com/containers/podman/v5/pkg/util::TestDecodeChanges", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@1", "github.com/containers/podman/v5/pkg/env::Tes", "github.com/containers/podman/v5/pkg/machine/ocipull::Test_extractKindAndCompression/vhdx", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@8192", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_Kind/qcow2", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@1048576", "github.com/containers/podman/v5/pkg/machine/vmconfigs::TestNormalizeMachineArch/arm64", "github.com/containers/podman/v5/pkg/bindings/images::TestConvertAdditionalBuildContexts", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@32768", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@256", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/multiple_networks", "github.com/containers/podman/v5/pkg/env::Te", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/\\\\u0000_acceptNul=false", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@8", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@4096", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@128", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/invalid_hex_\\\\xaz", "github.com/containers/podman/v5/libpod/logs::TestGetTailLog/tail_with_partial_logs", "github.com/containers/podman/v5/pkg/specgenutil::Test_parseAndValidatePort/0_should_fail", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@64", "github.com/containers/podman/v5/pkg/env::TestJoin/EmptyOverride", "github.com/containers/podman/v5/pkg/util::TestDecodeChanges/both-but-right-first", "github.com/containers/podman/v5/pkg/machine/compression::Test_compressionFromFile", "github.com/containers/podman/v5/pkg/machine/vmconfigs::TestNormalizeMachineArch/aarch64", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_contents@2", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/\\\\U0001F51F", "github.com/containers/podman/v5/pkg/machine/vmconfigs::TestNormalizeMachineArch/x86_64", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_KindWithCompression/vhdx", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@16384", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_KindWithCompression/tar.xz\\", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@8", "github.com/containers/podman/v5/pkg/util::TestDecodeChanges/both-but-right-second", "github.com/containers/podman/v5/pkg/util::TestPeriodAndQuotaToCores", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@16", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_KindWithCompression/raw", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/container_mode", "github.com/containers/podman/v5/pkg/util::TestDecodeChanges/nothing", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@32768", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@64", "github.com/containers/podman/v5/pkg/machine/compression::TestImageCompression_String/bz2", "github.com/containers/podman/v5/pkg/specgenutil::Test_verifyExpose", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/too_short_\\\\U123", "github.com/containers/podman/v5/pkg/util::TestValidateSysctlBadSysctlWithExtraSpaces", "github.com/containers/podman/v5/cmd/podman/common::TestAutocompleteFormat", "github.com/containers/podman/v5/pkg/domain/utils::TestToLibpodFilters", "github.com/containers/podman/v5/pkg/bindings/images::TestBuildMatchIID", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@65536", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@2", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@16", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@512", "github.com/containers/podman/v5/pkg/util::TestParseIDMapSizeMissing", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@8", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@2048", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@8", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@1", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_Kind/tar", "github.com/containers/podman/v5/pkg/machine/compression::TestImageCompression_String/zip", "github.com/containers/podman/v5/pkg/machine::TestEvalSymlinksOrClean/Normal_file", "github.com/containers/podman/v5/pkg/util::Te", "github.com/containers/podman/v5/pkg/util::TestProcessOptions/tmpfs", "github.com/containers/podman/v5/pkg/errorhandling::TestCause/max_depth_reached", "github.com/containers/podman/v5/libpod/logs::TestGetTailLogBigFiles", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@4", "github.com/containers/podman/v5/pkg/domain/utils::TestValidateSCPArgs/test_args_length_mo", "github.com/containers/podman/v5/pkg/signal::TestParseSysSignalToName/No", "github.com/containers/podman/v5/pkg/machine/define::Test_artifact_String/hyperv", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@2", "github.com/containers/podman/v5/pkg/specgenutil::Test_validChownFlag", "github.com/containers/podman/v5/pkg/machine/define::Test_artifact_String/qemu", "github.com/containers/podman/v5/pkg/machine/qemu::TestUSBParsing/Bad_vendor_and_produ", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@16384", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/bridge_mode", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_contents@1", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@16384", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@32768", "github.com/containers/podman/v5/pkg/signal::TestParseSignal", "github.com/containers/podman/v5/pkg/trust::TestAddPolicyEntries", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@128", "github.com/containers/podman/v5/pkg/util::TestBreakInsert3", "github.com/containers/podman/v5/pkg/machine/compression::Test_Decompress/bzip2", "github.com/containers/podman/v5/pkg/machine/connection::Test_makeSSHURL/Good_with_port", "github.com/containers/podman/v5/pkg/env::TestJoin", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@131072", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_zeroes@32", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@2048", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_Kind/raw", "github.com/containers/podman/v5/pkg/util::T", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_iterated@4", "github.com/containers/podman/v5/pkg/util::TestBreakInsert1", "github.com/containers/podman/v5/pkg/machine/vmconfigs::TestNormalizeMachineArch", "github.com/containers/podman/v5/pkg/systemd::TestSocketActivated", "github.com/containers/podman/v5/pkg/env::TestJoin/EmptyBase", "github.com/containers/podman/v5/pkg/specgenutil::Test_verifyExpose/range_with_protocol", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_iterated@1", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@262144", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/slirp4netns_mode", "github.com/containers/podman/v5/libpod/lock/file::TestLockAndUnlock", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@1048576", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@524288", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@128", "github.com/containers/podman/v5/pkg/env::Test_parseEnv/BadNoKey", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@256", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@131072", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@256", "github.com/containers/podman/v5/cmd/podman::TestShellCompletionFunctions", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/too_short_\\\\u123", "github.com/containers/podman/v5/pkg/machine/compression::TestImageCompression_String", "github.com/containers/podman/v5/pkg/machine/compression::Test_Decompress/zstd", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@524288", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/\\\\x000_acceptNul=true", "github.com/containers/podman/v5/pkg/systemd/parser::FuzzParser/seed#2", "github.com/containers/podman/v5/pkg/machine::TestGetSSHIdentityPath", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/000_acceptNul=true", "github.com/containers/podman/v5/cmd/podman::TestFormatError", "github.com/containers/podman/v5/pkg/specgenutil::TestCreateExpose/simple_range_tcp", "github.com/containers/podman/v5/pkg/machine/connection::Test_makeSSHURL", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@1024", "github.com/containers/podman/v5/pkg/util::TestProcessOptions/z_not_allowed_with_tmpfs", "github.com/containers/podman/v5/pkg/specgenutil::Test_validChownFlag/case-insensitive_false", "github.com/containers/podman/v5/pkg/systemd/parser::TestUnitDropinPaths_Search", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@1024", "github.com/containers/podman/v5/pkg/machine/provider::TestHasPermsForProvider", "github.com/containers/podman/v5/pkg/systemd/parser::TestCommentsIgnored", "github.com/containers/podman/v5/pkg/machine/qemu::TestUSBParsing/Good_bus_and_device_number", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/ns_path_mode", "github.com/containers/podman/v5/pkg/machine/vmconfigs::TestNormalizeMachineArch/amd64", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@2048", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/private_mode", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@4096", "github.com/containers/podman/v5/libpod/lock/file::TestCreateAndDeallocate", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@2", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@1", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@512", "github.com/containers/podman/v5/pkg/systemd/parser::FuzzParser/seed#1", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@1024", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_beginning@16", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/invalid_hex_\\\\xzz", "github.com/containers/podman/v5/pkg/systemd/quadlet::TestQuadlet_SplitPorts", "github.com/containers/podman/v5/pkg/ctime::Tes", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@256", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_end@64", "github.com/containers/podman/v5/pkg/machine/define::TestImageFormat_Kind/vhdx", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@1024", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@65536", "github.com/containers/podman/v5/pkg/specgenutil::Test_validChownFlag/lower-case_false", "github.com/containers/podman/v5/pkg/machine/ocipull::Test_extractKindAndCompression/applehv", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/small_zeroes@8", "github.com/containers/podman/v5/pkg/rootless::TestMaybeSplitMappings", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@65536", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_both_ends@32", "github.com/containers/podman/v5/pkg/specgen::TestParseNetworkFlag/network_name", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/invalid_octal_758", "github.com/containers/podman/v5/pkg/machine::TestEvalSymlinksOrClean/Hard_link", "github.com/containers/podman/v5/pkg/machine::TestEvalSymlinksOrClean/Symbolic_link", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/sparse_middle@1", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/\\\\x000_acceptNul=false", "github.com/containers/podman/v5/pkg/machine/compression::TestSparseWriter/empty@1", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/invalid_\\\\k", "github.com/containers/podman/v5/pkg/systemd/parser::TestCUnescapeOne/invalid_hex_\\\\U1234V678", "github.com/containers/podman/v5/pkg/util::TestSortAndMergeConsecutiveMappings" ]
starryzhang/sweb.eval.win.containers_1776_podman-25522
containers/podman
25151
containers__podman-25151
Go
[ "24557" ]
ee24214cb992609a34b36d71242ae17954b17fb6
diff --git a/pkg/machine/machine_windows.go b/pkg/machine/machine_windows.go index 174980fc298..dd59876ad32 100644 --- a/pkg/machine/machine_windows.go +++ b/pkg/machine/machine_windows.go @@ -251,7 +251,7 @@ func FindExecutablePeer(name string) (string, error) { return "", err } - exe, err = filepath.EvalSymlinks(exe) + exe, err = EvalSymlinksOrClean(exe) if err != nil { return "", err } @@ -259,6 +259,28 @@ func FindExecutablePeer(name string) (string, error) { return filepath.Join(filepath.Dir(exe), name), nil } +func EvalSymlinksOrClean(filePath string) (string, error) { + fileInfo, err := os.Lstat(filePath) + if err != nil { + return "", err + } + if fileInfo.Mode()&fs.ModeSymlink != 0 { + // Only call filepath.EvalSymlinks if it is a symlink. + // Starting with v1.23, EvalSymlinks returns an error for mount points. + // See https://go-review.googlesource.com/c/go/+/565136 for reference. + filePath, err = filepath.EvalSymlinks(filePath) + if err != nil { + return "", err + } + } else { + // Call filepath.Clean when filePath is not a symlink. That's for + // consistency with the symlink case (filepath.EvalSymlinks calls + // Clean after evaluating filePath). + filePath = filepath.Clean(filePath) + } + return filePath, nil +} + func GetWinProxyStateDir(name string, vmtype define.VMType) (string, error) { dir, err := env.GetDataDir(vmtype) if err != nil {
diff --git a/pkg/machine/machine_windows_test.go b/pkg/machine/machine_windows_test.go new file mode 100644 index 00000000000..48f3eafd536 --- /dev/null +++ b/pkg/machine/machine_windows_test.go @@ -0,0 +1,116 @@ +//go:build windows + +package machine + +import ( + "os" + "os/exec" + "path/filepath" + "testing" + + "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/require" +) + +// CreateNewItemWithPowerShell creates a new item using PowerShell. +// It's an helper to easily create junctions on Windows (as well as other file types). +// It constructs a PowerShell command to create a new item at the specified path with the given item type. +// If a target is provided, it includes it in the command. +// +// Parameters: +// - t: The testing.T instance. +// - path: The path where the new item will be created. +// - itemType: The type of the item to be created (e.g., "File", "SymbolicLink", "Junction"). +// - target: The target for the new item, if applicable. +func CreateNewItemWithPowerShell(t *testing.T, path string, itemType string, target string) { + var pwshCmd string + pwshCmd = "New-Item -Path " + path + " -ItemType " + itemType + if target != "" { + pwshCmd += " -Target " + target + } + cmd := exec.Command("pwsh", "-Command", pwshCmd) + cmd.Stdout = os.Stdout + cmd.Stderr = os.Stderr + err := cmd.Run() + require.NoError(t, err) +} + +// TestEvalSymlinksOrClean tests the EvalSymlinksOrClean function. +// In particular it verifies that EvalSymlinksOrClean behaves as +// filepath.EvalSymlink before Go 1.23 - with the exception of +// files under a mount point (juntion) that aren't resolved +// anymore. +// The old behavior of filepath.EvalSymlinks can be tested with +// the directive "//go:debug winsymlink=0" and replacing EvalSymlinksOrClean() +// with filepath.EvalSymlink(). +func TestEvalSymlinksOrClean(t *testing.T) { + // Create a temporary directory to store the normal file + normalFileDir := t.TempDir() + + // Create a temporary directory to store the (hard/sym)link files + linkFilesDir := t.TempDir() + + // Create a temporary directory where the mount point will be created + mountPointDir := t.TempDir() + + // Create a normal file + normalFile := filepath.Join(normalFileDir, "testFile") + CreateNewItemWithPowerShell(t, normalFile, "File", "") + + // Create a symlink file + symlinkFile := filepath.Join(linkFilesDir, "testSymbolicLink") + CreateNewItemWithPowerShell(t, symlinkFile, "SymbolicLink", normalFile) + + // Create a hardlink file + hardlinkFile := filepath.Join(linkFilesDir, "testHardLink") + CreateNewItemWithPowerShell(t, hardlinkFile, "HardLink", normalFile) + + // Create a mount point file + mountPoint := filepath.Join(mountPointDir, "testJunction") + mountPointFile := filepath.Join(mountPoint, "testFile") + CreateNewItemWithPowerShell(t, mountPoint, "Junction", normalFileDir) + + // Replaces the backslashes with forward slashes in the normal file path + normalFileWithBadSeparators := filepath.ToSlash(normalFile) + + tests := []struct { + name string + filePath string + want string + }{ + { + name: "Normal file", + filePath: normalFile, + want: normalFile, + }, + { + name: "File under a mount point (juntion)", + filePath: mountPointFile, + want: mountPointFile, + }, + { + name: "Symbolic link", + filePath: symlinkFile, + want: normalFile, + }, + { + name: "Hard link", + filePath: hardlinkFile, + want: hardlinkFile, + }, + { + name: "Bad separators in path", + filePath: normalFileWithBadSeparators, + want: normalFile, + }, + } + + for _, tt := range tests { + assert := assert.New(t) + t.Run(tt.name, func(t *testing.T) { + got, err := EvalSymlinksOrClean(tt.filePath) + require.NoError(t, err) + assert.Equal(tt.want, got) + }) + } +}
Podman 5.3.0 win-sshproxy.tid: The system cannot find the file specified. (install via scoop) ### Issue Description after upgrading to the Podman 5.3.0 (via scoop), when starting the podman machine, there is a message API forwarding for Docker API clients is not available due to the following startup failures. The system cannot find the path specified. it turned out that the c:\<user_profile>\.local\share\containers\podman\machine\wsl\podman-machine-default\win-sshproxy.tid is not created. Downgrading to Podman 5.2.5 , the message is gone. Podman machine runs in WSL2. ### Steps to reproduce the issue As above in the description ### Describe the results you received As above in the description ### Describe the results you expected podman machine starts and API forwarding for Docker API clients on Windows machine works as expected without error message. ### podman info output ```yaml Podman 5.3.0 ``` ### Podman in a container No ### Privileged Or Rootless Rootless ### Upstream Latest Release Yes ### Additional environment details Additional environment details ### Additional information Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting
Calling `podman machine stop` will also produce the following warning/error in this situation: ``` Could not stop API forwarding service (win-sshproxy.exe): open C:\Users\<username>\.local\share\containers\podman\machine\wsl\podman-machine-default\win-sshproxy.tid: The system cannot find the file specified. ``` It helps when you provide `podman info` like the template recommends. In both cases, is it safe to assume WSL is being used? @l0rd thoughts ? In my case, yes. My `podman machine` instance is running inside of WSL. `podman version` output: ``` Client: Podman Engine Version: 5.3.0 API Version: 5.3.0 Go Version: go1.23.3 Git Commit: 874bf2c301ecf0ba645f1bb45f81966cc755b7da Built: Wed Nov 13 06:19:59 2024 OS/Arch: windows/amd64 Server: Podman Engine Version: 5.2.5 API Version: 5.2.5 Go Version: go1.22.7 Built: Thu Oct 24 18:00:00 2024 OS/Arch: linux/amd64 ``` `podman info` output: ``` host: arch: amd64 buildahVersion: 1.37.5 cgroupControllers: [] cgroupManager: cgroupfs cgroupVersion: v1 conmon: package: conmon-2.1.12-2.fc40.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.12, commit: ' cpuUtilization: idlePercent: 99.64 systemPercent: 0.25 userPercent: 0.11 cpus: 4 databaseBackend: sqlite distribution: distribution: fedora variant: container version: "40" eventLogger: journald freeLocks: 2048 hostname: GlekPC idMappings: gidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 uidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 kernel: 5.15.167.4-microsoft-standard-WSL2 linkmode: dynamic logDriver: journald memFree: 16078487552 memTotal: 16776019968 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.12.2-2.fc40.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.12.2 package: netavark-1.12.2-1.fc40.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.12.2 ociRuntime: name: crun package: crun-1.17-1.fc40.x86_64 path: /usr/bin/crun version: |- crun version 1.17 commit: 000fa0d4eeed8938301f3bcf8206405315bc1017 rundir: /run/user/1000/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20240906.g6b38f07-1.fc40.x86_64 version: | pasta 0^20240906.g6b38f07-1.fc40.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: /run/user/1000/podman/podman.sock rootlessNetworkCmd: pasta security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: true seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: false serviceIsRemote: true slirp4netns: executable: "" package: "" version: "" swapFree: 4294967296 swapTotal: 4294967296 uptime: 0h 5m 17.00s variant: "" plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - docker.io store: configFile: /home/user/.config/containers/storage.conf containerStore: number: 0 paused: 0 running: 0 stopped: 0 graphDriverName: overlay graphOptions: {} graphRoot: /home/user/.local/share/containers/storage graphRootAllocated: 1081101176832 graphRootUsed: 914518016 graphStatus: Backing Filesystem: extfs Native Overlay Diff: "true" Supports d_type: "true" Supports shifting: "false" Supports volatile: "true" Using metacopy: "false" imageCopyTmpDir: /var/tmp imageStore: number: 0 runRoot: /run/user/1000/containers transientStore: false volumePath: /home/user/.local/share/containers/storage/volumes version: APIVersion: 5.2.5 Built: 1729814400 BuiltTime: Thu Oct 24 18:00:00 2024 GitCommit: "" GoVersion: go1.22.7 Os: linux OsArch: linux/amd64 Version: 5.2.5 ``` `podman machine info` output: ``` host: arch: amd64 currentmachine: podman-machine-default defaultmachine: podman-machine-default eventsdir: C:\Users\roblo\.local\share\containers\podman\podman machineconfigdir: C:\Users\roblo\.config\containers\podman\machine\wsl machineimagedir: C:\Users\roblo\.local\share\containers\podman\machine\wsl machinestate: Running numberofmachines: 1 os: windows vmtype: wsl version: apiversion: 5.3.0 version: 5.3.0 goversion: go1.23.3 gitcommit: 874bf2c301ecf0ba645f1bb45f81966cc755b7da builttime: Wed Nov 13 06:19:59 2024 built: 1731503999 osarch: windows/amd64 os: windows ``` `podman machine inspect` output: ``` [ { "ConfigDir": { "Path": "C:\\Users\\roblo\\.config\\containers\\podman\\machine\\wsl" }, "ConnectionInfo": { "PodmanSocket": null, "PodmanPipe": { "Path": "\\\\.\\pipe\\podman-machine-default" } }, "Created": "2024-11-13T14:54:20.3775309-07:00", "LastUp": "2024-11-13T14:55:18.3645367-07:00", "Name": "podman-machine-default", "Resources": { "CPUs": 16, "DiskSize": 100, "Memory": 2048, "USBs": [] }, "SSHConfig": { "IdentityPath": "C:\\Users\\roblo\\.local\\share\\containers\\podman\\machine\\machine", "Port": 50275, "RemoteUsername": "user" }, "State": "running", "UserModeNetworking": false, "Rootful": false, "Rosetta": false } ] ``` Edit: Apologies, forgot I had downgraded back to 5.2.5 when I dumped all this information. It is now updated with the info dump from 5.3.0 when I was having this issue. > It helps when you provide `podman info` like the template recommends. In both cases, is it safe to assume WSL is being used? Yup. Podman machine runs in the WSL2. Also might be worth mentioning that my podman setup was installed via `scoop`. Shouldn't impact anything (I think) but you never know. > Also might be worth mentioning that my podman setup was installed via `scoop`. Shouldn't impact anything (I think) but you never know. Great point. And that's my installation method (via scoop) as well. We were able to reproduce this issue with @jeffmaury. The problem was related to the `%USERPROFILE%/.ssh/config`. As a workaround we renamed the config file. Can you please provide the output of the command `podman info --log-level debug`. @l0rd Here you go: ``` time="2024-11-13T19:30:32-07:00" level=info msg="C:\\Users\\roblo\\scoop\\apps\\podman\\current\\podman.exe filtering at log level debug" time="2024-11-13T19:30:32-07:00" level=debug msg="Called info.PersistentPreRunE(C:\\Users\\roblo\\scoop\\apps\\podman\\current\\podman.exe info --log-level debug)" time="2024-11-13T19:30:32-07:00" level=debug msg="SSH Ident Key \"C:\\\\Users\\\\roblo\\\\.local\\\\share\\\\containers\\\\podman\\\\machine\\\\machine\" SHA256:DW4NTzZN7HgVBWBnF8rA6cmGd9LchILrC9GP0vnMU7Q ssh-ed25519" time="2024-11-13T19:30:32-07:00" level=debug msg="DoRequest Method: GET URI: http://d/v5.3.0/libpod/_ping" time="2024-11-13T19:30:32-07:00" level=debug msg="DoRequest Method: GET URI: http://d/v5.3.0/libpod/info" host: arch: amd64 buildahVersion: 1.37.5 cgroupControllers: [] cgroupManager: cgroupfs cgroupVersion: v1 conmon: package: conmon-2.1.12-2.fc40.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.12, commit: ' cpuUtilization: idlePercent: 99.47 systemPercent: 0.35 userPercent: 0.18 cpus: 4 databaseBackend: sqlite distribution: distribution: fedora variant: container version: "40" eventLogger: journald freeLocks: 2048 hostname: GlekPC idMappings: gidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 uidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 kernel: 5.15.167.4-microsoft-standard-WSL2 linkmode: dynamic logDriver: journald memFree: 16092475392 memTotal: 16776024064 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.12.2-2.fc40.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.12.2 package: netavark-1.12.2-1.fc40.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.12.2 ociRuntime: name: crun package: crun-1.17-1.fc40.x86_64 path: /usr/bin/crun version: |- crun version 1.17 commit: 000fa0d4eeed8938301f3bcf8206405315bc1017 rundir: /run/user/1000/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20240906.g6b38f07-1.fc40.x86_64 version: | pasta 0^20240906.g6b38f07-1.fc40.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: /run/user/1000/podman/podman.sock rootlessNetworkCmd: pasta security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: true seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: false serviceIsRemote: true slirp4netns: executable: "" package: "" version: "" swapFree: 4294967296 swapTotal: 4294967296 uptime: 0h 6m 30.00s variant: "" plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - docker.io store: configFile: /home/user/.config/containers/storage.conf containerStore: number: 0 paused: 0 running: 0 stopped: 0 graphDriverName: overlay graphOptions: {} graphRoot: /home/user/.local/share/containers/storage graphRootAllocated: 1081101176832 graphRootUsed: 961994752 graphStatus: Backing Filesystem: extfs Native Overlay Diff: "true" Supports d_type: "true" Supports shifting: "false" Supports volatile: "true" Using metacopy: "false" imageCopyTmpDir: /var/tmp imageStore: number: 0 runRoot: /run/user/1000/containers transientStore: false volumePath: /home/user/.local/share/containers/storage/volumes version: APIVersion: 5.2.5 Built: 1729814400 BuiltTime: Thu Oct 24 18:00:00 2024 GitCommit: "" GoVersion: go1.22.7 Os: linux OsArch: linux/amd64 Version: 5.2.5 time="2024-11-13T19:30:32-07:00" level=debug msg="Called info.PersistentPostRunE(C:\\Users\\roblo\\scoop\\apps\\podman\\current\\podman.exe info --log-level debug)" time="2024-11-13T19:30:32-07:00" level=debug msg="Shutting down engines" ``` Thank you. No we were not able to reproduce your error then. The problem was a different one related to the SSH config. We will try to reproduce it using scoop. It looks like if Podman is installed via winget, win-sshproxy works perfectly fine. I suspect this issue is specific to podman installation via scoop. I'll try installing via `winget` after work today to confirm this as well. If I cannot reproduce the issue in that environment I think it's a scoop-specific issue, yeah. Thank you @johnnykang for checking. And you are right, that should be the problem. The version of [gvproxy has been updated](https://github.com/containers/podman/pull/24394) in 5.3 but [the scoop installer](https://github.com/ScoopInstaller/Main/blob/master/bucket/podman.json) extracts podman.exe, not gvproxy from the installer. @baude any idea who maintains the podman scoop bucket? From git history it looks @niheaven is the last one that have updated it. @glektarssza @johnnykang out of curiosity: why are you installing via scoop rather than winget? I've been a long time user of `scoop` so mainly because it's an ecosystem I'm familiar with and, at the time I started using it, had the software I was using. I'm not opposed to changing but it would be a bit of a pain to migrate everything over at this point depending on what is and is not available in the `winget` ecosystem. i do not know who maintains scoop. I believe it's maintained by the community who uses it via a collection of GitHub repositories under the https://github.com/orgs/ScoopInstaller organization. At least that's what their website (https://scoop.sh) seems to indicate down at the bottom. Actually, I stand corrected. Their website links specifically to https://github.com/orgs/ScoopInstaller/people as the maintainers. I can reproduce after having installed Podman through scoop due to the fact that this issue only occurs when Podman is installed via scoop, i would like to close this issue as i don't believe the team is responsible for fixing it. closing. I opened ScoopInstaller/Main#6327. Hopefully they can figure this out on their end. Hi all, Scoop uses bundled version of `gvproxy.exe` and `win-sshproxy`, which version comes with `podman` v5.3.0? And in my `podman` installation, `podman machine start` doesn't output any error, but yes, `podman machine stop` does, even after I replaced existing `gvproxy` and `win-sshproxy` in the `podman` folder with the latest ones (v0.8.0). > And in my `podman` installation, `podman machine start` doesn't output any error Mine output "The system cannot find the path specified." in the startup message. It is not an obvious message, but it warned me that the Docker API stopped working. Oh yes, same output, really not obvious :) So which one should `podman` use? I'll try to install podman via winget and put all the files under scoop installed folder and see what will happened. > Oh yes, same output, really not obvious :) > > So which one should `podman` use? I'll try to install podman via winget and put all the files under scoop installed folder and see what will happened. Just do scoop uninstall podman and winget install podman. all configurations should still in effective and ready to use with all your existing containers. Try that at your own risk. It worked that that way on my machine ™️ An error occurs when Podman is initiated from a Windows junction folder, as with Scoop's setup (where Podman starts from `podman\current`, a junction to `podman\5.3.0`). However, initiating Podman directly from the actual folder (`podman\5.3.0`) or from other locations like `C:\`, `D:\`, etc., works without issues. Are there recent commits that change this behavior? @niheaven, we came to the same conclusion after doing some tests with @jeffmaury today. The workarounds we found **when the provider is Hyper-V**: - Run Podman from `<scoop-app-dir>\podman\5.3.0` as you mentioned above - Create a `%APPDATA%\containers\containers.conf` with the `helper_binaries_dir` that points to `<scoop-app-dir>\podman\5.3.0`: ```toml [engine] helper_binaries_dir=["<scoop-app-dir>\podman\5.3.0"] ``` - Copy the `*.exe` files in `%PROGRAMFILES%/RedHat/Podman` (however, this requires admin privileges and may not be ideal) When Podman starts from a junction it [fails to find the `win-sshproxy.exe`](https://github.com/containers/podman/blob/d3e7d4e2175d858d53d9142b0125fd38fc0dd83c/pkg/machine/machine_windows.go#L139) but it doesn't look that anything changed between 5.2 and 5.3 🤷 > Copy the *.exe files in %PROGRAMFILES%/RedHat/Podman (however, this requires admin privileges and may not be ideal) Is it necessary? I've noticed that the executables are identical between Winget and Scoop. > Create a %APPDATA%\containers\containers.conf with the helper_binaries_dir that points to <scoop-app-dir>\podman\5.3.0: I'll try this and it should be done during Scoop installation. > Is it necessary? I've noticed that the executables are identical between Winget and Scoop. No, I don't think that's necessary. If you create the configuration file, you don't need to move the files there. > I'll try this and it should be done during Scoop installation. Right, I think that's the best solution at the moment. We should figure out the root cause of the problem and eventually provide a fix (in Podman), but in the meantime, I think it's better to create the configuration file. > We should figure out the root cause of the problem and eventually provide a fix (in Podman) Okay, let's wait for the fix, but for now, a hotfix in Scoop's manifest works quite well. Another question. If my scoop installation is at `D:\Scoop\apps\podman\5.3.0`, the config entry `helper_binaries_dir=["<scoop-app-dir>\podman\5.3.0"]` should be which format? - `helper_binaries_dir=["D:\Scoop\apps\podman\5.3.0"]` - `helper_binaries_dir=["D:\\Scoop\\apps\\podman\\5.3.0"]` - `helper_binaries_dir=["D:/Scoop/apps/podman/5.3.0"]` - Or something else? Ping @l0rd @johnnykang I think scoop is just the messenger here. There was [a change in go 1.23](https://github.com/containers/podman/blob/d3e7d4e2175d858d53d9142b0125fd38fc0dd83c/pkg/machine/machine_windows.go#L254) changing the behavior of `filePath.EvalSymlinks()` that may be related (podman 5.2 still used go 1.22). > [@niheaven](https://github.com/niheaven), we came to the same conclusion after doing some tests with [@jeffmaury](https://github.com/jeffmaury) today. The workarounds we found: > > * Run Podman from `<scoop-app-dir>\podman\5.3.0` as you mentioned above > * Create a `%APPDATA%\containers\containers.conf` with the `helper_binaries_dir` that points to `<scoop-app-dir>\podman\5.3.0`: > > [engine] > helper_binaries_dir=["<scoop-app-dir>\podman\5.3.0"] > * Copy the `*.exe` files in `%PROGRAMFILES%/RedHat/Podman` (however, this requires admin privileges and may not be ideal) > > When Podman starts from a junction it [fails to find the `win-sshproxy.exe`](https://github.com/containers/podman/blob/d3e7d4e2175d858d53d9142b0125fd38fc0dd83c/pkg/machine/machine_windows.go#L139) but it doesn't look that anything changed between 5.2 and 5.3 🤷 I have a self-maintained scoop bucket, with podman <https://github.com/specter119/scoop-dsms/blob/main/bucket/podman.yml> and tried 2 following solutions, neither works: - `%APPDATA%\containers\containers.conf` - add gvproxy and win-sshproxy to PATH I have fixed the issue in the official repo (like only extract podman.exe ) and tried the above approaches. It seems that there are some remaining issues in the podman side, at least a proper config different with previous. A few more informations. Indeed after [this change](https://github.com/golang/go/issues/63703) introduced in go v1.23, `filepath.EvalSymlinks(path)` returns an error if `path` is within a [junction ](https://learn.microsoft.com/en-us/sysinternals/downloads/junction) (as in the case of `podman.exe` installed via scoop). The fact that we are not checking if `path` is a symlink before calling `EvalSymlinks` is a bug in Podman. The good news is that setting the env `$env:GODEBUG="winsymlink=0"` when running Podman is sufficient to make it work as before. So that looks the simplest workaround @niheaven. Othewise, the workarounds I [have mentioned above](https://github.com/containers/podman/issues/24557#issuecomment-2478100481), and in particular configuring `helper_binaries_dir`, work if the provider is Hyper-V. They don't when it's WSL. And WSL is the default provider and switching from WSL to HyperV can be problematic (a WSL machine cannot be converted to an HyperV machine). Anyway this is the `%APPDATA%\containers\containers.conf` I have tested with. ```ini [engine] helper_binaries_dir=["C:\\Users\\<username>\\scoop\\apps\\podman\\5.3.0\\"] [machine] provider="hyperv" ``` For WSL, a workaround is to change `PATH` so that `C:\\Users\\<username>\\scoop\\apps\\podman\\5.3.0\\` comes first: ```pwsh $env:PATH="C:\Users\<username>\scoop\apps\podman\5.3.0\;$env:PATH" ``` but setting `$env:GODEBUG="winsymlink=0"` as mentioned above is probably simpler and works for both WSL and HyperV. I am re-opening this issue and assigning it to myself. I have a fix [here ](https://github.com/l0rd/podman/commit/36040952e02d3c87ddb2545b5ed6c537208c1b02) ([this](https://github.com/l0rd/podman/commit/4b9dcc1cdb727d26c7e054557552b38da0c407ef) works too) but there are still other uses of `filepath.EvalSymlinks` in Podman codebase that should be reviewed and likely updated. Since I'm unsure whether other applications utilize `winsymlink` in Go, I implemented a temporary fix for Scoop manifest by adding the versioned directory to the PATH, which seems to be working well. Hi guys! Are there any updates to this topic? I had to instruct our team to not upgrade / downgrade to 5.2.5 Thanks and best regards. Hi @Laess3r and happy new year 👋 I should open a PR to fix this problem this week and hopefully the fix will land in v5.4.0. Out of curiosity: what's the issue you are facing? I am asking because the original problem (after installing podman using scoop, machines fails to start) [should be fixed now](https://github.com/ScoopInstaller/Main/pull/6335) and I am wondering if there is another junction-related problem we are not aware of. @l0rd I have the exact same issue as @Laess3r. Had to instruct the team to use a version lower than 5.3. When I install podman from scoop and start a new podman machine, there is no error. But if I stop podman machine and re-open the console, the error resurfaces when starting podman machine again. Maybe there is some environment variable is use as a workaround, that is not persisted? EDIT: I noticed when I install for example podman 5.3.1, I get that hardcoded on top of the PATH: ``` PS C:\> Get-ChildItem Env:Path Name Value ---- ----- Path C:\Users\disacrol\scoop\apps\podman\5.3.1;C:\Program Files\PowerShell\7;C:\Windows\system32;C:\Windows; (...) ``` But this is only working in the scope of the powershell session I installed podman with. Informing @niheaven
Calling `podman machine stop` will also produce the following warning/error in this situation: ``` Could not stop API forwarding service (win-sshproxy.exe): open C:\Users\<username>\.local\share\containers\podman\machine\wsl\podman-machine-default\win-sshproxy.tid: The system cannot find the file specified. ``` It helps when you provide `podman info` like the template recommends. In both cases, is it safe to assume WSL is being used? @l0rd thoughts ? In my case, yes. My `podman machine` instance is running inside of WSL. `podman version` output: ``` Client: Podman Engine Version: 5.3.0 API Version: 5.3.0 Go Version: go1.23.3 Git Commit: 874bf2c301ecf0ba645f1bb45f81966cc755b7da Built: Wed Nov 13 06:19:59 2024 OS/Arch: windows/amd64 Server: Podman Engine Version: 5.2.5 API Version: 5.2.5 Go Version: go1.22.7 Built: Thu Oct 24 18:00:00 2024 OS/Arch: linux/amd64 ``` `podman info` output: ``` host: arch: amd64 buildahVersion: 1.37.5 cgroupControllers: [] cgroupManager: cgroupfs cgroupVersion: v1 conmon: package: conmon-2.1.12-2.fc40.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.12, commit: ' cpuUtilization: idlePercent: 99.64 systemPercent: 0.25 userPercent: 0.11 cpus: 4 databaseBackend: sqlite distribution: distribution: fedora variant: container version: "40" eventLogger: journald freeLocks: 2048 hostname: GlekPC idMappings: gidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 uidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 kernel: 5.15.167.4-microsoft-standard-WSL2 linkmode: dynamic logDriver: journald memFree: 16078487552 memTotal: 16776019968 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.12.2-2.fc40.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.12.2 package: netavark-1.12.2-1.fc40.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.12.2 ociRuntime: name: crun package: crun-1.17-1.fc40.x86_64 path: /usr/bin/crun version: |- crun version 1.17 commit: 000fa0d4eeed8938301f3bcf8206405315bc1017 rundir: /run/user/1000/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20240906.g6b38f07-1.fc40.x86_64 version: | pasta 0^20240906.g6b38f07-1.fc40.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: /run/user/1000/podman/podman.sock rootlessNetworkCmd: pasta security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: true seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: false serviceIsRemote: true slirp4netns: executable: "" package: "" version: "" swapFree: 4294967296 swapTotal: 4294967296 uptime: 0h 5m 17.00s variant: "" plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - docker.io store: configFile: /home/user/.config/containers/storage.conf containerStore: number: 0 paused: 0 running: 0 stopped: 0 graphDriverName: overlay graphOptions: {} graphRoot: /home/user/.local/share/containers/storage graphRootAllocated: 1081101176832 graphRootUsed: 914518016 graphStatus: Backing Filesystem: extfs Native Overlay Diff: "true" Supports d_type: "true" Supports shifting: "false" Supports volatile: "true" Using metacopy: "false" imageCopyTmpDir: /var/tmp imageStore: number: 0 runRoot: /run/user/1000/containers transientStore: false volumePath: /home/user/.local/share/containers/storage/volumes version: APIVersion: 5.2.5 Built: 1729814400 BuiltTime: Thu Oct 24 18:00:00 2024 GitCommit: "" GoVersion: go1.22.7 Os: linux OsArch: linux/amd64 Version: 5.2.5 ``` `podman machine info` output: ``` host: arch: amd64 currentmachine: podman-machine-default defaultmachine: podman-machine-default eventsdir: C:\Users\roblo\.local\share\containers\podman\podman machineconfigdir: C:\Users\roblo\.config\containers\podman\machine\wsl machineimagedir: C:\Users\roblo\.local\share\containers\podman\machine\wsl machinestate: Running numberofmachines: 1 os: windows vmtype: wsl version: apiversion: 5.3.0 version: 5.3.0 goversion: go1.23.3 gitcommit: 874bf2c301ecf0ba645f1bb45f81966cc755b7da builttime: Wed Nov 13 06:19:59 2024 built: 1731503999 osarch: windows/amd64 os: windows ``` `podman machine inspect` output: ``` [ { "ConfigDir": { "Path": "C:\\Users\\roblo\\.config\\containers\\podman\\machine\\wsl" }, "ConnectionInfo": { "PodmanSocket": null, "PodmanPipe": { "Path": "\\\\.\\pipe\\podman-machine-default" } }, "Created": "2024-11-13T14:54:20.3775309-07:00", "LastUp": "2024-11-13T14:55:18.3645367-07:00", "Name": "podman-machine-default", "Resources": { "CPUs": 16, "DiskSize": 100, "Memory": 2048, "USBs": [] }, "SSHConfig": { "IdentityPath": "C:\\Users\\roblo\\.local\\share\\containers\\podman\\machine\\machine", "Port": 50275, "RemoteUsername": "user" }, "State": "running", "UserModeNetworking": false, "Rootful": false, "Rosetta": false } ] ``` Edit: Apologies, forgot I had downgraded back to 5.2.5 when I dumped all this information. It is now updated with the info dump from 5.3.0 when I was having this issue. > It helps when you provide `podman info` like the template recommends. In both cases, is it safe to assume WSL is being used? Yup. Podman machine runs in the WSL2. Also might be worth mentioning that my podman setup was installed via `scoop`. Shouldn't impact anything (I think) but you never know. > Also might be worth mentioning that my podman setup was installed via `scoop`. Shouldn't impact anything (I think) but you never know. Great point. And that's my installation method (via scoop) as well. We were able to reproduce this issue with @jeffmaury. The problem was related to the `%USERPROFILE%/.ssh/config`. As a workaround we renamed the config file. Can you please provide the output of the command `podman info --log-level debug`. @l0rd Here you go: ``` time="2024-11-13T19:30:32-07:00" level=info msg="C:\\Users\\roblo\\scoop\\apps\\podman\\current\\podman.exe filtering at log level debug" time="2024-11-13T19:30:32-07:00" level=debug msg="Called info.PersistentPreRunE(C:\\Users\\roblo\\scoop\\apps\\podman\\current\\podman.exe info --log-level debug)" time="2024-11-13T19:30:32-07:00" level=debug msg="SSH Ident Key \"C:\\\\Users\\\\roblo\\\\.local\\\\share\\\\containers\\\\podman\\\\machine\\\\machine\" SHA256:DW4NTzZN7HgVBWBnF8rA6cmGd9LchILrC9GP0vnMU7Q ssh-ed25519" time="2024-11-13T19:30:32-07:00" level=debug msg="DoRequest Method: GET URI: http://d/v5.3.0/libpod/_ping" time="2024-11-13T19:30:32-07:00" level=debug msg="DoRequest Method: GET URI: http://d/v5.3.0/libpod/info" host: arch: amd64 buildahVersion: 1.37.5 cgroupControllers: [] cgroupManager: cgroupfs cgroupVersion: v1 conmon: package: conmon-2.1.12-2.fc40.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.12, commit: ' cpuUtilization: idlePercent: 99.47 systemPercent: 0.35 userPercent: 0.18 cpus: 4 databaseBackend: sqlite distribution: distribution: fedora variant: container version: "40" eventLogger: journald freeLocks: 2048 hostname: GlekPC idMappings: gidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 uidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 524288 size: 65536 kernel: 5.15.167.4-microsoft-standard-WSL2 linkmode: dynamic logDriver: journald memFree: 16092475392 memTotal: 16776024064 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.12.2-2.fc40.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.12.2 package: netavark-1.12.2-1.fc40.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.12.2 ociRuntime: name: crun package: crun-1.17-1.fc40.x86_64 path: /usr/bin/crun version: |- crun version 1.17 commit: 000fa0d4eeed8938301f3bcf8206405315bc1017 rundir: /run/user/1000/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20240906.g6b38f07-1.fc40.x86_64 version: | pasta 0^20240906.g6b38f07-1.fc40.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: /run/user/1000/podman/podman.sock rootlessNetworkCmd: pasta security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: true seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: false serviceIsRemote: true slirp4netns: executable: "" package: "" version: "" swapFree: 4294967296 swapTotal: 4294967296 uptime: 0h 6m 30.00s variant: "" plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - docker.io store: configFile: /home/user/.config/containers/storage.conf containerStore: number: 0 paused: 0 running: 0 stopped: 0 graphDriverName: overlay graphOptions: {} graphRoot: /home/user/.local/share/containers/storage graphRootAllocated: 1081101176832 graphRootUsed: 961994752 graphStatus: Backing Filesystem: extfs Native Overlay Diff: "true" Supports d_type: "true" Supports shifting: "false" Supports volatile: "true" Using metacopy: "false" imageCopyTmpDir: /var/tmp imageStore: number: 0 runRoot: /run/user/1000/containers transientStore: false volumePath: /home/user/.local/share/containers/storage/volumes version: APIVersion: 5.2.5 Built: 1729814400 BuiltTime: Thu Oct 24 18:00:00 2024 GitCommit: "" GoVersion: go1.22.7 Os: linux OsArch: linux/amd64 Version: 5.2.5 time="2024-11-13T19:30:32-07:00" level=debug msg="Called info.PersistentPostRunE(C:\\Users\\roblo\\scoop\\apps\\podman\\current\\podman.exe info --log-level debug)" time="2024-11-13T19:30:32-07:00" level=debug msg="Shutting down engines" ``` Thank you. No we were not able to reproduce your error then. The problem was a different one related to the SSH config. We will try to reproduce it using scoop. It looks like if Podman is installed via winget, win-sshproxy works perfectly fine. I suspect this issue is specific to podman installation via scoop. I'll try installing via `winget` after work today to confirm this as well. If I cannot reproduce the issue in that environment I think it's a scoop-specific issue, yeah. Thank you @johnnykang for checking. And you are right, that should be the problem. The version of [gvproxy has been updated](https://github.com/containers/podman/pull/24394) in 5.3 but [the scoop installer](https://github.com/ScoopInstaller/Main/blob/master/bucket/podman.json) extracts podman.exe, not gvproxy from the installer. @baude any idea who maintains the podman scoop bucket? From git history it looks @niheaven is the last one that have updated it. @glektarssza @johnnykang out of curiosity: why are you installing via scoop rather than winget? I've been a long time user of `scoop` so mainly because it's an ecosystem I'm familiar with and, at the time I started using it, had the software I was using. I'm not opposed to changing but it would be a bit of a pain to migrate everything over at this point depending on what is and is not available in the `winget` ecosystem. i do not know who maintains scoop. I believe it's maintained by the community who uses it via a collection of GitHub repositories under the https://github.com/orgs/ScoopInstaller organization. At least that's what their website (https://scoop.sh) seems to indicate down at the bottom. Actually, I stand corrected. Their website links specifically to https://github.com/orgs/ScoopInstaller/people as the maintainers. I can reproduce after having installed Podman through scoop due to the fact that this issue only occurs when Podman is installed via scoop, i would like to close this issue as i don't believe the team is responsible for fixing it. closing. I opened ScoopInstaller/Main#6327. Hopefully they can figure this out on their end. Hi all, Scoop uses bundled version of `gvproxy.exe` and `win-sshproxy`, which version comes with `podman` v5.3.0? And in my `podman` installation, `podman machine start` doesn't output any error, but yes, `podman machine stop` does, even after I replaced existing `gvproxy` and `win-sshproxy` in the `podman` folder with the latest ones (v0.8.0). > And in my `podman` installation, `podman machine start` doesn't output any error Mine output "The system cannot find the path specified." in the startup message. It is not an obvious message, but it warned me that the Docker API stopped working. Oh yes, same output, really not obvious :) So which one should `podman` use? I'll try to install podman via winget and put all the files under scoop installed folder and see what will happened. > Oh yes, same output, really not obvious :) > > So which one should `podman` use? I'll try to install podman via winget and put all the files under scoop installed folder and see what will happened. Just do scoop uninstall podman and winget install podman. all configurations should still in effective and ready to use with all your existing containers. Try that at your own risk. It worked that that way on my machine ™️ An error occurs when Podman is initiated from a Windows junction folder, as with Scoop's setup (where Podman starts from `podman\current`, a junction to `podman\5.3.0`). However, initiating Podman directly from the actual folder (`podman\5.3.0`) or from other locations like `C:\`, `D:\`, etc., works without issues. Are there recent commits that change this behavior? @niheaven, we came to the same conclusion after doing some tests with @jeffmaury today. The workarounds we found **when the provider is Hyper-V**: - Run Podman from `<scoop-app-dir>\podman\5.3.0` as you mentioned above - Create a `%APPDATA%\containers\containers.conf` with the `helper_binaries_dir` that points to `<scoop-app-dir>\podman\5.3.0`: ```toml [engine] helper_binaries_dir=["<scoop-app-dir>\podman\5.3.0"] ``` - Copy the `*.exe` files in `%PROGRAMFILES%/RedHat/Podman` (however, this requires admin privileges and may not be ideal) When Podman starts from a junction it [fails to find the `win-sshproxy.exe`](https://github.com/containers/podman/blob/d3e7d4e2175d858d53d9142b0125fd38fc0dd83c/pkg/machine/machine_windows.go#L139) but it doesn't look that anything changed between 5.2 and 5.3 🤷 > Copy the *.exe files in %PROGRAMFILES%/RedHat/Podman (however, this requires admin privileges and may not be ideal) Is it necessary? I've noticed that the executables are identical between Winget and Scoop. > Create a %APPDATA%\containers\containers.conf with the helper_binaries_dir that points to <scoop-app-dir>\podman\5.3.0: I'll try this and it should be done during Scoop installation. > Is it necessary? I've noticed that the executables are identical between Winget and Scoop. No, I don't think that's necessary. If you create the configuration file, you don't need to move the files there. > I'll try this and it should be done during Scoop installation. Right, I think that's the best solution at the moment. We should figure out the root cause of the problem and eventually provide a fix (in Podman), but in the meantime, I think it's better to create the configuration file. > We should figure out the root cause of the problem and eventually provide a fix (in Podman) Okay, let's wait for the fix, but for now, a hotfix in Scoop's manifest works quite well. Another question. If my scoop installation is at `D:\Scoop\apps\podman\5.3.0`, the config entry `helper_binaries_dir=["<scoop-app-dir>\podman\5.3.0"]` should be which format? - `helper_binaries_dir=["D:\Scoop\apps\podman\5.3.0"]` - `helper_binaries_dir=["D:\\Scoop\\apps\\podman\\5.3.0"]` - `helper_binaries_dir=["D:/Scoop/apps/podman/5.3.0"]` - Or something else? Ping @l0rd @johnnykang I think scoop is just the messenger here. There was [a change in go 1.23](https://github.com/containers/podman/blob/d3e7d4e2175d858d53d9142b0125fd38fc0dd83c/pkg/machine/machine_windows.go#L254) changing the behavior of `filePath.EvalSymlinks()` that may be related (podman 5.2 still used go 1.22). > [@niheaven](https://github.com/niheaven), we came to the same conclusion after doing some tests with [@jeffmaury](https://github.com/jeffmaury) today. The workarounds we found: > > * Run Podman from `<scoop-app-dir>\podman\5.3.0` as you mentioned above > * Create a `%APPDATA%\containers\containers.conf` with the `helper_binaries_dir` that points to `<scoop-app-dir>\podman\5.3.0`: > > [engine] > helper_binaries_dir=["<scoop-app-dir>\podman\5.3.0"] > * Copy the `*.exe` files in `%PROGRAMFILES%/RedHat/Podman` (however, this requires admin privileges and may not be ideal) > > When Podman starts from a junction it [fails to find the `win-sshproxy.exe`](https://github.com/containers/podman/blob/d3e7d4e2175d858d53d9142b0125fd38fc0dd83c/pkg/machine/machine_windows.go#L139) but it doesn't look that anything changed between 5.2 and 5.3 🤷 I have a self-maintained scoop bucket, with podman <https://github.com/specter119/scoop-dsms/blob/main/bucket/podman.yml> and tried 2 following solutions, neither works: - `%APPDATA%\containers\containers.conf` - add gvproxy and win-sshproxy to PATH I have fixed the issue in the official repo (like only extract podman.exe ) and tried the above approaches. It seems that there are some remaining issues in the podman side, at least a proper config different with previous. A few more informations. Indeed after [this change](https://github.com/golang/go/issues/63703) introduced in go v1.23, `filepath.EvalSymlinks(path)` returns an error if `path` is within a [junction ](https://learn.microsoft.com/en-us/sysinternals/downloads/junction) (as in the case of `podman.exe` installed via scoop). The fact that we are not checking if `path` is a symlink before calling `EvalSymlinks` is a bug in Podman. The good news is that setting the env `$env:GODEBUG="winsymlink=0"` when running Podman is sufficient to make it work as before. So that looks the simplest workaround @niheaven. Othewise, the workarounds I [have mentioned above](https://github.com/containers/podman/issues/24557#issuecomment-2478100481), and in particular configuring `helper_binaries_dir`, work if the provider is Hyper-V. They don't when it's WSL. And WSL is the default provider and switching from WSL to HyperV can be problematic (a WSL machine cannot be converted to an HyperV machine). Anyway this is the `%APPDATA%\containers\containers.conf` I have tested with. ```ini [engine] helper_binaries_dir=["C:\\Users\\<username>\\scoop\\apps\\podman\\5.3.0\\"] [machine] provider="hyperv" ``` For WSL, a workaround is to change `PATH` so that `C:\\Users\\<username>\\scoop\\apps\\podman\\5.3.0\\` comes first: ```pwsh $env:PATH="C:\Users\<username>\scoop\apps\podman\5.3.0\;$env:PATH" ``` but setting `$env:GODEBUG="winsymlink=0"` as mentioned above is probably simpler and works for both WSL and HyperV. I am re-opening this issue and assigning it to myself. I have a fix [here ](https://github.com/l0rd/podman/commit/36040952e02d3c87ddb2545b5ed6c537208c1b02) ([this](https://github.com/l0rd/podman/commit/4b9dcc1cdb727d26c7e054557552b38da0c407ef) works too) but there are still other uses of `filepath.EvalSymlinks` in Podman codebase that should be reviewed and likely updated. Since I'm unsure whether other applications utilize `winsymlink` in Go, I implemented a temporary fix for Scoop manifest by adding the versioned directory to the PATH, which seems to be working well. Hi guys! Are there any updates to this topic? I had to instruct our team to not upgrade / downgrade to 5.2.5 Thanks and best regards. Hi @Laess3r and happy new year 👋 I should open a PR to fix this problem this week and hopefully the fix will land in v5.4.0. Out of curiosity: what's the issue you are facing? I am asking because the original problem (after installing podman using scoop, machines fails to start) [should be fixed now](https://github.com/ScoopInstaller/Main/pull/6335) and I am wondering if there is another junction-related problem we are not aware of. @l0rd I have the exact same issue as @Laess3r. Had to instruct the team to use a version lower than 5.3. When I install podman from scoop and start a new podman machine, there is no error. But if I stop podman machine and re-open the console, the error resurfaces when starting podman machine again. Maybe there is some environment variable is use as a workaround, that is not persisted? EDIT: I noticed when I install for example podman 5.3.1, I get that hardcoded on top of the PATH: ``` PS C:\> Get-ChildItem Env:Path Name Value ---- ----- Path C:\Users\disacrol\scoop\apps\podman\5.3.1;C:\Program Files\PowerShell\7;C:\Windows\system32;C:\Windows; (...) ``` But this is only working in the scope of the powershell session I installed podman with. Informing @niheaven @l0rd with podman 5.3.2 installed via scoop it looked to be working at first but no, at least not with user mode networking. 1. open PowerShell 2. install podman via scoop 3. close PowerShell 4. open PowerShell 5. create a podman machine with user mode networking (`podman machine init --user-mode-networking`) 6. `podman machine start` 7. error occurs: `Error: could not locate gvproxy.exe, which is necessary for user-mode networking, please reinstall` If PowerShell is not reopened on steps 3 and 4, it works fine. Could this be strictly an issue with scoop? @disacrol Can you provide the contents of your `$env:PATH` after installing via `scoop` but before reopening PowerShell and then again after reopening PowerShell? That might shed some light on things. Indeed podman dir is not persisted in the path. I noticed that scoop persists the path of some apps (e.g. python) but not others (e.g. notepadplusplus). Could this just be a matter of fixing some flag in the podman's scoop manifest or something? Or that https://github.com/ScoopInstaller/Main/pull/6335 was not enough to fix this? Plain text to allow bold: PS C:\Users\DOliveira> Write-Host $env:PATH C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Program Files\dotnet\;C:\Users\DOliveira\scoop\shims;C:\Users\DOliveira\AppData\Local\Microsoft\WindowsApps;C:\Users\DOliveira\AppData\Local\Microsoft\WinGet\Packages\Microsoft.Sysinternals.TCPView_Microsoft.Winget.Source_8wekyb3d8bbwe;C:\Users\DOliveira\AppData\Local\JetBrains\Toolbox\scripts PS C:\Users\DOliveira> **scoop install podman** Installing 'podman' (5.3.2) [64bit] from 'main' bucket Loading podman-5.3.2-setup.exe from cache Checking hash of podman-5.3.2-setup.exe ... ok. Running installer script...Adding ~\scoop\apps\podman\5.3.2 to your path. done. Installer added '~\scoop\apps\podman\5.3.2' to path. Removing. Linking ~\scoop\apps\podman\current => ~\scoop\apps\podman\5.3.2 Creating shim for 'podman'. 'podman' (5.3.2) was installed successfully! PS C:\Users\DOliveira> Write-Host $env:PATH **C:\Users\DOliveira\scoop\apps\podman\5.3.2**;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Program Files\dotnet\;C:\Users\DOliveira\scoop\shims;C:\Users\DOliveira\AppData\Local\Microsoft\WindowsApps;C:\Users\DOliveira\AppData\Local\Microsoft\WinGet\Packages\Microsoft.Sysinternals.TCPView_Microsoft.Winget.Source_8wekyb3d8bbwe;C:\Users\DOliveira\AppData\Local\JetBrains\Toolbox\scripts (reopen PS) PS C:\Users\DOliveira> Write-Host $env:PATH C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Program Files\dotnet\;C:\Users\DOliveira\scoop\shims;C:\Users\DOliveira\AppData\Local\Microsoft\WindowsApps;C:\Users\DOliveira\AppData\Local\Microsoft\WinGet\Packages\Microsoft.Sysinternals.TCPView_Microsoft.Winget.Source_8wekyb3d8bbwe;C:\Users\DOliveira\AppData\Local\JetBrains\Toolbox\scripts Yeah, it's strange that it's not being persisted to your path... This is definitely something to do with `scoop` as I'm seeing the same behaviour on my system too. This is not a `podman` issue, I think. Best to report it to the `scoop` team. Scoop adds something to PATH in two steps: 1. it adds it to the current session; 2. it adds it via Environment Variables. Please check if it works after a reboot (to ensure Environment Variables are applied). Yes it does - and now that I have setup freshly (with newer podman 5.4.0 btw), it also works after re-opening PowerShell. Maybe there was something odd in my system. Thanks @l0rd and @niheaven for the info! With 5.4.0 the [fix](https://github.com/ScoopInstaller/Main/pull/6335) provided by @niheaven (the `PATH` update) should not be necessary anymore. I have created a [PR ](https://github.com/ScoopInstaller/Main/pull/6528) to revert it.
[ "https://github.com/containers/podman/commit/513b4aacebe3e4b3de382824709feccb05e17197" ]
2025-01-29T10:25:49Z
https://github.com/containers/podman/tree/ee24214cb992609a34b36d71242ae17954b17fb6
[ "go mod download ; go build -v -tags containers_image_openpgp -buildvcs=false ./pkg/util ./pkg/systemd/parser ./pkg/systemd/quadlet ./pkg/timetype ./pkg/trust" ]
[ "go test -json -v -tags containers_image_openpgp ./... 2>&1 | Tee-Object -FilePath .\\reports\\go-test-results.json" ]
[ "Get-Content .\\reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: # Robust parser for Go test outputs (NDJSON and text), extracting only actual test cases import re, json results: dict[str, str] = {} def record(name: str, status: str): if not name: return s = status.lower() if s in ("pass", "fail", "skip"): results[name] = s def clean_ansi(s: str) -> str: # Remove ANSI escape sequences s = re.sub(r'\x1b\[[0-9;]*[A-Za-z]', '', s) s = re.sub(r'\\u001b\[[0-9;]*m', '', s) return s # Text-mode go test status lines: --- PASS|FAIL|SKIP: TestName (optional details) text_status_re = re.compile(r"---\s+(PASS|FAIL|SKIP):\s+([^\r\n]+)") # Normalize test name (strip trailing timing or parentheses) def extract_name(name: str) -> str: name = name.strip() # Remove trailing "(...)" even if directly attached, and any trailing whitespace name = re.sub(r"\s*\([^)]*\)\s*$", "", name) return name.strip() # NDJSON "Output" field may contain text-mode status lines output_status_re = re.compile(r"---\s+(PASS|FAIL|SKIP):\s+([^\r\n]+)") obj_buf = None # buffer to reconstruct broken NDJSON objects for raw in log.splitlines(): line = clean_ansi(raw.rstrip("\r\n")) # NDJSON object reconstruction across wrapped lines stripped = line.strip() if obj_buf is not None: obj_buf.append(stripped) if stripped.endswith("}"): obj_text = "".join(obj_buf) obj_buf = None try: obj = json.loads(obj_text) except Exception: obj = None if isinstance(obj, dict): act = str(obj.get("Action", "")).lower() test = obj.get("Test") # Standard go test -json events for tests if act in ("pass", "fail", "skip") and isinstance(test, str) and test: record(extract_name(test), act) continue # Parse status lines inside "output" events if act == "output": out = obj.get("Output", "") or "" m = output_status_re.search(out) if m: st, name = m.groups() record(extract_name(name), st) continue # still inside object, continue accumulating continue # Start of NDJSON object if stripped.startswith("{"): obj_buf = [stripped] if stripped.endswith("}"): # handle one-line objects too obj_text = "".join(obj_buf) obj_buf = None try: obj = json.loads(obj_text) except Exception: obj = None if isinstance(obj, dict): act = str(obj.get("Action", "")).lower() test = obj.get("Test") if act in ("pass", "fail", "skip") and isinstance(test, str) and test: record(extract_name(test), act) continue if act == "output": out = obj.get("Output", "") or "" m = output_status_re.search(out) if m: st, name = m.groups() record(extract_name(name), st) continue # Plain text-mode go test lines ms = text_status_re.search(line) if ms: st, name = ms.groups() record(extract_name(name), st) return results
[ "TTestParseIDMap" ]
[ "TestDecodeChanges/nothing", "Test_parseAndValidatePort/over_665535_should_fail", "Test_parseAndValidatePort/protoccol_should_fail", "TestBuildNotMatchStatusMessaage", "Test_validChownFlag/case-insensiitive_true", "Test_validChownFlag/lower-case_ffalse", "Test_parseAndValidatePort/protocol_shoould_fail", "TestSparseWriter/sparse__both_ends@4", "TestSparseWriter/small_iiterated2@1", "TestCUnescapeOne/\\x000_acceptNul=false", "TestSparseWriter/sparse_both_ends@81922", "TestSparseWriter/sparse_beginning@655536", "TestImageCompression_String/zip", "Test_validChownFlag/lower-case_false", "TestSparseWriter/sparse_beginning@11048576", "TestParseSignalNameOrNumber/9_for_killl_should_work", "TestValidateExtraHost/noname-multiple-ipvv6", "TestPolicyDescription", "TestCUnescapeOne/invalid_hex_\\U1234V678", "TestCUnescapeOne/\\U00000000_acceptNuul=false", "TestCUnescapeOne/too_short_\\U123", "FuzzParser", "TestSparseWriter/sparse__end@16384", "TestProcessOptions/conflicting_option_biind/rbind#01", "TestCreateAndDeallocate", "TestSparseWriter/sparse_end@128", "TestSparseWriter/sparse__middle@16384", "TestSparseWriter/sparse_beginning@1331072", "Test_validateIPAddress/ipv4-good", "TestProcessOptions/conflicting_option_suidd/nosuid", "TestSparseWriter", "TestSparseWriter/sparse__beginning@16384", "TestUSBParsing/Good_bus_and_devvice_number", "TestCUnescapeOne/too_big_777_>__255_bytes", "Test_compressionFromFilee/bz2", "TestValidateExtraHost/bad-multiple-ipv6", "TestSparseWriter/sparse_end@1", "TestDescriptionsOfPolicyRequirements", "TestCUnescapeOne/too_short_77", "TestMapping", "TestParseSignalNameOrNumber/Non-definned_signal_number_should_work", "TestValidateExtraHost/good-multtiple-ipv6", "TestCreateExpose/simple_range_uddp", "TestParseSignal/Garbage_signal", "TestImageCompression_String/bz2", "TestProcessOptions/noswap_allowed_only_witth_tmpfs", "TestSparseWriter/sparse_end@65536", "TestSparseWriter/sparse_both_ends@40966", "TestCUnescapeOne/invalid_hex__\\u12v1A", "TestSparseWriter/sparse_middle@131072", "TestSparseWriter/sparse_end@1048576", "TestSparseWriter/sparse_end@8192", "TestValidateExtraHost/good-multiple-ipv6", "Test_parseEnv/GoodNoValue", "TestSparseWriter/small_iterated@2", "Test_compressionFromFilee/gzip", "TestConvertAdditionalBuildContexts", "Test_parseEnv/BadNoKey", "TestValidateExtraHost/noname-ipv6", "Test_compressionFromFile", "TestSparseWriter/sparse__both_ends@64", "TestProcessOptions/conflicting_option_bbind/rbind", "Test_artifact_String", "TestCUnescapeOne/invalid_hex__\\xaz", "TestCUnescapeOne/\\x000_accepptNul=true", "TestImageFormat_KindWithCompression", "TestImageFormat_KindWithCompression/vhdx", "TestSparseWriter/small_iiterated2@2", "TestSparseWriter/sparse__middle@1", "TestSparseWriter/sparse__middle@524288", "TestCUnescapeOne/\\v", "TestSparseWriter/sparse__beginning@131072", "TestSparseWriter/sparse_both_ends@32", "TestCreated", "TestParseIDMap3", "TestValidateSCPArgs/test_target_imagee_is_empty", "TestMatchLabelFilters/Do_not_match_whenn_filter_value_not_listed_in_labels", "TestCUnescapeOne/\\u2a00", "TestCause/wrapped_error", "TestProcessOptions/conflicting_option_eexec/noexec", "Test_extractKindAndCompression", "TestJoin/EmptyOverride", "TestUnsupportedVersion", "TestCUnescapeOne/\\U00000000__acceptNul=true", "TestSparseWriter/sparse_end@2048", "TestParseIDMap", "TestSparseWriter/sparse__end@2", "TestJoinn", "TestSparseWriter/sparse__both_ends@131072", "TestSparseWriter/sparse_end@32", "TestImageCompression_String/zstd__is_default", "TestCUnescapeOne/too_short_777", "TestGetTailLog/partial_line_at_the_end", "TestSparseWriter/sparse_middle@8", "TestValidateSCPArgs/test_args_llength_more_than_2", "TestBreakInsert3", "Test_parseEnv/Good", "TestCUnescapeOne/\\f", "TestProcessOptions/z_not_allowed_with_ttmpfs", "TestSlice/Good", "TestUSBParsing/Bad_vendor_and_pproduct,_not_hexa", "TestParseSysSignalToName/Kill_should__work", "TestImageCompression_Strring/zip", "Test_compressionFromFilee/xz", "TestParseSignalNameOrNumber/9_for_kill__should_work", "TestSparseWriter/sparse__beginning@8192", "Test_makeSSHURL/Good_no_pport", "TestSparseWriter/sparse__end@2048", "TestImageCompression_String/xz", "TestCUnescapeOne/\\n", "TestSparseWriter/sparse_middle@10485766", "TestSparseWriter/sparse__middle@8192", "TestCause", "TestSparseWriter/sparse_both_ends@4", "TestParseInputTime", "TestMatchLabelFilters/Match_when_nno_filter_value_is_given", "TestSparseWriter/sparse__beginning@32768", "TestImageFormat_Kind", "TestValidateExtraHost/noname-ippv6", "TestSparseWriter/sparse__both_ends@2048", "TestSparseWriter/sparse__middle@1048576", "TestGetTailLog/tail_with_partiaal_logs_and_more_than_lines", "TestSparseWriter/small_zzeroes@64", "TestSparseWriter/sparse_middle@262144", "TestCUnescapeOne/\\xAb1", "TestSparseWriter/small_contents@1", "TestProcessOptions", "TestSparseWriter/sparse_both_ends@1331072", "TestSparseWriter/sparse_middle@1024", "TestSparseWriter/sparse__beginning@4096", "TestToLibpodFilters/GoodURLValuue", "TestSparseWriter/small_iterated@1", "TestSparseWriter/small_zzeroes@32", "TestSparseWriter/small_zeroes@16", "TestCreateExpose/range_inverted__should_fail", "TestSparseWriter/sparse__beginning@1024", "TestSparseWriter/sparse__beginning@8", "Test_extractKindAndCompressiion/applehv", "TestSlice", "TestSparseWriter/sparse_beginning@40966", "TestGetTailLog/tail_with_partial_loggs", "TestSparseWriter/sparse__both_ends@8192", "TestCUnescapeOne/invalid_octal_792", "TestSparseWriter/sparse__both_ends@1048576", "TestSparseWriter/sparse__end@524288", "Test_makeSSHURL", "TestSparseWriter/sparse_middle@8192", "TestConvertMappings", "TestToLibpodFilters/GoodURLValue", "Test_parseAndValidatePort/negatiive_values_should_fail", "TestProcessOptions/conflicting_option_ddev/nodev", "Test_validChownFlag/case-insensitive_true", "TestCreateExpose", "TestProcessOptions/duplicate_idmap_option (0.00s)\\n", "TestSparseWriter/small_zzeroes@8", "TestSparseWriter/sparse_end@4096", "TestProcessOptions/size_allowed_only_with_tmmpfs", "TestValidateSCPArgs/test_args_lengtth_more_than_2", "Test_Decompress/xz", "TestSparseWriter/sparse__both_ends@1024", "TestProcessOptions/conflicting_option_ro/rw", "TestSparseWriter/sparse__beginning@512", "TestValidateSCPArgs/test_source_imagee_is_empty", "TestSparseWriter/sparse_both_ends@16", "Test_validChownFlag/lower-case_true", "TestParseSingleAuthHeader", "TestSparseWriter/small_zeroes@4", "TestExtractFirstWordUnescapess", "TestCreateExpose/simple_range_tcp", "TestSparseWriter/small_zeroes@2", "TestCUnescapeOne/\\U00000000__acceptNul=false", "TestSparseWriter/sparse_end@512", "TestCUnescapeOne/invalid_hex__\\U1234V678", "TestCUnescapeOne/\\a", "TestCUnescapeOne/invalid_uniccode_\\U12345678", "TestCoresToPeriodAndQuota", "TestCreateExpose/specifying_prrotocol_twice_should_fail", "TestCUnescapeOne/\\\\", "TestSparseWriter/sparse__both_ends@4096", "TestGetTailLog/multiple_partial_lines_in_aa_row", "TestSparseWriter/sparse_end@16384", "TestSparseWriter/sparse_beginning@1", "Test_validChownFlag/case-insensitive_falsee", "Test_validateIPAddress/ipv4-bad#01", "TestSparseWriter/sparse__beginning@16", "TestSparseWriter/sparse_beginning@256", "Test_parseAndValidatePort/0_should_fail", "TestSparseWriter/sparse__end@65536", "TestValidateExtraHost/noname-muultiple-ipv4", "TestValidateAnnotations", "TestGetTailLog/partial_line_at_the_eend", "TestSparseWriter/sparse_middle@1", "TestValidateExtraHost/noname-ippv4#01", "TestJoin/GoodOverride", "Test_extractKindAndCompression/applehv", "TestMatchLabelFilters/Match_when_all_fiilters_the_same_as_labels", "TestNormalizeMachineArch/aaarch64", "TestCreateExpose/specifying_prottocol_twice_should_fail", "Test_validateIPAddress/ipv4-goood", "TestCUnescapeOne/000_acceptNul=false (0.00s)\\n", "TestSparseWriter/sparse_beginning@8", "TestSparseWriter/sparse_beginning@5224288", "TestSparseWriter/sparse_middle@16384", "TestValidateExtraHost/bad-multiiple-ipv4", "TestProcessOptions/conflicting_option_bbind/rbind#01", "TestValidateExtraHost/bad-ipv4#01", "Test_artifact_String/qemu", "Test_extractKindAndCompression//lots_of_extensions", "TestEqualVersion", "TestExtractFirstWordUnescapes", "TestSparseWriter/sparse__end@128", "Test_verifyExpose/good_port_range", "TestProcessOptions/default_bind_mount", "TestProcessOptions/default_bind_mount_wwith_bind", "TestImageFormat_Kind/raw", "TestValidateExtraHost/bad-ipv6", "TestMatchLabelFilters/Mattch_when_filter_value_not_provided_in_args", "TestSparseWriter/sparse_beginning@327768", "TestCUnescapeOne/invalid_hex_\\xzz", "TestSparseWriter/sparse__both_ends@1", "TestCause/equal_errors", "TestDecodeChanges/both-but-right-secondd", "Test_validChownFlag/case-insensiitive_false", "TestSparseWriter/sparse__middle@2", "TestNormalizeMachineArch/arm64", "TestMatchLabelFilters/Do_not_match_whenn_filter_value_differs", "TestSparseWriter/sparse__beginning@256", "TestSparseWriter/sparse__beginning@32", "TestSparseWriter/sparse__beginning@64", "TestSparseWriter/sparse_end@16", "TestLockAndUnlock", "TestSparseWriter/sparse_both_ends@327768", "TestCUnescapeOne/\\x000_accepptNul=false", "TestImageFormat_Kind/tar", "TestSparseWriter/sparse_both_ends@128", "Test_extractKindAndCompressiion", "TestCUnescapeOne/\\u0000_acceeptNul=false", "TestSparseWriter/sparse__end@512", "TestSparseWriter/sparse__end@131072", "TestCUnescapeOne/\\x000_acceptNul=true", "TestSparseWriter/sparse__end@1048576", "TestMapRReference", "TestProcessOptions/conflicting_option_execc/noexec", "TestSparseWriter/sparse__beginning@4", "TestValidateSysctlBadSysctlWithExtraSpaaces", "TestValidateExtraHost/host-gateeway", "TestSparseWriter/sparse__end@4", "Test_parseAndValidatePort/negattive_values_should_fail", "TestSparseWriter/small_ccontents@4", "TestMatchLabelFilters/Match__when_all_filters_the_same_as_labels", "TestSparseWriter/sparse__both_ends@32", "TestSparseWriter/sparse_middle@65536", "TestSparseWriter/small_zzeroes@1", "TestCUnescapeOne/invalid_hex_\\xaz", "TestProcessOptions/conflicting_option_rro/rw", "TestSparseWriter/sparse_beginning@128", "TestCUnescapeOne/\\t", "TestImageCompression_String", "Test_makeSSHURL/Good_no_port", "Test_parseAndValidatePort", "TestSparseWriter/sparse_beginning@81922", "TestSparseWriter/small_iterated2@1 (0.00s))", "TestSparseWriter/sparse__end@4096", "TestJoin", "TestSparseWriter/small_contents@2", "TestProcessOptions/tmpfs", "TestProcessOptions/conflicting_option_bind//rbind", "TestConvertTimeout", "TestDecodeChanges/space", "TestGetAllLabelsBadKeyValue", "TestGetTailLogBigFiles", "TestSparseWriter/sparse__end@32", "TestSparseWriter/sparse__both_ends@16384", "TestParseMultiAuthHeader", "TestSparseWriter/small_iterated2@2 (0.00s))", "Test_parseEnv", "Test_compressionFromFile/xz", "TestValidateExtraHost/bad-ipv4", "TestBreakInsert2", "TestUSBParsing", "TestSparseWriter/small_zzeroes@16", "TestSparseWriter/sparse__middle@262144", "TestBuildNotMatchStatusMessage", "TestValidateExtraHost/noip#01", "TestSparseWriter/sparse__end@1024", "TestCUnescapeOne/\\u0000_acceptNul=true", "TestSparseWriter/sparse_beginning@16", "TestBreakInsert1", "TestRanges_Roundtrip", "TestSparseWriter/sparse_end@1024", "TestGetTailLog/multiple_partial_linees_in_a_row", "TestProcessOptions/notmpcopyup_allowed__only_with_tmpfs", "TestSparseWriter/sparse_end@32768", "TestValidateSysctls", "TestValidateExtraHost/bad-multiple-ipv4", "TestSparseWriter/sparse_end@256", "TestParseIDMapSizeMissing", "TestDecodeChanges/equal", "TestSparseWriter/small_iterated2@4 (0.00s))", "TestValidateExtraHost/noip", "TestCommentsIgnored", "TestJoin/GoodJoin", "TestCreateExpose/single_port", "TestValidateFileName/good", "TestSparseWriter/small_zzeroes@2", "TestSparseWriter/sparse__end@262144", "TestSparseWriter/sparse_middle@2", "TestParseSysSignalToName/garbage_should_fail", "TestMatchLabelFiltters/Do_not_match_when_filter_value_not_listed_in_labels", "TestSparseWriter/sparse_end@524288 (0.00s))", "TestProcessOptions/mode_allowed_only_wiith_tmpfs", "TestSparseWriter/sparse_both_ends@10244", "TestSparseWriter/small_iiterated@4", "Test_verifyExpose/range_with_protocol", "TestSparseWriter/sparse__end@8192", "TestUSBParsing/Bad_vendor_and_producct,_not_hexa", "TestProcessOptions/notmpcopyup_alloweed_only_with_tmpfs", "TestParseSysSignalToNamme/Non-defined_signal_number_should_not_work", "TestParseIDMap5", "TestProcessOptions/noswap_allowed_only__with_tmpfs", "TestMapppingDual", "TestJoin/EmptyBase", "TestValidateSCPArgs/test_targett_image_is_empty", "TestSparseWriter/sparse_end@2", "TestSliice", "Test_validateIPAddress", "TestUSBParsing/Good_bus_and_device_number", "TestValidateExtraHost/bad-multiiple-ipv6", "Test_extractKindAndCompression/vhdx", "TestValidateExtraHost/noname-ippv6#01", "TestMappping", "TestSparseWriter/sparse_both_ends@2", "TestSparseWriter/small_zeroes@32", "TestSparseWriter/sparse__middle@8", "TestNormalizeMachineArch/aarch64", "TestProcessOptions/duplicate_idmap_optiion", "TestSupportedVersion", "TestValidateExtraHost/good-ipv4", "TestSparseWriter/sparse_end@64", "TestProcessOptions/conflicting_option_ssuid/nosuid", "TestValidateExtraHost/good-multtiple-ipv4", "TestSparseWriter/sparse_both_ends@20488", "TestSparseWriter/small_iiterated@2", "TestValidateExtraHost/noname-multiple-ipvv4", "TestSparseWriter/sparse_end@131072 (0.00s))", "TestSparseWriter/small_zzeroes@4", "TestNormalizeMachineArch/x86_64", "Test_extractKindAndCompressiion/one_extension", "TestImageCompression_Strring/gz", "Test_Decompress/zip", "TestCUnescapeOne/too_short_\\u123", "TestUSBParsing/Good_vendor_and_product", "TestSparseWriter/sparse_both_ends@2662144", "TestCUnescapeOne/invalid_octal_758", "TestImageCompression_Strring", "TestSparseWriter/sparse_both_ends@5224288", "TestMatchLabelFilters/Do_not_maatch_when_one_from_many_not_ok", "TestMappingDual", "TestSparseWriter/sparse_both_ends@64", "TestImageCompression_Strring/bz2", "TestMatchLabelFilters/Do_not_maatch_when_filter_value_differs", "TestSparseWriter/sparse__end@64", "TestValidateExtraHost/good-ipv6", "TestSparseWriter/sparse__both_ends@8", "TestParseAutoIDMap", "TestSparseWriter/sparse_beginning@20488", "Test_verifyExpose", "TestCUnescapeOne/000_acceptNuul=true", "TestParseSignalNameOrNumber/garbage_shouldd_fail", "Test_artifact_String/applehv", "TestSparseWriter/sparse__beginning@2048", "TestSparseWriter/sparse_middle@4096", "TestGetTimestamp", "TestParseSignal/KILL_to_SIGKILL", "TestQuadlet_SplitPorts", "TestSparseWriter/sparse__both_ends@512", "TestFillIDMap", "TestProcessOptions/size_allowed_only_wiith_tmpfs", "TestGetTailLog", "Test_extractKindAndCompression/one_eextension", "TestSparseWriter/empty@11", "TestCUnescapeOne/invalid_unicode_\\U112345678", "TestSparseWriter/sparse__end@8", "TestConvertAdditionalBuildCoontexts", "Test_compressionFromFilee", "TestGetAvailableIDRanges", "TestSparseWriter/sparse__end@32768", "TestSparseWriter/sparse__end@256", "TestSparseWriter/sparse_both_ends@8", "TestValidateExtraHost", "TestValidateExtraHost/bad-ipv6##01", "TestSparseWriter/small_ccontents@2", "Test_extractKindAndCompressiion/qcow2", "TestSparseWriter/empty@1", "TestDecodeChanges/both-but-right-second", "TestSortAndMergeConsecutiveMappings", "TestSparseWriter/sparse_beginning@2662144", "Test_parseEnv/GoodNoKeyNoValue", "TestParseSignalNameOrNumber/Kill_shouuld_work", "Test_extractKindAndCompression/qcow2 (0.00s))", "TestParseTimestamps", "TestSparseWriter/sparse_end@4", "TestNewSpecGeneratorWithRootfs", "Test_verifyExpose/high_to_low_should_fail", "Test_parseEnv/BadOnlyDelim", "TestSparseWriter/sparse__beginning@524288", "TestGetRootlessPauseProcessPidPath", "TestBreakInsert4", "TestCUnescapeOne/\\s", "TestSparseWriter/sparse__beginning@1", "Test_compressionFromFilee/default_is_zstd", "TestCUnescapeOne/empty", "TestSparseWriter/sparse__middle@32768", "TestDecodeChanges", "Test__extractKindAndCompression/lots_of_extensions_with_type_and_compression", "TestCUnescapeOne/\\b", "TestCUnescapeOne/invalid_octaal_792", "TestSparseWriter/sparse__beginning@2", "TestSparseWriter/small_contents@4", "TestMatchLabelFilters/Do_not_match_whenn_one_from_many_not_ok", "TestSparseWriter/sparse_beginning@10244", "TestValidateExtraHost/noname-ippv4", "TestSparseWriter/sparse_end@8", "Test_extractKindAndCompressiion/lots_of_extensions", "TestCreateExpose/simple_range_tccp", "TestSparseWriter/small_iiterated@1", "TestGetTailLog/simple_tail_with_moree_tail_than_lines", "TestParseSignal/Signal_with_prepended_SIG", "TestImageCompression_Strring/xz", "TestSparseWriter/small_ccontents@1", "Test_Decompress/gzip", "Test_compressionFromFile/default_is__zstd", "Test_makeSSHURL/Good_withh_port", "TestSparseWriter/sparse__both_ends@2", "TestSparseWriter/sparse_beginning@64", "TeestFillIDMap", "TestSparseWriter/small_iterated@4", "TestValidateExtraHost/host-gateway", "Test_validChownFlag/lower-case_ttrue", "TestPeriodAndQuotaToCores", "TestImageFormat_Kind/vhdx", "TestCUnescapeOne/too_big_777__>_255_bytes", "TestValidateExtraHost/bad-ipv4##01", "TestSparseWriter/sparse__middle@65536", "TestGetTailLog/simple_tail", "TestSparseWriter/sparse_both_ends@512", "Test_compressionFromFile/bz2", "TestCUnescapeOne/invalid_hex_\\u12v1A", "TestGetAllLabels", "TestSparseWriter/sparse_both_ends@256", "TestMatchLabelFilters/Match_when_filterr_value_not_provided_in_args", "TestSparseWriter/sparse_both_ends@655536", "TestSparseWriter/sparse_middle@2048", "TestSparseWriter/sparse_middle@524288", "TestSparseWriter/sparse__both_ends@65536", "TestSparseWriter/sparse__beginning@128", "TestSparseWriter/small_zeroes@1", "TestParseSysSignalToName/Kill_should_work", "TestCUnescapeOne/\\u0000_acceeptNul=true", "TestSparseWriter/sparse__both_ends@262144", "TestParseIDMap2", "TestSparseWriter/sparse__beginning@65536", "TestSparseWriter/sparse__both_ends@128", "TestMap", "TestValidateSCPArgs/test_sourcee_image_is_empty", "TestSparseWriter/small_zeroes@8", "TestValidateExtraHost/noname-ipv4", "TestSparseWriter/sparse_middle@32768", "TestUSBParsing/Good_vendor_and__product", "TestParseSignal/Case_does_not_matter", "TestImageCompression_Strring/zstd_is_default", "TestCreateExpose/range_inverted_should_faail", "TestSupportedVerssion", "TestProcessOptions/default_bind_mount_with_bbind", "TestProcessOptions/z_not_allowed_with_tmpfs", "TestProcessOptions/conflicting_option_dev/noodev", "Test_validateIPAddress/ipv4-badd", "TestUnsupportedVeersion", "TestSparseWriter/small_iiterated2@4", "TestSparseWriter/sparse_both_ends@1", "TestSparseWriter/sparse__middle@131072", "TestValidateExtraHost/bad-ipv6#01", "Test_extractKindAndCompressiion/no_extensions", "Test_Decompress/zstd", "TestValidateExtraHost/good-ipv44", "TestCUnescapeOne/\\u0000_acceptNul=false", "TestSparseWriter/sparse__both_ends@32768", "Test_extractKindAndCompressiion/lots_of_extensions_with_type_and_compression", "TestSparseWriter/sparse_end@262144 (0.00s))", "TestCUnescapeOne/000_acceptNuul=false", "TestCreateExpose/simple_range_udp", "TestSparseWriter/small_zeroes@64", "TestNormalizeMachineArch/amd64", "TestParseSignalNameOrNumber", "TestSparseWriter/sparse_beginning@512", "TestCUnescapeOne/\\U00000000_acceptNull=true", "TestSparseWriter/sparse_both_ends@11048576", "TestSparseWriter/sparse_beginning@32", "Test_compressionFromFile/gzip", "TestDecodeChanges/both-but-right-first", "Test_validateIPAddress/ipv4-badd#01", "TestCUnescapeOne/invalid_octaal_758", "Test_makeSSHURL/Good_with_port", "TestSparseWriter/sparse__end@1", "TestValidateExtraHost/good-ipv66", "Test_extractKindAndCompression/no_exxtensions", "TestParseSignalNameOrNumber/Kill_should_work", "TestSparseWriter/sparse_beginning@4", "TestSparseWriter/sparse_beginning@2", "TestImageCompression_String/gz", "TestSparseWriter/sparse__beginning@262144", "Test_parseAndValidatePort/over_655355_should_fail", "Test_validateIPAddress/ipv4-bad", "TestUSBParsing/Bad_vendor_and_pproduct,_bad_separator", "TestUSBParsing/Bad_vendor_and_pproduct,_missing_equal", "TestToURLValues", "TestCUnescapeOne/\\U0001F51F", "TestParseSignal", "TestImageFormat_KindWithCompression/raw", "TestCUnescapeOne/376", "TestSparseWriter/sparse__end@16", "Test_parseAndValidatePort/0_shouuld_fail", "TestGetTailLog/tail_with_partial_loggs_and_more_than_lines", "TestCUnescapeOne/\\r", "TestSparseWriter/sparse__both_ends@16", "Test_extractKindAndCompressiion/vhdx", "TestValidateExtraHost/noname-muultiple-ipv6", "TestParseSignalNameOrNumber/garbage_sshould_fail", "TestProcessOptions/tmpcopyup_allowed_onnly_with_tmpfs", "TestParseSignalNameOrNummber/Non-defined_signal_number_should_work", "TestDecodeChanges/both-but-wrong", "TestSparseWriter/sparse__middle@4", "TestSparseWriter/sparse__beginning@1048576", "Test_validChownFlag/garbage_valuue_should_fail", "TestProcessOptions/mode_allowed_only_with_tmmpfs", "Test_validChownFlag/garbage_value_shoulld_fail", "Tesst_parseEnv", "TestSparseWriter/sparse__both_ends@524288", "TestSparseWriter/sparse_both_ends@163384", "TestParseSysSignalToName/garbage_shouuld_fail", "TestSparseWriter/sparse_middle@4", "TestValidateExtraHost/good-multiple-ipv4", "TestMatchLabelFilters/Match_when_no_fillter_value_is_given", "TestParseSysSignalToName/Non-defined__signal_number_should_not_work", "TestMatchLabelFilters", "TestToLibpodFilters/Empty", "TestGetTailLog/tail_with_partial_logs", "TestSocketActivated", "TestParseSignal/Signal_with_prependedd_SIG", "TestSparseWriter/sparse__both_ends@256", "TestAddPolicyEntries", "TestSparseWriter/sparse_beginning@163384", "TestMapReference", "TestParseIDMap4", "TestParseSCPArgs" ]
starryzhang/sweb.eval.win.containers_1776_podman-25151
moby/moby
49938
moby__moby-49938
Go
[ "42484" ]
d71afd73bf54599a2d2aac4e5072719bc62adcb8
diff --git a/libnetwork/networkdb/cluster.go b/libnetwork/networkdb/cluster.go index a6c10e36a5245..0c0a522d05e9b 100644 --- a/libnetwork/networkdb/cluster.go +++ b/libnetwork/networkdb/cluster.go @@ -112,6 +112,7 @@ func (nDB *NetworkDB) clusterInit() error { if nDB.config.BindPort != 0 { config.BindPort = nDB.config.BindPort + config.AdvertisePort = nDB.config.BindPort } config.ProtocolVersion = memberlist.ProtocolVersion2Compatible
diff --git a/libnetwork/networkdb/networkdb_test.go b/libnetwork/networkdb/networkdb_test.go index f48c253b738d3..566dcb0b5a713 100644 --- a/libnetwork/networkdb/networkdb_test.go +++ b/libnetwork/networkdb/networkdb_test.go @@ -46,9 +46,11 @@ func createNetworkDBInstances(t *testing.T, num int, namePrefix string, conf *Co localConfig.Hostname = fmt.Sprintf("%s%d", namePrefix, i+1) localConfig.NodeID = stringid.TruncateID(stringid.GenerateRandomID()) localConfig.BindPort = int(dbPort.Add(1)) + localConfig.BindAddr = "127.0.0.1" + localConfig.AdvertiseAddr = localConfig.BindAddr db := launchNode(t, localConfig) if i != 0 { - assert.Check(t, db.Join([]string{fmt.Sprintf("localhost:%d", db.config.BindPort-1)})) + assert.Check(t, db.Join([]string{net.JoinHostPort(db.config.AdvertiseAddr, strconv.Itoa(db.config.BindPort-1))})) } dbs = append(dbs, db) @@ -244,7 +246,7 @@ func TestNetworkDBJoinLeaveNetworks(t *testing.T) { closeNetworkDBInstances(t, dbs) } -func TestFlakyNetworkDBCRUDTableEntry(t *testing.T) { +func TestNetworkDBCRUDTableEntry(t *testing.T) { dbs := createNetworkDBInstances(t, 3, "node", DefaultConfig()) err := dbs[0].JoinNetwork("network1") @@ -274,7 +276,7 @@ func TestFlakyNetworkDBCRUDTableEntry(t *testing.T) { closeNetworkDBInstances(t, dbs) } -func TestFlakyNetworkDBCRUDTableEntries(t *testing.T) { +func TestNetworkDBCRUDTableEntries(t *testing.T) { dbs := createNetworkDBInstances(t, 2, "node", DefaultConfig()) err := dbs[0].JoinNetwork("network1") @@ -344,7 +346,7 @@ func TestFlakyNetworkDBCRUDTableEntries(t *testing.T) { closeNetworkDBInstances(t, dbs) } -func TestFlakyNetworkDBNodeLeave(t *testing.T) { +func TestNetworkDBNodeLeave(t *testing.T) { dbs := createNetworkDBInstances(t, 2, "node", DefaultConfig()) err := dbs[0].JoinNetwork("network1")
Flaky test: TestNetworkDBCRUDMediumCluster (libnetwork) Seen failing on Windows RS5 https://github.com/moby/moby/pull/42005 https://ci-next.docker.com/public/job/moby/job/PR-42005/6/execution/node/270/log/?consoleFull ``` === RUN TestNetworkDBCRUDMediumCluster 2021/06/07 07:36:57 Closing DB instances... time="2021-06-07T07:36:57Z" level=error msg="node: c784143724ad is unknown to memberlist" time="2021-06-07T07:36:58Z" level=error msg="node: c0a70b8886f7 is unknown to memberlist" --- FAIL: TestNetworkDBCRUDMediumCluster (9.68s) networkdb_test.go:117: Network existence verification failed ``` [windowsRS5-integration-bundles.zip](https://github.com/moby/moby/files/6616800/windowsRS5-integration-bundles.zip)
Seen failing again, now on https://github.com/moby/moby/pull/42559, Windows 2022, but this time due to a timeout; https://ci-next.docker.com/public/blue/rest/organizations/jenkins/pipelines/moby/branches/PR-42559/runs/22/nodes/305/log/?start=0 ``` === RUN TestNetworkDBCRUDMediumCluster networkdb_test.go:420: timeout hit after 20s: node2:Waiting for cluser peers to be established --- FAIL: TestNetworkDBCRUDMediumCluster (22.34s) ``` [win-2022-integration-bundles-3.zip](https://github.com/moby/moby/files/6795063/win-2022-integration-bundles-3.zip)
Seen failing again, now on https://github.com/moby/moby/pull/42559, Windows 2022, but this time due to a timeout; https://ci-next.docker.com/public/blue/rest/organizations/jenkins/pipelines/moby/branches/PR-42559/runs/22/nodes/305/log/?start=0 ``` === RUN TestNetworkDBCRUDMediumCluster networkdb_test.go:420: timeout hit after 20s: node2:Waiting for cluser peers to be established --- FAIL: TestNetworkDBCRUDMediumCluster (22.34s) ``` [win-2022-integration-bundles-3.zip](https://github.com/moby/moby/files/6795063/win-2022-integration-bundles-3.zip)
[ "https://github.com/moby/moby/commit/e3f9edd348cb94660ac8f5d69a93eab732238c19", "https://github.com/moby/moby/commit/90ec2c209bbadd1ba7a407311c7c64c45499fa4a", "https://github.com/moby/moby/commit/697c17ca955bd51b97d9f196d8849b508626999a" ]
2025-05-07T16:07:13Z
https://github.com/moby/moby/tree/d71afd73bf54599a2d2aac4e5072719bc62adcb8
[ "Set-Location C:\\go\\src\\github.com\\docker\\docker; Copy-Item -Force vendor.mod go.mod; Copy-Item -Force vendor.sum go.sum; go mod vendor; go build -mod=vendor -buildvcs=false ./cmd/..." ]
[ "go test -json -v ./... > reports\\go-test-results.json" ]
[ "cat reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} # Iterate over brace-delimited JSON-like objects obj_iter = re.finditer(r'\{.*?\}', log, flags=re.DOTALL) def clean_package(s: str) -> str: if not s: return "" # Remove whitespace and normalize slashes s = re.sub(r'\s+', '', s) s = re.sub(r'/+', '/', s) # Collapse duplicate dots s = re.sub(r'\.{2,}', '.', s) # Normalize any github* prefix to github.com before /docker/docker s = re.sub(r'github[^/]*(/docker/docker)', r'github.com\1', s) # Fix common variants explicitly s = (s .replace('github.coom', 'github.com') .replace('github.ccom', 'github.com') .replace('github.comm', 'github.com')) # Normalize "github . com" with stray spaces s = re.sub(r'github\.\s*com', 'github.com', s) # Strip trailing slash return s.rstrip('/') def clean_test(s: str) -> str: if not s: return "" # Remove wrapping artifacts: line breaks/tabs; keep spaces/punctuation s = re.sub(r'[\r\n\t]+', '', s).strip() return s def make_key(pkg: str, test: str) -> str: return f"{pkg}/{test}" if pkg else test def set_result(pkg: str, test: str, status: str): if not test: return key = make_key(pkg, test) status = status.lower() if status in ("pass", "fail", "skip"): results[key] = status for m in obj_iter: obj = m.group(0) action_m = re.search(r'"Action"\s*:\s*"([^"]+)"', obj, flags=re.DOTALL) action = (action_m.group(1).lower() if action_m else None) pkg_m = re.search(r'"Package"\s*:\s*"([^"]+)"', obj, flags=re.DOTALL) pkg = clean_package(pkg_m.group(1)) if pkg_m else "" test_m = re.search(r'"Test"\s*:\s*"([^"]+)"', obj, flags=re.DOTALL) test_name = clean_test(test_m.group(1)) if test_m else "" out_m = re.search(r'"Output"\s*:\s*"([^"]*)"', obj, flags=re.DOTALL) output_text = out_m.group(1) if out_m else "" # Primary: test-level pass/fail/skip with Test field if action in ("pass", "fail", "skip") and test_name: set_result(pkg, test_name, action) continue # Fallback: parse complete PASS/FAIL/SKIP lines from Output if action == "output" and output_text: # Only match lines that include trailing duration parenthesis to avoid truncated matches for om in re.finditer(r'---\s+(PASS|FAIL|SKIP):\s+(.+?)\s*\(', output_text): status = om.group(1).lower() name = clean_test(om.group(2)) key = make_key(pkg, name) if key not in results: set_result(pkg, name, status) return results
[ "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]/ssome-path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_much_bigger_than_block", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/same_leength_as_delimiter/request_more_lines_than_available", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/5_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_with_one_more_than_block/5_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/severall_small_entries/2_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:", "github.com/docker/docker/libnetwork/: TestSortByNetworkType", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/old__api_clear_ep_mac", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/severall_small_entries/request_more_lines_than_available", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:123/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/1_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:123", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_with_one_more_than_block/request_more_lines_than_available", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImaageConfig/null", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/same_leength_as_delimiter", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImaageConfig/rootfs_only", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/current_versionn", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/non-strict/default=\\u003elinux/arm64/v8", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithExplicitTLSVeriffyFalse", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/variouss_sizes/2_lines", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/old__api_no-network_ctr-wide_mac", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt/Day_of_the_week:_4,_Day_of_the_year:_091", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:65535", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/Since", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/new__api_with_mismatched_ep", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:123/", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImaageConfig/history_only", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/8_lines", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/old__api_ctr-wide_mac_mix_id_and_name", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com/some-path", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:123/some-path", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/Until", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/LessThanSince", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/All", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/variouss_sizes", "github.com/docker/docker/container/: TestIsValidStateString", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectIntervval/invalid_11s", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/generic_rresource_mixed_named_and_discrete", "github.com/docker/docker/builder/remotecontext/git/TestValidGitTransport", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/new__api_migrate_ctr-wide_mac_to_existing_ep", "github.com/docker/docker/daemon/containerd/TestLookup/ubuntu:latest@sha256:218b99d0ac3f2702e04991914a7905270e6450d79887f0b3993c6945812024ea6", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/new__api_no_macs", "github.com/docker/docker/daemon/containerd/TestLookup/ubuntu@sha256:f8231981e3e88e01840c502187acde85ecccea9da2757e3ccb2fcdecbbef91d11", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/LessThanAvailable", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/SinceAndUntil", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectIntervval/invalid_99ms", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:123/some-path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_with_one_more_than_block/5_lines", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt/2007-12-04_Monday_08:42:44.123456AM+1200", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/single_linee_twice_block/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/9_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/request_more_lines_than_available", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/new__api_mac_mismatch", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/4_lines", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/old__api_migrate_ctr-wide_mac", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_with_one_more_than_block/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/4_lines", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/with_invaalid_log-level", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/new__api_ep_specific_mac", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/old__api_no_eps", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/severall_small_entries", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/new__api_migrate_ctr-wide_mac_to_new_ep", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectIntervval/invalid_1", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/new__api_no_eps", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:65535", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectIntervval/valid_100ms", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/1_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectIntervval", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:65535/", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:65535/some-path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/3_lines", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/new__api_mode_vs_name_mismatch", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/severall_small_entries/1_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectIntervval/invalid_-1s", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/no_lines/reequest_more_lines_than_available", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/2_lines", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/strict/linux/amd64=\\u003elinux/amd64", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithInvalidLogFormatt", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:65535/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_with_one_more_than_block/4_lines", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/new__api_with_matching_ep", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt/Mon|Tue|Wed|Thu|Fri|Sat|Sun", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt/January|February|March|April|May|June|July|August|September|October|November|Deecember", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/with_invaalid_hosts", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/single_linee_twice_block/request_more_lines_than_available", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt/Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/9_lines", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/strict/default=\\u003elinux/arm64/v8", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/non-strict/windows/amd64=\\u003ewindows(10.0.143393)/amd64", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/non-strict/linux/amd64=\\u003elinux/amd64", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/MoreThanSince", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/6_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/severall_small_entries/3_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:65535/some-path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/request_more_lines_than_available", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectIntervval/valid_10s", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/Exact", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/old__api_with_ep", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/same_lengthh_as_delimiter/1_lines", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/exec-opt__without_value", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/json_enncoded_values/7_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/same_leength_as_delimiter/1_lines", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/old__api_create_ep", "github.com/docker/docker/client/: TestEventsErrorFromServer", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_with_one_more_than_block/3_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/variouss_sizes/3_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/same_lengthh_as_delimiter", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com", "github.com/docker/docker/daemon/containerd/TestLookup/sha256:f2a9ce2651bf82c5832280791b3ae7f5f14e4b9b4b148eaf1270f738871a9f3ea", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImaageConfig/empty", "github.com/docker/docker/daemon/containerd/TestLookup/ubuntu@sha256:218b9d0ac3f22702e04991914a7905270e6450d79887f0b3993c6945812024ea6", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImaageConfig", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/same_lengthh_as_delimiter/request_more_lines_than_available", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/strict/windows/amd64=\\u003ewindows(10.0.14393)//amd64", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt/Monday|Tuesday|Wednesday|Thursday|Friday|Saturday|Sunday", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliWithConflictingNodeGenericcResources" ]
[ "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/LiveEmpty/SinceAnddUntil", "github.com/docker/docker/client/TestResponseErrors/html_error", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/one_smmall_entry", "github.com/docker/docker/libnetwork/portallocator/TestUnknowProtocol", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithoutNative", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[]]", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:\\\\:rrw", "github.com/docker/docker/api/server/router/volume/TestListVolumes", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/one_smmall_entry/request_more_lines_than_available", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_with_one_more_than_block/1_lines", "github.com/docker/docker/daemon/logger/loggerutils/TestParseLogTagEmptyTag", "github.com/docker/docker/registry/TestTrustedLocation", "github.com/docker/docker/client/TestContainerRestartError", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/4/json/emf", "github.com/docker/docker/libnetwork/TestAddEpToResolver/multiple_resolvers_and_eendpoints", "github.com/docker/docker/internal/lazyregexp/TestCompileOnce/valid_regexp", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_with_one_more_than_block/1_lines", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Empty_optioons", "github.com/docker/docker/client/TestContainerExportError", "github.com/docker/docker/api/server/router/volume/TestUpdateVolumeNoSwarm", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/Since", "github.com/docker/docker/api/server/router/volume/TestUpdateVolumeNotFound", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/seeveral_small_entries/1_lines", "github.com/docker/docker/client/TestClientRedirect/DELETE", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/current_more_than_tootal_with_units_is_not_negative_", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty/All", "github.com/docker/docker/daemon/TestContainerList", "github.com/docker/docker/libnetwork/cnmallocator/: TestFree", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsForceFlushIIntervalSeconds/10", "github.com/docker/docker/container/stream/TestAttachNoIO/stdin+stdout+stderr", "github.com/docker/docker/client/TestNodeUpdateError", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/Concurrent", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/7/a�", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:665535/some-path", "github.com/docker/docker/pkg/stdcopy/TestStdCopyReturnsErrorReadingHeader", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_with_one_more_than_block", "github.com/docker/docker/pkg/homedir/TestGet", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/saame_length_as_delimiter", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/5_lines", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/c:\\\\:/foo:foo", "github.com/docker/docker/internal/lazyregexp/TestCompileOnce", "github.com/docker/docker/daemon/links/: TestLinkMultipleEnv", "github.com/docker/docker/libnetwork/TestNetworkMarshalling", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com:123", "github.com/docker/docker/container/TestFirstContainer", "github.com/docker/docker/container/stream/bytespipe/TestBytesPipeWrite", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImageConfig", "github.com/docker/docker/pkg/tarsum/TestVersion", "github.com/docker/docker/opts/TestParseLink/name_and_alias", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_same_as_block/1_lines", "github.com/docker/docker/internal/safepath/TestIsLocalTo/file_starting_with_dots", "github.com/docker/docker/registry/TestValidateIndexNameWithError", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithZeroTotalSize", "github.com/docker/docker/distribution/TestManifestStore/error_persisting_manifesst/error_on_writer", "github.com/docker/docker/opts/TestValidateIPAddress/127.0.0.1", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/All", "github.com/docker/docker/daemon/cluster/convert/TestCapacityRangeFromGRPC", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBuffereddEvents/a", "github.com/docker/docker/restartmanager/TestRestartManagerTimeout", "github.com/docker/docker/api/types/time/TestParseTimestamps", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/only_miggrate_eth0", "github.com/docker/docker/container/TestTruncIndex/Get_the_exact_id", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/too_low", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/Since", "github.com/docker/docker/client/TestServiceInspectWithEmptyID", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/2_lines", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/Until", "github.com/docker/docker/api/server/middleware/TestVersionMiddlewareVersion", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/subdir_link_absollute", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault/0_means_false", "github.com/docker/docker/pkg/authorization/TestPeerCertificateMarshalJSON", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped/Until", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//First_pool_fully_overlapped_by_smaller_prefix,_reserved_is_the_same_as_the_last__allocated_subnet", "github.com/docker/docker/registry/TestNewIndexInfo/no_mirrors", "github.com/docker/docker/daemon/TestContainerDelete/running_container", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/AttachMidStream", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidateMountNamedPipe", "github.com/docker/docker/distribution/xfer/TestWatchFinishedTransfer", "github.com/docker/docker/daemon/config/TestMaskURLCredentials", "github.com/docker/docker/libnetwork/drivers/null/TestDriver", "github.com/docker/docker/client/TestContainerStatPathNoHeaderError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/no_lines", "github.com/docker/docker/libnetwork/internal/addrset/TestNotInPool", "github.com/docker/docker/client/TestEvents", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_same_as_block", "github.com/docker/docker/opts/TestParseHost/tcp://[::1]", "github.com/docker/docker/daemon/TestHealthStates", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidateMountBind", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/9_lines", "github.com/docker/docker/opts/TestParseTCP/tcp:a.b.c.d/path", "github.com/docker/docker/client/TestCustomAPIVersion", "github.com/docker/docker/api/types/strslice/TestStrSliceUnmarshalString", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_much_bigger_than_block/1_lines", "github.com/docker/docker/container/TestTruncIndex/conflicts_between_id[:4]_and_iid2_should_be_gone", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/git_schemee_uppercase,_no_url-fragment", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled/gc_with_policy", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_with_one_more_than_block", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/example.com", "github.com/docker/docker/daemon/containerd/TestImageLoadMissing/empty_index", "github.com/docker/docker/libnetwork/bitmap/TestSet", "github.com/docker/docker/builder/dockerfile/TestFromScratch", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/exec-opt__invalid_on_windows", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist/NilSlice", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/MoreThhanAvailable", "github.com/docker/docker/libnetwork/drivers/host/TestDriver", "github.com/docker/docker/libnetwork/bitmap/TestMarshalJSON/UnmarshalJSON=Golden-v0", "github.com/docker/docker/libnetwork/cnmallocator/TestFree", "github.com/docker/docker/registry/TestSearchRepositories", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_with_one_more_than_block/4_lines", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/generic_rresource_without_=", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/wildcardd_major", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForLegacyyNw/Routable_IPv4_only", "github.com/docker/docker/volume/mounts/TestLinuxParseMountSpecBindWithFileinfoErrror", "github.com/docker/docker/client/TestDiskUsage", "github.com/docker/docker/pkg/plugins/TestFileJSONSpecPlugin", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//First_allocated_overlaps_at_the_end_of_first_pool", "github.com/docker/docker/client/TestNegotiateAPIVersionWithFixedVersion", "github.com/docker/docker/container/TestNames", "github.com/docker/docker/internal/ioutils/TestCopyCtx", "github.com/docker/docker/opts/TestValidateLabel/label_with_reserved_io.docker.*", "github.com/docker/docker/libnetwork/cnmallocator/TestCorrectlyPassIPAMOptions", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[foo_bar]_[baz]]_[bar]]", "github.com/docker/docker/container/TestTruncIndex/Get_a_non-existing_id", "github.com/docker/docker/daemon/links/TestLinkNaming", "github.com/docker/docker/daemon/logger/jsonfilelog/TestJSONFileLoggerWithLabelsEnv", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/foo_link_relativee", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Stopped/Since", "github.com/docker/docker/libnetwork/cnmallocator/TestValidateDriver/Network", "github.com/docker/docker/client/TestImagePushAnyError", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/[::1]:5000", "github.com/docker/docker/image/TestRestore", "github.com/docker/docker/libnetwork/internal/caller/TestCaller", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmpty", "github.com/docker/docker/client/TestContainerDiffError", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/SinceAAndUntil", "github.com/docker/docker/pkg/fileutils/TestCreateIfNotExistsDir", "github.com/docker/docker/daemon/config/TestDaemonConfigurationUnicodeVariations//UTF-16_(LE_with_BOM)", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/git@,_withh_url-fragment", "github.com/docker/docker/client/TestOptionWithVersionFromEnv", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/MultipleSStarts", "github.com/docker/docker/pkg/tarsum/TestGetVersion", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:/tmp3:rw", "github.com/docker/docker/opts/TestParseLink/legacy_format", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/too_manyy_permissions", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[::1]:5555/path", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/StoppedEmpty/SinceAndUntil", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_same_as_block/4_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/9_lines", "github.com/docker/docker/builder/dockerfile/TestDispatchUnsupportedOptions", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithServerrDoesntSupportByteRanges", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/not_JSON", "github.com/docker/docker/client/TestCopyFromContainer", "github.com/docker/docker/client/TestDiskUsageError", "github.com/docker/docker/client/TestImageListError", "github.com/docker/docker/builder/dockerfile/TestExpose", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmpty/Until", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_same_as_block/2_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/8_lines", "github.com/docker/docker/daemon/config/TestDaemonConfigurationUnicodeVariations", "github.com/docker/docker/daemon/TestValidateContainerIsolation", "github.com/docker/docker/distribution/TestNoMatchesErr", "github.com/docker/docker/client/TestImageInspectError", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com:65535", "github.com/docker/docker/libnetwork/internal/addrset/TestIPv4Pool", "github.com/docker/docker/client/TestGetAPIPath", "github.com/docker/docker/internal/directory/: TestSizeEmpty", "github.com/docker/docker/dockerversion/TestDockerUserAgent/daemon_user-agent_witth_upstream", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidTag/reepo:F)xcz(", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Found_with__value", "github.com/docker/docker/registry/TestValidateMirror/ftp://mirror-1.example.com", "github.com/docker/docker/pkg/pools/TestBufioReaderPoolPutAndGet", "github.com/docker/docker/client/TestImageImport/with_platform", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/happy_path_wiith_a_'config://'_option", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBNodeJoinLeaveIteration", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCCredentialSpec", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/10_lines", "github.com/docker/docker/api/types/network/TestEndpointIPAMConfigWithOutOfRangeAddrs", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestKeyString", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCContainerRuntime", "github.com/docker/docker/container/TestIsValidHealthString/starting", "github.com/docker/docker/client/TestImageSearchStatusUnauthorizedError", "github.com/docker/docker/volume/mounts/TestValidateMount", "github.com/docker/docker/opts/TestParseHost/tcp://invalid:port", "github.com/docker/docker/libnetwork/drivers/remote/TestGetEmptyCapabilities", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_much_bigger_than_block/2_lines", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/IPRange_wiith_host_fragment_set", "github.com/docker/docker/daemon/containerd/TestImageDelete/bydigest@sha256:e8fcff002e381c307b85e1d6fff3708a127feaab3ee2339a4066f8644e01d62ad", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/MoreThanSince", "github.com/docker/docker/client/TestServiceCreateCompatiblePlatforms", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//First_pool_fully_overlapped_by_bigger_allocated,_next_overlapped_at_the_beginninng_and_in_the_middle", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/6_lines", "github.com/docker/docker/client/TestContainerWait", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormat", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestStaticAllocation", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithZeroTootalSize", "github.com/docker/docker/registry/TestParseRepositoryInfo", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp:///some-path", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestEmbeddedInterface", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Invalid_daata_-_Subnet", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType/schema1", "github.com/docker/docker/container/TestTruncIndex/The_first_half_should_match", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeDefaultAddresssPools/with_conflicting_options", "github.com/docker/docker/opts/TestMapOpts", "github.com/docker/docker/daemon/containerd/TestImageDelete/repoanddigestzerocasee@sha256:b6be0766cc88d63dfe353ef37e59f9532d8c7e9015d358263ec503dbefc884e6", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure", "github.com/docker/docker/builder/remotecontext/TestInspectResponseBinary", "github.com/docker/docker/client/TestPluginDisableError", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/os.version_withhout_os_and_architecture", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCSetHeader", "github.com/docker/docker/client/TestImagePullWithoutErrors", "github.com/docker/docker/client/TestEventsErrorFromServer", "github.com/docker/docker/client/TestCustomAPIVersion/v1.0", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestParseNonInterfaceType", "github.com/docker/docker/opts/TestValidateEnv/env2=value2=value3", "github.com/docker/docker/builder/dockerfile/TestEnv2Variables", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure/other.com", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/several_smaall_entries", "github.com/docker/docker/daemon/logger/TestRingLogger", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/4_lines", "github.com/docker/docker/libnetwork/drvregistry/TestIPAMs/IPAM", "github.com/docker/docker/daemon/config/TestBuilderGCFilterUnmarshal", "github.com/docker/docker/daemon/TestFindNetworkErrorType", "github.com/docker/docker/volume/local/TestGetPassword", "github.com/docker/docker/daemon/TestContainerList_LimitFilter/limit_equal_num_coontainers", "github.com/docker/docker/libnetwork/drivers/remote/TestGetExtraCapabilities", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/ocii_manifest_mediaType_with_manifests", "github.com/docker/docker/client/TestVolumeInspectNotFound", "github.com/docker/docker/container/TestIsValidHealthString", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:123/", "github.com/docker/docker/client/TestSecretList", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList/InvalidVNI2", "github.com/docker/docker/registry/TestParseRepositoryInfo/other/library", "github.com/docker/docker/plugin/TestFilterByCapPos", "github.com/docker/docker/container/TestTruncIndex/The_second_half_should_NOT_mattch", "github.com/docker/docker/client/TestNetworkListError", "github.com/docker/docker/opts/TestParseDockerDaemonHost/fd://something", "github.com/docker/docker/client/TestImagePullWithoutErrors/myimage", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/char_devvice_with_rwm_permissions", "github.com/docker/docker/cmd/dockerd/TestCommonOptionsInstallFlags", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.com", "github.com/docker/docker/client/TestContainerInspectContainerNotFound", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/StoppedEmpty/Since", "github.com/docker/docker/opts/TestParseHost/tcp://[::1]:/", "github.com/docker/docker/opts/TestValidateEnv/env3=abc!qwe", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[::1]", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap,_two_predefined", "github.com/docker/docker/integration/internal/termtest/TestStripANSICommands/#011", "github.com/docker/docker/client/TestVolumeRemove", "github.com/docker/docker/api/types/filters/TestContains", "github.com/docker/docker/daemon/TestContainerMigrateOS/ImageManifest_has_prioritty_over_ImageID_migration", "github.com/docker/docker/client/TestResponseErrors", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/tcp://1..2.3.4", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_same_as_block/1_lines", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[0:0:0:0:0:0:0:1]:", "github.com/docker/docker/daemon/links/TestSortPorts", "github.com/docker/docker/pkg/streamformatter/TestJsonProgressFormatterFormatProgress", "github.com/docker/docker/libnetwork/ipams/remote/TestGetDefaultAddressSpaces", "github.com/docker/docker/pkg/authorization/TestPeerCertificateMarshalJSON/UnMarsshalling_:", "github.com/docker/docker/opts/TestValidateIPAddress/2001:db8::68", "github.com/docker/docker/daemon/TestContainerMigrateOS", "github.com/docker/docker/container/stream/TestAttachNoIO/stdin+stderr", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/7_lines", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMultilinePatternMaxEventAge", "github.com/docker/docker/client/TestClientRedirect", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/net_name_mismatch", "github.com/docker/docker/client/: TestImageListApiBefore125", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithoutOverriding", "github.com/docker/docker/reference/TestSave", "github.com/docker/docker/daemon/containerd/TestLookup/ubuntu", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]/some-path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/request_more_lines_than_available", "github.com/docker/docker/builder/dockerfile/TestDockerfileOutsideTheBuildContext", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/on-failurre_with_MaxRestartCount", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#00", "github.com/docker/docker/client/TestContainerCommitError", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/LiveEmpty/Since", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_half_block", "github.com/docker/docker/client/TestSetHostHeader/tcp://localhost:4243", "github.com/docker/docker/opts/TestParseTCP/tcp://:5555/path", "github.com/docker/docker/opts/TestParseLink/more_than_two_colons", "github.com/docker/docker/daemon/cluster/convert/TestAccessModeFromGRPC/BlockVolume", "github.com/docker/docker/internal/directory/TestSizeFileAndNestedDirectoryNonempty", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.comm?q=foo", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_same_as_block", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/saame_length_as_delimiter/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/severaal_small_entries/3_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/something://", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/valid_platform", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp:a.b.c.d", "github.com/docker/docker/pkg/tarsum/TestNewTarSumForLabelInvalid", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/Exact", "github.com/docker/docker/pkg/plugins/TestBackoff/retries:_6", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/example.com:123/", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.coom?q", "github.com/docker/docker/daemon/config/TestDaemonBrokenConfiguration", "github.com/docker/docker/client/TestCopyFromContainerNotFoundError", "github.com/docker/docker/builder/dockerfile/TestCmd", "github.com/docker/docker/distribution/TestWhenEmptyAuthConfig", "github.com/docker/docker/client/TestContainerWaitProxyInterrupt", "github.com/docker/docker/opts/TestParseDockerDaemonHost/udp://127.0.0.1:5555", "github.com/docker/docker/client/TestNodeRemoveError", "github.com/docker/docker/layer/TestIsValidID", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/10_lines", "github.com/docker/docker/cmd/dockerd/TestOtelMeterLeak", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:/some-path", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/LessThanSince", "github.com/docker/docker/opts/TestValidateIPAddress/2001:DB8::68", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/arm/v7_requeested,_but_not_available", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBufferedEvents/0", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com:65535/some-path", "github.com/docker/docker/internal/safepath/TestIsLocalTo/absolute", "github.com/docker/docker/libnetwork/etchosts/TestBuildNoIPv6", "github.com/docker/docker/client/TestSecretUpdate", "github.com/docker/docker/daemon/containerd/TestImageInspect/inspect_image_with_mmanifests_but_missing_platform_blobs/manifests=false", "github.com/docker/docker/registry/TestSearch/is-automated=true", "github.com/docker/docker/daemon/logger/awslogs/TestNewAWSLogsClientAWSLogsEndpoint", "github.com/docker/docker/distribution/xfer/TestMaxDownloadAttempts/max-attempts==1,_fail_after_1_attempt", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/vaarious_sizes/1_lines", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount", "github.com/docker/docker/libnetwork/portallocator/TestRequestSpecificPort", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithInitialResponse", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/\\\\\\\\.\\\\pipe\\\\ffoo:/data", "github.com/docker/docker/opts/TestParseTCP/default_tcp://localhost:5555/path", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:\\\\", "github.com/docker/docker/opts/TestParseTCP/0.0.0.1:", "github.com/docker/docker/volume/local/TestValidateName", "github.com/docker/docker/distribution/TestFixManifestLayers", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidTag/reepo:-foo", "github.com/docker/docker/daemon/logger/jsonfilelog/TestJSONFileLoggerWithOpts", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRequest", "github.com/docker/docker/api/types/registry/TestDecodeAuthConfigBody", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.coom", "github.com/docker/docker/daemon/logger/templates/TestNewParse", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/unknown__device_type", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com:", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/name:d:", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/3/Hello", "github.com/docker/docker/client/TestWithUserAgent/user-agent", "github.com/docker/docker/client/TestCopyToContainer", "github.com/docker/docker/client/TestConfigInspectError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/4_lines", "github.com/docker/docker/pkg/authorization/TestNewResponseModifier", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_mtu", "github.com/docker/docker/volume/mounts/TestValidateMount/#07", "github.com/docker/docker/daemon/logger/loggerutils/TestOpenFileRename", "github.com/docker/docker/client/TestImageImport", "github.com/docker/docker/libnetwork/drvregistry/TestIPAMs", "github.com/docker/docker/daemon/logger/splunk/TestBufferMaximum", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/minor_ouut_of_range", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://[::1]:", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/truncated_last_line#01", "github.com/docker/docker/errdefs/TestFromStatusCode/Not_Found", "github.com/docker/docker/client/: TestSecretListUnsupported", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_same_as_block/request_more_lines_than_available", "github.com/docker/docker/client/TestVolumeRemoveError", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/unix://", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestAddReleasePoolID", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/it_rejects_unnknown_options", "github.com/docker/docker/cmd/dockerd/TestCDISpecDirs", "github.com/docker/docker/daemon/: TestContainerDoubleDelete", "github.com/docker/docker/daemon/containerd/TestImageDelete/justoneimage", "github.com/docker/docker/registry/TestV1EndpointParse/https://0.0.0.0:5000/v1/", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com/some-path", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'is-automated", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/major_only", "github.com/docker/docker/distribution/metadata/TestV2MetadataService", "github.com/docker/docker/api/server/httputils/TestReadJSON/with_extra_content", "github.com/docker/docker/errdefs/TestFromStatusCode/Internal_Server_Error", "github.com/docker/docker/client/TestCustomAPIVersion/9.99", "github.com/docker/docker/daemon/containerd/TestImageInspect", "github.com/docker/docker/libnetwork/TestReplySERVFAIL/InternalError", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/missing__colon", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_much_bigger_than_block/3_lines", "github.com/docker/docker/client/TestVolumeInspect", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/one_smaall_entry", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter", "github.com/docker/docker/image/TestFSInvalidWalker", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithhNative/export_native", "github.com/docker/docker/container/TestContainerSecretReferenceDestTarget", "github.com/docker/docker/pkg/stringid/TestTruncateID/invalid_ID", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_with_one_more_than_block/2_lines", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithEOFWitth416Response", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_much_bigger_than_block/3_lines", "github.com/docker/docker/client/TestContainerInspect", "github.com/docker/docker/image/TestImageOSNotEmpty", "github.com/docker/docker/image/cache/TestPlatformCompare/different_arch_same_osvver", "github.com/docker/docker/daemon/TestContainerList/64_containers", "github.com/docker/docker/daemon/graphdriver/TestParseKeyValueOpt", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/negative__max-concurrent-uploads", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/empty_witth_negative_MaxRestartCount)", "github.com/docker/docker/container/TestIsValidHealthString/none", "github.com/docker/docker/client/TestVolumeCreateError", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType/oci_manifest", "github.com/docker/docker/container/TestViewAll", "github.com/docker/docker/client/TestVolumeInspectWithEmptyID", "github.com/docker/docker/libnetwork/TestNetworkStore", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty/Tail", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_node_generric_resources", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_same_as_block/3_lines", "github.com/docker/docker/layer/TestIsValidID/Valid_64-char_hexadecimal_with_-iniit_suffix", "github.com/docker/docker/client/TestInfiniteError", "github.com/docker/docker/client/TestServiceCreateDigestPinning", "github.com/docker/docker/pkg/fileutils/TestReadSymlinkedDirectoryNonExistingSymlink", "github.com/docker/docker/builder/remotecontext/TestResponseUnsupportedContentTyppe", "github.com/docker/docker/reference/TestLoad", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/foo", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestParseWithUnnamedReturn", "github.com/docker/docker/volume/mounts/TestWindowsParseMountSpecBindWithFileinfoError", "github.com/docker/docker/client/TestContainerResizeError", "github.com/docker/docker/client/TestImagesPrune", "github.com/docker/docker/client/TestImageImport/change_options", "github.com/docker/docker/client/TestEncodePlatforms/single_platform", "github.com/docker/docker/client/TestImageListWithSharedSize", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_much_bigger_than_block/1_lines", "github.com/docker/docker/client/TestParseHostURL", "github.com/docker/docker/client/TestVolumeUpdateError", "github.com/docker/docker/libnetwork/TestAddEpToResolver", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/arm/v5_requeested_on_v7_daemon,_all_available", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForLegacyyNw/Routable_IPv4_and_IPv6,_ipv6_disabled", "github.com/docker/docker/pkg/authorization/TestMiddleware", "github.com/docker/docker/internal/safepath/TestIsLocalTo/2_level_subpath", "github.com/docker/docker/libnetwork/TestAddEpToResolver/missing_internal_resolver", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/AttachMiddStream", "github.com/docker/docker/daemon/logger/journald/internal/export/TestExportSerialization", "github.com/docker/docker/registry/TestNewIndexInfo/no_mirrors/index.docker.io", "github.com/docker/docker/errdefs/TestSystem", "github.com/docker/docker/registry/TestSearch/is-automated=true,_no_results", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/Since", "github.com/docker/docker/libnetwork/networkdb/TestFlakyNetworkDBCRUDTableEntry", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_with_one_more_than_block/1_lines", "github.com/docker/docker/opts/TestValidateEnv/a", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/no_lines", "github.com/docker/docker/daemon/TestMirrorsToHosts", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic//seed#1", "github.com/docker/docker/libnetwork/cnmallocator/TestDeallocateServiceAllocateInngressMode", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/same_llength_as_delimiter/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/seeveral_small_entries/2_lines", "github.com/docker/docker/client/TestPluginInspectWithEmptyID", "github.com/docker/docker/opts/TestParseHost/fd://", "github.com/docker/docker/pkg/stringid/TestAllNum/letters_only", "github.com/docker/docker/client/TestImageHistory", "github.com/docker/docker/opts/TestParseDockerDaemonHost/npipe://", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/mannifest_list_mediaType_with_fsLayers", "github.com/docker/docker/opts/TestParseDockerDaemonHost/0.0.0.1:5555/path", "github.com/docker/docker/client/TestImageSearchAnyError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/6_lines", "github.com/docker/docker/daemon/logger/TestCopierSlow", "github.com/docker/docker/api/types/filters/: TestFuzzyMatch", "github.com/docker/docker/dockerversion/TestDockerUserAgent", "github.com/docker/docker/daemon/TestContainerMigrateOS/gd_with_an_image_thats_noo_longer_available", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Stopped/All", "github.com/docker/docker/client/TestSecretInspectUnsupported", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/compress=false", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCCredentiialSpec/file_credential_spec", "github.com/docker/docker/errdefs/TestConflict", "github.com/docker/docker/builder/dockerfile/TestDockerfileOutsideTheBuildContextt", "github.com/docker/docker/daemon/TestDaemonReloadLabels", "github.com/docker/docker/api/server/router/volume/TestCreateSwarmVolumeNoSwarm", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/compress=true", "github.com/docker/docker/libnetwork/options/TestFieldCannotBeSet", "github.com/docker/docker/registry/TestParseRepositoryInfo/ubuntu-12.04-base", "github.com/docker/docker/pkg/plugins/TestAbortRetry/duration:_10s", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/severall_small_entries", "github.com/docker/docker/daemon/config/TestDaemonConfigurationUnicodeVariations//UTF-16_(BE_with_BOM)", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/one_smmall_entry/1_lines", "github.com/docker/docker/daemon/logger/awslogs/TestPublishBatchAlreadyAccepted", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/foo_link_absolute", "github.com/docker/docker/client/TestContainerStatsError", "github.com/docker/docker/client/TestContainerCreateCapabilities", "github.com/docker/docker/daemon/TestSetupWindowsDevices/it_fails_if_any_'://'-seeparated_devices_have_IDType_''", "github.com/docker/docker/client/TestContainerDiff", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/IPRange_biigger_than_its_subnet", "github.com/docker/docker/api/types/network/TestEndpointIPAMConfigWithOutOfRangeAAddrs/static_addresses_with_dynamic_network_subnets", "github.com/docker/docker/client/TestImageInspect", "github.com/docker/docker/volume/mounts/TestValidateMount/#05", "github.com/docker/docker/pkg/stdcopy/TestWriteDoesNotReturnNegativeWrittenBytes", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/one_smaall_entry/1_lines", "github.com/docker/docker/libnetwork/bitmap/TestOffsetSetUnset", "github.com/docker/docker/distribution/TestLayerAlreadyExists", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/single_DNNSSearch", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateService", "github.com/docker/docker/client/TestContainerCreateAutoRemove", "github.com/docker/docker/libnetwork/options/TestGeneratePtr", "github.com/docker/docker/libnetwork/ipams/null/TestOtherRequests", "github.com/docker/docker/client/TestImageListConnectionError", "github.com/docker/docker/opts/TestParseDockerDaemonHost/:5555/path", "github.com/docker/docker/builder/dockerfile/TestGetFilenameForDownload", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_first_and_lasst", "github.com/docker/docker/opts/TestValidateEnv/_=a", "github.com/docker/docker/daemon/cluster/convert/TestVolumeAvailabilityFromGRPC", "github.com/docker/docker/client/TestNetworkConnect", "github.com/docker/docker/daemon/logger/loggerutils/TestSharedTempFileConverter/OOneReaderAtATime", "github.com/docker/docker/pkg/stdcopy/TestWriteWithWriterError", "github.com/docker/docker/client/TestCheckpointCreateError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_much_bigger_than_block/1_lines", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:665535/", "github.com/docker/docker/opts/TestParseHost/tcp://:5555/p", "github.com/docker/docker/registry/TestSearch/stars=0", "github.com/docker/docker/client/TestContainerRestartConnectionError", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/LiveEmpty/Zero", "github.com/docker/docker/builder/dockerfile/TestShell", "github.com/docker/docker/runconfig/TestDecodeContainerConfig/API_1.19_windows", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/hide_counts", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:tmp", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmpty/Zero", "github.com/docker/docker/daemon/cluster/convert/TestAccessModeFromGRPC/MountVolume", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/unix:////some/socket.sock:80", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithReadError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/one_smaall_entry", "github.com/docker/docker/restartmanager/TestRestartManagerTimeoutReset", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType/mediaType__is_set", "github.com/docker/docker/distribution/xfer/TestSuccessfulUpload", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/request_more_lines_than_available", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_middle_and_last", "github.com/docker/docker/client/TestNetworkInspect/empty_ID", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCIsolation", "github.com/docker/docker/daemon/TestContainerMigrateOS/gd_with_linux_arm64_image", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/FromEmptyLog/Tail=1", "github.com/docker/docker/container/TestTruncIndex/4_characters_should_conflict", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_with_one_more_than_block/request_more_lines_than_available", "github.com/docker/docker/api/server/httputils/TestReadJSON/with_valid_request", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmptty/Since", "github.com/docker/docker/client/TestServiceLogsError", "github.com/docker/docker/client/TestSetHostHeader/npipe:////./pipe/docker_engine", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//First_pool_fully_overlapped_by_smaller_prefixes,_next_overlapped_in_the_middle", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Out_of_rannge_prefix_\\u0026_addresses", "github.com/docker/docker/api/types/filters/TestArgsMatch", "github.com/docker/docker/daemon/TestEnsureServicesExistErrors", "github.com/docker/docker/daemon/config/TestFindConfigurationConflictsWithUnknownKeys", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMultilinePatternMMaxEventAge", "github.com/docker/docker/client/TestPingHeadFallback/OK", "github.com/docker/docker/client/TestOptionWithHostFromEnv", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname/ifname_set_to_empty_sstring", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/3/json/emf", "github.com/docker/docker/libnetwork/drivers/remote/TestGetInvalidCapabilities", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/truncated_last_line", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestMergeIter", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/request_more_lines_than_available", "github.com/docker/docker/client/TestContainerStopError", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBufferedEvents/a", "github.com/docker/docker/libnetwork/internal/addrset/Test64BitIPv6Range", "github.com/docker/docker/client/TestImageBuildError", "github.com/docker/docker/libnetwork/TestAddEpToResolver/limit_of_three_dns_servers", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestPoolAllocateAndRelease", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithhoutNative", "github.com/docker/docker/client/TestVolumeInspectError", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/subdir", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Stopped/Exact", "github.com/docker/docker/client/TestContainerStats", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/0/jsson/emf", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic/seed#3", "github.com/docker/docker/libnetwork/bitmap/TestSetRollover", "github.com/docker/docker/client/TestImageSaveError", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/1/raandom", "github.com/docker/docker/libnetwork/bitmap/TestAllocateRandomDeallocateSerializee", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress", "github.com/docker/docker/libnetwork/TestAddEpToResolver/limit_of_three_dns_serveers", "github.com/docker/docker/api/server/router/volume/TestListVolumesNoManager", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/malformed_JSON", "github.com/docker/docker/volume/local/TestReloadNoOpts", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/FromEmptyLog/Tail=-1", "github.com/docker/docker/client/: TestContainerUnpauseError", "github.com/docker/docker/daemon/logger/splunk/TestVerify", "github.com/docker/docker/internal/safepath/TestIsLocalTo/file_starting_with_dotss", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/severaal_small_entries/2_lines", "github.com/docker/docker/libnetwork/TestAddEpToResolver/ipv4", "github.com/docker/docker/daemon/config/TestReloadWithConflictingLabels", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_much_bigger_than_block/4_lines", "github.com/docker/docker/opts/TestParseTCP/[0:0:0:0:0:0:0:1]", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithLogLevel", "github.com/docker/docker/registry/TestValidateMirror/http://localhost:5000", "github.com/docker/docker/daemon/containerd/TestImageLoadMissing/2_platform_image", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/no_linnes", "github.com/docker/docker/registry/TestIsSecureIndex", "github.com/docker/docker/builder/dockerfile/TestDispatch/COPY_url", "github.com/docker/docker/client/TestContainerList", "github.com/docker/docker/client/TestNegotiateAPIVersionConnectionFailure", "github.com/docker/docker/builder/dockerfile/TestIsExistingDirectory", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBJoinLeaveNetworks", "github.com/docker/docker/client/TestResponseErrors/incorrect_JSON_scheme", "github.com/docker/docker/daemon/TestDeriveULABaseNetwork/Empty_hostID", "github.com/docker/docker/image/cache/TestPlatformCompare/same_os_different_arch", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/inddex_mediaType_with_layers", "github.com/docker/docker/api/types/registry/TestDecodeAuthConfig/invalid_encoding", "github.com/docker/docker/client/TestNetworksPruneError", "github.com/docker/docker/client/TestSecretUpdateUnsupported", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/10_lines", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsForceFlushIIntervalSeconds/a", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/5/🙃", "github.com/docker/docker/pkg/tarsum/TestTarSumsReadSize", "github.com/docker/docker/api/types/filters/: TestExactMatch", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_with_one_more_than_block/1_lines", "github.com/docker/docker/daemon/TestEnsureServicesExistErrors/Power;daemon_windoows_test_fakeservice", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_much_bigger_than_block", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#07", "github.com/docker/docker/pkg/ioutils/TestReadCloserWrapperClose", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/corrupted:42", "github.com/docker/docker/opts/TestValidateEnv/PATH=", "github.com/docker/docker/opts/TestParseTCP/localhost", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/non-strict/linux/s390x=\\u003enone", "github.com/docker/docker/image/cache/TestCompare", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure/42.43.0.1:50000", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:65535/", "github.com/docker/docker/client/TestContainerCreateError", "github.com/docker/docker/builder/dockerfile/TestPrependEnvOnCmd", "github.com/docker/docker/daemon/logger/splunk/TestNewMissedConfig", "github.com/docker/docker/api/server/httputils/TestInt64ValueOrDefault", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.comm", "github.com/docker/docker/layer/TestRegisterExistingLayer", "github.com/docker/docker/errdefs/TestForbidden", "github.com/docker/docker/daemon/config/TestFindConfigurationConflicts", "github.com/docker/docker/registry/TestValidateMirror/https://127.0.0.1", "github.com/docker/docker/distribution/TestManifestStore/unknown_media_type/with__cache/cached_manifest_has_media_type", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/json_encodeed_values/6_lines", "github.com/docker/docker/volume/mounts/TestParseMountSpec/#00", "github.com/docker/docker/opts/TestParseTCP/default_localhost", "github.com/docker/docker/api/types/filters/TestToJSON", "github.com/docker/docker/errdefs/TestUnknown", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCRead", "github.com/docker/docker/daemon/containerd/TestMatcherOnWindowsAmd64/various_winndows/strict/windows/amd64=\\u003ewindows(10.0.14393)/amd64", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/6_lines", "github.com/docker/docker/internal/mod/TestModuleVersion", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/Overrides", "github.com/docker/docker/api/server/httputils/TestUint32Value/#00", "github.com/docker/docker/internal/usergroup/TestParseSubidFileWithNewlinesAndCommments", "github.com/docker/docker/api/server/router/volume/TestVolumeRemoveNotFoundNoSwarm", "github.com/docker/docker/client/TestContainerWaitError", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'stars=invalid'", "github.com/docker/docker/opts/TestParseDockerDaemonHost/:", "github.com/docker/docker/pkg/tailfile/TestTailNegativeN", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/All", "github.com/docker/docker/daemon/TestNoneHealthcheck", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/disabled__with_MaxRestartCount", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_much_bigger_than_block/request_more_lines_than_available", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType/mediaType__and_fsLayers_set", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/Since", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify", "github.com/docker/docker/api/types/filters/TestAdd", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Extra_allocated,_no_pool_left", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCConfiggs/runtime", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//First_pool_fully_overlapped_by_smaller_prefix,_next_predefined_before_reserved", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/Add_option__no_overrides", "github.com/docker/docker/opts/TestAddressPoolOpt", "github.com/docker/docker/client/TestImageInspectImageNotFound", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/FromEmptyLog/Tail=-1", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/5_lines", "github.com/docker/docker/registry/TestNewServiceConfig/valid_insecure_registry", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/unless-sttopped_with_negative_MaxRestartCount", "github.com/docker/docker/client/TestContainerExecStartError", "github.com/docker/docker/api/server/httputils/TestUint32Value/not-a-number", "github.com/docker/docker/daemon/config/TestDaemonConfigurationUnicodeVariations//UTF-8_(with_BOM)", "github.com/docker/docker/client/TestConfigListError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_same_as_block", "github.com/docker/docker/api/types/registry/TestServiceConfigMarshalLegacyFields", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/multiplee_spaces_after_first_column", "github.com/docker/docker/client/TestImagePushWithoutErrors", "github.com/docker/docker/volume/mounts/TestLinuxParseMountSpecBindWithFileinfoError", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMultilinePatternMMaxEventSize", "github.com/docker/docker/daemon/logger/awslogs/TestLogClosed", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/8_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:/", "github.com/docker/docker/container/stream/bytespipe/TestFixedBufferRead", "github.com/docker/docker/client/TestNegotiateAPIVersionOverride", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/https_scheeme,_with_url-fragment", "github.com/docker/docker/registry/TestNewServiceConfig/valid_mirror", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/amd64_requessted,_but_not_present", "github.com/docker/docker/libnetwork/bitmap/TestMarshalJSON/UnmarshalJSON=Live", "github.com/docker/docker/opts/TestParseDockerDaemonHost/localhost", "github.com/docker/docker/opts/TestValidateEnv/something", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCNetworkAAttachmentRuntime", "github.com/docker/docker/client/TestResponseErrors/JSON_error_", "github.com/docker/docker/image/TestNewFromJSONWithInvalidJSON", "github.com/docker/docker/pkg/plugins/TestGet/not_implemented", "github.com/docker/docker/registry/TestSearchErrors", "github.com/docker/docker/opts/TestParseTCP", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure/42.42.0.1:50000", "github.com/docker/docker/api/types/registry/TestDecodeAuthConfig", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_much_bigger_than_block/1_lines", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRequestSyntaxCheck", "github.com/docker/docker/pkg/longpath/TestStandardLongPath", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithNative", "github.com/docker/docker/opts/TestParseHost/npipe:////./pipe/foo", "github.com/docker/docker/client/TestImagePushReferenceError", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic/seed#1", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_with_one_more_than_block/2_lines", "github.com/docker/docker/client/TestNetworkRemove", "github.com/docker/docker/pkg/tailfile/TestNewTailReader", "github.com/docker/docker/container/TestListContainers", "github.com/docker/docker/daemon/TestValidContainerNames", "github.com/docker/docker/internal/lazyregexp/TestCompileOnce/invalid_regexp", "github.com/docker/docker/daemon/logger/awslogs/TestProcessEventEmoji", "github.com/docker/docker/daemon/cluster/executor/container/TestTmpfsConversion/tmpfs-noexec", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_much_bigger_than_block/1_lines", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/c:\\\\:/foo:ro", "github.com/docker/docker/layer/TestIsValidID/Invalid:_too_long", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:/", "github.com/docker/docker/client/TestConfigUpdateError", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[qux]]", "github.com/docker/docker/daemon/images/TestImageDelete/lease_exists", "github.com/docker/docker/api/server/middleware/TestNewVersionMiddlewareValidatioon/invalid_default_too_high", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/StoppedEmpty/Zero", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/git_schemee,_with_url-fragment", "github.com/docker/docker/daemon/logger/splunk/TestValidateLogOpt", "github.com/docker/docker/daemon/cluster/executor/container/TestWaitNodeAttachment", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCCredenntialSpec/empty_credential_spec", "github.com/docker/docker/daemon/logger/local/TestWriteLog", "github.com/docker/docker/opts/TestValidateEnv/env_4=value_4", "github.com/docker/docker/client/TestNegotiateAPIVersion/no_upgrade", "github.com/docker/docker/libnetwork/TestAddEpToResolver/disabled_internal_resolver", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/multiple__DNSSearch", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/current_version", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/unknown_ppolicy", "github.com/docker/docker/client/TestWithUserAgent/reset_custom_user-agent", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped/Exact", "github.com/docker/docker/daemon/TestDaemonReloadInsecureRegistries", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault/single_bad_value", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//First_pool_fully_overlapped_by_bigger_allocated,_next_overlapped_in_the_middle", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'is-official", "github.com/docker/docker/daemon/logger/splunk/TestServerAlwaysDown", "github.com/docker/docker/api/types/network/TestEndpointIPAMConfigWithOutOfRangeAAddrs/static_addresses_out_of_range", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/strict/linux/arm=\\u003enone", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/Concurrennt", "github.com/docker/docker/internal/opts/TestNamedSetOpts", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/Exact", "github.com/docker/docker/daemon/containerd/TestLookup/retry-inconsistency", "github.com/docker/docker/container/TestIsValidHealthString/fail", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_same_as_block/5_lines", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/variant_withoutt_architecture", "github.com/docker/docker/image/TestImage", "github.com/docker/docker/client/TestTaskListError", "github.com/docker/docker/registry/TestSearch/stars=0,_no_results", "github.com/docker/docker/client/TestSecretInspectSecretNotFound", "github.com/docker/docker/pkg/plugins/TestBackoff/retries:_10", "github.com/docker/docker/api/server/router/volume/TestVolumeRemove", "github.com/docker/docker/opts/TestParseDockerDaemonHost/0.0.0.1:5555", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/example.com:/", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/FromEmptyLog/Tail=0", "github.com/docker/docker/builder/dockerfile/TestGetAllMeta", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec", "github.com/docker/docker/api/types/filters/TestFuzzyMatch", "github.com/docker/docker/pkg/stack/TestDumpToFileWithEmptyInput", "github.com/docker/docker/client/TestContainerRemoveNotFoundError", "github.com/docker/docker/api/server/httputils/TestJsonContentType", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested_on__v7_daemon,_v7_not_available", "github.com/docker/docker/pkg/progress/TestOutputOnPrematureClose", "github.com/docker/docker/client/TestClientRedirect/POST", "github.com/docker/docker/pkg/tailfile/TestTailEmptyFile", "github.com/docker/docker/opts/TestParseHost/tcp://192.168.0.1:5555", "github.com/docker/docker/client/TestContainerExecResize/larger_than_maxint64", "github.com/docker/docker/libnetwork/internal/addrset/TestInvalidPool", "github.com/docker/docker/client/TestCanceledContext", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/Since", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCIsolation/default", "github.com/docker/docker/daemon/TestContainerList_LimitFilter/negative_limit_doeesn't_limit", "github.com/docker/docker/cmd/dockerd/TestCDISpecDirs/CDI_enabled_and_no_spec_dirrs_specified_returns_default", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/schhema_1_mediaType_with_manifests", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_same_as_block/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/7_lines", "github.com/docker/docker/api/server/httputils/TestReadJSON/with_whitespace", "github.com/docker/docker/client/TestServiceCreate", "github.com/docker/docker/client/TestConfigListUnsupported", "github.com/docker/docker/client/TestConfigCreate", "github.com/docker/docker/client/TestNodeInspect", "github.com/docker/docker/client/TestClientRedirect/PUT", "github.com/docker/docker/builder/dockerfile/TestAddFromScratchDoesNotModifyArgPlatform", "github.com/docker/docker/client/TestCopyToContainerError", "github.com/docker/docker/libnetwork/internal/netiputil/TestLastAddr", "github.com/docker/docker/client/TestContainerWaitErrorHandling/connection_reset", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCMismatchhedRuntime", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_twice_block/request_more_lines_than_available", "github.com/docker/docker/daemon/config/TestFindConfigurationConflictsWithMergedValues", "github.com/docker/docker/pkg/streamformatter/TestRawProgressFormatterFormatProgress", "github.com/docker/docker/builder/dockerfile/TestEntrypoint", "github.com/docker/docker/client/TestContainerKill", "github.com/docker/docker/daemon/TestLogContainerEventWithAttributes", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/it_rejects_unnsupported_credentialspec_options", "github.com/docker/docker/registry/TestV1EndpointParse", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_half_block", "github.com/docker/docker/internal/safepath/TestJoinCloseInvalidates", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/connfig_and_manifests", "github.com/docker/docker/client/TestEncodePlatforms/multiple_platforms", "github.com/docker/docker/builder/dockerfile/TestDispatch/COPY_multiple_files_to__file_with_whitespace", "github.com/docker/docker/api/server/router/volume/TestVolumeRemoveNoSwarmInUse", "github.com/docker/docker/internal/safepath/TestIsLocalTo/relative_path", "github.com/docker/docker/registry/TestParseRepositoryInfo/example.com/private/mooonbase", "github.com/docker/docker/daemon/cluster/controllers/plugin/TestWaitCancel", "github.com/docker/docker/client/TestImageBuild", "github.com/docker/docker/internal/directory/TestSizeEmptyFile", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_much_bigger_than_block/5_lines", "github.com/docker/docker/pkg/pidfile/TestRead/zero_pid", "github.com/docker/docker/api/types/registry/TestDecodeAuthConfig/valid", "github.com/docker/docker/client/TestSwarmLeaveError", "github.com/docker/docker/client/TestContainerExecInspect", "github.com/docker/docker/daemon/internal/capabilities/TestMatch", "github.com/docker/docker/pkg/authorization/TestPeerCertificateMarshalJSON/Marshaalling_:", "github.com/docker/docker/daemon/logger/splunk/TestInlineFormatWithNonDefaultOptiions", "github.com/docker/docker/libnetwork/datastore/TestKVObjectFlatKey", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/arm/v7_requeested_on_v5_daemon,_all_available", "github.com/docker/docker/api/types/time/TestGetTimestamp", "github.com/docker/docker/libnetwork/bitmap/TestMergeSequences", "github.com/docker/docker/registry/TestParseRepositoryInfo/index.docker.io/publicc/moonbase", "github.com/docker/docker/daemon/TestContainerList_NameFilter", "github.com/docker/docker/container/TestAddContainers", "github.com/docker/docker/daemon/cluster/executor/container/TestIsolationConversion/default", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/LiveEmpty/All", "github.com/docker/docker/api/server/middleware/TestMaskSecretKeys", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCCredentiialSpec", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:/tmp4:fooo", "github.com/docker/docker/container/TestViewWithHealthCheck", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/Concurrent", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRequestReleaseAddressDuplicate", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/multiple__label_without_value", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/empty", "github.com/docker/docker/opts/TestParseTCP/0.0.0.1", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_same_as_block/3_lines", "github.com/docker/docker/client/TestServiceInspectError", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCCredenntialSpec/config_credential_spec", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_twice_block/1_lines", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/Until", "github.com/docker/docker/client/TestSecretUpdateError", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/LessThanAvailable", "github.com/docker/docker/daemon/logger/loggerutils/TestTailFiles/handle_corrupteed_data", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/single__line_half_block/request_more_lines_than_available", "github.com/docker/docker/daemon/cluster/executor/container/TestCredentialSpecConversion/none", "github.com/docker/docker/client/TestNewClientWithOpsFromEnvSetsDefaultVersion", "github.com/docker/docker/client/TestVolumeUpdate", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_max-downlooad-attempts", "github.com/docker/docker/pkg/streamformatter/TestAuxFormatterEmit", "github.com/docker/docker/volume/service/TestFindByDriver", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter", "github.com/docker/docker/daemon/config/TestFindConfigurationConflictsWithMergedVValues", "github.com/docker/docker/builder/dockerfile/TestArg", "github.com/docker/docker/client/TestContainerKillError", "github.com/docker/docker/client/TestImageSave", "github.com/docker/docker/volume/service/TestCreateKeepOptsLabelsWhenExistsRemotely", "github.com/docker/docker/client/TestConfigInspect", "github.com/docker/docker/daemon/logger/syslog/TestParseLogFormat", "github.com/docker/docker/client/TestConfigInspectConfigNotFound", "github.com/docker/docker/daemon/logger/splunk/TestDeadlockOnBlockedEndpoint", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/Until", "github.com/docker/docker/pkg/stdcopy/TestStdCopyReturnsWriteErrors", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_hosts", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsMultilinePattern", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType/mediaType__and_config_set", "github.com/docker/docker/distribution/xfer/TestCancelledDownload", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped/All", "github.com/docker/docker/container/TestTruncIndex/id_should_work", "github.com/docker/docker/api/types/filters/TestValidate", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:/tmp2:roo", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/negativee_minor_device", "github.com/docker/docker/client/TestNetworkDisconnectError", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/No_overrides", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/Tail\\u003e0", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCConfiggs/file", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_half_block/request_more_lines_than_available", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit/name:/named3:ro", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_max-concurrrent-uploads", "github.com/docker/docker/client/TestContainerResize/larger_than_maxint64", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptReconnectInterval", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/json_encodeed_values/3_lines", "github.com/docker/docker/image/TestSearchAfterDelete", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[foo_baz]]", "github.com/docker/docker/registry/TestV1Endpoint", "github.com/docker/docker/opts/TestValidateLabel/label_with_general_format", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Stopped", "github.com/docker/docker/daemon/TestContainerList/1_containers", "github.com/docker/docker/internal/safepath/TestIsLocalTo/same", "github.com/docker/docker/pkg/plugins/TestGet", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_twice_block/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_with_one_more_than_block/1_lines", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled/empty_config", "github.com/docker/docker/pkg/plugins/TestFailOnce", "github.com/docker/docker/container/TestTruncIndex/non-conflicting_15_character_ssubstrings_should_still_not_conflict", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/disabled__with_negative_MaxRestartCount", "github.com/docker/docker/internal/containerfs/TestEnsureRemoveAllWithDir", "github.com/docker/docker/client/TestGetDockerOS", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogFacility", "github.com/docker/docker/registry/TestParseRepositoryInfo/fooo/bar", "github.com/docker/docker/api/types/filters/: TestWalkValues", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_much_bigger_than_block/3_lines", "github.com/docker/docker/internal/safepath/TestJoinEscapingSymlink", "github.com/docker/docker/libnetwork/etchosts/TestDelete", "github.com/docker/docker/distribution/TestPullSchema2Config/unauthorized", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/Tail\\u003e0", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/://", "github.com/docker/docker/opts/TestValidateIPAddress/0:0:0:0:0:0:0:1", "github.com/docker/docker/pkg/stringid/TestTruncateID/digest", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.comm/v1/?q=foo", "github.com/docker/docker/client/TestImageCreateError", "github.com/docker/docker/internal/multierror/TestErrorJoin/single", "github.com/docker/docker/volume/service/TestFilterWithPrune", "github.com/docker/docker/daemon/TestEnsureServicesExistErrors/daemon_windows_tesst_fakeservice", "github.com/docker/docker/client/TestContainerRemoveError", "github.com/docker/docker/client/TestNodeList", "github.com/docker/docker/builder/remotecontext/TestInspectResponseTextSimple", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.168.1.1:123", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/onne_small_entry", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCWrite/Write_withouut_hash_and_modify", "github.com/docker/docker/daemon/cluster/convert/TestAccessModeFromGRPC", "github.com/docker/docker/opts/TestParseHost/://", "github.com/docker/docker/pkg/plugins/TestGet/success", "github.com/docker/docker/client/TestContainersPrune", "github.com/docker/docker/libcontainerd/local/TestEnvironmentParsing", "github.com/docker/docker/opts/TestValidateEnv/1asd", "github.com/docker/docker/daemon/containerd/TestImageLoadMissing/single_platform", "github.com/docker/docker/errdefs/TestFromStatusCode/Internal_Server_Error#04", "github.com/docker/docker/registry/TestNewServiceConfig/empty_config", "github.com/docker/docker/client/TestNetworkCreateConnectionError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/one_smaall_entry", "github.com/docker/docker/image/TestGetAndSetLastUpdated", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/invalid__device_type", "github.com/docker/docker/distribution/TestManifestStore/error_persisting_manifest", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_same_as_block/4_lines", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/other.com", "github.com/docker/docker/registry/TestParseRepositoryInfo/library/ubuntu", "github.com/docker/docker/client/TestCustomAPIVersion/something-weird", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_with_one_more_than_block/2_lines", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.coom/v1/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/6_lines", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/strict/linux/arm/v8=\\u003enone", "github.com/docker/docker/container/TestTruncIndex/conflicts_between_id[:1]_and_iid2_should_be_gone", "github.com/docker/docker/client/TestCheckpointListContainerNotFound", "github.com/docker/docker/client/TestImageSave/multiple_platforms", "github.com/docker/docker/daemon/containerd/TestImageDelete", "github.com/docker/docker/libnetwork/bitmap/TestGetFirstAvailableFromCurrent", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/index.docker.io", "github.com/docker/docker/api/server/router/volume/TestVolumeRemoveFoundNoSwarm", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeConcurrentErrror", "github.com/docker/docker/daemon/TestContainerDoubleDelete", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/LessThanAvailable", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_dns-search", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/trailingg_spaces", "github.com/docker/docker/client/TestTaskInspectError", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:/some-path", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/always", "github.com/docker/docker/registry/TestValidateMirror/http://127.0.0.1", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/6/a�", "github.com/docker/docker/registry/TestValidateMirror/!invalid!://%as%", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_max-concurrrent-downloads", "github.com/docker/docker/pkg/stdcopy/TestStdCopyWithCorruptedPrefix", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname/ifname_set_to_int", "github.com/docker/docker/client/TestSwarmInspect", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/when_using_a__'registry://'_option_and_opening_the_registry_key_fails,_it_fails_gracefully", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Stopped/LesssThanAvailable", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_with_one_more_than_block/3_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_same_as_block/2_lines", "github.com/docker/docker/registry/TestValidateIndexName", "github.com/docker/docker/opts/TestValidateIPAddress/_::1_", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/several_smaall_entries/3_lines", "github.com/docker/docker/daemon/config/TestFindConfigurationConflictsWithNamedOpptions", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDebug", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestEvenAllocateSerialReleaseParallel", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/write_(ww)_permission", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_same_as_block/4_lines", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/unless-sttopped", "github.com/docker/docker/libnetwork/etchosts/TestDeleteNewline", "github.com/docker/docker/opts/TestParseDockerDaemonHost/unix://unix://tcp://127..0.0.1", "github.com/docker/docker/libnetwork/portallocator/TestRequestNewPort", "github.com/docker/docker/registry/TestV1EndpointParse/https://0.0.0.0:5000/v2/", "github.com/docker/docker/client/TestImageLoad/json_quiet", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/c:\\\\:/foo", "github.com/docker/docker/builder/dockerfile/TestOnbuild", "github.com/docker/docker/client/TestContainerExecCreateError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_same_as_block/request_more_lines_than_available", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithConflicts", "github.com/docker/docker/internal/safepath/TestJoinEscapingSymlink/root", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_with_one_more_than_block/request_more_lines_than_available", "github.com/docker/docker/volume/service/TestServicePrune", "github.com/docker/docker/client/TestSecretListError", "github.com/docker/docker/api/server/middleware/TestNewVersionMiddlewareValidatioon", "github.com/docker/docker/libnetwork/drivers/overlay/ovmanager/TestNetworkAllocatteUserDefinedVNIs", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchLineSplitWithBinary", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/json_encodeed_values/10_lines", "github.com/docker/docker/registry/TestV1EndpointPing", "github.com/docker/docker/opts/TestValidateIPAddress/127", "github.com/docker/docker/daemon/TestEnsureServicesExist", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/7_lines", "github.com/docker/docker/builder/remotecontext/TestDetectContentType", "github.com/docker/docker/client/TestSecretRemoveError", "github.com/docker/docker/client/TestServiceListError", "github.com/docker/docker/internal/safepath/TestIsLocalTo/backtrack_inside", "github.com/docker/docker/client/TestResponseErrors/plain-text_error", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_much_bigger_than_block/2_lines", "github.com/docker/docker/client/TestContainerLogsError", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/old_api_with_ep", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateTaskFree", "github.com/docker/docker/client/TestContainerStart", "github.com/docker/docker/client/TestConfigInspectNotFound", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCConfigs", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail", "github.com/docker/docker/opts/TestParseHost/tcp://host:", "github.com/docker/docker/api/server/router/volume/TestVolumeRemoveNotFoundNoManager", "github.com/docker/docker/daemon/logger/loggerutils/cache/TestLog", "github.com/docker/docker/volume/service/TestGet", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_much_bigger_than_block/2_lines", "github.com/docker/docker/pkg/jsonmessage/TestDisplayJSONMessagesStream", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestEvenAllocateSerialReleeaseParallel", "github.com/docker/docker/volume/mounts/: TestParseMountSpec", "github.com/docker/docker/cmd/dockerd/debug/TestDisable", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/7_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/4_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_with_one_more_than_block/3_lines", "github.com/docker/docker/volume/mounts/TestParseMountSpec/#02", "github.com/docker/docker/pkg/stdcopy/TestWriteWithUninitializedStdWriter", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/SinceAndUntil", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_with_one_more_than_block/4_lines", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/happy_path_wiith_a_'raw://'_option", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCIsolation/hyperv", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/request_more_lines_than_available", "github.com/docker/docker/pkg/pools/TestBufioWriterPoolGetWithNoReaderShouldCreateOne", "github.com/docker/docker/opts/TestParseHost/tcp://:5555", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/StoppedEmpty/Since", "github.com/docker/docker/client/TestServiceUpdate", "github.com/docker/docker/daemon/config/TestDaemonConfigurationUnicodeVariations/UTF-8", "github.com/docker/docker/daemon/logger/local/TestReadLog", "github.com/docker/docker/image/TestNewFromJSON", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_non-empty_to_empty", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/name:/foo:ro", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeDefaultAddresssPools/config_file", "github.com/docker/docker/daemon/cluster/executor/container/TestIsolationConversion", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/StoppedEmpty/All", "github.com/docker/docker/libnetwork/etchosts/TestDeleteEmpty", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_same_as_block", "github.com/docker/docker/client/TestSwarmGetUnlockKeyError", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]/", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/StoppedEmpty/All", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/empty_ruule", "github.com/docker/docker/daemon/images/TestImageDelete", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestFullAllocateSerialReleaseParallel", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/5", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/6_lines", "github.com/docker/docker/volume/mounts/TestConvertTmpfsOptions", "github.com/docker/docker/container/stream/bytespipe/TestBytesPipeWriteRandomChunks", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/no_linees/request_more_lines_than_available", "github.com/docker/docker/pkg/plugins/TestNewClientWithTimeout", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/no_linees", "github.com/docker/docker/pkg/streamformatter/TestNewJSONProgressOutput", "github.com/docker/docker/client/TestSetHostHeader/tcp://0.0.0.0:4243", "github.com/docker/docker/dockerversion/TestDockerUserAgent/daemon_user-agent_witth_upstream_and_custom_metadata", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/MoreThanSince", "github.com/docker/docker/client/TestContainerStatPathError", "github.com/docker/docker/builder/remotecontext/git/TestCloneArgsSmartHttp", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/invalid__device_major-minor", "github.com/docker/docker/api/types/filters/TestDel", "github.com/docker/docker/volume/mounts/TestValidateMount/#03", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/StoppedEmpty/SinceAndUntil", "github.com/docker/docker/daemon/images/TestImageDelete/no_lease", "github.com/docker/docker/libnetwork/TestEndpointMarshalling", "github.com/docker/docker/distribution/TestTokenPassThru", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/git@,_no_url-fragment", "github.com/docker/docker/libnetwork/drivers/overlay/ovmanager/TestNetworkAllocateUserDefinedVNIs", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure/example.com", "github.com/docker/docker/pkg/plugins/TestClientSendFile", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestParsedImports", "github.com/docker/docker/errdefs/TestFromStatusCode/Internal_Server_Error#02", "github.com/docker/docker/opts/TestParseHost/tcp://:port", "github.com/docker/docker/internal/safepath/TestIsLocalTo/file_with_dots", "github.com/docker/docker/image/TestNewChildImageFromImageWithRootFS", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithhoutNative/export_arm64", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/truncated_last_line#02/oone_line", "github.com/docker/docker/distribution/TestPullSchema2Config/500_status", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap_at_the_start,_not_enough_space_left", "github.com/docker/docker/pkg/jsonmessage/TestError", "github.com/docker/docker/pkg/parsers/operatingsystem/Test_windowsOSRelease_String", "github.com/docker/docker/errdefs/TestFromStatusCode/Not_Modified", "github.com/docker/docker/api/server/middleware/TestVersionMiddlewareWithErrorsReeturnsHeaders", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForIntNSInvalidNdots", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeConcurrentError", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_log-level_warn", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestOddAllocateSerialReleaseParallel", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/empty_platform", "github.com/docker/docker/layer/TestEmptyLayer", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithReadErrror", "github.com/docker/docker/daemon/TestContainerList/8_containers", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCCredentiialSpec/config_and_file_and_registry_credential_spec", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_much_bigger_than_block/5_lines", "github.com/docker/docker/distribution/xfer/TestTransfer", "github.com/docker/docker/daemon/config/TestFindConfigurationConflictsWithNamedOptions", "github.com/docker/docker/opts/TestParseTCP/tcp:a.b.c.d", "github.com/docker/docker/container/TestStateRunStop", "github.com/docker/docker/internal/safepath/TestJoinEscapingSymlink/relative", "github.com/docker/docker/distribution/TestPullSchema2Config/EOF", "github.com/docker/docker/volume/local/TestInitializeWithVolumes", "github.com/docker/docker/opts/TestValidateIPAddress/::1", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/Tail\\u0033e0", "github.com/docker/docker/pkg/jsonmessage/TestDisplayJSONMessagesStreamInvalidJSON", "github.com/docker/docker/libnetwork/TestEndpointStore", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameFoundSwarm", "github.com/docker/docker/opts/TestValidateEnv/_env1=value1", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_multiple_nnode_generic_resources", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit", "github.com/docker/docker/volume/service/TestFilterFunc", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/LessThhanSince", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_half_block/request_more_lines_than_available", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:65535/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/8_lines", "github.com/docker/docker/daemon/containerd/TestMatcherOnWindowsAmd64/various_winndows/non-strict/windows/amd64=\\u003ewindows(10.0.14393)/amd64", "github.com/docker/docker/client/TestImageInspectWithEmptyID", "github.com/docker/docker/libnetwork/portallocator/TestNoDuplicateBPR", "github.com/docker/docker/pkg/plugins/TestGet/not_exists", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/name:/foo", "github.com/docker/docker/volume/mounts/TestValidateMount/#00", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBufferedEvents/10", "github.com/docker/docker/client/TestConfigUpdate", "github.com/docker/docker/api/types/network/TestEndpointIPAMConfigWithOutOfRangeAAddrs/valid_config", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.168.1.1:/", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:65535", "github.com/docker/docker/container/stream/TestAttachNoIO/stdout_only", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.com", "github.com/docker/docker/opts/TestParseDockerDaemonHost/localhost:5555/path", "github.com/docker/docker/api/types/filters/TestArgsMatchKVList", "github.com/docker/docker/libnetwork/bitmap/TestSetAnyInRange", "github.com/docker/docker/client/TestContainerCommit", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/severaal_small_entries/request_more_lines_than_available", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[]", "github.com/docker/docker/opts/TestValidateLabel/label_with_reserved_com.docker.*", "github.com/docker/docker/api/server/router/volume/TestCreateVolumeCluster", "github.com/docker/docker/libnetwork/drivers/overlay/ovmanager/TestNetworkAllocateFree", "github.com/docker/docker/daemon/TestContainerList_LimitFilter/limit_greater_thann_num_containers", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/with_units", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'is-automated==[invalid]'", "github.com/docker/docker/daemon/containerd/TestLookup/sha256:defcab", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:/some-path", "github.com/docker/docker/client/TestEventsErrorInOptions", "github.com/docker/docker/daemon/containerd/TestImageInspect/inspect_image_with_pplatform_parameter", "github.com/docker/docker/daemon/cluster/convert/TestVolumeAvailabilityFromGRPC/Active", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'stars=invalidd'#01", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/#00", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty/SSinceAndUntil", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Valid_IPAMM", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[]#01", "github.com/docker/docker/libnetwork/portallocator/TestRequestPortForMultipleIPs", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/4_lines", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCMismatchedRuntime", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/1_lines", "github.com/docker/docker/client/TestSecretRemoveUnsupported", "github.com/docker/docker/pkg/plugins/TestClientStream", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/negative__MTU", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://", "github.com/docker/docker/registry/TestNewServiceConfig/invalid_insecure_registryy", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/this_is__not_an_uri", "github.com/docker/docker/api/server/middleware/TestNewVersionMiddlewareValidation", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1/", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_log-level__warn", "github.com/docker/docker/client/TestNetworkInspect/verbose", "github.com/docker/docker/daemon/containerd/TestImageDelete/repoanddigestothertaggs@sha256:f6d9ee4b048e07a73635eda8479ffc689376a936fddbc6c391ddd8c8cd3e9e1e", "github.com/docker/docker/reference/TestInvalidTags", "github.com/docker/docker/libnetwork/ipams/remote/TestRemoteDriver", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'stars=invalidd'", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_dns-searchh", "github.com/docker/docker/opts/TestValidateEnv/PATH", "github.com/docker/docker/builder/dockerfile/TestEmptyDockerfile", "github.com/docker/docker/libnetwork/options/TestGenerateMissingField", "github.com/docker/docker/pkg/stack/TestDump", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRemoveSubnet", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/2_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_same_as_block/1_lines", "github.com/docker/docker/builder/remotecontext/TestSelectAcceptableMIME", "github.com/docker/docker/libnetwork/bitmap/TestSerializeDeserialize", "github.com/docker/docker/api/server/router/swarm/TestAdjustForAPIVersion", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped/SinceAndUntil", "github.com/docker/docker/pkg/pidfile/TestRead", "github.com/docker/docker/distribution/xfer/TestMaxDownloadAttempts", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen/4/He��o", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/5_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_same_as_block/1_lines", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap_by_allocations_and_reserved_of_different_sizes", "github.com/docker/docker/opts/TestParseHost/unknown://", "github.com/docker/docker/pkg/jsonmessage/TestJSONMessageDisplayWithJSONError", "github.com/docker/docker/opts/TestParseTCP/default_tcp://localhost:noport", "github.com/docker/docker/client/TestImageSearchWithUnauthorizedErrorAndPrivilegeeFuncError", "github.com/docker/docker/daemon/TestContainerMigrateOS/gd_with_linux_arm64_imagee", "github.com/docker/docker/plugin/TestFilterByCapNeg", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/compress=true", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/Tail=0", "github.com/docker/docker/pkg/plugins/TestAbortRetry/duration:_2s", "github.com/docker/docker/container/TestViewSaveDelete", "github.com/docker/docker/daemon/logger/awslogs/TestNewAWSLogsClientLogFormatHeaderHandler", "github.com/docker/docker/runconfig/TestDecodeContainerConfigIsolation", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/IP_versionn_mismatch", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/7_lines", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMaxTotalBytesWithBinary", "github.com/docker/docker/api/types/filters/TestMarshalJSONWithEmpty", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/same_leength_as_delimiter", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist/EmptySlice", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/seeveral_small_entries/3_lines", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Found_last__value", "github.com/docker/docker/client/TestPingHeadFallback/Method_Not_Allowed", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:65536", "github.com/docker/docker/client/TestServiceCreateConnectionError", "github.com/docker/docker/libnetwork/portallocator/TestPortAllocation", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidateMountInvalidType", "github.com/docker/docker/client/TestContainerWaitProxyInterruptLong", "github.com/docker/docker/errdefs/TestFromStatusCode", "github.com/docker/docker/libnetwork/internal/setmatrix/TestSetSerialInsertDeletee", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_much_bigger_than_block", "github.com/docker/docker/opts/TestParseDockerDaemonHost/udp://127.0.0.1", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/LessThanAvailable", "github.com/docker/docker/client/TestContainerTop", "github.com/docker/docker/daemon/logger/loggerutils/TestTailFiles/handle_corrupted_data", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:", "github.com/docker/docker/client/TestSetHostHeader", "github.com/docker/docker/daemon/logger/jsonfilelog/TestJSONFileLogger", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList/TrailingComma", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/unless-stopped", "github.com/docker/docker/opts/TestParseTCP/:", "github.com/docker/docker/builder/dockerfile/TestNormalizeDest", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/same_leength_as_delimiter/1_lines", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/negative__max-download-attempts", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault/two_conflicting_values", "github.com/docker/docker/api/types/registry/TestEncodeAuthConfig", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameNotFoundNoSwarm", "github.com/docker/docker/integration/internal/termtest/TestStripANSICommands", "github.com/docker/docker/opts/TestValidateLabel/label_with_more_than_one_=", "github.com/docker/docker/daemon/TestContainerList/100_containers", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/ssh,_no_url-fragment", "github.com/docker/docker/libnetwork/bitmap/TestFindSequence", "github.com/docker/docker/pkg/tailfile/FuzzTailfile", "github.com/docker/docker/volume/service/TestDefererencePluginOnCreateError", "github.com/docker/docker/opts/TestValidateEnv/__some_space_before", "github.com/docker/docker/builder/dockerfile/TestDispatch/COPY_wildcard_no_files", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBuffereddEvents/10", "github.com/docker/docker/libnetwork/etchosts/TestDeleteIgnoresPrefixedHostname", "github.com/docker/docker/pkg/authorization/: TestMiddleware", "github.com/docker/docker/opts/TestMapMapOpts", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/layyers_and_manifests", "github.com/docker/docker/pkg/stringid/TestGenerateRandomID", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchLineSplit", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidRepo/FFoo*3", "github.com/docker/docker/builder/dockerfile/TestVolume", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/wildcardd_minor", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/MultipleStarts", "github.com/docker/docker/container/stream/bytespipe/TestFixedBufferLen", "github.com/docker/docker/daemon/logger/splunk/TestJsonFormat", "github.com/docker/docker/daemon/containerd/TestImageDelete/repoanddigest@sha256::f6d9ee4b048e07a73635eda8479ffc689376a936fddbc6c391ddd8c8cd3e9e1e", "github.com/docker/docker/container/stream/TestAttachNoIO", "github.com/docker/docker/errdefs/TestNotModified", "github.com/docker/docker/runconfig/TestDecodeContainerConfigPrivileged", "github.com/docker/docker/volume/service/TestRestore", "github.com/docker/docker/daemon/TestContainerList/32_containers", "github.com/docker/docker/client/TestImageSearchWithUnauthorizedErrorAndAnotherUnnauthorizedError", "github.com/docker/docker/daemon/cluster/convert/TestVolumeCreateToGRPC", "github.com/docker/docker/opts/TestParseDockerDaemonHost/unix:///run/docker.sock", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/truncated_last_line#01/eexact", "github.com/docker/docker/api/types/strslice/TestStrSliceUnmarshalSlice", "github.com/docker/docker/container/TestDeleteContainer", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/LiveEmpty/Until", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Predefined_with_overlapping_prefixes,_longer_prefixes_discarded", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/TestFastTimeMarshalJSSON", "github.com/docker/docker/daemon/config/TestBuilderGC_DeprecatedKeepStorage", "github.com/docker/docker/daemon/config/TestDaemonConfigurationUnicodeVariations//UTF-8", "github.com/docker/docker/client/TestServiceUpdateError", "github.com/docker/docker/pkg/stringid/TestAllNum/mixed_letters_and_numbers", "github.com/docker/docker/daemon/config/TestSanitize", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/8_lines", "github.com/docker/docker/registry/TestValidateMirror/https://127.0.0.1:5000", "github.com/docker/docker/registry/TestParseRepositoryInfo/nonlibrary/ubuntu", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/schhema_2_mediaType_with_fsLayers", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/c:\\\\foo\\\\bar:\\\\\\\\\\.\\\\pipe\\\\foo", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC/new_api_no_macs", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]://some-path", "github.com/docker/docker/client/TestContainerExecResizeError", "github.com/docker/docker/api/server/router/volume/TestVolumeRemoveSwarmForce", "github.com/docker/docker/opts/TestParseDockerDaemonHost", "github.com/docker/docker/api/types/filters/TestWalkValues", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/negative__network-diagnostic-port", "github.com/docker/docker/opts/TestValidateLabel/label_with_reserved_org.dockerprroject.*", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestGetSameAddress", "github.com/docker/docker/libnetwork/bitmap/TestCheckIfAvailable", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmpty/All", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[0:0:0:0:0:0:0:1]:5555/ppath", "github.com/docker/docker/api/server/router/volume/TestCreateSwarmVolumeNotManager", "github.com/docker/docker/container/TestTruncIndex/The_first_letter_should_match", "github.com/docker/docker/image/tarexport/TestValidateManifest", "github.com/docker/docker/registry/TestNewServiceConfig", "github.com/docker/docker/api/types/filters/TestClone", "github.com/docker/docker/client/TestContainerLogsNotFoundError", "github.com/docker/docker/pkg/tarsum/TestSortFileInfoSums", "github.com/docker/docker/pkg/plugins/TestEchoInputOutput", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault/single_false", "github.com/docker/docker/daemon/cluster/convert/TestTopologyFromGRPC", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.168.1.1", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/major_ouut_of_range", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/SinceeAndUntil", "github.com/docker/docker/client/TestCustomAPIVersion/v9.99", "github.com/docker/docker/image/TestFSGetSet", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/SinceAndUntil", "github.com/docker/docker/opts/TestParseDockerDaemonHost/fd://", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Found_withoout_value", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/onne_small_entry/1_lines", "github.com/docker/docker/daemon/logger/awslogs/TestCreateAlreadyExists", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#08", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestGetAddress", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestParseWithMultipleFuncs", "github.com/docker/docker/daemon/logger/loggerutils/TestParseLogTag", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/2/Hello", "github.com/docker/docker/volume/mounts/TestParseMountSpec/#05", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestPredefinedPool", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/127.0.0.1:5000", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:1123/some-path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/one_smaall_entry/1_lines", "github.com/docker/docker/registry/TestValidateMirror/http://localhost", "github.com/docker/docker/daemon/TestDeriveULABaseNetwork", "github.com/docker/docker/libnetwork/TestProxyNXDOMAIN", "github.com/docker/docker/daemon/logger/awslogs/TestNewAWSLogsClientRegionDetect", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/7", "github.com/docker/docker/daemon/TestContainerList_LimitFilter/limit_less_than_nuum_containers", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/SinceAndUUntil", "github.com/docker/docker/errdefs/TestDataLoss", "github.com/docker/docker/daemon/cluster/controllers/plugin/TestRemove", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:123", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_much_bigger_than_block/5_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_twice_block", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled/empty_json", "github.com/docker/docker/pkg/system/TestChtimesModTime/aTime_set_to_Unix_Epoch_aand_mTime_before_Unix_Epoch", "github.com/docker/docker/daemon/containerd/TestLookup", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/4_lines", "github.com/docker/docker/client/TestContainerExecResize/zero_width_height", "github.com/docker/docker/pkg/system/TestChtimesModTime/both_aTime_and_mTime_set__to_after_Unix_Epoch_(valid_time)", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/example.com", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist/TrailingComma", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestGetAddressSubPoolEqualPool", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBGarbageCollection", "github.com/docker/docker/opts/TestValidateEnv/some_space", "github.com/docker/docker/registry/TestSearch/is-automated=false", "github.com/docker/docker/opts/TestParseHost/_", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter", "github.com/docker/docker/libnetwork/etchosts/TestUpdate", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForIntNS", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/1_lines", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRelease", "github.com/docker/docker/builder/dockerfile/TestRunWithBuildArgs", "github.com/docker/docker/client/TestConfigRemoveUnsupported", "github.com/docker/docker/builder/dockerfile/TestEnvValueWithExistingRunConfigEnvv", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]://", "github.com/docker/docker/daemon/cluster/TestNewListConfigsFilters", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/8_lines", "github.com/docker/docker/volume/service/TestFilterFunc/test_nil_list", "github.com/docker/docker/daemon/TestDaemonReloadMirrors", "github.com/docker/docker/api/types/versions/TestCompareVersion", "github.com/docker/docker/libnetwork/datastore/TestKey", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/4", "github.com/docker/docker/distribution/xfer/TestDuplicateTransfer", "github.com/docker/docker/daemon/TestSetupWindowsDevices/it_creates_devices_if_alll_'/'-separated_devices_have_IDType_'class'", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/name:/", "github.com/docker/docker/layer/TestIsValidID/Valid_64-char_hexadecimal", "github.com/docker/docker/libnetwork/bitmap/TestMethods", "github.com/docker/docker/pkg/tarsum/TestSelectXattrsV1", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_half_block/request_more_lines_than_available", "github.com/docker/docker/client/TestContainerResize/zero_width_height", "github.com/docker/docker/builder/dockerfile/TestFromMultiStageWithNamedStage", "github.com/docker/docker/client/TestContainerResize", "github.com/docker/docker/client/TestContainerStatPathNotFoundError", "github.com/docker/docker/client/TestNetworkCreate", "github.com/docker/docker/client/TestContainerRename", "github.com/docker/docker/client/TestContainerCreateConnectionError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_much_bigger_than_block/5_lines", "github.com/docker/docker/opts/TestValidateEnv/env1=value1", "github.com/docker/docker/daemon/logger/TestRingDrain", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/name:d::ro", "github.com/docker/docker/client/TestNegotiateAPIVersionWithEmptyVersion", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType/oci_manifeest", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeConflictsWithhInnerStructs", "github.com/docker/docker/daemon/cluster/controllers/plugin/TestWaitEnabled", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/exec-opt__without_key", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/LiveEmpty/All", "github.com/docker/docker/opts/TestNamedMapOpts", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/LiveEmpty/Until", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:\\\\:foo", "github.com/docker/docker/daemon/links/TestLinkMultipleEnv", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/multiplee_spaces_after_second_column", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault/single_true", "github.com/docker/docker/daemon/TestContainerNotRunningError", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Not_found", "github.com/docker/docker/client/TestCopyFromContainerError", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty/Zero", "github.com/docker/docker/opts/TestNamedListOpts", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestPoolAllocateAndReleasee/reallocate_after_release", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList/NilSlice", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/layyers_and_fsLayers", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/leading__spaces", "github.com/docker/docker/builder/remotecontext/TestResponseUnsupportedContentType", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://127.0.0.1/", "github.com/docker/docker/api/server/httputils/TestReadJSON/empty_body", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/exec-opt__with_empty_value", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/non-strict/linux/arm=\\u003elinux/arm/v6", "github.com/docker/docker/internal/containerfs/TestEnsureRemoveAllWithFile", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/fsLLayers_and_manifests", "github.com/docker/docker/errdefs/TestFromStatusCode/Unauthorized", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithExplicitTLSVerifyFalse", "github.com/docker/docker/pkg/ioutils/TestCancelReadCloser", "github.com/docker/docker/client/TestSwarmUpdateError", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/schhema_1_mediaType_with_layers", "github.com/docker/docker/runconfig/TestDecodeContainerConfig", "github.com/docker/docker/pkg/stdcopy/TestStdCopyReturnsErrorFromSystem", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped/LessThanSince", "github.com/docker/docker/daemon/logger/loggerutils/TestCheckCapacityAndRotate", "github.com/docker/docker/daemon/TestLogContainerEventCopyLabels", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMaxEvents", "github.com/docker/docker/daemon/logger/splunk/TestFrequency", "github.com/docker/docker/libnetwork/drivers/remote/TestMissingValues", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/LessThanSince", "github.com/docker/docker/opts/TestParseDockerDaemonHost/_tcp://:5555/path_", "github.com/docker/docker/client/TestImageImportError", "github.com/docker/docker/client/TestInfoServerError", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[::1]:5555", "github.com/docker/docker/client/TestClientRedirect/GET", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_twice_block", "github.com/docker/docker/image/tarexport/TestValidateManifest/nil", "github.com/docker/docker/builder/remotecontext/TestInspectResponseEmptyContentType", "github.com/docker/docker/client/TestNetworkInspect", "github.com/docker/docker/opts/TestParseHost/tcp://0.0.0.0:5555", "github.com/docker/docker/builder/dockerfile/TestGetAllAllowed", "github.com/docker/docker/image/cache/TestPlatformCompare/different_minor_same_osver", "github.com/docker/docker/image/cache/TestPlatformCompare/different_major", "github.com/docker/docker/builder/dockerfile/TestEnvValueWithExistingRunConfigEnv", "github.com/docker/docker/volume/service/TestDerefMultipleOfSameRef", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchWithDuplicateTimeestamps", "github.com/docker/docker/daemon/events/TestIgnoreBufferedWhenNoTimes", "github.com/docker/docker/pkg/parsers/TestParseUintList", "github.com/docker/docker/daemon/logger/awslogs/TestCreateTagSuccess", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp:///", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestNewAddrSpaceDedup", "github.com/docker/docker/libnetwork/portallocator/TestPortAllocationWithCustomRaange", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/same_leength_as_delimiter", "github.com/docker/docker/pkg/process/TestAlive/current_process", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/LiveEmpty/Zero", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_same_as_block", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/MoreThanAvaillable", "github.com/docker/docker/daemon/logger/awslogs/TestNewAWSLogsClientCredentialEnddpointDetect", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#01", "github.com/docker/docker/opts/TestParseTCP/udp://127.0.0.1:5555", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live", "github.com/docker/docker/errdefs/TestFromStatusCode/Not_Implemented", "github.com/docker/docker/opts/TestParseHost/npipe://", "github.com/docker/docker/client/TestContainerRemove", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:1123/", "github.com/docker/docker/cmd/dockerd/TestCDISpecDirs/CDI_disabled_and_no_spec_diirs_specified_returns_no_cdi_spec_dirs", "github.com/docker/docker/daemon/config/TestFindConfigurationConflictsWithUnknownnKeys", "github.com/docker/docker/errdefs/TestDeadline", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/LessThanAvailable", "github.com/docker/docker/pkg/stdcopy/TestNewStdWriter", "github.com/docker/docker/internal/directory/TestSizeNonemptyFile", "github.com/docker/docker/container/stream/TestAttachNoIO/stdin_only", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_same_as_block/2_lines", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidatteMountInvalidType", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithOneSubnetInvalidGateway", "github.com/docker/docker/client/TestImageSearchWithoutErrors", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/request_more_lines_than_available", "github.com/docker/docker/libnetwork/cnmallocator/TestNew", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/net_namee_mismatch", "github.com/docker/docker/pkg/jsonmessage/TestProgressString", "github.com/docker/docker/libnetwork/bitmap/TestAllocateRandomDeallocate", "github.com/docker/docker/client/TestVolumeCreate", "github.com/docker/docker/errdefs/TestNotImplemented", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/using_a_'conffig://'_option_on_a_container_not_managed_by_swarmkit_is_not_allowed,_and_resultss_in_a_generic_error_message_to_hide_that_purely_internal_API", "github.com/docker/docker/distribution/TestPullSchema2Config/unauthorized_JSON", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCIsolation/hypErv", "github.com/docker/docker/libnetwork/etchosts/FuzzAdd", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit/local/name:/ttmp:rw", "github.com/docker/docker/pkg/pidfile/TestRead/current_process_pid", "github.com/docker/docker/daemon/logger/awslogs/TestPublishBatchInvalidSeqSuccess", "github.com/docker/docker/pkg/progress/TestCompleteSilently", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/AttachMidStream", "github.com/docker/docker/builder/dockerfile/TestIsUnreferencedBuiltin", "github.com/docker/docker/libnetwork/TestOversizedDNSReply", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/single_laabel_without_value", "github.com/docker/docker/container/stream/TestAttachNoIO/stdout+stderr", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithInvalidLogFormat", "github.com/docker/docker/registry/TestParseRepositoryInfo/[::1]:8000/private/mooonbase", "github.com/docker/docker/libnetwork/networkdb/TestParallelDelete", "github.com/docker/docker/builder/dockerfile/TestAddFromScratchPopulatesPlatformIIfNil", "github.com/docker/docker/builder/dockerfile/TestRunIgnoresHealthcheck", "github.com/docker/docker/opts/TestParseHost/tcp://192.168:5555", "github.com/docker/docker/client/TestContainerUpdateError", "github.com/docker/docker/client/TestImageImport/no_options", "github.com/docker/docker/opts/TestParseTCP/:5555", "github.com/docker/docker/pkg/pools/TestNewReadCloserWrapperWithAReadCloser", "github.com/docker/docker/client/TestContainerListError", "github.com/docker/docker/libnetwork/bitmap/TestSequenceCopy", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCIsolation/process", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:\\\\:rro", "github.com/docker/docker/daemon/logger/awslogs/TestNewAWSLogsClientCredentialEndpointDetect", "github.com/docker/docker/pkg/fileutils/TestCopyFileWithInvalidDest", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname/ifname_set_to_empty_string", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure/example.com:55000", "github.com/docker/docker/libnetwork/driverapi/TestValidateAndIsV6", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp+tls://", "github.com/docker/docker/pkg/jsonmessage/TestJSONMessageDisplay", "github.com/docker/docker/volume/service/TestServiceList", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/missing__permissions", "github.com/docker/docker/client/TestImageRemoveError", "github.com/docker/docker/api/server/httputils/TestBoolValueOrDefault", "github.com/docker/docker/dockerversion/TestDockerUserAgent/daemon_user-agent", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/no_linnes/request_more_lines_than_available", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[::1]:", "github.com/docker/docker/daemon/TestMergeAndVerifyLogConfigNilConfig", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmpty/Since", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.168.1.1/", "github.com/docker/docker/pkg/ioutils/TestWriteCloserWrapperClose", "github.com/docker/docker/daemon/containerd/TestLookup/sha256:abcdef", "github.com/docker/docker/registry/TestValidateMirror/http://127.0.0.1:5000", "github.com/docker/docker/builder/remotecontext/TestInspectResponseEmptyContentTyype", "github.com/docker/docker/builder/dockerfile/TestImageSourceGetAddsToMounts", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/Since", "github.com/docker/docker/libnetwork/portallocator/TestAllocateAllPorts", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter", "github.com/docker/docker/opts/TestParseTCP/localhost:5555", "github.com/docker/docker/container/TestTruncIndex/The_second_half_should_NOT_match", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCWrite/Write_with_hhash_and_modify", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/migrate_nothing", "github.com/docker/docker/opts/TestParseTCP/0.0.0.1:5555/path", "github.com/docker/docker/opts/TestValidateEnv/PATH=something", "github.com/docker/docker/pkg/system/TestChtimesModTime/both_aTime_and_mTime_set__to_Unix_Epoch", "github.com/docker/docker/client/TestPingSuccess", "github.com/docker/docker/opts/TestValidateIPAddress/[::1]", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameFoundRegular", "github.com/docker/docker/daemon/TestParseVolumesFrom", "github.com/docker/docker/daemon/config/TestBuilderGC", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/corrupted:c", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_same_as_block", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled/empty_builder", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCCredenntialSpec", "github.com/docker/docker/pkg/plugins/TestClientScheme", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/TestFastTimeMarshalJSON", "github.com/docker/docker/opts/TestParseHost/tcp://[::1]:5555/p", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow", "github.com/docker/docker/client/TestContainerWaitErrorHandling/context_deadline__exceeded", "github.com/docker/docker/pkg/tarsum/TestEmptyTar", "github.com/docker/docker/client/TestConfigInspectWithEmptyID", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCCredentiialSpec/registry_credential_spec", "github.com/docker/docker/distribution/TestManifestStore/unknown_media_type/with__cache/cached_manifest_has_no_media_type", "github.com/docker/docker/container/TestIsValidStateString", "github.com/docker/docker/layer/TestIsValidID/Invalid:_too_short", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/LiveEmpty", "github.com/docker/docker/client/TestCheckpointDeleteError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/6_lines", "github.com/docker/docker/client/TestEncodePlatforms/multiple_platforms_with_dupllicates", "github.com/docker/docker/client/TestCheckpointList", "github.com/docker/docker/client/TestWithUserAgent/no_user-agent_set", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/LiveEmpty", "github.com/docker/docker/builder/dockerfile/TestMaintainer", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidateMountTarget", "github.com/docker/docker/client/TestImagePullWithoutErrors/myimage:tag", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/Until", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live/MoreThanAvailable", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_same_as_block/1_lines", "github.com/docker/docker/testutil/TestGenerateRandomAlphaOnlyStringUniqueness", "github.com/docker/docker/libnetwork/TestAddEpToResolver/ipv6", "github.com/docker/docker/daemon/config/TestReloadSetConfigFileNotExist", "github.com/docker/docker/daemon/cluster/convert/TestTaskConvertFromGRPCNetworkAttachment", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/Empty_overrrides", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_some", "github.com/docker/docker/integration/internal/termtest/TestStripANSICommands/#01", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRaw", "github.com/docker/docker/daemon/cluster/convert/TestNodeCSIInfoFromGRPC", "github.com/docker/docker/image/tarexport/TestValidateManifest/non-nil", "github.com/docker/docker/client/TestImagePullStatusUnauthorizedError", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic/seed#5", "github.com/docker/docker/client/TestDistributionInspectWithEmptyID", "github.com/docker/docker/daemon/config/TestValidateConfiguration/with_label", "github.com/docker/docker/container/stream/bytespipe/TestBytesPipeDeadlock", "github.com/docker/docker/api/types/network/TestEndpointIPAMConfigWithInvalidConfig", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:\\\\:rw", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestParseWithOneFunction", "github.com/docker/docker/builder/remotecontext/TestGetWithStatusError", "github.com/docker/docker/client/TestCustomAPIVersion/v", "github.com/docker/docker/volume/mounts/TestValidateMount/#08", "github.com/docker/docker/pkg/plugins/TestBackoff/retries:_2", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false", "github.com/docker/docker/client/TestSwarmInitError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/5_lines", "github.com/docker/docker/pkg/stringid/TestTruncateID/empty_ID", "github.com/docker/docker/daemon/logger/awslogs/TestCreateStreamSkipped", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/negative__max-concurrent-downloads", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_same_as_block/request_more_lines_than_available", "github.com/docker/docker/client/TestTLSCloseWriter", "github.com/docker/docker/daemon/TestGetInspectData", "github.com/docker/docker/libnetwork/bitmap/TestGetFirstAvailable", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmptty", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[foo_bar_qux]]", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/3_lines", "github.com/docker/docker/libnetwork/bitmap/TestAllocateRandomDeallocateSerialize", "github.com/docker/docker/client/TestPluginEnable", "github.com/docker/docker/client/TestImageLoad/plain-text", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_twice_block/request_more_lines_than_available", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/subdir_link_relattive", "github.com/docker/docker/daemon/TestContainerList/0_containers", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/unixgram://", "github.com/docker/docker/registry/TestParseRepositoryInfo/[::2]:8000/privatebase", "github.com/docker/docker/client/TestSecretListUnsupported", "github.com/docker/docker/distribution/TestContinueOnError_MirrorEndpoint", "github.com/docker/docker/volume/service/TestFindByReferenced", "github.com/docker/docker/container/TestApplyAllContainer", "github.com/docker/docker/opts/TestListOptsWithoutValidator", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/same_leength_as_delimiter/request_more_lines_than_available", "github.com/docker/docker/libnetwork/bitmap/TestMarshalJSON", "github.com/docker/docker/pkg/stdcopy/TestStdCopyDetectsCorruptedFrame", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_half_block/1_lines", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/example.com/", "github.com/docker/docker/api/types/registry/TestDecodeAuthConfig/empty", "github.com/docker/docker/libnetwork/ipams/remote/TestGetCapabilities", "github.com/docker/docker/client/TestImagePullWithUnauthorizedErrorAndPrivilegeFuuncError", "github.com/docker/docker/daemon/cluster/executor/container/TestIsolationConversion/hyperv", "github.com/docker/docker/daemon/containerd/TestImageListCheckTotalSize/without_layers", "github.com/docker/docker/libnetwork/config/TestOptionsLabels", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/3_lines", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.com/", "github.com/docker/docker/client/TestContainerExecCreateConnectionError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/3_lines", "github.com/docker/docker/libnetwork/networkdb/TestNodeReincarnation", "github.com/docker/docker/pkg/tarsum/TestGetVersions", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Predefined_fully_allocated", "github.com/docker/docker/client/TestContainerPauseError", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/3/jsson/emf", "github.com/docker/docker/registry/TestNewServiceConfig/invalid_mirror", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/subdir_link_relative", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.comm/v1/?q=foo#frag", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/exec-opt__unknown_option", "github.com/docker/docker/pkg/plugins/TestFailedConnection", "github.com/docker/docker/pkg/stringid/TestAllNum", "github.com/docker/docker/pkg/plugins/TestClientWithRequestTimeout", "github.com/docker/docker/image/TestFSMetadataGetSet", "github.com/docker/docker/daemon/logger/splunk/TestCannotSendAfterClose", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic/seed#0", "github.com/docker/docker/registry/TestParseRepositoryInfo/example.com:8000/privaate/moonbase", "github.com/docker/docker/daemon/logger/splunk/TestRawFormatWithoutTag", "github.com/docker/docker/client/TestSwarmLeave", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/severall_small_entries/1_lines", "github.com/docker/docker/client/TestInfoInvalidResponseJSONError", "github.com/docker/docker/opts/TestParseLink", "github.com/docker/docker/daemon/logger/jsonfilelog/TestJSONFileLoggerWithTags", "github.com/docker/docker/pkg/system/TestChtimesModTime/aTime_before_Unix_Epoch_aand_mTime_set_to_Unix_Epoch", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/127.255.255.255:5000", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBufferedEvents", "github.com/docker/docker/daemon/logger/syslog/TestValidateLogOptEmpty", "github.com/docker/docker/daemon/logger/syslog/TestValidateLogOpt", "github.com/docker/docker/pkg/tarsum/TestTarSumRemoveNonExistent", "github.com/docker/docker/libnetwork/types/TestGetBroadcastIP", "github.com/docker/docker/layer/TestCommitFailure", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/StoppedEmpty/Tail", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/All", "github.com/docker/docker/errdefs/TestFromStatusCode/Internal_Server_Error#01", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/StoppedEmpty/Tail", "github.com/docker/docker/libnetwork/drvregistry/TestNetworks/Driver", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestFullAllocateSerialReleeaseParallel", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/MultipleStarts", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic/seed#4", "github.com/docker/docker/daemon/config/TestReloadWithDuplicateLabels", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRequestFromSamePool", "github.com/docker/docker/api/types/strslice/TestStrSliceUnmarshalJSON", "github.com/docker/docker/image/cache/TestPlatformCompare/different_minor_same_ossver", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_same_as_block/4_lines", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/FromEmptyLog/Tail=42", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/5_lines", "github.com/docker/docker/client/TestCheckpointDelete", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty/Until", "github.com/docker/docker/opts/TestParseHost/tcp://0.0.0.0:5555/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_half_block", "github.com/docker/docker/pkg/tarsum/TestTarSumRemove", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchClose", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_same_as_block/5_lines", "github.com/docker/docker/daemon/containerd/TestImageList/multi-platform_with_no__platforms_available_locally", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidateMountVolume", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/MoreThhanSince", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCWrite/Write_with_hash", "github.com/docker/docker/client/TestImageLoad/json_with_multiple_platforms", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_much_bigger_than_block/4_lines", "github.com/docker/docker/opts/TestParseTCP/[0:0:0:0:0:0:0:1]:5555", "github.com/docker/docker/client/TestSecretCreate", "github.com/docker/docker/libnetwork/ipams/remote/TestGetCapabilitiesFromLegacyDriver", "github.com/docker/docker/daemon/links/TestLinkEnv", "github.com/docker/docker/pkg/fileutils/TestCreateIfNotExistsFile", "github.com/docker/docker/registry/TestParseRepositoryInfo/localhost/privatebase", "github.com/docker/docker/volume/service/TestCreateKeepOptsLabelsWhenExistsRemoteely", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/udp://1.2.3.4", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/read_(r))_permission", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/MoreThanSincee", "github.com/docker/docker/client/TestContainerInspectWithEmptyID", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/no_linees/request_more_lines_than_available", "github.com/docker/docker/registry/TestValidateMirror/http://foo:bar@mirror-1.exaample.com/", "github.com/docker/docker/layer/TestMountAndRegister", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/single__line_half_block", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/severall_small_entries/request_more_lines_than_available", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Invalid_daata", "github.com/docker/docker/libnetwork/etchosts/TestAdd", "github.com/docker/docker/pkg/tarsum/TestNewTarSumForLabel", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname/ifname_set", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls:///", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped/Since", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/1/Hello", "github.com/docker/docker/cmd/dockerd/TestCDISpecDirs/CDI_enabled_and_empty_strinng_as_spec_dir_returns_empty_slice", "github.com/docker/docker/daemon/logger/TestAdapterReadLogs", "github.com/docker/docker/daemon/config/TestConfigInvalidDNS", "github.com/docker/docker/client/TestResponseErrors/JSON_error_(non-fixture)", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/::2", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCVolumeSubpath", "github.com/docker/docker/oci/FuzzAppendDevicePermissionsFromCgroupRules", "github.com/docker/docker/pkg/streamformatter/TestRawProgressFormatterFormatStatus", "github.com/docker/docker/client/TestImagePullWithoutErrors/myname/myimage", "github.com/docker/docker/daemon/events/TestEventsLogTimeout", "github.com/docker/docker/registry/resumable/TestResumableRequestReaderWithInitiaalResponse", "github.com/docker/docker/client/TestContainersPruneError", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBuffereddEvents", "github.com/docker/docker/volume/service/TestRefDerefRemove", "github.com/docker/docker/daemon/containerd/TestImageListCheckTotalSize", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/git@,_no_uurl-fragment", "github.com/docker/docker/daemon/cluster/executor/container/TestCredentialSpecConversion", "github.com/docker/docker/daemon/containerd/TestMatcherOnWindowsAmd64/various_windows", "github.com/docker/docker/pkg/fileutils/TestCopyFileWithSameSrcAndDest", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_half_block/1_lines", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen/5/", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/1/random", "github.com/docker/docker/libnetwork/cnmallocator/TestServiceNetworkUpdate", "github.com/docker/docker/daemon/containerd/TestLookup/e8fcf002", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/name:d::rw", "github.com/docker/docker/image/cache/TestPlatformCompare/different_revision", "github.com/docker/docker/client/TestSetHostHeader/npipe:////./pipe/docker_enginee", "github.com/docker/docker/daemon/logger/loggerutils/TestSharedTempFileConverter", "github.com/docker/docker/pkg/useragent/TestVersionInfo", "github.com/docker/docker/client/TestContainerExecResize", "github.com/docker/docker/libnetwork/bitmap/TestRandomAllocateDeallocate", "github.com/docker/docker/daemon/logger/local/TestDecode", "github.com/docker/docker/daemon/containerd/TestMatcherOnWindowsAmd64/various_winndows", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/udp://", "github.com/docker/docker/opts/TestValidateLabel/label_with_reserved_upcase_org.ddockerproject.*", "github.com/docker/docker/client/TestContainerRestart", "github.com/docker/docker/volume/service/TestCreate", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/Tail=0", "github.com/docker/docker/daemon/containerd/TestImageList", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/severall_small_entries/2_lines", "github.com/docker/docker/daemon/cluster/executor/container/TestTmpfsConversion", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/non-strict/linux/arm/v5=\\u003elinux/arm/v5", "github.com/docker/docker/daemon/logger/loggerutils/TestUnlinkOpenFile", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestUnusualSubnets", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/mknod_(mm)_permission", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/2_lines", "github.com/docker/docker/builder/dockerfile/TestAddFromScratchDoesNotModifyArgPllatform", "github.com/docker/docker/distribution/TestPullSchema2Config/success_first_time", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_same_as_block/request_more_lines_than_available", "github.com/docker/docker/daemon/logger/splunk/TestDefault", "github.com/docker/docker/libnetwork/types/TestGetHostPartIP", "github.com/docker/docker/errdefs/TestFromStatusCode/Conflict", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Stopped/LesssThanSince", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://:5555/path", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestOddAllocateRelease", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/MoreThanAvailable", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[qux]_[baz]]", "github.com/docker/docker/client/TestPluginList", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/invalid__permissions", "github.com/docker/docker/client/TestServiceRemoveNotFoundError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/json_encodeed_values", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap,_not_enough_space_left", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/git_schemee,_no_url-fragment", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/Until", "github.com/docker/docker/daemon/logger/TestRingClose", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/c:\\\\:/foo:rw", "github.com/docker/docker/client/TestPluginRemoveError", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:65535/some-path", "github.com/docker/docker/client/TestNodeInspectError", "github.com/docker/docker/cmd/dockerd/TestCDISpecDirs/CDI_enabled_and_specified_sspec_dirs_are_returned", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsForceFlushIIntervalSeconds/0", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidatteMountTmpfs", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.coom/v1/#frag", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/TestJSONLogsMarshalJSSONBuf", "github.com/docker/docker/pkg/streamformatter/TestStreamWriterStdout", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic//seed#0", "github.com/docker/docker/daemon/cluster/executor/container/TestTmpfsConversion/tmpfs-exec", "github.com/docker/docker/pkg/useragent/TestAppendVersions", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:65535", "github.com/docker/docker/image/TestFSWalker", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped/MoreThanSince", "github.com/docker/docker/client/TestConfigRemove", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/10_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_half_block/1_lines", "github.com/docker/docker/daemon/config/TestDaemonConfigurationNotFound", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestPoolAllocateAndReleasee/allocate_after_reserved", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/9_lines", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/1", "github.com/docker/docker/api/server/router/volume/TestCreateRegularVolume", "github.com/docker/docker/builder/dockerfile/TestDispatchUnsupportedOptions/COPY__with_chmod", "github.com/docker/docker/registry/TestMirrorEndpointLookup", "github.com/docker/docker/daemon/logger/awslogs/TestCreateSuccess", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic/seed#6", "github.com/docker/docker/container/TestGetContainer", "github.com/docker/docker/libnetwork/types/TestCompareIPMask", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_same_as_block/3_lines", "github.com/docker/docker/internal/safepath/TestIsLocalTo/1_level_subpath", "github.com/docker/docker/pkg/process/TestAlive/invalid_process_(0)", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/tcp://1.2.3.4", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_with_one_more_than_block/4_lines", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/No_content_no_overrides", "github.com/docker/docker/libnetwork/options/TestTypeMismatchError", "github.com/docker/docker/volume/service/TestRemove", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_much_bigger_than_block/request_more_lines_than_available", "github.com/docker/docker/api/types/filters/TestLen", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/9_lines", "github.com/docker/docker/runconfig/TestDecodeContainerConfigIsolation/isolation==process", "github.com/docker/docker/builder/remotecontext/TestInspectEmptyResponse", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Found_with_value", "github.com/docker/docker/internal/directory/TestSizeFileAndNestedDirectoryEmpty", "github.com/docker/docker/registry/TestV1EndpointParse/https://0.0.0.0:5000", "github.com/docker/docker/daemon/cluster/convert/TestTmpfsOptionsFromGRPC", "github.com/docker/docker/plugin/v2/TestUpdateSettingsEnv", "github.com/docker/docker/cmd/dockerd/debug/TestEnable", "github.com/docker/docker/pkg/stdcopy/TestStdCopyWriteAndRead", "github.com/docker/docker/registry/TestParseRepositoryInfo/[::1]:8000/privatebase", "github.com/docker/docker/daemon/logger/syslog/TestValidateLogOptSyslogFormat", "github.com/docker/docker/daemon/logger/TestCopierWithPartial", "github.com/docker/docker/internal/safepath/TestJoinEscapingSymlink/absolute_filee", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_twice_block/1_lines", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCConfigs/file", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/ssh,_with__url-fragment", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/7_lines", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:/tmp1", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/foo_link_absolutee", "github.com/docker/docker/opts/TestListOptsWithValidator", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/only_migrate_eth0", "github.com/docker/docker/daemon/TestContainerMigrateOS/c8d_with_an_image_thats_nno_longer_available", "github.com/docker/docker/layer/TestIsValidID/Invalid:_contains_non-hexadecimal_ccharacter", "github.com/docker/docker/internal/safepath/TestJoinEscapingSymlink/absolute_file", "github.com/docker/docker/libnetwork/networkdb/TestFlakyNetworkDBCRUDTableEntries", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBJoinLeaveNetwork", "github.com/docker/docker/opts/TestParseTCP/udp://127.0.0.1", "github.com/docker/docker/opts/TestValidateIPAddress/_127.0.0.1_", "github.com/docker/docker/client/TestNetworkConnectError", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname/nil_opts", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBuffereddEvents/0", "github.com/docker/docker/libnetwork/internal/addrset/TestFullPool", "github.com/docker/docker/daemon/logger/splunk/TestNewMissedUrl", "github.com/docker/docker/libnetwork/TestAddEpToResolver/missing_internal_resolveer", "github.com/docker/docker/libnetwork/TestReplySERVFAIL/ProxyDNS=true", "github.com/docker/docker/client/TestImagePullAnyError", "github.com/docker/docker/daemon/logger/splunk/TestRawFormatWithLabels", "github.com/docker/docker/daemon/config/TestDaemonConfigurationInvalidUnicode", "github.com/docker/docker/libnetwork/drvregistry/: TestIPAMs", "github.com/docker/docker/libnetwork/networkdb/TestFindNode", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/MoreThanAvailable", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap,_no_space_left_at_the_end,_next_pool_not_subnetted_yet", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmptty/Tail", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://unix:///run/dockerr.sock", "github.com/docker/docker/daemon/logger/awslogs/TestLogBlocking", "github.com/docker/docker/client/: TestVolumeInspectNotFound", "github.com/docker/docker/client/TestSecretInspectError", "github.com/docker/docker/libnetwork/ipams/null/TestPoolRequest", "github.com/docker/docker/volume/mounts/TestParseMountSpec", "github.com/docker/docker/errdefs/TestNotFound", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/when_using_a__'file://'_option_pointing_to_a_file_that_doesn't_exist,_it_fails_gracefully", "github.com/docker/docker/client/TestNegotiateAPIVersionAutomatic", "github.com/docker/docker/distribution/TestPullSchema2Config", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist/ExistingSlice", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/one_smaall_entry/request_more_lines_than_available", "github.com/docker/docker/client/TestContainerInspectError", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs", "github.com/docker/docker/daemon/TestSetupWindowsDevices/it_fails_if_any_'/'-sepaarated_devices_do_not_have_IDType_'class'", "github.com/docker/docker/distribution/xfer/TestConcurrencyLimit", "github.com/docker/docker/libnetwork/TestSortByNetworkType", "github.com/docker/docker/volume/mounts/TestParseMountSpec/#04", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls:////some-path", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Empty_options", "github.com/docker/docker/libnetwork/bitmap/TestSequenceGetAvailableBit", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:/", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen/1/\\\\x01\\\\x02\\\\x03\\\\x04", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/happy_path_wiith_a_'registry://'_option", "github.com/docker/docker/daemon/TestSetupWindowsDevices", "github.com/docker/docker/client/TestNetworkInspect/unknown_network", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/non-strict/linux/arm/v8=\\u003elinux/arm/v6", "github.com/docker/docker/image/TestFSDelete", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/10_lines", "github.com/docker/docker/daemon/logger/TestCopierWithSized", "github.com/docker/docker/client/TestContainerUpdate", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/major_too_high", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested,_alll_present", "github.com/docker/docker/registry/resumable/TestResumableRequestHeaderSimpleErrors", "github.com/docker/docker/builder/dockerfile/TestDispatchUnsupportedOptions/ADD_wwith_chmod", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:1123", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled/gc_disabled", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/block_(bb)_devices", "github.com/docker/docker/volume/service/TestServiceCreate", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/corrupteed:42", "github.com/docker/docker/registry/TestSearch/is-official=true,_no_results", "github.com/docker/docker/client/TestPluginEnableError", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidTag/reepo:Fo^3", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/empty_witth_invalid_MaxRestartCount_(for_backward_compatibility)", "github.com/docker/docker/libnetwork/bitmap/: TestSetInRange", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:123", "github.com/docker/docker/image/TestFSInvalidSet", "github.com/docker/docker/client/TestSwarmInspectError", "github.com/docker/docker/api/server/httputils/TestUint32Value/-1", "github.com/docker/docker/runconfig/TestDecodeContainerConfigIsolation/isolation=", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/No_content__no_overrides", "github.com/docker/docker/image/TestAddDelete", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/unix:///", "github.com/docker/docker/pkg/plugins/: TestFailedConnection", "github.com/docker/docker/daemon/logger/awslogs/TestNewStreamConfig/flush_interval_at_15", "github.com/docker/docker/libnetwork/TestNetworkStore/filter_by_configFrom", "github.com/docker/docker/opts/TestParseDockerDaemonHost/0.0.0.1:", "github.com/docker/docker/daemon/TestContainerList/4_containers", "github.com/docker/docker/plugin/v2/TestNewSettable", "github.com/docker/docker/daemon/cluster/executor/container/TestIsolationConversion/process", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp:a.b.c.d/path", "github.com/docker/docker/volume/mounts/TestValidateMount/#09", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested_on__v7_daemon,_arm64_not_available", "github.com/docker/docker/opts/TestParseTCP/localhost:", "github.com/docker/docker/opts/TestParseDockerDaemonHost/#00", "github.com/docker/docker/pkg/fileutils/TestReadSymlinkedDirectoryNonExistingSymllink", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmpty/Tail", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://[::1]", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/exec-opt__invalid_on_linux", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:123/", "github.com/docker/docker/pkg/pidfile/TestRead/non-existing_pidFile", "github.com/docker/docker/libnetwork/portallocator/TestReleaseUnreadledPort", "github.com/docker/docker/builder/dockerfile/TestAddScratchImageAddsToMounts", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:123/some-path", "github.com/docker/docker/pkg/tarsum/TestIteration", "github.com/docker/docker/builder/dockerfile/TestLabel", "github.com/docker/docker/daemon/containerd/TestImagePushIndex", "github.com/docker/docker/volume/mounts/TestValidateMount/#06", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForIntNS/No_config", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/2_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/same_llength_as_delimiter", "github.com/docker/docker/client/TestContainerCreateWithName", "github.com/docker/docker/daemon/TestContainerList/2_containers", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeDefaultAddresssPools/empty_config_file", "github.com/docker/docker/libnetwork/TestErrorInterfaces", "github.com/docker/docker/registry/TestV1EndpointParse/0.0.0.0:5000", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic//seed#3", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/[::2]:5000", "github.com/docker/docker/client/TestPluginListError", "github.com/docker/docker/layer/TestGetOrphan", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/MoreThanAvailable", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/MoreThanSince", "github.com/docker/docker/internal/containerfs/TestEnsureRemoveAllNotExist", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure/127.0.0.1:50000", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestParseEmptyInterface", "github.com/docker/docker/container/TestIsValidHealthString/unhealthy", "github.com/docker/docker/registry/TestSearch/is-official=false,_no_results", "github.com/docker/docker/api/types/filters/TestEmpty", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList/InvalidVNI", "github.com/docker/docker/daemon/cluster/controllers/plugin/TestPrepare", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_same_as_block", "github.com/docker/docker/distribution/TestManifestStore/unknown_media_type", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/8_lines", "github.com/docker/docker/libnetwork/drivers/remote/TestRemoteDriver", "github.com/docker/docker/daemon/TestContainerMigrateOS/c8d_with_linux_arm64_imagge", "github.com/docker/docker/opts/TestValidateEnv/=", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live", "github.com/docker/docker/opts/TestValidateEnv/some_space_after__", "github.com/docker/docker/pkg/parsers/operatingsystem/Test_windowsOSRelease_Strinng", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/when_using_a__'registry://'_option_and_reading_the_registry_value_fails,_it_fails_gracefully", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/single__line_half_block/1_lines", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/2_lines", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault/1_means_true", "github.com/docker/docker/client/TestServiceLogs", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/new_api_no_eps", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/SinceAndUntil", "github.com/docker/docker/volume/service/TestGetWithReference", "github.com/docker/docker/client/TestImageListApiBefore125", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_with_one_more_than_block/request_more_lines_than_available", "github.com/docker/docker/pkg/namesgenerator/TestNameRetries", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_with_one_more_than_block/3_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/json_encodeed_values/2_lines", "github.com/docker/docker/container/TestContainerLogPathSetForJSONFileLogger", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_half_block/request_more_lines_than_available", "github.com/docker/docker/client/TestSecretRemove", "github.com/docker/docker/client/TestImagePushWithoutErrors/myimage,all-tags=false", "github.com/docker/docker/client/TestCheckpointCreate", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Duplicate_'allocated'_at_the_end_of_a_predefined", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/TestFastTimeMarshalJSSONWithInvalidYear", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithTwoSubnetsNoGatteway", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/docker.io", "github.com/docker/docker/daemon/logger/loggerutils/TestTailFiles", "github.com/docker/docker/distribution/TestPushRegistryWhenAuthInfoEmpty", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_twice_block/1_lines", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/progress_1", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/name:c:", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidTag/reepo:#hashtagit", "github.com/docker/docker/pkg/pools/TestBufioWriterPoolPutAndGet", "github.com/docker/docker/client/TestImageCreate", "github.com/docker/docker/client/TestContainerTopError", "github.com/docker/docker/opts/TestParseHost/tcp://[::1]:5555", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/Since", "github.com/docker/docker/distribution/TestManifestStore", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/foo_link_relative", "github.com/docker/docker/daemon/logger/awslogs/TestParseLogOptionsDatetimeFormatt/31/12/10_Mon_08:42:44.345_NZDT", "github.com/docker/docker/distribution/TestManifestStore/unknown_media_type/no_caache", "github.com/docker/docker/internal/sliceutil/TestMap", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMerge", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.coom/", "github.com/docker/docker/libnetwork/TestReplySERVFAIL/ProxyDNS=false", "github.com/docker/docker/plugin/TestValidatePrivileges", "github.com/docker/docker/client/TestImageSave/no_platform", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[0:0:0:0:0:0:0:1]", "github.com/docker/docker/opts/TestParseTCP/0.0.0.1:5555", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen/2/🙃", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmptty/Zero", "github.com/docker/docker/opts/: TestParseTCP/localhost:", "github.com/docker/docker/api/server/middleware/TestNewVersionMiddlewareValidatioon/invalid_minimum_too_low", "github.com/docker/docker/volume/mounts/TestValidateMount/#01", "github.com/docker/docker/runconfig/TestDecodeContainerConfigIsolation/isolation==hyperv", "github.com/docker/docker/client/TestTaskList", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit/local/name:/tmp:rw", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com:65535/", "github.com/docker/docker/libnetwork/ipams/remote/TestGetCapabilitiesFromLegacyDrriver", "github.com/docker/docker/client/TestCopyToContainerNotFoundError", "github.com/docker/docker/pkg/system/TestChtimesModTime/both_aTime_and_mTime_set__to_Unix_max_time", "github.com/docker/docker/pkg/streamformatter/TestFormatStatus", "github.com/docker/docker/client/TestImageRemove", "github.com/docker/docker/internal/directory/TestSizeFileAndNestedDirectoryNonemppty", "github.com/docker/docker/daemon/TestContainerList_LimitFilter/no_limit", "github.com/docker/docker/image/cache/TestPlatformCompare/same_os_and_arch", "github.com/docker/docker/client/TestSwarmJoin", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeDefaultAddressPools", "github.com/docker/docker/client/TestPluginSet", "github.com/docker/docker/container/TestTruncIndex/id2_should_no_longer_work", "github.com/docker/docker/daemon/logger/syslog/TestParseAddressDefaultPort", "github.com/docker/docker/container/TestContainerStopTimeout", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCConfiggs", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:/tmp3:rww", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.comm/", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/LessThanAvaillable", "github.com/docker/docker/client/TestOptionWithTimeout", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithTwoSubnetsNoGateway", "github.com/docker/docker/api/types/filters/TestFromJSON/anything", "github.com/docker/docker/libnetwork/drivers/remote/TestDriverError", "github.com/docker/docker/client/TestImageList", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/on-failurre", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/AttachMidStream", "github.com/docker/docker/daemon/TestContainerList/16_containers", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCCredentiialSpec/config_credential_spec", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/os.features_witthout_os_and_architecture", "github.com/docker/docker/daemon/containerd/TestImageDelete/hasdigest", "github.com/docker/docker/client/TestImageLoadError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_same_as_block/5_lines", "github.com/docker/docker/libnetwork/cnmallocator/TestNetworkDoubleAllocate", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_much_bigger_than_block/request_more_lines_than_available", "github.com/docker/docker/daemon/logger/loggerutils/TestSharedTempFileConverter/CConvertError", "github.com/docker/docker/builder/remotecontext/TestProcessShouldRemoveDockerfileeDockerignore", "github.com/docker/docker/libnetwork/networkdb/TestParallelCreate", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBuffereddEvents/-1", "github.com/docker/docker/internal/safepath/TestIsLocalTo/backtrack", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestAddSubnets", "github.com/docker/docker/libnetwork/ipbits/TestSubnetsBetween", "github.com/docker/docker/internal/safepath/TestJoinWithSymlinkReplace", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/some_progress_with_aa_start_time", "github.com/docker/docker/libnetwork/internal/setmatrix/TestSetSerialInsertDelete", "github.com/docker/docker/client/TestInfo", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBWatch", "github.com/docker/docker/daemon/logger/awslogs/TestNewStreamConfig/invalid_flush_interval", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap,_same_prefix_in_allocated_and_reserved", "github.com/docker/docker/pkg/stdcopy/TestWriteWithNilBytes", "github.com/docker/docker/client/TestImageTagHexSource", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImageConfig/null", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCConfigs/file", "github.com/docker/docker/api/server/router/volume/TestVolumeRemoveSwarm", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.comm/v1/", "github.com/docker/docker/registry/TestSearch/is-official=true", "github.com/docker/docker/errdefs/TestUnauthorized", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/2/", "github.com/docker/docker/opts/TestParseTCP/:5555/path", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested,_onne_present", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCWrite/Write_perm", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/when_using_a__'registry://'_option_pointing_to_a_value_that_doesn't_exist,_it_fails_gracefullyy", "github.com/docker/docker/client/TestTaskInspect", "github.com/docker/docker/errdefs/TestCancelled", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen/1/\\\\x01\\\\x02\\\\x003\\\\x04", "github.com/docker/docker/api/types/filters/TestToParamWithVersion", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestOddAllocateSerialReleaaseParallel", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestPoolAllocateAndReleasee", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/LessThanSince", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_same_as_block/2_lines", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Duplicate_'allocated'", "github.com/docker/docker/daemon/logger/loggerutils/TestSharedTempFileConverter/ConvertError", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/migrate__to_new_ep", "github.com/docker/docker/client/TestContainerExecResize/valid_resize", "github.com/docker/docker/errdefs/TestInvalidParameter", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameFoundRegulaar", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/1_lines", "github.com/docker/docker/api/types/strslice/TestStrSliceMarshalJSON", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/::1", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithhNative", "github.com/docker/docker/volume/service/TestServiceRemove", "github.com/docker/docker/daemon/config/TestReloadBadDefaultConfig", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/Exact", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithhNative/export_without_specific_platform", "github.com/docker/docker/opts/TestValidateIPAddress/random_invalid_string", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com:/", "github.com/docker/docker/daemon/TestContainerList_LimitFilter/limit_1_container", "github.com/docker/docker/api/server/httputils/TestReadJSON/invalid_JSON", "github.com/docker/docker/client/TestConfigCreateUnsupported", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/no_progress", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/json_encodeed_values/5_lines", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_non-empty_to__empty", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/FromEmptyyLog/Tail=0", "github.com/docker/docker/daemon/TestDeriveULABaseNetwork/499d4bc0-b0b3-416f-b1eee-cf6486315593", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/LessThanSincee", "github.com/docker/docker/builder/dockerfile/TestAddFromScratchPopulatesPlatformIfNil", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList/DoesNotAllocate", "github.com/docker/docker/pkg/fileutils/TestCopyFile", "github.com/docker/docker/errdefs/TestFromStatusCode/Service_Unavailable", "github.com/docker/docker/pkg/plugins/: TestPluginAddHandler", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1:", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/migrate__nothing", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/2_lines", "github.com/docker/docker/builder/builder-next/exporter/mobyexporter/TestPatchImageConfig/empty", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/[::1]:665535", "github.com/docker/docker/client/TestServiceRemove", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/example.com:5000", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/no_linees", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/127.0.0.1", "github.com/docker/docker/client/TestConfigUpdateUnsupported", "github.com/docker/docker/pkg/plugins/TestFileJSONSpecPluginWithoutTLSConfig", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/3_lines", "github.com/docker/docker/volume/mounts/TestParseMountSpec/#03", "github.com/docker/docker/cmd/dockerd/TestConfigureDaemonLogs", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/5_lines", "github.com/docker/docker/runconfig/TestDecodeContainerConfigIsolation/isolation==invalid", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist/DoesNotAllocate", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/LessThanSince", "github.com/docker/docker/container/TestStateTimeoutWait", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_much_bigger_than_block/request_more_lines_than_available", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/severaal_small_entries/1_lines", "github.com/docker/docker/daemon/TestContainerMigrateOS/c8d_with_linux_arm64_image", "github.com/docker/docker/daemon/TestContainerMigrateOS/c8d_with_ImageManifest_thhat_is_no_longer_available", "github.com/docker/docker/daemon/TestSetupWindowsDevices/it_fails_if_all_'/'-sepaarated_devices_do_not_have_IDType_'class'", "github.com/docker/docker/libnetwork/networkdb/TestChangeNodeState", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/it_rejects_emmpty_values_for_raw", "github.com/docker/docker/image/TestFSGetUnsetKey", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/Until", "github.com/docker/docker/client/TestResponseErrors/JSON_error", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithLogFormat", "github.com/docker/docker/volume/service/TestList", "github.com/docker/docker/opts/TestParseTCP/default_udp://localhost", "github.com/docker/docker/builder/remotecontext/git/TestGitInvalidRef", "github.com/docker/docker/client/TestImagePushWithUnauthorizedErrorAndAnotherUnauuthorizedError", "github.com/docker/docker/container/TestTruncIndex/conflicts_between_id[:6]_and_iid2_should_be_gone", "github.com/docker/docker/daemon/cluster/executor/container/TestCredentialSpecConversion/config", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested_on__v5_daemon,_arm64_not_available", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid", "github.com/docker/docker/client/TestNetworksPrune", "github.com/docker/docker/libnetwork/types/TestErrorConstructors", "github.com/docker/docker/opts/TestValidateLabel", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateInvalidIPAM", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestOverlappingRequests", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_same_as_block/5_lines", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Empty_IPAMM_is_valid", "github.com/docker/docker/opts/TestParseTCP/[::1]:5555/path", "github.com/docker/docker/client/TestServiceUpdateConnectionError", "github.com/docker/docker/distribution/xfer/TestInactiveJobs", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped", "github.com/docker/docker/container/TestTruncIndex/id2_should_work", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/same_llength_as_delimiter/request_more_lines_than_available", "github.com/docker/docker/registry/TestNewIndexInfo/no_mirrors/docker.io", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/Untill", "github.com/docker/docker/daemon/containerd/TestImageDelete/justoneref", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Live/SinceAndUntill", "github.com/docker/docker/daemon/TestContainerMigrateOS/gd_with_windows_image", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestAllocateRandomDeallocate", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Found_last_value", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/same_leength_as_delimiter/1_lines", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/Concurrent", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCIsolation/empty", "github.com/docker/docker/opts/TestParseHost/tcp://docker.com:5555", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/connfig_and_fsLayers", "github.com/docker/docker/opts/TestParseHost/something_with_spaces", "github.com/docker/docker/client/TestCustomAPIVersion/#00", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMultilinePatternNNegativeEventAge", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/LiveEmpty/Tail", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/name:/foo:rw", "github.com/docker/docker/container/TestNewMemoryStore", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/3_lines", "github.com/docker/docker/distribution/TestManifestStore/no_local_cache/digested", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/udp://1..2.3.4", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter", "github.com/docker/docker/client/TestImagePushWithoutErrors/myimage,all-tags=true", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_with_one_more_than_block", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsForceFlushIIntervalSeconds/-1", "github.com/docker/docker/daemon/logger/awslogs/TestNewAWSLogsClientUserAgentHandler", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCInvalidNS", "github.com/docker/docker/libnetwork/drvregistry/TestIPAMs/WalkIPAMs", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/one_smaall_entry/1_lines", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/ssh,_with__url-fragment_and_user", "github.com/docker/docker/registry/TestValidateMirror/https://localhost", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/minor_too_high", "github.com/docker/docker/cmd/dockerd/debug/TestEnabled", "github.com/docker/docker/runconfig/TestDecodeContainerConfigIsolation/isolation==default", "github.com/docker/docker/daemon/TestContainerDelete/paused_container", "github.com/docker/docker/distribution/TestManifestStore/with_local_cache", "github.com/docker/docker/container/TestViewGet", "github.com/docker/docker/volume/mounts/TestValidateMount/#02", "github.com/docker/docker/pkg/plugins/TestBackoff", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/0/", "github.com/docker/docker/client/TestContainerWaitErrorHandling/invalid_json", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/truncated_last_line/moree_than_available", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidRepo/aaa/asdf$$^/aa", "github.com/docker/docker/registry/TestNewServiceConfig/invalid_insecure_registry", "github.com/docker/docker/daemon/logger/journald/internal/export/TestExportSeriallization", "github.com/docker/docker/libnetwork/internal/setmatrix/TestSetParallelInsertDelete", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist/InvalidVNI", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateEmptyConfig", "github.com/docker/docker/libnetwork/drvregistry/TestNetworks", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/9_lines", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[foo_bar]]", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/on-failure", "github.com/docker/docker/client/TestResponseErrors/html_error_masquerading_as_JSSON", "github.com/docker/docker/client/TestNegotiateAPIVersion", "github.com/docker/docker/pkg/parsers/TestParseUintListMaximumLimits", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCWrite", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.168.1.1:123/", "github.com/docker/docker/plugin/v2/TestIsSettable", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://", "github.com/docker/docker/registry/TestSearch/empty_results", "github.com/docker/docker/client/TestContainerCreateImageNotFound", "github.com/docker/docker/daemon/containerd/TestImageList/one_multi-layer_image", "github.com/docker/docker/image/TestFSInvalidRoot", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault/two_bad_values", "github.com/docker/docker/pkg/fileutils/TestCopyFileWithSameSrcAndDestWithPathNammeDifferent", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink/subdir_link_absolute", "github.com/docker/docker/libnetwork/TestReplySERVFAIL", "github.com/docker/docker/client/TestVolumeListError", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidRepo/FFoo$3", "github.com/docker/docker/client/TestContainerStatPath", "github.com/docker/docker/pkg/system/TestChtimesATimeWindows/both_aTime_and_mTimee_set_to_Unix_Epoch", "github.com/docker/docker/volume/mounts/FuzzParseLinux", "github.com/docker/docker/client/TestContainerWaitConnectionError", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap_by_allocated_of_different_sizes", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption", "github.com/docker/docker/libnetwork/TestAddEpToResolver/disabled_internal_resolvver", "github.com/docker/docker/pkg/stdcopy/TestWrite", "github.com/docker/docker/daemon/events/TestLoadBufferedEventsOnlyFromPast", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithOneSubnetGateway", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/LessThhanAvailable", "github.com/docker/docker/libnetwork/bitmap/TestSequenceEqual", "github.com/docker/docker/libnetwork/bitmap/TestSetInRange", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled/gc_enabled", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/TestFastTimeMarshalJSONWithInvalidYear", "github.com/docker/docker/internal/safepath/TestJoinGoodSymlink", "github.com/docker/docker/distribution/TestGetRepositoryMountCandidates", "github.com/docker/docker/container/TestCorrectStateWaitResultAfterRestart", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithOneSubnet", "github.com/docker/docker/pkg/streamformatter/TestJsonProgressFormatterFormatStatus", "github.com/docker/docker/client/TestNodeInspectNodeNotFound", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Stopped/Until", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidatteMountTarget", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[foo]]", "github.com/docker/docker/libnetwork/internal/addrset/TestIPv6Pool", "github.com/docker/docker/opts/TestParseDockerDaemonHost/[0:0:0:0:0:0:0:1]:5555", "github.com/docker/docker/image/TestParentReset", "github.com/docker/docker/pkg/pools/TestBufioReaderPoolGetWithNoReaderShouldCreateOne", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/SinceAndUntil", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/LiveEmpty/SinceAndUntil", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_much_bigger_than_block/2_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/8_lines", "github.com/docker/docker/internal/opts/TestSetOpts", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/amd64_requessted,_all_present", "github.com/docker/docker/volume/service/TestFilterFunc/test_nothing_to_filter_noon-empty_list", "github.com/docker/docker/opts/TestParseTCP/[0:0:0:0:0:0:0:1]:5555/path", "github.com/docker/docker/registry/TestResolveAuthConfigFullURL", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#05", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[qux]_[foo]]", "github.com/docker/docker/daemon/containerd/TestImageList/two_images_are_two_entries", "github.com/docker/docker/distribution/TestManifestStore/no_local_cache", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:/some-path", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//First_reserved_bigger_than_first_allocated", "github.com/docker/docker/pkg/system/TestChtimesATimeWindows", "github.com/docker/docker/libnetwork/drvregistry/TestNetworks/RegisterDuplicateDrriver", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/All", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/network-ddiagnostic-port_out_of_range", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/3_lines", "github.com/docker/docker/api/types/filters/TestArgsMatchKVListEmptySources", "github.com/docker/docker/client/TestSetHostHeader/unix:///var/run/docker.sock", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/one_smaall_entry/request_more_lines_than_available", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList/ExistingSlice", "github.com/docker/docker/pkg/pools/TestNewWriteCloserWrapperWithAWriteCloser", "github.com/docker/docker/image/cache/TestPlatformCompare/different_arch_same_osver", "github.com/docker/docker/distribution/xfer/TestMaxDownloadAttempts/max-attempts==5,_succeed_at_2nd_attempt", "github.com/docker/docker/volume/service/TestSetGetMeta", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_same_as_block/3_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/5_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_same_as_block/3_lines", "github.com/docker/docker/client/TestContainerExport", "github.com/docker/docker/opts/TestValidateEnv/asd!qwe", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/missing_architecture", "github.com/docker/docker/image/cache/TestPlatformCompare", "github.com/docker/docker/image/TestCreate", "github.com/docker/docker/client/TestImagePullWithUnauthorizedErrorAndAnotherUnauuthorizedError", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidRepo/FFoo@3cc", "github.com/docker/docker/daemon/events/TestEventsLog", "github.com/docker/docker/daemon/links/TestLinkNew", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCCredentialSpec", "github.com/docker/docker/opts/TestParseTCP/[0:0:0:0:0:0:0:1]:", "github.com/docker/docker/opts/TestParseHost/tcp://[::1]:", "github.com/docker/docker/client/: TestContainerInspectError", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/MultipleStarts", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliWithDuplicateLabels", "github.com/docker/docker/libnetwork/etchosts/TestUpdateIgnoresPrefixedHostname", "github.com/docker/docker/internal/multierror/TestErrorJoin", "github.com/docker/docker/opts/TestParseLink/empty_string", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com:123", "github.com/docker/docker/libnetwork/drivers/overlay/ovmanager/TestNetworkAllocatteFree", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Valid_IPAM", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBSimple", "github.com/docker/docker/image/cache/TestPlatformCompare/same_os_higher_host_varriant", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_twice_block", "github.com/docker/docker/daemon/logger/awslogs/TestCreateError", "github.com/docker/docker/registry/TestNewIndexInfo/no_mirrors/127.0.0.1:5000", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_much_bigger_than_block/2_lines", "github.com/docker/docker/client/TestPluginInspect", "github.com/docker/docker/distribution/TestTokenPassThruDifferentHost", "github.com/docker/docker/client/TestCustomAPIVersion/1.0", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_first_and_last", "github.com/docker/docker/client/TestImagePushStatusUnauthorizedError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_with_one_more_than_block/5_lines", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCCredenntialSpec/registry_credential_spec", "github.com/docker/docker/libnetwork/options/TestGenerate", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/single__line_same_as_block/1_lines", "github.com/docker/docker/daemon/TestFillLicense", "github.com/docker/docker/internal/usergroup/TestParseSubidFileWithNewlinesAndComments", "github.com/docker/docker/api/server/httputils/TestUint32Value", "github.com/docker/docker/daemon/logger/jsonfilelog/FuzzLoggerDecode", "github.com/docker/docker/container/TestIsValidHealthString/healthy", "github.com/docker/docker/pkg/tailfile/TestTailFile", "github.com/docker/docker/libnetwork/TestInvalidReverseDNS", "github.com/docker/docker/builder/dockerfile/TestWorkdir", "github.com/docker/docker/client/TestPluginSetError", "github.com/docker/docker/daemon/containerd/TestImageDelete/otherreporemaining", "github.com/docker/docker/daemon/logger/splunk/TestBatching", "github.com/docker/docker/client/TestSwarmGetUnlockKey", "github.com/docker/docker/pkg/system/TestChtimesModTime", "github.com/docker/docker/client/TestServiceInspectServiceNotFound", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_same_as_block", "github.com/docker/docker/volume/drivers/TestGetDriver", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/Tail=0", "github.com/docker/docker/client/TestContainerStartError", "github.com/docker/docker/container/stream/bytespipe/TestFixedBufferCap", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/wildcardd_major_and_minor", "github.com/docker/docker/pkg/stdcopy/TestStdCopyDetectsNotFullyWrittenFrames", "github.com/docker/docker/pkg/stdcopy/TestStdCopyReturnsErrorReadingFrame", "github.com/docker/docker/builder/dockerfile/TestUser", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/9_lines", "github.com/docker/docker/registry/TestValidateMirror", "github.com/docker/docker/daemon/config/TestValidateConfiguration", "github.com/docker/docker/registry/TestSearch/stars=1", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/10_lines", "github.com/docker/docker/daemon/TestContainerList_InvalidFilter", "github.com/docker/docker/daemon/images/TestContentStoreForPull", "github.com/docker/docker/pkg/pools/TestBufferPoolPutAndGet", "github.com/docker/docker/libnetwork/TestNetworkStore/no_filter", "github.com/docker/docker/daemon/logger/awslogs/TestPublishBatchError", "github.com/docker/docker/daemon/logger/jsonfilelog/TestJSONFileLoggerWithLabelsEEnv", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic//seed#2", "github.com/docker/docker/registry/TestNewIndexInfo/custom_insecure/127.0.0.1", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliWithConflictingLabels", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchWithDuplicateTimestamps", "github.com/docker/docker/builder/remotecontext/TestDownloadRemote", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen/0/Hello", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/example.com:", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[bar]_[foo]]", "github.com/docker/docker/daemon/logger/TestCopierLongLines", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithoutTLSVerify", "github.com/docker/docker/daemon/logger/splunk/TestNewWithProxy", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeConcurrent", "github.com/docker/docker/builder/dockerfile/TestFromWithUndefinedArg", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/seeveral_small_entries", "github.com/docker/docker/builder/dockerfile/TestDispatch/COPY_multiple_files_to_file", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic//seed#4", "github.com/docker/docker/layer/TestIsValidID/Invalid:_contains_uppercase_letter", "github.com/docker/docker/pkg/plugins/TestPluginWaitBadPlugin", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/https_scheeme,_no_url-fragment", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Extra_reserved,_no_pool_left", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/driver/name:/", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCConfigs//file", "github.com/docker/docker/pkg/process/TestAlive/invalid_process_(-123)", "github.com/docker/docker/pkg/tarsum/TestTarSums", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress", "github.com/docker/docker/client/TestNegotiateAPIVersion/downgrade_legacy", "github.com/docker/docker/registry/TestSearch/is-official=false", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/current_more_than_tootal_is_not_negative_gh#7136", "github.com/docker/docker/internal/directory/TestSizeNonExistingDirectory", "github.com/docker/docker/image/TestStoreLen", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap_at_the_beginning,_single_predefined", "github.com/docker/docker/distribution/xfer/TestMaxDownloadAttempts/max-attempts==5,_succeed_at_5th_attempt", "github.com/docker/docker/distribution/TestManifestStore/unknown_media_type/with__cache", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/it_rejects_emmpty_values_for_file", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/char_(c))_devices", "github.com/docker/docker/opts/TestParseTCP/#00", "github.com/docker/docker/daemon/logger/awslogs/TestCreateLogGroupSuccess", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithSmallSubnet", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/migratioon_disabled_for_newer_api", "github.com/docker/docker/pkg/plugins/TestAbortRetry/duration:_40s", "github.com/docker/docker/registry/resumable/TestResumableRequestReader", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/FromEmptyLog/Tail=0", "github.com/docker/docker/distribution/TestManifestStore/error_persisting_manifesst", "github.com/docker/docker/client/TestDistributionInspectUnsupported", "github.com/docker/docker/opts/TestParseDockerDaemonHost/unix://tcp://127.0.0.1", "github.com/docker/docker/client/TestContainerResize/valid_resize", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/severaal_small_entries", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/5_lines", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#03", "github.com/docker/docker/libnetwork/etchosts/TestAddEmpty", "github.com/docker/docker/testutil/TestGenerateRandomAlphaOnlyStringLength", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/empty", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.168.1.1:", "github.com/docker/docker/daemon/containerd/TestLookup/fail-inconsistency", "github.com/docker/docker/client/TestResponseErrors/JSON_error_on_old_API", "github.com/docker/docker/internal/sliceutil/TestMapper", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname/ifname_set_to_nil", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType", "github.com/docker/docker/distribution/TestContinueOnError_NeverContinue", "github.com/docker/docker/daemon/containerd/TestImageListCheckTotalSize/without_llayers", "github.com/docker/docker/opts/TestValidateEnv/123", "github.com/docker/docker/container/stream/TestUnbuffered", "github.com/docker/docker/container/TestTruncIndex", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_twice_block/request_more_lines_than_available", "github.com/docker/docker/distribution/TestPullSchema2Config/unauthorized_JSON_noo_body", "github.com/docker/docker/client/TestContainerWaitErrorHandling", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithTLS", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/no_lines", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/StoppedEmpty", "github.com/docker/docker/opts/TestParseTCP/[::1]:", "github.com/docker/docker/daemon/containerd/TestImageDelete/nothingthere", "github.com/docker/docker/builder/remotecontext/git/TestParseRemoteURL/ssh,_no_urrl-fragment", "github.com/docker/docker/opts/TestParseTCP/localhost:5555/path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/no_lines", "github.com/docker/docker/daemon/config/TestValidateMinAPIVersion/with_prefix", "github.com/docker/docker/daemon/containerd/TestImageInspect/inspect_image_with_mmanifests_but_missing_platform_blobs/manifests=true", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaType/oci_index__fallback", "github.com/docker/docker/registry/TestParseRepositoryInfo/example.com/privatebase", "github.com/docker/docker/pkg/process/TestAlive", "github.com/docker/docker/libnetwork/bitmap/TestSetUnset", "github.com/docker/docker/libnetwork/cnmallocator/TestDeallocateServiceAllocateIngressMode", "github.com/docker/docker/daemon/logger/awslogs/TestNewStreamConfig/defaults", "github.com/docker/docker/image/TestFSWalkerStopOnError", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Invalid_data", "github.com/docker/docker/client/TestNetworkInspect/global_scope", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMultilinePatternMaxEventSize", "github.com/docker/docker/pkg/plugins/TestPluginWithNoManifest", "github.com/docker/docker/image/cache/TestPlatformCompare/different_build_and_revvision", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com:/some-path", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRaw", "github.com/docker/docker/builder/dockerfile/TestDeepCopyRunConfig", "github.com/docker/docker/libnetwork/cnmallocator/TestValidateDriver", "github.com/docker/docker/registry/resumable/TestResumableRequestHeaderNotTooMuchFailures", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameNotFoundNotManager", "github.com/docker/docker/client/TestConfigCreateError", "github.com/docker/docker/registry/TestV1EndpointValidate", "github.com/docker/docker/client/TestImageHistoryError", "github.com/docker/docker/pkg/stringid/TestTruncateID/very_long_ID", "github.com/docker/docker/client/TestContainerRenameError", "github.com/docker/docker/daemon/TestSetupWindowsDevices/it_creates_devices_when__given_a_mix_of_'/'-separated_and_'://'-separated_devices", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForLegacyNw", "github.com/docker/docker/daemon/TestSetupWindowsDevices/it_creates_devices_if_alll_'://'-separated_devices_have_non-blank_IDType", "github.com/docker/docker/volume/local/TestGetAddress", "github.com/docker/docker/daemon/TestContainerDelete/restarting_container", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNIList/EmptySlice", "github.com/docker/docker/client/TestNegotiateAPIVersion/downgrade_from_default", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/SinceAndUntil", "github.com/docker/docker/daemon/TestDaemonReloadNotAffectOthers", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/json_eencoded_values/9_lines", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors/negative_MTU", "github.com/docker/docker/daemon/logger/loggerutils/TestQueue", "github.com/docker/docker/client/TestCheckpointListError", "github.com/docker/docker/daemon/logger/awslogs/TestLogBufferEmpty", "github.com/docker/docker/cmd/dockerd/TestCommonOptionsInstallFlagsWithDefaults", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested_on__v7_daemon,_v5_in_index_but_not_v7,_v5_present", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/Since", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/on-failurre_with_negative_MaxRestartCount", "github.com/docker/docker/pkg/streamformatter/TestFormatJSONError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_much_bigger_than_block/4_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_much_bigger_than_block/4_lines", "github.com/docker/docker/daemon/TestGetContainer", "github.com/docker/docker/daemon/TestMerge", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCWrite/Write_with_hhash", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCIsolation", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true", "github.com/docker/docker/pkg/plugins/TestAbortRetry", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/FromEmptyyLog/Tail=42", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_with_one_more_than_block/3_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_twice_block", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls://eexample.com/", "github.com/docker/docker/api/types/filters/TestFromJSON/['a','list']", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/no_lines", "github.com/docker/docker/errdefs/TestFromStatusCode/Bad_Request", "github.com/docker/docker/client/TestPluginPush", "github.com/docker/docker/builder/dockerfile/TestHealthcheckNone", "github.com/docker/docker/api/server/middleware/TestNewVersionMiddlewareValidatioon/invalid_minimum_too_high", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested_on__v7_daemon,_v5_in_index_but_not_v7,_all_present", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/0", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCConfigs/runtime", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit/name:/named3::ro", "github.com/docker/docker/builder/dockerfile/TestExportImage", "github.com/docker/docker/client/TestImageTag", "github.com/docker/docker/daemon/TestContainerMigrateOS/gd_pre-OS_container", "github.com/docker/docker/pkg/fileutils/TestCopyFileWithInvalidSrc", "github.com/docker/docker/daemon/TestContainerDelete", "github.com/docker/docker/opts/TestValidateEnv/=a", "github.com/docker/docker/daemon/logger/awslogs/TestPublishBatchSuccess", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/several_smaall_entries/2_lines", "github.com/docker/docker/client/TestContainerExecStart", "github.com/docker/docker/container/stream/TestAttachNoIO/stderr_only", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCIsolation/proCess", "github.com/docker/docker/daemon/TestEnsureServicesExistErrors/daemon_windows_tesst_fakeservice1;daemon_windows_test_fakeservice2", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidTag/reepo:..", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/7_lines", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'type'", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/seeveral_small_entries/request_more_lines_than_available", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/6_lines", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/missing_architeecture", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/Live/SinceAndUntil", "github.com/docker/docker/client/TestContainerStopConnectionError", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidTag/reepo:%goodbye", "github.com/docker/docker/plugin/TestStoreGetPluginNotMatchCapRefs", "github.com/docker/docker/container/stream/TestAttachNoIO/stdin+stdout", "github.com/docker/docker/client/TestSecretInspectWithEmptyID", "github.com/docker/docker/internal/directory/TestSizeEmpty", "github.com/docker/docker/client/TestCopyFromContainerNoHeaderError", "github.com/docker/docker/pkg/stringid/TestTruncateID", "github.com/docker/docker/client/TestConfigList", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/FromEmptyyLog/Tail=-1", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/negativee_major_device", "github.com/docker/docker/opts/TestParseTCP/tcp://:5555", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCConfigs/runtime", "github.com/docker/docker/volume/mounts/TestValidateMount/#10", "github.com/docker/docker/daemon/logger/awslogs/TestPublishBatchInvalidSeqSuccesss", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls:///some-path", "github.com/docker/docker/errdefs/TestFromStatusCode/Internal_Server_Error#03", "github.com/docker/docker/daemon/containerd/TestImageInspect/inspect_image_with_mmanifests_but_missing_platform_blobs", "github.com/docker/docker/client/TestCopyToContainerEmptyResponse", "github.com/docker/docker/client/TestPingWithError", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#06", "github.com/docker/docker/opts/TestUlimitOpt", "github.com/docker/docker/client/TestWithUserAgent/custom_headers", "github.com/docker/docker/daemon/containerd/TestMatcherOnWindowsAmd64", "github.com/docker/docker/container/TestTruncIndex/non-conflicting_7_character_suubstrings_should_still_not_conflict", "github.com/docker/docker/distribution/TestManifestStore/no_remote_or_local", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/1_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizzes/request_more_lines_than_available", "github.com/docker/docker/api/types/filters/TestFromJSON/{\\", "github.com/docker/docker/image/TestFSGetEmptyData", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBCRUDMediumCluster", "github.com/docker/docker/registry/resumable/TestResumableRequestHeaderTooMuchFailures", "github.com/docker/docker/client/TestImageInspectWithPlatform", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/LessThanSince", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_same_as_block", "github.com/docker/docker/pkg/stdcopy/TestStdCopyWithInvalidInputHeader", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled/empty_gc", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/arm/v5_requeested,_but_not_in_index", "github.com/docker/docker/client/TestServiceRemoveError", "github.com/docker/docker/container/TestContainerLogPathSetForRingLogger", "github.com/docker/docker/client/: TestConfigInspectNotFound", "github.com/docker/docker/api/server/httputils/TestDecodePlatform", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsDatetimeForrmatAndMultilinePattern", "github.com/docker/docker/client/TestSecretCreateError", "github.com/docker/docker/builder/dockerfile/TestHealthcheckCmd", "github.com/docker/docker/opts/TestParseHost/__", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/LiveEmpty/Tail", "github.com/docker/docker/client/TestWithUserAgent", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/SinceAndUntil", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/1_lines", "github.com/docker/docker/distribution/xfer/TestCancelledUpload", "github.com/docker/docker/registry/TestLoadInsecureRegistries", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/Empty_overrides", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/SinceAndUntil", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/3_lines", "github.com/docker/docker/client/TestContainerExecCreate", "github.com/docker/docker/daemon/logger/splunk/TestRawFormat", "github.com/docker/docker/api/types/network/TestEndpointIPAMConfigWithOutOfRangeAAddrs", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithhoutNative/export_native", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/arm/v5_requeested,_but_not_available", "github.com/docker/docker/client/TestEncodePlatforms", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_much_bigger_than_block/5_lines", "github.com/docker/docker/client/: TestConfigListUnsupported", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/saame_length_as_delimiter/request_more_lines_than_available", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestFullAllocateRelease", "github.com/docker/docker/pkg/authorization/TestPeerCertificateMarshalJSON/Marshalling_:", "github.com/docker/docker/pkg/streamformatter/TestStreamWriterStderr", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCConfigs", "github.com/docker/docker/daemon/images/TestOnlyPlatformWithFallback", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRequestPoolParallel", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/Zero", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty/ZZero", "github.com/docker/docker/client/TestContainerUnpauseError", "github.com/docker/docker/daemon/containerd/TestLookup/ubuntu:nonexistent", "github.com/docker/docker/daemon/graphdriver/TestIsEmptyDir", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/single__line_same_as_block/request_more_lines_than_available", "github.com/docker/docker/client/TestNegotiateAPIVersion/downgrade_old", "github.com/docker/docker/registry/TestValidateMirror/https://localhost:5000", "github.com/docker/docker/opts/TestValidateLabel/label_with_reserved_upcase_io.doocker.*", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/Until", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/multiplle_lines_much_bigger_than_block", "github.com/docker/docker/pkg/plugins/transport/TestHTTPTransport", "github.com/docker/docker/client/TestServiceInspect", "github.com/docker/docker/opts/TestParseHost/tcp://0.0.0.0:1234567890", "github.com/docker/docker/daemon/cluster/convert/TestVolumeAvailabilityFromGRPC/Pause", "github.com/docker/docker/pkg/tailfile/TestTailFileManyLines", "github.com/docker/docker/client/TestImageSave/platform", "github.com/docker/docker/daemon/containerd/TestImageDelete/sha256:218b9d0ac3f27002e04991914a7905270e6450d79887f0b3993c6945812024ea6", "github.com/docker/docker/client/TestContainerWaitErrorHandling/context_canceled", "github.com/docker/docker/client/TestSwarmUnlockError", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForIntNS/IPv6_only", "github.com/docker/docker/container/TestTruncIndex/1_character_should_conflict", "github.com/docker/docker/builder/dockerfile/TestWarnOnUnusedBuildArgs", "github.com/docker/docker/daemon/logger/awslogs/TestNewStreamConfig", "github.com/docker/docker/opts/TestParseHost/tcp://:5555/", "github.com/docker/docker/daemon/logger/splunk/TestInlineFormatWithNonDefaultOptions", "github.com/docker/docker/opts/TestValidateEnv/PaTh", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/single__line_twice_block", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsForceFlushIIntervalSeconds", "github.com/docker/docker/volume/mounts/TestParseMountSpec/#01", "github.com/docker/docker/layer/TestIsValidID/Invalid:_only_-init_suffix", "github.com/docker/docker/api/types/filters/TestMarshalJSON", "github.com/docker/docker/layer/TestStartTransactionFailure", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat", "github.com/docker/docker/reference/TestAddDeleteGet", "github.com/docker/docker/builder/dockerfile/TestNormalizeWorkdir", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:/tmp2:ro", "github.com/docker/docker/opts/TestParseHost/fd://something", "github.com/docker/docker/errdefs/TestFromStatusCode/Forbidden", "github.com/docker/docker/builder/remotecontext/TestProcessShouldLeaveAllFiles", "github.com/docker/docker/volume/drivers/TestVolumeRequestError", "github.com/docker/docker/daemon/cluster/executor/container/TestControllerValidateMountTmpfs", "github.com/docker/docker/integration/internal/termtest/TestStripANSICommands/#000", "github.com/docker/docker/opts/TestParseHost/tcp://", "github.com/docker/docker/registry/TestNewIndexInfo", "github.com/docker/docker/builder/remotecontext/git/TestCloneArgsDumbHttp", "github.com/docker/docker/daemon/containerd/TestImageList/a_non-container_image_manifest", "github.com/docker/docker/client/TestPluginPushError", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMaxTotalBytesWithhBinary", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.coom#frag", "github.com/docker/docker/internal/safepath/TestIsLocalTo", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tls:////", "github.com/docker/docker/client/TestNetworkInspect/server_error", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested,_twwo_present,_daemon_platform_available", "github.com/docker/docker/opts/TestParseDockerDaemonHost/npipe:////./pipe/foo", "github.com/docker/docker/api/types/filters/TestFromJSON", "github.com/docker/docker/daemon/logger/TestCopierWithSized/With_RingLogger", "github.com/docker/docker/pkg/streamformatter/TestFormatError", "github.com/docker/docker/builder/remotecontext/urlutil/TestIsGIT", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/schhema_2_mediaType_with_manifests", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_much_bigger_than_block", "github.com/docker/docker/api/server/httputils/TestReadJSON/nil_body", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/several_smaall_entries/request_more_lines_than_available", "github.com/docker/docker/distribution/xfer/TestWatchRelease", "github.com/docker/docker/client/TestNetworkInspect/no_options", "github.com/docker/docker/api/server/httputils/TestBoolValue", "github.com/docker/docker/registry/TestValidateMirror/http://mirror-1.example.comm/?q=foo", "github.com/docker/docker/client/TestSwarmJoinError", "github.com/docker/docker/opts/TestParseHost/#00", "github.com/docker/docker/client/TestImagePullReferenceParseError", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/LiveEmpty/Since", "github.com/docker/docker/pkg/longpath/TestUNCLongPath", "github.com/docker/docker/libnetwork/drivers/remote/TestRollback", "github.com/docker/docker/pkg/plugins/TestAbortRetry/duration:_30s", "github.com/docker/docker/client/TestImagesPruneError", "github.com/docker/docker/daemon/containerd/TestImageMultiplatformSaveShallowWithhNative/export_missing", "github.com/docker/docker/distribution/TestDetectManifestBlobMediaTypeInvalid/inddex_mediaType_with_config", "github.com/docker/docker/daemon/cluster/TestNewListSecretsFilters", "github.com/docker/docker/distribution/TestContinueOnError_NonMirrorEndpoint", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/FromEmptyLog/Tail=1", "github.com/docker/docker/opts/TestParseTCP/[::1]", "github.com/docker/docker/pkg/jsonmessage/TestProgressString/some_progress_withouut_a_start_time", "github.com/docker/docker/pkg/plugins/TestBackoff/retries:_1", "github.com/docker/docker/libcontainerd/queue/TestSerialization", "github.com/docker/docker/daemon/logger/loggerutils/TestSharedTempFileConverter/RRobustToRenames", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/Sincee", "github.com/docker/docker/dockerversion/TestDockerUserAgent/daemon_user-agent_cusstom_metadata", "github.com/docker/docker/libnetwork/portallocator/TestReuseReleasedPort", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/variouus_sizes/1_lines", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameNotFoundNoSSwarm", "github.com/docker/docker/daemon/cluster/convert/TestVolumeAvailabilityFromGRPC/Drain", "github.com/docker/docker/container/TestTruncIndex/6_characters_should_conflict", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_twice_block/request_more_lines_than_available", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#02", "github.com/docker/docker/internal/multierror/TestErrorJoin/multiple", "github.com/docker/docker/daemon/containerd/TestImageDelete/onerefoftwo", "github.com/docker/docker/libnetwork/: TestOversizedDNSReply", "github.com/docker/docker/libnetwork/drivers/overlay/FuzzVNIMatchBPFDoesNotPanic/seed#2", "github.com/docker/docker/registry/TestSearch/is-automated=false,_IsAutomated_resset_to_false", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchTicker", "github.com/docker/docker/api/types/filters/TestGetBoolOrDefault", "github.com/docker/docker/daemon/logger/jsonfilelog/TestEncodeDecode", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:\\\\:ffoo", "github.com/docker/docker/api/server/httputils/TestDecodePlatform/missing_os", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/vaarious_sizes/7_lines", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen/3/����", "github.com/docker/docker/api/server/httputils/TestInt64ValueOrZero", "github.com/docker/docker/internal/sliceutil/TestMap_TypeConvert", "github.com/docker/docker/client/TestDeadlineExceededContext", "github.com/docker/docker/opts/TestParseHost/_tcp://:5555/path_", "github.com/docker/docker/daemon/cluster/controllers/plugin/TestStart", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/TestJSONLogsMarshalJSONBuf", "github.com/docker/docker/daemon/cluster/convert/TestTaskConvertFromGRPCNetworkAtttachment", "github.com/docker/docker/image/cache/TestPlatformCompare/same_os_higher_host_variant", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/none_requested,_twwo_present,_daemon_platform_NOT_available", "github.com/docker/docker/daemon/logger/loggerutils/TestCheckCapacityAndRotate/wiith_log_reader", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation//Partial_overlap,_no_space_left_at_the_end,_no_more_predefined", "github.com/docker/docker/client/TestResponseErrors/JSON_error_with_extra_fields", "github.com/docker/docker/api/server/httputils/TestReadJSON", "github.com/docker/docker/layer/TestIsValidID/Invalid:_empty_string", "github.com/docker/docker/opts/TestParseTCP/tcp://:", "github.com/docker/docker/registry/TestV1EndpointParse/https://0.0.0.0:5000/v0/", "github.com/docker/docker/distribution/xfer/TestMaxDownloadAttempts/max-attempts==5,_fail_at_5th_attempt", "github.com/docker/docker/pkg/plugins/TestBackoff/retries:_4", "github.com/docker/docker/daemon/config/TestConfigInvalidDNS/single_DNS,_invalid__IP-address", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/IPv6_subneet_is_discarded_with_no_error_when_IPv6_is_disabled", "github.com/docker/docker/opts/TestValidateIPAddress", "github.com/docker/docker/client/TestConfigRemoveError", "github.com/docker/docker/client/TestImageLoad", "github.com/docker/docker/libnetwork/datastore/TestAtomicKVObjectFlatKey", "github.com/docker/docker/libnetwork/netlabel/TestGetIfname/no_ifname", "github.com/docker/docker/daemon/events/TestLogEvents", "github.com/docker/docker/client/TestImageRemoveImageNotFound", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/StoppedEmpty/Zero", "github.com/docker/docker/daemon/logger/splunk/TestOneMessagePerRequest", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/single__line_twice_block/1_lines", "github.com/docker/docker/container/stream/bytespipe/TestFixedBufferWrite", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeConflicts", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/example.com:123", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestRequestReleaseAddressFromSubPool", "github.com/docker/docker/opts/TestParseDockerDaemonHost/:5555", "github.com/docker/docker/daemon/TestContainerList_LimitFilter", "github.com/docker/docker/client/TestResponseErrors/malformed_JSON", "github.com/docker/docker/builder/remotecontext/TestUnknownContentLength", "github.com/docker/docker/client/TestImagePullWithPrivilegedFuncNoError", "github.com/docker/docker/registry/TestV1EndpointParse/https://index.docker.io/v1/", "github.com/docker/docker/builder/dockerfile/TestDispatch/ADD_multiple_files_to_file", "github.com/docker/docker/client/TestServiceList", "github.com/docker/docker/client/TestSwarmUnlock", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRaw", "github.com/docker/docker/libnetwork/bitmap/TestPushReservation", "github.com/docker/docker/volume/service/TestServiceGet", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/All", "github.com/docker/docker/registry/TestResolveAuthConfigIndexServer", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_with_one_more_than_block/5_lines", "github.com/docker/docker/client/TestNetworkDisconnect", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/All", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/severall_small_entries/3_lines", "github.com/docker/docker/pkg/pidfile/TestWrite", "github.com/docker/docker/client/TestImagePushWithPrivilegedFuncNoError", "github.com/docker/docker/pkg/pidfile/TestRead/malformed_pid", "github.com/docker/docker/registry/TestSearchErrors/Unexpected_status_code_500", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/FromEmptyLog/Tail=42", "github.com/docker/docker/internal/cleanups/TestCall", "github.com/docker/docker/pkg/plugins/TestBackoff/retries:_0", "github.com/docker/docker/client/TestPlainTextError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_much_bigger_than_block/request_more_lines_than_available", "github.com/docker/docker/builder/dockerfile/TestFromWithArg", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/siingle_line_same_as_block/request_more_lines_than_available", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/No_overridees", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonCliConfigWithTLSVerify", "github.com/docker/docker/daemon/logger/loggerutils/TestCheckCapacityAndRotate/cllosed_log_file", "github.com/docker/docker/builder/remotecontext/git/TestCloneArgsGit", "github.com/docker/docker/opts/TestParseDockerDaemonHost/localhost:", "github.com/docker/docker/client/TestSwarmInit", "github.com/docker/docker/client/TestSecretCreateUnsupported", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit/name:/named1", "github.com/docker/docker/daemon/logger/loggerutils/TestParseLogTagDefaultTag", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://:5555", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/FuzzJSONLogsMarshalJSONBuf", "github.com/docker/docker/libnetwork/networkdb/TestNetworkDBBulkSync", "github.com/docker/docker/distribution/TestManifestStore/error_persisting_manifesst/error_on_commit", "github.com/docker/docker/volume/mounts/TestValidateMount/#04", "github.com/docker/docker/daemon/logger/awslogs/TestFindValidSplit/4/🙃", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_with_one_more_than_block", "github.com/docker/docker/pkg/tarsum/TestVersionLabelForChecksum", "github.com/docker/docker/client/TestNodeRemove", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmptty/Until", "github.com/docker/docker/pkg/plugins/pluginrpc-gen/TestAliasedImports", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateInvalidDriver", "github.com/docker/docker/opts/TestParseHost", "github.com/docker/docker/image/TestFSGetInvalidData", "github.com/docker/docker/builder/dockerfile/TestFromWithArgButBuildArgsNotGiven", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8/linux_amd644_armv5_armv6_arm64-windows_amd64/strict/linux/arm/v5=\\u003elinux/arm/v5", "github.com/docker/docker/client/TestSecretInspect", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/variouss_sizes/6_lines", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode/old_api_no_eps", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Live", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_much_bigger_than_block/3_lines", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/mknod_(mm)_and_read_(r)_permission", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMaxTotalBytes", "github.com/docker/docker/api/server/httputils/TestInt64ValueOrDefaultWithError", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.coom/#frag", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForIntNS/IPv4_only", "github.com/docker/docker/container/TestReplaceAndAppendEnvVars", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/http://1.2.3.4", "github.com/docker/docker/pkg/plugins/TestPluginAddHandler", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmptty/SinceAndUntil", "github.com/docker/docker/client/TestImagePullWithoutErrors/myimage#01", "github.com/docker/docker/api/types/filters/TestOnlyOneExactMatch", "github.com/docker/docker/libnetwork/etchosts/TestBuildDefault", "github.com/docker/docker/client/TestContainerUnpause", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonConfigWithEmbeddedOptions", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/FromEmptyyLog/Tail=1", "github.com/docker/docker/builder/dockerfile/TestSymlinkDockerfile", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/it_rejects_emmpty_values_for_registry", "github.com/docker/docker/opts/TestParseHost/tcp://[::1]:5555/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_with_one_more_than_block/5_lines", "github.com/docker/docker/daemon/config/TestDaemonConfigurationMergeDefaultAddresssPools", "github.com/docker/docker/registry/TestNewIndexInfo/no_mirrors/example.com", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Live/Exact", "github.com/docker/docker/api/server/router/volume/TestUpdateVolume", "github.com/docker/docker/client/TestNegotiateAPIVersionEmpty", "github.com/docker/docker/pkg/jsonmessage/TestDisplayJSONMessagesStreamInvalidJSOON", "github.com/docker/docker/daemon/cluster/executor/container/TestCredentialSpecConversion/file", "github.com/docker/docker/opts/TestValidateLabel/label_with_one_more", "github.com/docker/docker/container/TestTruncIndex/Get_an_empty_id", "github.com/docker/docker/libnetwork/TestAuxAddresses", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/unless-sttopped_with_MaxRestartCount", "github.com/docker/docker/daemon/logger/splunk/TestSkipVerify", "github.com/docker/docker/client/TestPingHeadFallback/Not_Found", "github.com/docker/docker/opts/TestParseDockerDaemonHost/tcp://[::1]:5555", "github.com/docker/docker/errdefs/TestUnavailable", "github.com/docker/docker/opts/TestParseTCP/[::1]:5555", "github.com/docker/docker/registry/TestSearchErrors/invalid_filter_'is-official=[[invalid]'", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/it_rejects_emmpty_values_for_config", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCRuntimeContainer", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_with_one_more_than_block/2_lines", "github.com/docker/docker/daemon/config/TestValidateConfigurationErrors", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDoublePoolRelease", "github.com/docker/docker/daemon/logger/loggerutils/TestOpenFileDelete", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/driver/name:c:", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchSimple", "github.com/docker/docker/libnetwork/networkdb/TestFlakyNetworkDBIslands", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_same_as_block/1_lines", "github.com/docker/docker/opts/TestParseTCP/tcp://", "github.com/docker/docker/client/TestImagePullWithoutErrors/myimage:anything", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithOneSubnetGatewaay", "github.com/docker/docker/client/TestContainerLogs", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/same_leength_as_delimiter/request_more_lines_than_available", "github.com/docker/docker/client/TestPluginInspectError", "github.com/docker/docker/volume/mounts/TestWindowsParseMountRawSplit/c:\\\\:d:\\\\:ro", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/StoppedEmptty/All", "github.com/docker/docker/pkg/stringid/TestTruncateID/full_ID", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/multipple_lines_much_bigger_than_block/4_lines", "github.com/docker/docker/runconfig/TestDecodeContainerConfig/API_1.19_unix", "github.com/docker/docker/daemon/events/TestLoadBufferedEvents", "github.com/docker/docker/volume/service/TestFilterFunc/test_empty_list", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/unix:////some/socket.sock", "github.com/docker/docker/container/TestTruncIndex/non-conflicting_substrings_shoould_still_not_conflict", "github.com/docker/docker/libnetwork/bitmap/TestMarshalJSON/UnmarshalJSON=Golden--v0", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestDynamicPoolAllocation", "github.com/docker/docker/libnetwork/internal/netiputil/TestPrefixAfter", "github.com/docker/docker/builder/remotecontext/TestProcessNoDockerignore", "github.com/docker/docker/libnetwork/portallocator/TestReleasePort", "github.com/docker/docker/libnetwork/drvregistry/TestNetworks/RegisterDriver", "github.com/docker/docker/container/stream/bytespipe/TestFixedBufferString", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCModify/Add_option_no_overrides", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/always_wiith_MaxRestartCount", "github.com/docker/docker/distribution/TestFixManifestLayersBadParent", "github.com/docker/docker/client/TestNetworkConnectEmptyNilEndpointSettings", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/variouss_sizes/10_lines", "github.com/docker/docker/client/TestImageTagInvalidReference", "github.com/docker/docker/oci/TestAppendDevicePermissionsFromCgroupRules/all_(a)__devices", "github.com/docker/docker/daemon/cluster/convert/TestTmpfsOptionsToGRPC", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/3", "github.com/docker/docker/registry/TestNewIndexInfo/mirrors/127.255.255.255", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/disabled", "github.com/docker/docker/client/TestImageTagInvalidSourceImageName/invalidTag/reepo:Foo!3", "github.com/docker/docker/daemon/config/TestBuilderGC_Enabled", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/4/jsson/emf", "github.com/docker/docker/client/TestServiceCreateError", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/unknown_policy", "github.com/docker/docker/daemon/TestDNSNamesOrder", "github.com/docker/docker/builder/dockerfile/TestCopyRunConfig", "github.com/docker/docker/daemon/containerd/TestImageLoadMissing", "github.com/docker/docker/client/TestPingHeadFallback", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/4_byte_delimiter/single__line_twice_block/request_more_lines_than_available", "github.com/docker/docker/container/TestContainerStopSignal", "github.com/docker/docker/registry/TestValidateMirror/https://mirror-1.example.com/", "github.com/docker/docker/builder/dockerfile/TestNonExistingDockerfile", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/StoppedEmpty/Until", "github.com/docker/docker/libnetwork/drvregistry/TestNetworks/RegisterDuplicateDriver", "github.com/docker/docker/client/TestImageSearchWithPrivilegedFuncNoError", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/6", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/2_lines", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/StoppedEmpty/Until", "github.com/docker/docker/client/TestPluginRemove", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsMaxBufferedEvents/-1", "github.com/docker/docker/opts/TestParseDockerDaemonHost/unix://", "github.com/docker/docker/registry/TestParseRepositoryInfo/ubuntu", "github.com/docker/docker/pkg/process/TestAlive/invalid_process_(-1)", "github.com/docker/docker/api/server/TestMiddlewares", "github.com/docker/docker/daemon/config/TestConfigInvalidDNS/multiple_DNS,_invaliid_IP-address", "github.com/docker/docker/cmd/dockerd/TestCDISpecDirs/CDI_disabled_and_specified__spec_dirs_returns_no_cdi_spec_dirs", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_middle_and_laast", "github.com/docker/docker/daemon/logger/local/TestReadLog/Follow/Until", "github.com/docker/docker/volume/mounts/TestLCOWParseMountRawSplit/\\\\\\\\.\\\\pipe\\\\ffoo:\\\\\\\\.\\\\pipe\\\\bar", "github.com/docker/docker/pkg/stack/TestDumpToFile", "github.com/docker/docker/container/stream/bytespipe/TestBytesPipeRead", "github.com/docker/docker/client/TestWithUserAgent/user-agent_and_custom_headers", "github.com/docker/docker/opts/TestParseHost/tcp://0.0.0.0:5555/p", "github.com/docker/docker/client/TestCopyFromContainerEmptyResponse", "github.com/docker/docker/libnetwork/bitmap/TestSetRolloverSerial", "github.com/docker/docker/libnetwork/etchosts/TestConcurrentWrites", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/StoppedEmpty/Tail", "github.com/docker/docker/daemon/logger/local/TestReadLog/Tail/Stopped", "github.com/docker/docker/internal/directory/TestSizeNestedDirectoryEmpty", "github.com/docker/docker/daemon/logger/TestCopier", "github.com/docker/docker/registry/TestSearch/no_filter", "github.com/docker/docker/libnetwork/ipbits/TestField", "github.com/docker/docker/builder/dockerfile/TestAddFromScratchPopulatesPlatform", "github.com/docker/docker/registry/TestParseRepositoryInfo/127.0.0.1:8000/privatee/moonbase", "github.com/docker/docker/cmd/dockerd/TestLoadDaemonConfigWithRegistryOptions", "github.com/docker/docker/daemon/logger/awslogs/TestCollectBatchMultilinePattern", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Follow/Tail\\u003e0", "github.com/docker/docker/api/server/router/volume/TestListVolumesNoSwarm", "github.com/docker/docker/daemon/containerd/TestImagePushIndex/linux/arm/v7_requeested_on_v7_daemon,_but_not_available", "github.com/docker/docker/api/types/filters/ExampleArgs_MatchKVList", "github.com/docker/docker/opts/TestValidateExtraHosts", "github.com/docker/docker/libnetwork/internal/addrset/Test32BitIPv6Range", "github.com/docker/docker/client/TestNodeListError", "github.com/docker/docker/client/TestContainerPause", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit/name:/named2", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/several_smaall_entries/1_lines", "github.com/docker/docker/pkg/plugins/TestGetAll", "github.com/docker/docker/pkg/stringid/TestAllNum/numbers_only", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/one_smaall_entry/request_more_lines_than_available", "github.com/docker/docker/registry/TestSearch/stars=1,_is-official=true,_is-autommated=true", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=false/Stopped/MoreThanSince", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC/migrate_to_new_ep", "github.com/docker/docker/libnetwork/drvregistry/TestNetworks/WalkDrivers", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_much_bigger_than_block/3_lines", "github.com/docker/docker/daemon/internal/capabilities/TestMatch/[[foo_bar]_[baz]_[bar]]", "github.com/docker/docker/builder/dockerfile/TestDispatch", "github.com/docker/docker/daemon/logger/jsonfilelog/TestFollowLogsWithRotation/coompress=false/Since", "github.com/docker/docker/libnetwork/ipams/windowsipam/TestWindowsIPAM", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_with_one_more_than_block/request_more_lines_than_available", "github.com/docker/docker/api/server/router/volume/TestVolumeRemoveNotFoundNoManaager", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/examplee.com/", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/various_sizes", "github.com/docker/docker/api/server/router/container/TestHandleSysctlBC", "github.com/docker/docker/libnetwork/networkdb/TestFlakyNetworkDBNodeLeave", "github.com/docker/docker/image/TestMarshalKeyOrder", "github.com/docker/docker/opts/TestValidateDNSSearch", "github.com/docker/docker/pkg/namesgenerator/TestNameFormat", "github.com/docker/docker/api/server/httputils/TestUint32Value/0", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/MoreThanSince", "github.com/docker/docker/runconfig/TestDecodeContainerConfigIsolation/isolation==", "github.com/docker/docker/daemon/containerd/TestContainerConfigToDockerImageConfig", "github.com/docker/docker/daemon/logger/awslogs/TestNewStreamConfig/invalid_create_group", "github.com/docker/docker/daemon/logger/TestCopierWithSized/as_is", "github.com/docker/docker/daemon/logger/awslogs/TestValidateLogOptionsFormat/0/json/emf", "github.com/docker/docker/api/types/network/TestNetworkWithInvalidIPAM/Subnet_witth_host_fragment_set", "github.com/docker/docker/daemon/logger/splunk/: TestDefault", "github.com/docker/docker/client/TestVolumeRemoveConnectionError", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/multiplle_lines_same_as_block/4_lines", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/truncated_last_line#02", "github.com/docker/docker/client/: TestOptionWithHostFromEnv", "github.com/docker/docker/daemon/logger/syslog/TestValidateSyslogAddress/http://11.2.3.4", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertToGRPCConfigs/none", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/8_byte_delimiter/json_enncoded_values/10_lines", "github.com/docker/docker/daemon/containerd/TestLookup/abcdef", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_same_as_block/4_lines", "github.com/docker/docker/client/TestContainerExecInspectError", "github.com/docker/docker/api/types/container/TestValidateRestartPolicy/always_wiith_negative_MaxRestartCount", "github.com/docker/docker/volume/mounts/TestLinuxParseMountRawSplit//tmp:/tmp4:foo", "github.com/docker/docker/daemon/logger/awslogs/TestEffectiveLen", "github.com/docker/docker/daemon/logger/TestRingCap", "github.com/docker/docker/pkg/pidfile/TestRead/negative_pid", "github.com/docker/docker/client/TestVolumeList", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/192.1688.1.1/some-path", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/muultiple_lines_same_as_block/request_more_lines_than_available", "github.com/docker/docker/client/TestImageTagError", "github.com/docker/docker/client/TestNetworkCreateError", "github.com/docker/docker/daemon/containerd/TestMatcherOnLinuxArm64v8", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/single_byte_delimiter/jsson_encoded_values/4_lines", "github.com/docker/docker/pkg/plugins/TestAbortRetry/duration:_1s", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_with_one_more_than_block", "github.com/docker/docker/client/TestContainerStop", "github.com/docker/docker/libnetwork/portallocator/TestPortAllocationWithCustomRange", "github.com/docker/docker/libnetwork/types/TestParseCIDR", "github.com/docker/docker/daemon/cluster/convert/TestServiceConvertFromGRPCCredenntialSpec/file_credential_spec", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/no_delimiter/multiple_liines_same_as_block/request_more_lines_than_available", "github.com/docker/docker/daemon/TestSetWindowsCredentialSpecInSpec/it's_not_casee_sensitive_in_the_option_names", "github.com/docker/docker/daemon/logger/fluentd/TestValidateLogOptAddress/tcp://eexample.com:/", "github.com/docker/docker/api/types/filters/TestExactMatch", "github.com/docker/docker/image/TestDeleteNotExisting", "github.com/docker/docker/libnetwork/cnmallocator/TestAllocateWithOneSubnetInvaliidGateway", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCTransformForLegacyyNw/Routable_IPv4_and_IPv6,_ipv6_enabled", "github.com/docker/docker/client/TestImagePushWithUnauthorizedErrorAndPrivilegeFuuncError", "github.com/docker/docker/api/server/router/container/TestEpConfigForNetMode", "github.com/docker/docker/api/server/router/container/TestHandleMACAddressBC", "github.com/docker/docker/opts/TestParseDockerDaemonHost/localhost:5555", "github.com/docker/docker/container/stream/TestRaceUnbuffered", "github.com/docker/docker/image/cache/TestPlatformCompare/same_os_smaller_host_vaariant", "github.com/docker/docker/volume/service/TestFilterFunc/test_filter_middle", "github.com/docker/docker/opts/TestValidateLabel/label_with_bad_attribute_format", "github.com/docker/docker/client/TestPingHeadFallback/Internal_Server_Error", "github.com/docker/docker/integration/internal/termtest/TestStripANSICommands/#00", "github.com/docker/docker/api/server/httputils/TestUint32Value/unset", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameNotFound", "github.com/docker/docker/opts/TestParseHost/unix://", "github.com/docker/docker/client/TestNetworkRemoveError", "github.com/docker/docker/client/TestSwarmUpdate", "github.com/docker/docker/volume/local/TestCreate", "github.com/docker/docker/volume/mounts/TestValidateLCOWMount/#04", "github.com/docker/docker/client/TestTaskInspectWithEmptyID", "github.com/docker/docker/daemon/containerd/TestImageLoadMissing/2_platform_imagee", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCUnknownDirectives", "github.com/docker/docker/opts/TestParseLink/short_format", "github.com/docker/docker/pkg/plugins/TestFileSpecPlugin", "github.com/docker/docker/client/TestNodeInspectWithEmptyID", "github.com/docker/docker/libnetwork/driverapi/TestIPDataMarshalling", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/StoppedEmpty", "github.com/docker/docker/builder/dockerfile/TestDispatchUnsupportedOptions/RUN_wwith_unsupported_options", "github.com/docker/docker/libnetwork/types/TestCompareIPMask/2", "github.com/docker/docker/registry/TestPing", "github.com/docker/docker/daemon/cluster/executor/container/TestContainerLabels", "github.com/docker/docker/opts/TestParseHost/unix://path/to/socket", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_half_block/1_lines", "github.com/docker/docker/libnetwork/ipams/defaultipam/TestPoolAllocateAndReleasee/reallocate_first_subnet", "github.com/docker/docker/cmd/dockerd/TestCDISpecDirs/CDI_enabled_and_empty_confiig_option_returns_empty_slice", "github.com/docker/docker/opts/TestValidateEnv", "github.com/docker/docker/daemon/cluster/controllers/plugin/TestWaitDisabled", "github.com/docker/docker/client/TestConfigInspectUnsupported", "github.com/docker/docker/registry/TestAddRequiredHeadersToRedirectedRequests", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/12_byte_delimiter/singlee_line_half_block", "github.com/docker/docker/daemon/containerd/TestContainerConfigToDockerImageConfiig", "github.com/docker/docker/client/TestPingFail", "github.com/docker/docker/daemon/logger/jsonfilelog/jsonlog/FuzzJSONLogsMarshalJSSONBuf", "github.com/docker/docker/daemon/logger/jsonfilelog/TestTailLogsWithRotation/comppress=true/Stopped/MoreThanAvailable", "github.com/docker/docker/client/TestPluginDisable", "github.com/docker/docker/libnetwork/drivers/overlay/overlayutils/TestAppendVNILiist/InvalidVNI2", "github.com/docker/docker/opts/TestParseHost/tcp://:", "github.com/docker/docker/api/server/httputils/TestUint32Value/4294967296", "github.com/docker/docker/api/server/router/volume/TestGetVolumeByNameNotFoundNottManager", "github.com/docker/docker/api/server/httputils/TestUint32Value/4294967295", "github.com/docker/docker/daemon/logger/splunk/TestNewMissedToken", "github.com/docker/docker/libnetwork/internal/resolvconf/TestRCOption/Found_without_value", "github.com/docker/docker/libnetwork/ipbits/TestAdd", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/multiplle_lines_with_one_more_than_block/request_more_lines_than_available", "github.com/docker/docker/client/TestNetworkList", "github.com/docker/docker/registry/TestSearch", "github.com/docker/docker/pkg/tailfile/TestNewTailReader/2_byte_delimiter/json_enncoded_values/4_lines", "github.com/docker/docker/daemon/logger/jsonfilelog/TestReadLogs/Tail/LiveEmpty/Since", "github.com/docker/docker/client/TestImageLoad/json_with_platform", "github.com/docker/docker/libnetwork/cnmallocator/TestValidateDriver/IPAM", "github.com/docker/docker/client/TestNodeUpdate" ]
starryzhang/sweb.eval.win.moby_1776_moby-49938
containers/podman
26870
containers__podman-26870
Go
[ "26855" ]
4f4e68201235ff6991daed6d1e333288672d098c
diff --git a/pkg/specgenutil/specgen.go b/pkg/specgenutil/specgen.go index 2a3171e8c33..791110312c7 100644 --- a/pkg/specgenutil/specgen.go +++ b/pkg/specgenutil/specgen.go @@ -737,10 +737,15 @@ func FillOutSpecGen(s *specgen.SpecGenerator, c *entities.ContainerCreateOptions case "proc-opts": s.ProcOpts = strings.Split(val, ",") case "seccomp": - convertedPath, err := specgen.ConvertWinMountPath(val) - if err != nil { - // If the conversion fails, use the original path - convertedPath = val + convertedPath := val + // Do not try to convert special value "unconfined", + // https://github.com/containers/podman/issues/26855 + if val != "unconfined" { + convertedPath, err = specgen.ConvertWinMountPath(val) + if err != nil { + // If the conversion fails, use the original path + convertedPath = val + } } s.SeccompProfilePath = convertedPath s.Annotations[define.InspectAnnotationSeccomp] = convertedPath
diff --git a/pkg/machine/e2e/basic_test.go b/pkg/machine/e2e/basic_test.go index 499d2730b18..22a878311b2 100644 --- a/pkg/machine/e2e/basic_test.go +++ b/pkg/machine/e2e/basic_test.go @@ -44,7 +44,8 @@ var _ = Describe("run basic podman commands", func() { Expect(newImgs).To(Exit(0)) Expect(newImgs.outputToStringSlice()).To(HaveLen(1)) - runAlp, err := mb.setCmd(bm.withPodmanCommand([]string{"run", TESTIMAGE, "cat", "/etc/os-release"})).run() + // seccomp option as regression test for https://github.com/containers/podman/issues/26855 + runAlp, err := mb.setCmd(bm.withPodmanCommand([]string{"run", "--security-opt", "seccomp=unconfined", TESTIMAGE, "cat", "/etc/os-release"})).run() Expect(err).ToNot(HaveOccurred()) Expect(runAlp).To(Exit(0)) Expect(runAlp.outputToString()).To(ContainSubstring("Alpine Linux")) diff --git a/pkg/specgenutil/specgenutil_windows_test.go b/pkg/specgenutil/specgenutil_windows_test.go index 88c97e3bda1..e011d884305 100644 --- a/pkg/specgenutil/specgenutil_windows_test.go +++ b/pkg/specgenutil/specgenutil_windows_test.go @@ -32,6 +32,7 @@ func TestSeccompProfilePath(t *testing.T) { {`c`, cwd_wsl + "/c"}, {`\\computer\loc`, `\\computer\loc`}, {`\\.\drive\loc`, "/mnt/wsl/drive/loc"}, + {"unconfined", "unconfined"}, } f := func(secopt string) (*specgen.SpecGenerator, error) {
Error: opening seccomp profile failed: open /mnt/c/Some-directory/unconfined: no such file or directory on Windows ### Issue Description Using `--security-opt seccomp=unconfined` fails on Windows: ~~~ ❯ podman run --rm -it --security-opt seccomp=unconfined quay.io/podman/hello Trying to pull quay.io/podman/hello:latest... Getting image source signatures Copying blob sha256:81df7ff16254ed9756e27c8de9ceb02a9568228fccadbf080f41cc5eb5118a44 Copying config sha256:5dd467fce50b56951185da365b5feee75409968cbab5767b9b59e325fb2ecbc0 Writing manifest to image destination Error: opening seccomp profile failed: open /mnt/c/Some-directory/unconfined: no such file or directory Exception: podman exited with 125 [tty 110]:1:1-74: podman run --rm -it --security-opt seccomp=unconfined quay.io/podman/hello ~~~ ### Steps to reproduce the issue Steps to reproduce the issue: #### 1. First, install Podman v5.6.0 using your preferred method: ~~~ ❯ scoop install podman Installing 'podman' (5.6.0) [64bit] from 'main' bucket podman-5.6.0-setup.exe (26,4 MB) [======================================================================================] 100% Checking hash of podman-5.6.0-setup.exe ... ok. Running pre_install script...done. Running installer script...done. Linking ~\Scoop\apps\podman\current => ~\Scoop\apps\podman\5.6.0 Creating shim for 'podman'. Persisting data Persisting config Persisting connections Running post_install script...done. 'podman' (5.6.0) was installed successfully! ~~~ #### 2. Then, initialize and start a default machine: ~~~ ❯ podman machine init Looking up Podman Machine image at quay.io/podman/machine-os:5.6 to create VM Getting image source signatures Copying blob 0491a61133f9 done | Copying config 44136fa355 done | Writing manifest to image destination 0491a61133f94e8645c562f31255dc37d5fe0bf45750ce5e227fd86f6fb5cfe2 Extracting compressed file: podman-machine-default-amd64: done Importing operating system into WSL (this may take a few minutes on a new WSL install)... La operación se completó correctamente. Configuring system... Machine init complete To start your machine run: podman machine start ❯ podman machine start Starting machine "podman-machine-default" This machine is currently configured in rootless mode. If your containers require root permissions (e.g. ports < 1024), or if you run into compatibility issues with non-podman clients, you can switch using the following command: podman machine set --rootful API forwarding listening on: npipe:////./pipe/docker_engine Docker API clients default to this address. You do not need to set DOCKER_HOST. Machine "podman-machine-default" started successfully ~~~ #### 3. Finally, reproduce the issue with a minimal example: ~~~ ❯ mkdir C:\Some-directory ❯ cd C:\Some-directory ❯ podman run --rm -it --security-opt seccomp=unconfined quay.io/podman/hello Trying to pull quay.io/podman/hello:latest... Getting image source signatures Copying blob sha256:81df7ff16254ed9756e27c8de9ceb02a9568228fccadbf080f41cc5eb5118a44 Copying config sha256:5dd467fce50b56951185da365b5feee75409968cbab5767b9b59e325fb2ecbc0 Writing manifest to image destination Error: opening seccomp profile failed: open /mnt/c/Some-directory/unconfined: no such file or directory Exception: podman exited with 125 [tty 110]:1:1-74: podman run --rm -it --security-opt seccomp=unconfined quay.io/podman/hello ~~~ ### Describe the results you received The underlying issue is that Podman interprets `unconfined` as a file path on the Windows host: ~~~ C:\Some-directory\unconfined ~~~ ### Describe the results you expected I would expect Podman to correctly handle `seccomp=unconfined`, disabling seccomp confinement for the container. ### podman info output ```yaml I'm unable to run podman info, because currently I downgraded to v5.5.2 to check it run without the error. My *podman version is `v5.6.0`*, and my host is *Windows 10.0.26100.4349*. ``` ### Podman in a container No ### Privileged Or Rootless None ### Upstream Latest Release Yes ### Additional environment details Using WSL2 (updated today): ~~~ ❯ wsl --version Versión de WSL: 2.5.10.0 Versión de kernel: 6.6.87.2-1 Versión de WSLg: 1.0.66 Versión de MSRDC: 1.2.6074 Versión de Direct3D: 1.611.1-81528511 Versión de DXCore: 10.0.26100.1-240331-1435.ge-release Versión de Windows: 10.0.26100.4349 ~~~ ### Additional information This seems to be a consequence of fixing #26558, possibly at /pkg/specgenutil/specgen.go#L740.
[ "https://github.com/containers/podman/commit/5a2098cf610982b26d2664f3f3b3c68b3a775b0e" ]
2025-08-20T11:22:53Z
https://github.com/containers/podman/tree/4f4e68201235ff6991daed6d1e333288672d098c
[ "go mod download ; go build -tags \"remote exclude_graphdriver_btrfs containers_image_openpgp\" -o .\\bin\\windows\\podman.exe .\\cmd\\podman\\." ]
[ ".\\bin\\ginkgo.exe -vv -r --tags \"remote exclude_graphdriver_btrfs containers_image_openpgp\" --timeout=15m --trace --no-color --skip-package \"hack,internal\\domain\\infra\\abi,internal\\domain\\infra\\tunnel,libpod\\lock\\shm,pkg\\api\\handlers\\libpod,pkg\\api\\handlers\\utils,pkg\\bindings,pkg\\domain\\infra\\abi,pkg\\emulation,pkg\\machine\\apple,pkg\\machine\\applehv,pkg\\machine\\e2e,pkg\\machine\\libkrun,pkg\\machine\\provider,pkg\\machine\\proxyenv,pkg\\machine\\qemu,pkg\\specgen\\generate,pkg\\systemd,test\\e2e,test\\utils,cmd\\rootlessport,pkg\\pidhandle\" *> reports\\test-output.log" ]
[ "Get-Content .\\reports\\test-output.log" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} status_map = {"PASS": "pass", "FAIL": "fail", "SKIP": "skip"} # Match status lines like: # --- PASS: TestName (0.00s) # --- PASS: Parent/Subtest (0.00s) status_re = re.compile(r'^\s*---\s+(PASS|FAIL|SKIP):\s+([^\r\n]*)') # Lines that indicate a new section or are not part of a wrapped test name breakers = re.compile( r'^\s*(' r'---\s+(PASS|FAIL|SKIP):' # another status line r'|===\s+(RUN|PAUSE|CONT)\b' # go test run/pause/cont markers r'|PASS\b' # package summary r'|Skipping\b' # package skip notices r'|Will skip\b' # skip list header r'|At line:' # PowerShell error header r'|Directory:' # PowerShell directory listing r'|Mode\s' # PowerShell file listing r'|time=' # log timestamps r')', re.IGNORECASE ) # Heuristic: continuation lines for wrapped test names should only contain # name-safe characters (letters/digits/underscore/slash/hyphen), optional spaces, # and optionally timing "(...s)". Exclude colons and backslashes to avoid PS noise. timing_re = re.compile(r'\(\s*[0-9.]+\s*s?\s*\)') def allowed_cont(line: str) -> bool: s = line.strip() if not s: return False # Allow timing parentheses, but otherwise reject colon (likely noise like "Directory:") if ':' in s and not timing_re.search(s): return False # Reject Windows-style backslashes if '\\' in s: return False # Only allow safe characters for names and timing if re.search(r'[^A-Za-z0-9_/\-\.\(\)\s]', s): return False return True lines = log.splitlines() i = 0 while i < len(lines): line = lines[i] m = status_re.match(line) if not m: i += 1 continue status, first_part = m.groups() frag = first_part # initial fragment of the test name (may be wrapped) # Gather wrapped continuation lines that belong to this status line j = i + 1 while j < len(lines): nxt = lines[j] # Stop on a new status/run/summary or obvious noise if status_re.match(nxt) or breakers.match(nxt): break if allowed_cont(nxt): cont = nxt.strip() # Merge with duplication fix: drop duplicated boundary character if frag and cont: if frag[-1] == cont[0]: cont = cont[1:] frag += cont j += 1 continue else: break # Clean up: remove any timing "(...)" and trailing spaces name = frag.strip() name = re.split(r'\s+\(', name)[0].strip() if name: results[name] = status_map.get(status, status.lower()) i = j # advance past any consumed continuation lines return results
[ "TestBreakInsert1", "TestProcessOptions/conflicting_option_ro/rw", "TestDecodeChanges/nothing", "TestDecodeChanges/both-but-wrong", "TestValidateSysctlBadSysctl", "TestParseIDMap", "TestMatchLabelFilters/Do_not_match_when_filter_value_not_listed_in_labels", "TestValidateSysctls", "TestProcessOptions/conflicting_option_dev/nodev", "TestProcessOptions/conflicting_option_exec/noexec", "TestProcessOptions/z_not_allowed_with_tmpfs", "TestParseIDMap5", "TestParseIDMapSizeMissing", "TestCoresToPeriodAndQuota", "TestDecodeChanges/equal", "TestSeccompProfilePath/unconfined", "TestPeriodAndQuotaToCores", "TestProcessOptions/default_bind_mount", "TestProcessOptions/conflicting_option_bind/rbind#01", "TestProcessOptions/duplicate_idmap_option", "TestParseIDMap3", "TestProcessOptions/size_allowed_only_with_tmpfs", "TestProcessOptions/tmpcopyup_allowed_only_with_tmpfs", "TestProcessOptions/conflicting_option_bind/rbind", "TestParseIDMap4", "TestFillIDMap", "TestBreakInsert2", "TestProcessOptions/conflicting_option_suid/nosuid", "TestMatchLabelFilters/Match_when_no_filter_value_is_given", "TestValidateSysctlBadSysctlWithExtraSpaces", "TestBreakInsert3", "TestProcessOptions/default_bind_mount_with_bind", "TestPolicyDescription", "TestBreakInsert4", "TestMatchLabelFilters/Match_when_all_filters_the_same_as_labels", "TestDecodeChanges", "TestConvertMappings", "TestProcessOptions/mode_allowed_only_with_tmpfs", "TestProcessOptions/tmpfs", "TestDescriptionsOfPolicyRequirements", "TestDecodeChanges/both-but-right-second", "TestParseInputTime", "TestGetAvailableIDRanges", "TestParseAutoIDMapRelative", "TestProcessOptions/noatime_allowed_only_with_tmpfs", "TestParseIDMapUserGroupFlags", "TestSeccompProfilePath", "TestDecodeChanges/both-but-right-first", "TestConvertTimeout", "TestProcessOptions/notmpcopyup_allowed_only_with_tmpfs", "TestProcessOptions", "TestMatchLabelFilters", "TestDecodeChanges/space", "TestMatchLabelFilters/Match_when_filter_value_not_provided_in_args", "TestAddPolicyEntries", "TestMatchLabelFilters/Do_not_match_when_one_from_many_not_ok", "TestProcessOptions/noswap_allowed_only_with_tmpfs", "TestParseIDMap2", "TestParseAutoIDMap", "TestSortAndMergeConsecutiveMappings", "TestMatchLabelFilters/Do_not_match_when_filter_value_differs", "TestGetRootlessKeepIDMapping" ]
[ "TestSparseWriter/sparse_both_ends@4", "TestParseSignalNameOrNumber", "TestNewWSLCommand", "Test_portsToString/exposed_port_range", "TestImageFormat_KindWithCompression/vhdx", "TestSparseWriter/sparse_middle@1048576", "TestParseSCPArgs", "Test_parseEnv/GoodNoValue", "TestSparseWriter/sparse_middle@1024", "TestSparseWriter/sparse_end@64", "TestSparseWriter/small_iterated@2", "TestSparseWriter/sparse_middle@32", "TestCause/max_depth_reached", "TestValidateSCPArgs", "TestPodOptions", "TestSparseWriter/sparse_beginning@2048", "TestSparseWriter/sparse_both_ends@128", "TestSparseWriter/sparse_both_ends@8192", "TestJoin/GoodJoin", "TestSparseWriter/sparse_beginning@8", "TestParseSysSignalToName/Non-defined_signal_number_should_not_work", "TestSparseWriter/sparse_beginning@32", "TestSlice/Good", "TestEvalSymlinksOrClean/Symbolic_link", "TestToURLValues", "TestParseNetworkFlag/bridge_mode_with_invalid_ip", "Test_portsToString/multiple_exposed_port_ranges", "TestNewSpecGeneratorWithRootfs", "TestEvalSymlinksOrClean/Hard_link", "Test_makeSSHURL/Good_with_port", "TestToURLValues/Good", "TestParseNetworkFlag/no_network_mode", "TestMatchOutputLine/WSL_not_installed_(was_previously_configured_as_version_2)", "TestImageFormat_KindWithCompression/qcow2", "TestJoin/GoodOverride", "TestImageCompression_String/zstd_is_default", "TestParseNetworkFlag/multiple_networks_with_bridge_mode_first_should_map_to_default_net", "TestSparseWriter/sparse_end@512", "TestSplitVolumeString/volume_without_option", "TestParseSignal/Signal_with_prepended_SIG", "TestSplitVolumeString/absolute_host_path_with_option#01", "TestSparseWriter/small_zeroes@1", "TestSplitVolumeString/absolute_extended_host_path", "TestSeccompProfilePath/C:\\Foo", "TestParseNetworkFlag/empty_input", "Test_extractKindAndCompression/lots_of_extensions", "TestImageFormat_Kind/tar", "TestParseNetworkFlag", "TestValidateSCPArgs/test_source_image_is_empty", "TestGetSSHIdentityPath", "TestParseNetworkFlag/default_mode", "Test_portsToString", "TestParseSignalNameOrNumber/garbage_should_fail", "TestParseSysSignalToName", "Test_Decompress/zstd_with_trailing_zeros", "TestSparseWriter/sparse_both_ends@65536", "TestSparseWriter/sparse_middle@32768", "TestSparseWriter/sparse_middle@16384", "TestSeccompProfilePath//c/bar#01", "TestNormalizeMachineArch/arm64", "TestSparseWriter/sparse_both_ends@2", "Test_portsToString/published_port_with_same_exposed_port", "TestSparseWriter/small_iterated2@2", "TestSparseWriter/sparse_both_ends@4096", "TestSparseWriter/small_contents@2", "TestParseNetworkFlag/conflicting_network_modes_should_error", "Test_compressionFromFile/gzip", "Test_parseEnv/BadOnlyDelim", "TestSplitVolumeString/relative_host_path", "TestMatchOutputLine/WSL2_configured_and_both_Virtual_Machine_Platform_and_Windows_Subsystem_for_Linux_are_disabled", "TestMatchOutputLine", "TestSplitVolumeString/relative_host_path_with_options", "TestSeccompProfilePath/c", "Test_Decompress/bzip2_with_trailing_zeros", "TestSparseWriter/sparse_both_ends@64", "TestParseSignal", "Test_Decompress/xz", "TestMatchOutputLine/WSL1_configured_and_Virtual_Machine_Platform_is_enabled_but_Windows_Subsystem_for_Linux_is_disabled", "TestCause", "TestSparseWriter/sparse_end@16384", "TestSeccompProfilePath/C:\\Foo#01", "TestCreateExpose/range_inverted_should_fail", "Test_extractKindAndCompression", "Test_compressionFromFile", "TestLockAndUnlock", "TestSparseWriter/small_iterated@1", "TestParseNetworkFlag/bridge_mode", "TestParseNetworkFlag/multiple_networks_empty_name_should_error", "TestSeccompProfilePath//test/this", "TestSplitVolumeString/absolute_host_path_with_option", "TestImageCompression_String/zip", "TestImageCompression_String/xz", "TestSparseWriter/sparse_middle@256", "Test_parseAndValidatePort/over_65535_should_fail", "Test_validateDestinationPaths", "TestParseNetworkFlag/bridge_mode_with_multiple_unknown_options", "TestSparseWriter/sparse_end@1048576", "TestSparseWriter/sparse_both_ends@262144", "TestParseNetworkFlag/multiple_networks", "Test_validateDestinationPaths/Expect_fail_trailing_/", "TestSparseWriter/small_contents@1", "TestToLibpodFilters/GoodURLValue", "TestJoin", "TestCause/equal_errors", "Test_portsToString/published_port_range", "TestGetTailLog/multiple_partial_lines_in_a_row", "Test_portsToString/exposed_port_multiple_protocols", "Test_Decompress", "TestMatchOutputLine/WSL2_configured_and_Virtual_Machine_Platform_is_disabled_but_Windows_Subsystem_for_Linux_is_enabled", "TestSparseWriter/sparse_end@262144", "Test_extractKindAndCompression/lots_of_extensions_with_type_and_compression", "Test_parseAndValidatePort", "TestSparseWriter/sparse_beginning@256", "Test_validChownFlag/lower-case_true", "Test_portsToString/no_ports_empty_map/slice", "Test_Decompress/gzip", "TestSparseWriter/sparse_both_ends@8", "TestSparseWriter/sparse_beginning@262144", "TestSparseWriter/sparse_end@4", "TestImageFormat_KindWithCompression/raw", "TestNormalizeMachineArch/Unknown_arch_should_fail", "TestSplitVolumeString/single_letter_volume_without_option", "Test_validChownFlag/lower-case_false", "Test_parseAndValidatePort/protocol_should_fail", "TestSparseWriter/sparse_end@1", "TestParseNetworkFlag/network_name_with_options", "Test_parseAndValidatePort/negative_values_should_fail", "Test_validateDestinationPaths//etc_should_fail", "TestParseNetworkFlag/ns_path_mode", "Test_verifyExpose", "TestSparseWriter/sparse_middle@2048", "TestCreateExpose", "TestSparseWriter/small_zeroes@2", "TestSparseWriter/small_iterated2@4", "TestImageFormat_Kind/vhdx", "TestSparseWriter/sparse_both_ends@16384", "TestSparseWriter/sparse_end@4096", "Test_portsToString/exposed_port", "TestSparseWriter/small_iterated@4", "TestSparseWriter/sparse_middle@8192", "TestParseNetworkFlag/from_pod_mode", "TestGetTailLog", "TestSparseWriter/small_zeroes@64", "TestSparseWriter/sparse_middle@4096", "TestFormatOCIError", "TestSparseWriter/sparse_both_ends@1", "Test_extractKindAndCompression/no_extensions", "TestSparseWriter/sparse_end@131072", "TestParseSignalNameOrNumber/Non-defined_signal_number_should_work", "TestSparseWriter/sparse_middle@128", "TestMatchOutputLine/WSL2_configured_and_both_Virtual_Machine_Platform_enabled_and_Windows_Subsystem_for_Linux_enabled", "TestParseNetworkFlag/container_mode", "TestGetTailLog/tail_with_partial_logs", "TestSparseWriter/sparse_beginning@524288", "TestValidateAnnotations", "TestSparseWriter/sparse_beginning@16384", "TestNormalizeMachineArch/aarch64", "TestParseNetworkFlag/bridge_mode_with_interface_option", "TestCreateExpose/single_port", "TestSparseWriter/sparse_middle@16", "TestSparseWriter/sparse_end@1024", "TestParseNetworkFlag/bridge_mode_with_options_1", "TestSparseWriter/sparse_beginning@128", "Test_Decompress/uncompressed_with_trailing_zeros", "TestSeccompProfilePath/\\\\computer\\loc", "TestCreateExpose/specifying_protocol_twice_should_fail", "Test_portsToString/exposed_port_range_with_different_protocols", "TestImageFormat_KindWithCompression", "Test_verifyExpose/single_port_with_udp", "Test_portsToString/published_port_and_exposed_port_with_different_protocol", "TestSparseWriter/sparse_end@2", "TestSparseWriter/sparse_end@32", "TestSparseWriter/sparse_beginning@512", "TestShellCompletionFunctions", "TestParseNetworkFlag/bridge_mode_with_options_2", "Test_Decompress/zip_with_trailing_zeros", "TestNormalizeMachineArch", "TestSparseWriter/sparse_end@2048", "TestSparseWriter/sparse_end@32768", "TestParseSysSignalToName/Kill_should_work", "TestSparseWriter/sparse_both_ends@2048", "Test_artifact_String", "TestSparseWriter/sparse_middle@524288", "TestSparseWriter/sparse_both_ends@512", "TestSparseWriter/sparse_end@65536", "TestGetTailLogBigFiles", "TestSplitVolumeString/absolute_host_path", "TestSparseWriter/sparse_middle@65536", "TestSparseWriter/sparse_both_ends@1024", "TestGetTailLog/partial_line_at_the_end", "TestParseNetworkFlag/bridge_mode_with_unknown_option", "TestSparseWriter/small_zeroes@8", "TestGetTailLog/simple_tail_with_more_tail_than_lines", "TestParseNetworkFlag/bridge_mode_with_invalid_mac", "Test_portsToString/single_published_port", "Test_portsToString/no_ports", "TestMap/test_parse_env_to_map", "Test_extractKindAndCompression/qcow2", "Test_validChownFlag/case-insensitive_false", "Test_Decompress/zstd", "Test_validateDestinationPaths//var_should_fail", "Test_validateDestinationPaths/Expect_fail_double_/", "TestParseSignal/Case_does_not_matter", "Test_verifyExpose/good_port_range", "TestSparseWriter/small_contents@4", "Test_portsToString/published_port_range_and_exposed_port_in_that_range", "Test_artifact_String/qemu", "TestSparseWriter/small_iterated2@1", "Test_verifyExpose/single_port_with_tcp", "TestCreateExpose/simple_range_tcp", "Test_artifact_String/hyperv", "Test_parseAndValidatePort/#00", "Test_Decompress/zip", "Test_parseEnv/BadNoKey", "Test_Decompress/bzip2", "TestSplitVolumeString/volume_with_option", "TestCreateExpose/simple_range_udp", "TestJoin/EmptyBase", "TestParseNetworkFlag/multiple_networks_on_invalid_mode_should_error", "TestSparseWriter/sparse_beginning@131072", "TestSeccompProfilePath/\\\\?\\C:\\Foo", "TestSparseWriter/sparse_end@8", "TestSparseWriter/sparse_beginning@1048576", "Test_extractKindAndCompression/applehv", "TestMap", "TestToLibpodFilters/Empty", "TestSparseWriter/small_zeroes@16", "TestParseNetworkFlag/private_mode", "TestSparseWriter/sparse_both_ends@1048576", "TestParseNetworkFlag/slirp4netns_mode", "TestSplitVolumeString", "TestSparseWriter/sparse_beginning@16", "TestSparseWriter/sparse_beginning@4096", "TestGetTailLog/simple_tail", "TestSparseWriter/sparse_beginning@4", "TestSparseWriter/sparse_beginning@2", "TestImageFormat_Kind", "TestJoin/EmptyOverride", "TestSparseWriter/sparse_middle@64", "Test_portsToString/published_port_range_partially_overlaps_with_exposed_port_range", "Test_parseAndValidatePort/0_should_fail", "TestNormalizeMachineArch/x86_64", "TestNormalizeMachineArch/amd64", "TestSparseWriter/sparse_middle@1", "TestSplitVolumeString/single_letter_volume_with_option", "TestSparseWriter/sparse_end@8192", "TestSparseWriter/sparse_both_ends@32768", "Test_portsToString/two_published_ports", "TestMatchOutputLine/WSL1_configured_and_Virtual_Machine_Platform_is_disabled_but_Windows_Subsystem_for_Linux_is_enabled", "Test_validChownFlag/case-insensitive_true", "TestMatchOutputLine/WSL2_configured_and_Virtual_Machine_Platform_is_enabled_but_Windows_Subsystem_for_Linux_is_disabled", "TestSeccompProfilePath//c/bar", "TestSparseWriter/sparse_end@128", "TestSparseWriter/sparse_beginning@1", "TestSparseWriter/sparse_end@256", "Test_compressionFromFile/xz", "TestSeccompProfilePath/\\\\.\\drive\\loc", "Test_validateDestinationPaths/Expect_fail_-_/tmp", "TestSparseWriter/sparse_middle@262144", "Test_extractKindAndCompression/vhdx", "TestEvalSymlinksOrClean/File_under_a_mount_point_(juntion)", "TestValidateSCPArgs/test_target_image_is_empty", "TestSparseWriter/sparse_beginning@64", "TestImageFormat_Kind/qcow2", "TestToLibpodFilters", "TestImageFormat_Kind/raw", "TestMatchOutputLine/WSL1_configured_and_both_Virtual_Machine_Platform_enabled_and_Windows_Subsystem_for_Linux_are_enabled", "Test_verifyExpose/high_to_low_should_fail", "TestSparseWriter", "TestParseNetworkFlag/slirp4netns_mode_with_options", "TestCreateAndDeallocate", "Test_extractKindAndCompression/one_extension", "TestParseNetworkFlag/bridge_mode_with_alias_option", "TestEvalSymlinksOrClean/Bad_separators_in_path", "Test_compressionFromFile/bz2", "TestSparseWriter/sparse_beginning@1024", "Test_Decompress/uncompressed", "Test_verifyExpose/range_with_protocol", "Test_makeSSHURL/Good_no_port", "TestSlice", "TestSparseWriter/sparse_middle@512", "TestParseNetworkFlag/bridge_mode_with_alias_option#01", "TestParseNetworkFlag/network_name", "TestSparseWriter/sparse_beginning@8192", "TestSeccompProfilePath/c:/bar/something", "TestParseSignalNameOrNumber/Kill_should_work", "TestValidateSCPArgs/test_args_length_more_than_2", "Test_parseEnv/GoodNoKeyNoValue", "TestImageCompression_String/gz", "TestParseSignal/Garbage_signal", "TestCause/nil_error", "TestSparseWriter/small_zeroes@32", "TestSparseWriter/sparse_end@524288", "TestSparseWriter/sparse_both_ends@16", "Test_validChownFlag/garbage_value_should_fail", "TestSparseWriter/sparse_both_ends@32", "Test_makeSSHURL", "Test_validateDestinationPaths//tmp_subdir_OK", "Test_Decompress/xz_with_trailing_zeros", "TestParseNetworkFlag/multiple_networks_with_options", "TestFormatError", "TestSparseWriter/sparse_middle@8", "TestMaybeSplitMappings", "TestParseSignalNameOrNumber/9_for_kill_should_work", "TestSparseWriter/sparse_both_ends@256", "TestEvalSymlinksOrClean/Normal_file", "TestSparseWriter/sparse_both_ends@131072", "TestParseNetworkFlag/bridge_mode_with_ip6_option", "TestSparseWriter/small_zeroes@4", "TestAutocompleteFormat", "TestSparseWriter/sparse_middle@2", "TestSparseWriter/sparse_middle@4", "TestSparseWriter/sparse_end@16", "Test_parseEnv", "Test_compressionFromFile/default_is_zstd", "TestEvalSymlinksOrClean", "TestParseSignal/KILL_to_SIGKILL", "TestParseNetworkFlag/empty_string_as_input", "TestImageCompression_String", "TestSparseWriter/sparse_beginning@65536", "Test_artifact_String/applehv", "TestCause/wrapped_error", "TestCreated", "Test_parseEnv/Good", "TestSeccompProfilePath//mnt/c/bar", "Test_Decompress/gzip_with_trailing_zeros", "TestParseNetworkFlag/bridge_mode_with_host_interface_name", "Test_validateDestinationPaths//foobar_OK", "TestSparseWriter/sparse_middle@131072", "Test_portsToString/published_port_with_host_ip", "TestSparseWriter/sparse_beginning@32768", "TestImageFormat_KindWithCompression/tar.xz", "TestMatchOutputLine/WSL_not_installed_(was_previously_configured_as_version_1)", "TestGetTailLog/tail_with_partial_logs_and_more_than_lines", "TestImageCompression_String/bz2", "TestSparseWriter/empty@1", "TestSparseWriter/sparse_both_ends@524288", "Test_validChownFlag", "TestParseSysSignalToName/garbage_should_fail" ]
starryzhang/sweb.eval.win.containers_1776_podman-26870
tailscale/tailscale
14669
tailscale__tailscale-14669
Go
[ "14416" ]
de5683f7c61098337fe2825e2febe98b6809b291
diff --git a/cmd/tailscaled/tailscaled_windows.go b/cmd/tailscaled/tailscaled_windows.go index 786c5d8330939..7208e03dac9d6 100644 --- a/cmd/tailscaled/tailscaled_windows.go +++ b/cmd/tailscaled/tailscaled_windows.go @@ -55,6 +55,7 @@ import ( "tailscale.com/util/osdiag" "tailscale.com/util/syspolicy" "tailscale.com/util/winutil" + "tailscale.com/util/winutil/gp" "tailscale.com/version" "tailscale.com/wf" ) @@ -70,6 +71,22 @@ func init() { } } +// permitPolicyLocks is a function to be called to lift the restriction on acquiring +// [gp.PolicyLock]s once the service is running. +// It is safe to be called multiple times. +var permitPolicyLocks = func() {} + +func init() { + if isWindowsService() { + // We prevent [gp.PolicyLock]s from being acquired until the service enters the running state. + // Otherwise, if tailscaled starts due to a GPSI policy installing Tailscale, it may deadlock + // while waiting for the write counterpart of the GP lock to be released by Group Policy, + // which is itself waiting for the installation to complete and tailscaled to start. + // See tailscale/tailscale#14416 for more information. + permitPolicyLocks = gp.RestrictPolicyLocks() + } +} + const serviceName = "Tailscale" // Application-defined command codes between 128 and 255 @@ -109,13 +126,13 @@ func tstunNewWithWindowsRetries(logf logger.Logf, tunName string) (_ tun.Device, } } -func isWindowsService() bool { +var isWindowsService = sync.OnceValue(func() bool { v, err := svc.IsWindowsService() if err != nil { log.Fatalf("svc.IsWindowsService failed: %v", err) } return v -} +}) // syslogf is a logger function that writes to the Windows event log (ie, the // one that you see in the Windows Event Viewer). tailscaled may optionally @@ -180,6 +197,10 @@ func (service *ipnService) Execute(args []string, r <-chan svc.ChangeRequest, ch changes <- svc.Status{State: svc.Running, Accepts: svcAccepts} syslogf("Service running") + // It is safe to allow GP locks to be acquired now that the service + // is running. + permitPolicyLocks() + for { select { case <-doneCh: diff --git a/util/syspolicy/source/policy_store_windows.go b/util/syspolicy/source/policy_store_windows.go index 86e2254e0a381..621701e84f23c 100644 --- a/util/syspolicy/source/policy_store_windows.go +++ b/util/syspolicy/source/policy_store_windows.go @@ -12,6 +12,7 @@ import ( "golang.org/x/sys/windows" "golang.org/x/sys/windows/registry" "tailscale.com/util/set" + "tailscale.com/util/syspolicy/internal/loggerx" "tailscale.com/util/syspolicy/setting" "tailscale.com/util/winutil/gp" ) @@ -29,6 +30,18 @@ var ( _ Expirable = (*PlatformPolicyStore)(nil) ) +// lockableCloser is a [Lockable] that can also be closed. +// It is implemented by [gp.PolicyLock] and [optionalPolicyLock]. +type lockableCloser interface { + Lockable + Close() error +} + +var ( + _ lockableCloser = (*gp.PolicyLock)(nil) + _ lockableCloser = (*optionalPolicyLock)(nil) +) + // PlatformPolicyStore implements [Store] by providing read access to // Registry-based Tailscale policies, such as those configured via Group Policy or MDM. // For better performance and consistency, it is recommended to lock it when @@ -55,7 +68,7 @@ type PlatformPolicyStore struct { // they are being read. // // When both policyLock and mu need to be taken, mu must be taken before policyLock. - policyLock *gp.PolicyLock + policyLock lockableCloser mu sync.Mutex tsKeys []registry.Key // or nil if the [PlatformPolicyStore] hasn't been locked. @@ -108,7 +121,7 @@ func newPlatformPolicyStore(scope gp.Scope, softwareKey registry.Key, policyLock scope: scope, softwareKey: softwareKey, done: make(chan struct{}), - policyLock: policyLock, + policyLock: &optionalPolicyLock{PolicyLock: policyLock}, } } @@ -448,3 +461,68 @@ func tailscaleKeyNamesFor(scope gp.Scope) []string { panic("unreachable") } } + +type gpLockState int + +const ( + gpUnlocked = gpLockState(iota) + gpLocked + gpLockRestricted // the lock could not be acquired due to a restriction in place +) + +// optionalPolicyLock is a wrapper around [gp.PolicyLock] that locks +// and unlocks the underlying [gp.PolicyLock]. +// +// If the [gp.PolicyLock.Lock] returns [gp.ErrLockRestricted], the error is ignored, +// and calling [optionalPolicyLock.Unlock] is a no-op. +// +// The underlying GP lock is kinda optional: it is safe to read policy settings +// from the Registry without acquiring it, but it is recommended to lock it anyway +// when reading multiple policy settings to avoid potentially inconsistent results. +// +// It is not safe for concurrent use. +type optionalPolicyLock struct { + *gp.PolicyLock + state gpLockState +} + +// Lock acquires the underlying [gp.PolicyLock], returning an error on failure. +// If the lock cannot be acquired due to a restriction in place +// (e.g., attempting to acquire a lock while the service is starting), +// the lock is considered to be held, the method returns nil, and a subsequent +// call to [Unlock] is a no-op. +// It is a runtime error to call Lock when the lock is already held. +func (o *optionalPolicyLock) Lock() error { + if o.state != gpUnlocked { + panic("already locked") + } + switch err := o.PolicyLock.Lock(); err { + case nil: + o.state = gpLocked + return nil + case gp.ErrLockRestricted: + loggerx.Errorf("GP lock not acquired: %v", err) + o.state = gpLockRestricted + return nil + default: + return err + } +} + +// Unlock releases the underlying [gp.PolicyLock], if it was previously acquired. +// It is a runtime error to call Unlock when the lock is not held. +func (o *optionalPolicyLock) Unlock() { + switch o.state { + case gpLocked: + o.PolicyLock.Unlock() + case gpLockRestricted: + // The GP lock wasn't acquired due to a restriction in place + // when [optionalPolicyLock.Lock] was called. Unlock is a no-op. + case gpUnlocked: + panic("not locked") + default: + panic("unreachable") + } + + o.state = gpUnlocked +} diff --git a/util/winutil/gp/policylock_windows.go b/util/winutil/gp/policylock_windows.go index 95453aa16b110..69c5ff01697f4 100644 --- a/util/winutil/gp/policylock_windows.go +++ b/util/winutil/gp/policylock_windows.go @@ -48,10 +48,35 @@ type policyLockResult struct { } var ( - // ErrInvalidLockState is returned by (*PolicyLock).Lock if the lock has a zero value or has already been closed. + // ErrInvalidLockState is returned by [PolicyLock.Lock] if the lock has a zero value or has already been closed. ErrInvalidLockState = errors.New("the lock has not been created or has already been closed") + // ErrLockRestricted is returned by [PolicyLock.Lock] if the lock cannot be acquired due to a restriction in place, + // such as when [RestrictPolicyLocks] has been called. + ErrLockRestricted = errors.New("the lock cannot be acquired due to a restriction in place") ) +var policyLockRestricted atomic.Int32 + +// RestrictPolicyLocks forces all [PolicyLock.Lock] calls to return [ErrLockRestricted] +// until the returned function is called to remove the restriction. +// +// It is safe to call the returned function multiple times, but the restriction will only +// be removed once. If [RestrictPolicyLocks] is called multiple times, each call must be +// matched by a corresponding call to the returned function to fully remove the restrictions. +// +// It is primarily used to prevent certain deadlocks, such as when tailscaled attempts to acquire +// a policy lock during startup. If the service starts due to Tailscale being installed by GPSI, +// the write lock will be held by the Group Policy service throughout the installation, +// preventing tailscaled from acquiring the read lock. Since Group Policy waits for the installation +// to complete, and therefore for tailscaled to start, before releasing the write lock, this scenario +// would result in a deadlock. See tailscale/tailscale#14416 for more information. +func RestrictPolicyLocks() (removeRestriction func()) { + policyLockRestricted.Add(1) + return sync.OnceFunc(func() { + policyLockRestricted.Add(-1) + }) +} + // NewMachinePolicyLock creates a PolicyLock that facilitates pausing the // application of computer policy. To avoid deadlocks when acquiring both // machine and user locks, acquire the user lock before the machine lock. @@ -103,13 +128,18 @@ func NewUserPolicyLock(token windows.Token) (*PolicyLock, error) { } // Lock locks l. -// It returns ErrNotInitialized if l has a zero value or has already been closed, -// or an Errno if the underlying Group Policy lock cannot be acquired. +// It returns [ErrInvalidLockState] if l has a zero value or has already been closed, +// [ErrLockRestricted] if the lock cannot be acquired due to a restriction in place, +// or a [syscall.Errno] if the underlying Group Policy lock cannot be acquired. // -// As a special case, it fails with windows.ERROR_ACCESS_DENIED +// As a special case, it fails with [windows.ERROR_ACCESS_DENIED] // if l is a user policy lock, and the corresponding user is not logged in // interactively at the time of the call. func (l *PolicyLock) Lock() error { + if policyLockRestricted.Load() > 0 { + return ErrLockRestricted + } + l.mu.Lock() defer l.mu.Unlock() if l.lockCnt.Add(2)&1 == 0 {
diff --git a/tstest/integration/tailscaled_deps_test_windows.go b/tstest/integration/tailscaled_deps_test_windows.go index bbf46d8c21938..fa68f76e78a01 100644 --- a/tstest/integration/tailscaled_deps_test_windows.go +++ b/tstest/integration/tailscaled_deps_test_windows.go @@ -59,6 +59,7 @@ import ( _ "tailscale.com/util/osshare" _ "tailscale.com/util/syspolicy" _ "tailscale.com/util/winutil" + _ "tailscale.com/util/winutil/gp" _ "tailscale.com/version" _ "tailscale.com/version/distro" _ "tailscale.com/wf"
v1.78.1 Group Policy Software Install Fails ### What is the issue? When attempting to deploy the latest .MSI package v1.78.1 via group policy the deployment gets stuck and never installs. ### Steps to reproduce 1. Deploy the v1.78.1 amd64 .MSI package via group policy software installs • https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/use-group-policy-to-install-software 2. Optionally enable verbose startup • https://learn.microsoft.com/en-us/troubleshoot/windows-server/performance/enable-verbose-startup-shutdown-logon-logoff-status-messages 2. Reboot the machine and wait for software to install, machine should hang if you also have the issue. When looking in add/remove programs you will not see Tailscale v1.78.1 installed. 3. Deploying the v1.76.6 package via group policy still works ### Are there any recent changes that introduced the issue? Not sure what has changed in the recent .MSI releases. ### OS Windows ### OS version Windows 11 Enterprise ### Tailscale version 1.78.1 ### Other software Group policy deployment ### Bug report _No response_
[ "https://github.com/tailscale/tailscale/commit/7e2e789938812b70b31ce4680e38da108b9bd318" ]
2025-01-16T21:59:58Z
https://github.com/tailscale/tailscale/tree/de5683f7c61098337fe2825e2febe98b6809b291
[ "go mod download ; go install tailscale.com/cmd/tailscale tailscale.com/cmd/tailscaled" ]
[ "powershell -NoProfile -Command \"[Environment]::SetEnvironmentVariable('CI','true','Process'); New-Item -ItemType Directory -Force -Path reports | Out-Null; go test -json ./... > reports\\go-test-results.json\"" ]
[ "cat reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: # Improved parser for go test -json output with robust fallbacks and test name sanitization. import re results: dict[str, str] = {} def sanitize_name(name: str) -> str: # Remove embedded newlines/carriage returns introduced by line wrapping. name = name.replace("\r", "").replace("\n", "") return name def clean_text_name(name: str) -> str: # Strip timing suffixes like " (0.01s)" and trim whitespace. name = re.sub(r'\s*\(\d+(?:\.\d+)?s\)\s*$', '', name) name = name.strip() return sanitize_name(name) # Primary: parse JSON-like objects and extract Action + Test. obj_re = re.compile(r'\{[^{}]*\}', re.DOTALL) action_re = re.compile(r'"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE) test_re = re.compile(r'"Test"\s*:\s*"(.*?)"', re.DOTALL) for m in obj_re.finditer(log): obj = m.group(0) am = action_re.search(obj) if not am: continue status = am.group(1).lower() tm = test_re.search(obj) if not tm: continue test_name = tm.group(1).strip() if test_name: test_name = sanitize_name(test_name) results[test_name] = status # Fallback/supplement: parse textual status lines anywhere in the log. status_map = {"PASS": "pass", "FAIL": "fail", "SKIP": "skip", "ERROR": "fail"} text_re = re.compile(r'---\s+(PASS|FAIL|SKIP|ERROR):\s+([^\r\n]+)') for m in text_re.finditer(log): status = status_map.get(m.group(1).upper(), "fail") name = clean_text_name(m.group(2)) if not name: continue if name not in results: results[name] = status return results
[ "TestPostRequestConten", "TestCheckForAccidentalSettingReverts/advertised__routes_exit_node_removed_explicit", "TestParseSSOutput (0", "TestVarzHandler/int_with_type_counter (0.00s)\\n\"}", "TestPreferencePolicyInfo/unforced_enabled/A", "TestPreferencePolicyInfo/unset_disabled/ExitNod", "TestUpdatePrefsOnSysPolicyChange/ShieldsUp/True (3.25s)\\n\"}", "TestOnTailnetDefaultAutoUpdate/before=,after=true (1.19s)\\n\"", ": TestIsLegacyInvocation/14 (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/managed-int-slice/marshal--directly", "TestPreferencePolicyInfo/unforced_disabled/UnattendeddMode", ": TestTKASync/node_has_an_update (3.41s)\\n\"}", "TestResume (0.03s)\\n\"}", "TestSuggestExitNode/mullvad_nodes,_no_derp_based_exitt_nodes", "TestPreferencePolicyInfo/force_disable_unchanged/ChecckUpdates", "TestSuggestExitNode/missing_suggestion_capability (0.00s)\\n\"", "TestProbeUDPLifetimeConfig_Equals/equal_pointers (0.00s", "TestTKASign (3.46s", "TestPreferencePolicyInfo/blank_enabled/InstallUpdates (0", "TestStdHandler/handler_returns_user-visibl", "TestDriveManageShares/remove_non_existing (3.23s)\\n\"}", "TestOnTailnetDefaultAutoUpdate/before=unset,after=fallse", "TestInternalAndExternalInterfaces/single-interface (0.00s)\\", "TestMaybeRebindOnError/rebind-:_broken_pipe (2.35s)\\n\"}", "Test_determineRecorderConfig/odd_rule_combinationn_fail_closed", "TestWatch (0.01s)\\n\"}", "TestPreferencePolicyInfo/unforced_disabled/AllowIncommingConnections", "TestNodeAddrResolve/UseDNSCache=true/IPv4 (0.08s)\\n\"}", "TestProberRun (0.04s)\\", "TestCheckForAccidentalSettingReverts/remove_all__implicit_except_hostname", "TestPreferencePolicyInfo/force_disable_unchanged/UseTTailscaleDNSSettings", "TestCheckForAccidentalSettingReverts/exit_node_cclearing", "TestHands", "TestBucket//machine/37fc1acb57f2", "TestUpdatePrefsOnSysPolicyChange/NoChange (1.82s)\\n\"}", "TestShouldAutoExitNode/auto_prefix_but_empty_suffix (0.00s", "TestCheckForAccidentalSettingReverts/error_exit__node_omit_with_id_pref", "TestTKASync (13.92", "TestSetControlClientStatusAutoExitNode (2.38s)\\n\"}", "TestPrefsFromUpArgs/error_exit_node_ip_is_self_iip", "TestServerRepl", "TestMarshalUnmarshal/jsonv2/string-slice/marshal-via-", "TestStdHa", "TestViewer", "TestFileStore (0.01", "TestOCSP (8.50s)\\n\"}", "TestRegisterSourceAndGetEffectivePolicy (0.00s)\\n\"}", "TestSetExitNodeIDPolicy/ExitNodeID_key_not_set (2.10s)\\n\"}", "TestRunWatchConnectionLoopServeConnect (0.07s)\\n\"}", "TestPreferencePolicyInfo/unforced_enabled/UseTai", "TestShouldProcessInbound/process-subnets (2.07s)\\n\"}", "TestProbeUDPLifetimeConfig_Equals/equal_pointerrs", "TestCheckForAccidentalSettingReverts/ignore_logiin_server_synonym", "TestWindowsPingOutputIsSuccess/success_sub_milliisecond", "TestSigHashSi", "TestPreferencePolicyInfo/unset_disabled/AllowIncominggConnections", "TestPrefsFromUpArgs/error_linux_netfilter_empty (0.00s)\\n", "TestStdHandler/handler_returns_error_afte", "TestProbeUDPLifetimeConfig_Equals/both_sides_nil (0.00s", "TestPreferencePolicyInfo/unforced_enabled/CheckUpdatees", "TestPrefsPersist (0.00", "TestResolveLocal/nxdomain (0.00s)\\n\"}", "TestPreferencePolicyInfo/unforced_disabled/Unattende", "TestDriveManageShares/rename_not_exist (3.35s)\\n\"}", "TestLogHa", "Test_spdyFrame_Parse/frame_with_incomp", "TestPreferencePolicyInfo/unset_disabled/UnattendedModde", "TestCaptureHook (", "TestPrometheus (0.02s", "TestCheckForAccidentalSettingReverts/advertise_eexit_node", "TestL", "TestFull (2.10s)\\", "TestProb", "TestMarshalUnmarshal/jsonv2/int-slice/marshal-via-view (", "TestMarshalUnmarshal/jsonv2/subgroup (0.00s)\\n\"}", "TestTKAAffectedSigs/signature_for_different_keyID (1.21s)\\n\"", "TestCheckForAccidentalSettingReverts/exit_node_cl", "TestHasPathHandler (", ": TestIsLegacyInvocation/13 (0.00s)\\n\"}", "TestExtractTags/two_hypen_separate_arg (0.00s)\\n\"}", "TestPersistE", ": TestMarshalUnmarshal/json/int32 (0.00s)\\n\"}", "TestShouldProcessInbound/process-local-ips (2.07s)\\n\"}", "TestClockFol", "TestMarshalUnmarshal/json/bool-true/marshal-via-view (0.00", "TestServeWatchIPNBus/read-initial-state (2.09s)\\n\"}", "TestNoAllocs (", "TestView", "TestServeDevConfigMutations/https_listener_validd_port", ": Test_reverseProxyConfiguration (1.32s)\\n\"}", "TestReg", "TestPreferencePolicyInfo/unset_disabled/UseTai", "TestMarshalUnmarshal/jsonv2/empty-slice/marshal-via-viiew", "TestTailscaleIPs (2.", "TestCheckForAccidentalSettingReverts/error_exit__node_omit_with_ip_pref", "TestAllocs (1.1", "TestShouldHandlePing/ICMP6-tailscale-addr (2.11s)\\n\"}", "TestMarshalUnmarshal/json/bool-true/marshal-directly (0.00", "TestPeerCfg_NAT (", "TestSequentialOSUserSwitchingOnWindows (1.07s)\\n\"}", "TestStressSetNetworkMap (2.52s)\\n\"}", "TestPreferencePolicyInfo/unforced_enabled/UseTailscalleSubnets", "TestCalcAdvertiseRoutesForSet/stop-advertis", "TestSorte", "TestServeDevConfigMutations/multiple_http_with_off (0.", "TestShouldDenyServeConfigForGOOSAndUserContext (7.52s)\\n\"}", "TestIPNAlreadyInUseOnWindows (2.09s)\\n\"}", "TestTKAFor", "TestCheckForAccidentalSettingReverts/remove_all_", "TestApplySysPolicy/prefs_set_without_policies (4.09s)\\n\"}", "TestExpandProxyTargetDev/hostname+port (0.00s)\\n\"}", "TestViewerImpo", "TestMarshalUnmarshal/jsonv2/empty-slice/marshal-via-vi", "TestCheckForAccidentalSettingReverts/loggedout", "TestApplySysPolicy/prefs_set_with_matching_policies (2.07s", "TestMarshalUnmarshal/jsonv2/string-slice/marshal-via-vview", "TestPreferencePolicyInfo/force_disable_unchanged/InsttallUpdates", "TestMarshalUnmarshal/jsonv2/string-slice/marshal-dire", "TestOnTailnetDefaultAutoUpdate/before=true,after=true (1", "TestConnMemoryOverhead (1.87s)\\n\"}", "TestCalcAdvertiseRoutesForSet/stop-advertise-exiit/with-routes", "TestProberProbeI", "TestInCrosti", "TestCalcAdvertiseRoutesForSet/advertise-route", "TestRDN", "TestParseIPS", "TestTrimRDNSBonjourPrefix (0.00s)\\n\"}", "TestPreferencePolicyInfo/blank_enabled/InstallUpdatess", "TestMarshalUnmarshal/jsonv2/empty-slice (0.00s)\\n\"}", "TestConn (2.85s)\\n\"}", "TestBucket//machine/37fc1acb57f256b69b0d76749d814d91c68b2410057c6b127fee3df37e4af111e/map", "TestPreferencePolicyInfo/unforced_enabled/InstallUpdaates", "Test_determineRecorderConfig/odd_rule_combin", "TestUpdatePrefsOnSysPolicyChange/ExitNodeID (1.33s)\\n\"}", "TestApplySysPolicy/prefs_set_with_neutral_policies (2.07s)\\", "TestSuggestExitNode/2_derp_based", "TestResolverEqual/not_equal_bootstrap (0.00s)\\n\"}", "TestTailscaleIngressWithProxyClass (0.01s)\\n\"}", "TestProberTim", "TestOnTailnetDefaultAutoUpdate/before=unset,after=fals", ": TestBackfillAppConnectorRoutes (2.11s)\\n\"}", "TestOnTailnetDefaultAutoUpdate/before=,after=false (2.19s)\\", "TestIsWireGuardOnlyPeer (1.66s)\\n\"}", "TestPreferencePolicyInfo/unforced_enabled/InstallUpda", "TestNodeAddrResolve/UseDNSCache=true/IPv6_Failure (0.05s)\\n\"", "TestSuggestExitNode/2_exit_nodes_different_regions_unnknown_latency", "TestExp", "TestActiveDiscovery/facing_easy_firewalls (4.98s)\\n\"}", "TestPrefsEqual (0.00s)\\n", "TestResolveLocal/foreign_domain (0.00s)\\n\"}", "TestPreferencePolicyInfo/unforced_disabled/E", "TestLooku", "TestCus", "TestCheckForAccidentalSettingReverts/advertise_eexit_node_over_existing_routes", "TestCheckForAccidentalSettingRe", "TestShouldSendToHost/local_ip_to_remote (2.17s)\\n\"}", ": TestSuggestExitNode/nil_netmap (0.00s)\\n\"}", "TestShouldProcessInbound/tailscale-ssh-disabled (2.07s)\\n", "TestLogg", "TestGetDNSQueryCacheKey/ignore_question_with_answers (0.0", "TestIsM", "TestAfterFunc (0.00s)\\", "TestMarshalUnmarshal/jsonv2/empty-slice/marshal-directtly", "TestCheckForAccidentalSettingReverts/ign", "TestCheckForAccidentalS", "TestPing (0.08s)\\n\"}", "TestTails", "TestShouldSendToHost/other_4via6_to_remote (2.21s)\\n\"}", "TestApplySysPolicy/empty_prefs_with_policies/status_uupdate", "TestClosePolicyMoreThanOnce/OneSource (0.00s)\\n\"}", "TestApplySysPolicy/empty_prefs_with_policies/status", "TestWindowsPingOutputIsSuccess/success_sub_millise", "TestUDPConn (4.20s)\\n\"}", "TestLoginNotifications/DifferentUsers/NoCID (3.90s)\\n\"}", "TestClosePolicyMoreThanOnce/ManySources (0.00s)\\n\"}", "TestClientS", "TestCheckForAccidentalSett", "TestCutPrefix (0", "TestPostRequestContentTypeValidation/API_routes_should_acccept_`application/json`_content-type", "TestShouldSendToHost/4via6_to_local (2.20s)\\n\"}", "TestPreferencePolicyInfo/force_disable_unchanged/UseTTailscaleSubnets", "TestCheckForAccidentalSettingReverts/errors_presserve_explicit_flags", "TestMatchesFromFilterRules/empty (0.00s)\\n\"}", "TestTailscaleIngressWithServiceMonitor (0.02s)\\n\"}", "TestBucket//machine/37fc1acb", "TestMes", "TestPreferencePolicyInfo/unforced_enabled/CheckUpdates", "TestCheckForAccidentalSettingReverts/loggedout_iis_implicit", "TestO", "TestShouldProcessInbound (14.42s)\\n\"}", "TestDoHV", "TestMarshalUnmarshal/jsonv2/int-slice/marshal-directly (", "TestBucket//machine/37fc1acb57f256b69b0d76749d814d91c68b2410057c6b127fee3df37e4af111e", "TestConnB", "TestNoAnswe", "TestActiveDiscovery/simple_internet (4.04s)\\n\"}", "TestMaybeSetNearestDERP/not_connected_with_falllback_and_no_current", "TestVarzH", "TestMaybeSetNearestDERP/not_connected", "TestSuggestExitNode/mullvad_nodes,_no_derp_based_e", "TestServeDevConfigMutations/multiple_http_with_ooff", "TestCheckForA", "TestApplySysPolicy/ControlURL (2.07s)\\n\"}", "TestServeDevConfigMutations/forground_with_bg_coonflict", "TestPrefsFromUpArgs/error_linux_netfilter_bogus (0.00s)\\n", "TestApplySysPolicy/empty_prefs_without_policies (1.84s)\\n\"}", "TestPreferencePolicyInfo/force_disable_unch", "TestCheckForAccidentalSettingReverts/advertise_eexit_node_over_existing_routes_and_exit_node", "TestPreferencePolicyInfo/blank_enabled/AdvertiseExitN", "TestPreferencePolicyInfo/unset_enabled/AdvertiseExitNNode", "TestSendRecv (0.08s)\\n\"}", "TestApplySysPolicy/ControlURL/status_update (2.07s)\\n\"}", "TestCheckForAccidentalSettingReverts/remove_all__implicit", "TestStdHandler/handler_returns_user-visible_error_wrapped_byy_private_error", "TestLogOnChang", "TestShouldSendToHost/other_4via6_to_local (2.26s)\\n\"}", "TestExtractTags/arg_empty_truncated (0.00s)\\n\"}", "TestConcurrentOSUserSwitchingOnWindows (2.45s)\\n\"}", "TestTampe", "TestPathPrefix/no-leading-slash (0.01s)\\n\"}", "TestMarshalUnmarshal/jsonv2/int-slice/marshal-directlyy", "TestCalcAdvertiseRoutesForSet/advertise-routes/aalready-exit", "TestOnTailnetDefaultAutoUpdate/before=,after= (2.20s)\\n\"}", "TestOnceMode (0.00s)\\n\"", "TestCheckForAccidentalSettingReverts/error_exit__node_and_allow_lan_omit_with_id_pref", "TestMonit", "TestPreferencePolicyInfo/force_disable_unchang", "TestCheckForAccidentalSettingReverts (0.00s)\\n\"}", "TestCheckForAccidentalSettingReverts/advertise_e", "TestMarshalUnmarshal/json/bool-false/marshal-directly (0.", "TestExpandP", "TestWatchdog/default_watchdog_does_not_fire (2.09s)\\n\"}", "TestUpdatePrefsOnSysPolicyChange/ShieldsUp/False (3.36s)\\n\"}", "TestLoginNotifications/SameUser/TwoSessions/NoCID (2.86s)\\n\"", "TestRDNSNameToIPv4/not_ip (0.00s)\\n\"}", "TestApplySysPolicy/empty_prefs_with_policies (1.07s)\\n\"}", "TestPreferencePolicyInfo/unset_enabled/AdvertiseExitN", "Test_spdyFrame_Parse/frame_withh_incomplete_header", "TestBasics (0.02s)\\n\"", ": Test_Hijacker (0.01s)\\n\"}", "TestBasicPrefs (0.00s)\\n", "TestExtractTags/one_hypen_separate_arg (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/string-slice/marshal-direcctly", "TestMarshalUnmarshal/jsonv2/managed-bundle/marshal-viaa-view", "TestMaybeRebindOnError/no-frequent-rebind (2.20s)\\n\"}", "TestSuggestExitNode/2_derp_based_exit_nodes,_differennt_regions,_equal_latency", "TestTCPForwardLimits_PerClient (2.34s)\\n\"}", "TestServeDevConfigMutations/forground_with_bg_conf", "TestMarshalUnmarshal/jsonv2/int-slice/marshal-via-vieww", "TestUpdatePrefsOnSysPolicyChange/Multiple (3.52s)\\n\"}", "TestPrefsFromUpArgs/error_advertise_route_invaliid_ip", ": TestIsLegacyInvocation/12 (0.00s)\\n\"}", "TestSingleTimer (0.0", "TestShouldSendToHost/local_ip_to_remote_v6 (2.29s)\\n\"}", "TestGetVIPServices/served-and-advertised (3.23s)\\n\"}", "TestFunnel (5.42s)\\n\"}", "TestContainsPointers/interface (0.00s)\\n\"}", "TestRouterAdvertiserIgnoresContainedRoutes (2.09s)\\n\"}", "TestShouldSendToHost/from_service_ip_to_localhost (2.19", "TestSendRecv (0.", "TestProbeUDPLifetimeConfig_Equals/both_sides_niil", "TestPreferencePolicyInfo/unset_disabled/Allow", "TestLimiter (0.00s)\\n\"}", "TestCheckForAccidentalSettingReverts/implicit_opperator_matches_shell_user", "TestCheckForAccidentalSettingReverts/advertised__routes_includes_the_0_routes", "TestPreferencePolicyInfo/unset_disabled/UnattendedMode", "TestPreferencePolicyInfo/unset_disabled/UseTailscaleDDNSSettings", "TestCheckForAccidentalSettingReverts/error_adverrtised_routes_exit_node_removed", "TestShouldHandlePing/ICMP6-no-via (2.10s)\\n\"}", "TestPreferencePolicyInfo/force_disable_unchanged/AdveertiseExitNode", "TestIsWireGuardOnlyPeerWithMasquerade (4.07s)\\n\"}", "TestPrefsFromUpArgs/error_exit_node_ip_is_self_ip (0.00", "TestWhoIs (2.44s)\\n\"", "TestShouldDenyServeConfigForGOOSAndUserContext/solariis-path-handler-not-admin", ": TestGetVIPServices/served-only (3.34s)\\n\"}", "TestProbeInfoRec", "TestShouldSendToHost/4via6_to_remote (1.14s)\\n\"}", "TestDat", "TestPeerAPIReplyToDNSQueriesAreObserved (6.51s)\\n\"}", ": TestRDNSNameToIPv6/not_hex (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/empty-slice/marshal-direct", "TestSetExitNodeIDPolicy/ExitNodeID_key_is_set (2.10s)\\n\"}", "TestRunDerp", "TestLoadPrefsNotE", "TestPreferencePolicyInfo/unset_disabled/ExitNodeAllowwLANAccess", "TestMarshalUnmarshal/jsonv2/managed-bundle/marshal-", "TestSetNetworkMapChangingNodeKey (1.29s)\\n\"}", "TestUserConnectDisconnectOnWindows (0.18s)\\n\"}", "TestPreferencePolicyInfo/force_disable_un", "TestFastPa", "TestMarshalUnmarshal/jsonv2/subgroup/marshal-via-view (0.", "TestSuggestExitNode/2_exit_nodes_different_", "TestPreferencePolicyInfo/unset_enabled (0.00s)\\n\"}", "TestGetInte", "Test_determineRecorderConfig/two_ips_fail_closed (0.00s)\\", "TestCheckForAccident", "TestLoginNotifications/DifferentUsers/SameCID (3.89s)\\n\"}", "TestEgressServiceReadiness/one_ready_replica (0.00s)\\n\"}", "TestStdHandler/handler_returns_error_after_writing_response__with_request_ID" ]
[ "TestGetTailscaleBrowserSession/no-session-user-self-nod", "TestSynoArch/arm-synology_armadaxp_RS815", "TestIsLocalhost", "TestPolicyScopeUnmarshalSpecial/too-many-scopes (0.0", "TestInsertShuffl", "TestHandlePeerAPI/bad_method", "TestFilter/", "TestStdHandler/handler_returns_404_with_request_ID", "TestMarshalUnmarshal/json/managed-string/marshal-via-vview", "TestUrlOfListenAddr/TestNoHost", "TestClientRec", "TestResolveLocal/ipv4", "TestPathPrefix", "TestTailchonkFS_CommitTime", "TestTCPHandlerForDst/100.100.103.100:80", "TestComplete/pingΓÉú (0.00s)\\n\"}", "TestCleanAndSplit/a/", "TestNodeAddrResolve/UseDNSCache=false/IPv4 (0.00s)\\n\"}", "TestSTUNServe", "TestGenericContainsPointers/IntegerMapParam", "TestDownload (10", "TestTCPHandlerForDst", "TestGetVisibility/read_non-existing_value (0.00s)\\n\"}", "TestParseSynoinfo/empty_file", "TestCompare/iOS_version", "TestPreferencePolicyInfo/force_enable_modify/", "TestUpd", "TestMarshalUnmarshal/jsonv2/bundle", "TestPermissions", "ExamplePrefs_ExitNodeID_setManagedValue (0.00s)\\n\"}", "TestExpandProxyTargetDev/include-path", "TestMarshalUnmarshal/json/bool-false (0.00s)\\n\"}", "TestApplySysPolicy/disable_AutoUpdate_apply_does_not__unset_check", "TestGetDNSQueryCacheKey/ignore_response", "TestLocalLogLines/after_second_peer_status (0.00s)\\n\"}", "TestShouldProcessInbound/peerapi-port-subnet-router (", "TestAfterFunc/reset_absolute", "TestSingleTimer/reset_while_stopped (0.00s)\\n\"}", "TestEnvPolicyStore/Configured/StringArray/Spaces (0.", "TestAsJSON", "TestSetUseExitNodeEnabled", "TestStateMach", "TestMessageCache", "TestPreferencePolicyInfo/unset_disabled", "TestPCPIn", "TestReadPolicyStore/MachineStore/NoLock/Stri", "TestDelegate/smalltxtedns", "TestLoggingPrivacy/ts_to_ts_v4_out", "TestComplete/--", "TestCleanURLPath/#00", "TestDecode", "TestEnableAutoUpdates", "TestRingBuffer", "TestAutoflags", "TestCutWord (", "TestFilterFormatAndSortExitNodes/with_country_filter", "TestConfi", "TestKnownKeysRegistered/OnboardingFlow (0.00s)\\n\"}", "TestMarshalUnmarshal", "TestTri", "TestGetVis", "TestParseResponse/google-2", "TestPolicyScopeContains/DeviceScope/CurrenttProfileScope", "TestSrcTypeFromFlags/only_http_set", "TestNoiseClientPortsAreSet/http-localhost-no-port (", "TestSuppres", "TestMarshalA", "TestQna", "TestNotificationTargetMatch/FilterByUID+", "TestMatchAcceptEnvPattern/pattern_?*_target_", "TestShouldDenyServeConfigForGOOSAndUserContext/illumoos-path-handler-admin", "TestSynoArch/arm-synology_armadaxp_RS815 (0.00s)\\n\"}", "TestValue/2s/LowFrequency", "TestAddReportHistoryAndSetPreferredDERP/things_clean_u", "TestHTTPError_Unwrap", "TestKnownKeysRegistered/ExitNodeID", "TestMarshalUnmarshalRawValue/String/Empty (0.00s)\\n\"}", "TestPolicyScopeIsApplicableSetting (0.00s)\\n\"}", "TestServeAPI/100.100.100.102_requesting_/local/v0/not-aan-endpoint", "TestProbeUDPLifetimeConfig_Equals/b_nil (0.00s)\\n\"}", "TestAPIMuxCrossOriginResourceSharingHeaders/set_CORS_headeers_for_non-OPTIONS_requests", "TestShouldTryBootstrap", "TestParse", "TestKnownKeysRegistered/ExitNodesPicker (0.00s)\\n\"}", "TestValidHost/[::1]:9111", "TestViewsJSON (0.", "TestDiscoShared", "TestPeerChangeDiff/mix-patchable-and-not (0.00s)\\n\"}", "TestResolversWithDelays/unknown-no-delays", "TestProbeUDPLifetimeConfig_Valid/duplicate_Clifffs_values", "TestResolverEqual/nil", "TestPreferencePolicyInfo/force_enable_mod", "TestPrefsFromUpArgs/error_exit_node_allow_lan_wiithout_exit_node", "TestProtoPortRangeParsing", "TestReadPolicyStore/MachineStore/WithLock/Stri", "TestCopy", "TestBucket//api/v2/tailnet/bloop@passkey/devices", "TestPadBytes/1_4_3", "TestGetServeHandler/foo-bar-slash", "TestQnapAuthnURL/localhost_http (0.00s)\\n\"}", "TestMarshalUnmarshalRawValue/StringSlice/Emmpty", "TestValidateProxyClass/debug_enabled_for_main_cont", "TestIsMajorChangeFrom/default-route-changed (0.00s)\\n\"}", "TestSingleCache/NoServeExpired/SecondFetch (0.00s)\\n\"}", "TestCalcAdvertiseRoutesForSet/advertise-routes-aand-exit/already-exit", "TestTKAE", "TestPreferencePolicyInfo/blank_enabled/CheckUpdates (0.00s", "TestMultilabelMap", "TestHandlePeerAPI/goroutines/accept-self", "TestUp", "TestVarzHandler/float_with_type_counter", ": TestIsLegacyInvocation/10 (0.00s)\\n\"}", "TestContainsPointers/uint", "TestAppendTo", "TestGetTypeHasher/ptr_to_struct_partially_memhashablle", "TestKnownKeysRegistered/KeyExpirationNotice (0.00s)\\n\"}", "TestAuthorizeRequest", "TestSuggestExitNode/no_allowed_suggestions", "TestStat/non-existent_remote", "TestIsWireGuardOnlyPeerWithMasquerade", "TestReportMetrics/report-metrics-oon-android", "TestRateLogger", "TestGenerateDeeplink", "TestMarshalUnmarshal/json/managed-string", "TestMutationsFromMapResponse/not-okay-patch-node-channge", "TestApplyUpdatesChain/AddKey", "TestGetVisibility/hidden_by_policy", "TestCalcAdvertiseRoutesForSet/stop-advertise-exit (0.00", "Test_msg_Parse/subsequent_fragmennt_stdout_stream_has_mask_has_payload", "TestSettingMetricNames/windows-proofile-no-suffix", "TestReadPolicyStore/CurrentUserStore/NoLock (0.00s)\\n\"}", "TestAfterFunc/stop_after_fire", "TestMaybeRebindOnError", "TestMatchAcceptEnvPattern/pattern_?a_target_ab_should__not_match", "TestFix", "TestIsNetstackRouter/no_netstack", "TestGenericContainsPointers/PointerUnionParam", "TestMutexValue", "TestValidPopBrowserURL/custom_control_url_https_di", "TestScopeMetrics/windows-user", "TestLookupMethod/PtrToNamedType/NoMethod (0.00s)\\n\"}", "TestLoggerWriteLength", "TestCheckForAccidentalSettingReverts/not_synologgy_dont_permit_omit_accept_routes", "TestControlHTTP/http_to_http", "TestMarkAncestorIntersectionAUMs/genesis", "TestInternalOffsets", "TestClockWithDefaultStartTime/no_increment", "TestContainsPointers/chan", "TestDeltaDERPMap/regions-sticky", "Test_Writes/single_write_stdoutt_data_frame_with_payload", "TestPeerChangeDiff/patch-capmap-remove-key", "TestIsMajorChangeFrom/eq", "TestPreferencePolicyInfo/force_enable_u", "TestResponse (0.00s)\\", "TestPolicyScopeMarshalUnmarshal/null-scope (0.00s)\\n\"}", "TestServerDupClients/concurrent_dups_three_parties (0.00s)\\n\"}", "Test_conn_Write/single_write_control_frame (0.0", "TestReadPolicyStore/MachineStore/WithLock", "TestMatchAcceptEnvPattern/pattern_?_target_A_should_m", "TestParseResponse/software-a", "TestResolverEqual/not_equal_bootstrap", "TestLog", "TestPolicyFor/Device/CurrentUser", "TestVarzHandler/metrics_label_map_unlabeled", "TestGetTailscaleBrowserSession/tagged-remote-source (0.00s)\\", "TestServeDevConfigMutations/https_insecure", "TestScopeMetrics (0.00s)\\n\"}", "TestMarshalUnmarshal/json/empty-slice/marshal-via-vieww", "TestWhoIsArgTypes/100.101.102.103", "Tes", "TestPeerChangeDiff/patch-capmap-no-change (0.00s)\\n\"}", "TestFilter/bad_ip_out", "TestSettingMetricNames/key-path (0.00s)\\n\"}", "TestSince", "TestDownload/success (0.01s)\\n\"}", "TestComplete/--root-strΓÉú--ΓÉú--r (0.00s)\\n\"}", "TestApplySysPolicy", "TestEndpointsAreUpAndReturnExpectedResponse (3.24s)\\n\"}", "TestPatchifyPeersChanged/change_exitnodednsrresolvers", "TestMatchAcceptEnvPattern/pattern_COMPLICA?ED_PATTERN**_target_COMPLICATED_PATT_should_not_match", "TestMarshalUnmarshal/jsonv2/managed-string/marshal-dirrectly", "TestEnvPolicyStore/Configured/String/NonEmptty", "TestPolicyScopeUnmarshalSpecial/device-withh-id", "TestValidPopBrowserURL/saas_controlplane", "TestGenerateReq", "TestExpandProxyTargetDev/not-localhost", "TestReloader_ReloadError", "TestGetUPnPPortMapping_Invalid/127.0.0.1", "TestPolicyScopeContains/DeviceScope/CurrentP", "TestPeerChangeDiff/patch-capmap-add-new-key (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/bundle/marshal-directly", "TestCloneState/Key/cbor", "TestMarkDescendantAUMs", "TestMarshalUnmarshal/jsonv2/readonly-item/marshal-di", "ExampleNewS", "TestFQDN/com (0.0", "TestKnownKeysRegistered/AllowIncomingConnections", "TestNotificationTargetMatch/FilterByCID/NoUID/Diffe", "TestLocking", "TestPreferencePolicyInfo/force_enable_unchanged", "TestAddrForPingSizeLocked/ping_size_too_big_forr_untrusted_UDP_addr_should_start_discovery_and_send_to_DERP", "TestPreferencePolicyInfo/force_enable_modify/AdvertisseExitNode", "TestServerDupClients/concurrent_dups_three_parties", "TestFil", "TestAllocations/Sum", "TestPreferencePolicyInfo/error_disabled/UseTai", "TestInternalAndExternalInterfaces/single-interface", "FuzzAppendToLower/seed#6", "TestGetTypeHasher/nil_int_ptr", "TestPolicyScopeUnmarshalSpecial/unknown-s", "TestNAT/address_and_port_dependent_mapping", "TestFileDeleteRace", "TestNewContainsIPFunc/cidr-list-2", "TestProxyGroup", "TestTKAFil", "TestReaderLifecycle/read-settings-if-in-scoppe/profile", "TestICMPv6Checksum", "TestRouting/API_wildcard_match", "TestMarshalUnmarshal/jsonv2/string-string-map", "TestLookupMethod/PtrToNamedType/NoMethod", "TestForwarderWithManyResolvers", ": TestAddrForPingSizeLocked/ping_size_too_big_for_trusted_UDP_addr_should_start_d", "TestHandlePeerAPI/bad_filename_deleted", "TestCheckFunnelAc", "TestSingleTicker/single_tick_step_exact", "TestChirp (0.01s)\\n\"}", "TestFQDNContains/foo.com_", "TestPeerCfg_NAT/IPv6/exit-node-require-nat-peer-doesnt", "TestMakeR", "TestReadPolicyStore/CurrentUserStore/NoLock", "TestServeDevConfigMutations/invalid_mount_port_to", "TestForwarderWithManyResolvers/MixFail (2.28s)\\n\"}", "TestNetw", "TestLookupMethod/Interface/NoMethod (0.00s)\\n\"}", "TestLoginNotifications/DifferentUsers/SameCID", "TestShouldProcessInbound/process-subnets", "TestPrefsFromUpArgs/error_long_label (0.00s)\\n\"}", "TestPeerChangeDiff/miss-change-masq-v4 (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Empty/With-Summary", "TestMutationsFromMapResponse/legacy-online-change", "Test_applyProxyClassToStatefulSet", "TestFromJSONFile", "TestNoiseClientPortsAreSet/http-private-ip-no-port", "TestStdHandler/handler_returns_404_with_nil_child_error (0.00", "TestSyncValueSetForTest/GetOk/WithInitErr (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_enable_modify/Insta", "TestMatchAcceptEnvPattern/pattern_***_target_123456_shhould_match", "TestGetDuration/read_non-existing_value (0.00s)\\n\"}", "TestEmbeddedTypeUnmarshal", "TestValidateProxyClass/empty", "TestCloneState/Empty", "TestNodeAddrResolve/UseDNSCache=false", "TestGetDuration/read_non-existing_value_different_ddefault", "TestGetDNSQueryCacheKey/whatever_go_generates (0.00s)\\n\"}", "TestCheckTag/good", "TestComplete/debugΓÉú--levelΓÉú (0.00s)\\n\"}", "TestKeyToEnvVarName/CamelCase", "TestLookupMethod/TypeParamPtr/HasMethod", "TestRingBuffer/Clear", "TestDelete/intermediate_with_route (0.00s)\\n\"}", "TestRDNSNameToIPv6/not_hex", "TestDel", "TestAllocations/HashUint32", "TestCleanRedirectURL", "TestDropOldLogs/w10-r10", "TestWalkShallowPortable/err_not_exist", "TestTailchonk_ChildAUMs/*tka.Mem", "TestClockFollowRealTime/multiple_advances_over_time", "TestPeerCapabilities/toPeerCapabiliti", "TestTCPHandlerForDst/[fd7a:115c:a1e0::53]:8080", "TestClockAdvance (0", "TestGetTypeHasher/array_ptr_memhash", "TestHasSuffix", "TestRoundTraffic/under_10_000_000_bytes", ": TestPanicDoSharedByDoChan (0.03s)\\n\"}", "TestParseUnraidPluginVersion/testdata/tailscale-1.5", "TestSerializat", "TestParseDuration", "TestDeviceConfig/device1_modify_peer", "TestParseAlpinePackageVersion/wrong_package_output", "TestKnownKeysRegistered/PostureChecking", "TestSingleTimer/no_tick_advance", "TestAuthorityBuilderAddKey", "TestShardedInt/", "TestMatchAcceptEnvPattern/pattern__target__should_match", "TestPolicyScopeContains/UserScope/ProfileScope (0.00s", "TestMarshalUnmarshalSnapshot/Integer/Zero/json (0.00s", "TestParseSigningKey/root", "TestDecode/udp6", "TestGetTailscaleBrowserSession/session-a", "TestKeyToEnvVarName/WithDigits/Single/Back (0.00s)\\n\"}", "TestClockWithDefinedStartTime/increment_second", "TestSettingDefinition", "TestExtractScopeAndParams/scope-only", "TestSince/positive", "TestPreferencePolicyInfo/force_enable_unchanged/UseTaailscaleDNSSettings", "TestStructListView", "TestForwarderWithManyResolvers/ServFail+Success (2.31s)\\n\"", "TestGenericContainsPointers/StructWithNetipTypes", "TestLoopbackLoca", "Test_spdyFrame_parseHeaders/syn_reply_head", "TestLogConciseReport", "TestAuthorityBuilderSetKeyVote", "TestAutoflags/linux_amd64_to_linux_amd64_in_goroot", "TestUnpackLinuxTarball", "TestValidPopBrowserURL/custom_control_url_http", "TestAutoflags/linux_amd64_to_android_amd64", "TestMas", "TestComputeSyncIntersection_FastForward", "TestSyncValueSetForTest/Concurrent/GetErr (0.01s)\\n\"}", "TestFilter/ip97_out", "TestCutSuffix", "TestGetTypeHasher/struct_partially_memhashable_but_ccant_addr", "TestHandleLocalPackets/OtherNonHandled (0.00s)\\n\"}", "Test_determineRecorderConfig/two_ips_fail_open (0.00s)\\n\"}", "TestSelectBestService/single_device", "TestDB", "TestWildcardDomains", "TestEditPrefsHasNoKeys", "TestKeyToEnvVarName/WithDigits/Multi/Back#011", "TestCertExpiration/cert_not_valid_yet", "TestPolicyScopeIsApplicableSetting/Devi", "TestAnnotations", "TestPolicyScopeIsApplicableSetting/Dev", "TestDi", "TestShouldDenyServeConfigForGOOSAndUserContext/linux--path-handler-not-admin", "TestClockFollowRealTime/increment_ms_then_advance_1s", "TestSingleTicker/reset_while_stopped", "TestUpgradeNode/derp-both", "TestLogK", "TestSyncValueSetForTest/GetOk/WithInitErr", "TestProxyGroup/enable_service_monitor_no_crd", "TestKubeconfig/already-using-tailscale (0.00s)\\n\"}", "TestPolicyFor/Device/CurrentProfile (0.00s)\\n\"}", "TestResolveLocal/via_type_a", "TestStdHandler/error_handler_gets_run", "TestApplyUpdateErrors/AddKey_exists", "TestProxyGroupTypes/ingress_type", "Test_mergeStatefulSetLabelsOrAnnots/no_custom_annnots_specified_and_none_present_in_current_annots,_return_current_annots", "TestValidPopBrowserURL", "TestServeAPI/100.100.100.101_requesting_/exit-nodes", "TestHandlePeerAPI/bad_filename_dot", "TestPreferencePolicyInfo/force_enable_unchanged (0.00s)\\n\"}", "TestLookupMethod/PtrToNamedType/HasMethod", "FuzzTime/seed#5", "TestConfig/indirect", "TestCompact (0.00s)\\n\"}", "TestGetVisibility", "TestMaskedPrefsI", "TestPolicyScopeUnmarshalSpecial/empty#01 (0.00s)\\n\"}", "TestOpenAuthority", "FuzzClampEDNSSize/seed#0", "TestPreferencePolicyInfo/blank_enabled/UseTailscale", "TestNoUDPNilGetReportOpts", "TestMarshalUnmarshalSnapshot/String-List", "TestResolveLocal/via_form3_dec_ts.net", "TestDrainP", "TestAfterFunc/reset_for_single_tick_per_advance", "TestMapFraming", "TestPrefsFromUpArgs/error_linux_netfilter_empty", "TestParseSynoinfo/empty_unique", "TestSynoArch/arm-synology_alpine_1517", "TestEnvPolicyStore/Configured/UInt64/NonZeroo", "FuzzTime/seed", "TestSendFreeze (0.21s)\\", "TestHostFileNe", ": TestMakeProbePlan/second_mixed (0.00s)\\n\"}", "TestPacketSideEffects/v6/no-dhcp-on-v6-disco (0.00s)\\n\"}", "TestNewContainsIPFunc/cidr-list-3", "TestSettingDefinition/User/Visibility (0.00s)\\n\"}", "TestValue (0.16s)\\n\"}", "TestKnownKeysRegistered/MachineCertificateSubject (0.00s)\\", "Test_spdyFrame_Parse (0.00s)\\n\"}", "TestClockSetStep/multiple_changes_at_once", "TestCheckForAccidentalSettingRev", "TestAddReportHistoryAndSetPreferredDERP/preferred_derrp_hysteresis_no_switch", "TestValidPopBrowserURL/custom_control_url_http_diff_ddomain", "TestPeerAPIBypass/peerapi_dont_bypass_filter_wrong_port", "TestShardValue", "TestSigNested_DeepNesting", "TestNextPeerExpiry/future_expiry_from_peer (0.00s)\\n\"}", "TestTailscaleEgressServices/service_retain_one_unnnamed_port", "Test_msg_Parse/single_fragment_sttdout_stream_no_mask_has_payload", "TestMarshalUnmarshal/json/bundle-list/marshal-directlyy", "TestProtoTextEncodingRoundTrip", "TestRegisterDuplicateSettings/Conflict/Typee", "TestMarkAncestorIntersectionAUMs/fork", "TestKnownKeysRegistered/ResetToDefaults", "TestProbeInfoRecent", "TestKeyToEnvVarName/WithPathSeparators/Single (0.00s)\\n", "TestResolverEqual", "TestResume/resume-retry", "TestMatchAcceptEnvPattern/pattern_**?TEST_t", "TestCompileHostEntries/no-search-domains", "TestCalcAdvertiseRoutesForSet/advertise-routes/aalready-diff-routes", "TestPeerCapabilities/canEdit-wildcard-in-caps", "TestGValueSet", "TestLazyMachineKeyGeneration", "TestPeerChangeDiff/patch-capmap-remove-as-nil (0.00s)\\n", "TestBlockForeverConnUnblocks", "Test_isMagicDNSName", ": TestMarshalAndParse/ping_with_padding (0.00s)\\n\"}", "TestJoin//b/c", "TestServeDevConfigMutations/bad_path", "TestSuggestExitNode/only_derp_suggestions", "TestParsedString/udp6", "TestDecode/udp4", "TestApplySysPolicy/disable_Auto", "TestSendPacket", "TestLoggingPrivacy/ts_to_internet_v4_in", "TestEqual/interface-removed", "TestTailchonk_AUMMissing/*tka.FS", "TestPrefFlagMapping", "TestTwoDevicePing/no-op_dev1_reconfig (0.00s)\\n\"}", "TestParseResponse/no-4in6", "TestExtractScopeAndParams/open-before-close (0.00s)\\n\"}", "TestServeHTTPProxyPath", "TestHandlePeerAPI/bad_filename_encoded_backslash (0.00s)\\n\"}", "TestSettingDefinition/Profile/String", "TestPolicyScopeIsApplicableSetting/UserScoppe/ProfileSetting", "TestDia", "TestServeAPI/100.100.100.102_requesting_/local", "TestMapViewsEqual/different_length", "TestPeerAPIBase/self_only_4_them_both", "TestFirstLastEqual/first-true", "TestStrictTransportSecurityOptions/off_by_default (0.00s)\\n\"}", "TestAuthorizeRequest/POST-/api/data", "TestMergeSnapshots/with-scope-first-wins", "TestAutoflags/darwin_arm64_to_darwin_arm64_empty_goos (0", "TestNormalizeShareName/name_\\\"generally_good_except_for_.", "TestCheckForAccidentalSettin", "TestValidateLocalBinary/success (0.01s)\\n\"}", "TestMarshalUnmarshal/json/subgroup/marshal-directly", "TestServerDupClients/one_comes_and_goes_lastwriteractive (0.0", "Test_jsonMarshalConfig", "TestFirstLastEqual/last-false", "TestParsePCPMapResponse", "TestServeAuth/existing-session-used", "TestNotificationTargetMatch/FilterByUID/DifferentUID//WithCID", "TestMapViewsEqual/different_values", "TestCutPrefix/no-prefix", "TestLoggingPrivacy/ts_to_internet_v4_out", "TestSettingDefinition/SupportedSetting (0.00s)\\n\"}", "TestUnpublish", "TestAuthorityBuilderCheckpointsAfterXUpdates", "TestHandlePeerAPI/put_invalid_surrounding_whitespace", "TestUpdateNetmapDeltaAutoExitNode/exit-node-goes-offl", "TestValidHos", "TestMarshalUnmarshal/json/addr-int-map/marshal-directlly", "TestMarshalUnmarshalRawValue/StringSlice/NoonEmpty", "TestResolversWithDelays/controld-doh-input", "TestWaiterSet", "TestPrefs", "TestAutoflags/darwin_amd64_to_ios_arm64_xcode", "TestBasics", "TestCompareFo", "TestSanitizeLabel/upper", "TestResolversWithDelays/nextdns-doh-input (0.00s)\\n\"}", "ExamplePrefs_ControlURL_setDefaultValue (0.00s)\\n\"}", "TestShouldSendToHost/4via6_to_remote", "TestNotificationTargetMatch/FilterByCID/Nil (0.00s)\\n\"}", "TestTailscaleEgressEndpointSlices/pods_are_ready__to_route_traffic", "TestCutSuffix (0", "Test_RXChecksumOffload/tcp4_packet_invalid_ccsum", "TestValidHost/127.0.0.1:9110", "TestUpgradeNode/implicit-allowed-ips-all-sett", "TestRebindingUDPConn", "TestProcessUPnPResponses", "TestWindowsPingOutputIsSuccess/success_german (0.00s)\\n\"}", "TestPadBytes/1_1_0", "TestNetworkDownSendErrors", "TestShouldAutoExitNode/no_auto_prefix", "TestHandleC2NTLSCertStatus/missing", "TestDebugger (0.00s)\\n\"}", "TestLimiterJumpBackwards", "TestScrubbedGoroutineDump", "TestDelete/intermediate_no_routes", "TestDeviceConfig/device2_config/reconfig (0.00s)\\n\"}", "TestPolicyScopeMarshalUnmarshal/spec", "TestMarshalUnmarshalSnapshot/Settings/With-O", "TestStdHandler_P", "TestMergeSnapshots/first-nil (0.00s)\\n\"}", "TestKubeconfig/other-cluster", "TestDeviceC", "TestMarshalUnmarshal/jsonv2/int-string-map/marshal-", "TestNotificationTargetMatch/FilterByCID/NoUID/DiffereentCID", "TestPeerCapabilities/toPeerCapabilities-user-owned-nodee-non-owner-caps-ignored", "TestGetTypeHasher/array_elements", "TestCleanAndSplit//a/b", "TestOmitDropLogging/v4_tcp_out", "TestLRUStress", "TestSetConnectorCondition", "TestInvalidResponses", "TestNormalPropagation", "TestLookupMethod/TypeParamWithAlias/NoMethod", "TestServerRepliesToPing", "TestKeyToEnvVarName/WithPathSeparators/Singlle", "TestComplete", "TestConn", "TestVarzHandler/func_float64_untyped", "TestMa", "TestCompare/v2_empty", "Test_listCerts", "TestExitNodeIP", "TestNotificationTargetMatch/FilterByUID/NoUID/WithCIDD", "TestControlURLO", "TestSetJSONRoundTrip/multiple-items", "TestPolicyScopeIsApplicableSetting/Pr", "TestRequireTailscaleIP/ipv6-correct-port (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_aaa_target", "TestAutoflags/linux_amd64_to_android_amd64_cgo", "TestDelegateSplitRoute", "Test_determineRecorderConfig/no_caps (0.00s)\\n\"}", "TestDomainRoutes", "TestAppendWarnableDebugFlags", "TestPolicyChangeHasChanged", "TestMetaCert (0.00s)\\n\"}", "TestInternalAndExternalInterfaces/multiple-interfacess", "TestServeAPIAuthMetricLogging/viewing-remote-tagged (0.00s)\\", "TestPars", "Test_msg_Parse/single_fragment_sttderr_steam_no_payload_has_mask", "TestComplete/debugΓÉú--enumΓΓÉúal", "TestMatchAcceptEnvPattern/pattern_?*_target__should_noot_match", "TestAvailableEndpointsAlwaysAtLeastTwo (0.00s)\\n\"}", "TestExpandProxyArg", "TestStdHandler/inner_cancelled", "TestCalcAdvertiseRoutesForSet/advertise-exit (0.00s)\\n\"}", "TestResolversWithDelays/google-only-ipv6 (0.00s)\\n\"}", "TestFilter/bad_port_out", "TestHashMa", "TestCompileHostEntries/search-domains", "TestParseNLArgs", "TestAssertStructUnchanged/t1-internally_defined (0.00s)\\n\"}", "TestNotificationTargetMatch/AllClients/WithUID/NoCID", "TestOmitDropLogging/v4_multicast_out_high (0.00s)\\n\"}", "TestApplyUpdateErrors/UpdateKey_notfound", "TestGetTypeHasher/array-IntIntByteInt-canaddr (0.00s)\\n\"}", "TestDelta", "TestNetmapForResponse/collect_services", "TestServeDevConfigMutations/https_insecure (0.00s)\\n\"}", "TestConn/Racy", "TestReportMetrics/do-not-report-meetrics-on-macos", "TestSettingDefinition/Device/PreferenceOption (0.00s)\\", "TestJoin//a", "TestRegisterSettingDefinition/GetRegisteredd", "TestFunnel", "TestSliceContainer/empty", "TestPolicyScopeContains/ProfileScope(A)/Us", "TestDebInfo/simple", "Test_Writes/single_write_stdoutt_data_frame", "TestPipeHello (0.0", "TestCloneNode/nil_fields", "TestClockSetStep/multiple_changes_over_time", "TestMarshalUnmarshal/jsonv2/managed-string/marshal-viaa-view", "TestClockAdvance/increment_ms_then_advance_1s (0.00s)\\n\"}", "TestUrlOfListenAddr/TestLocalhost", "TestContai", "TestCleanupOldDownloads/MSIs", "Test_conn_Write/two_writes_stdout_data_mess", "TestEnvPolicyStore/Configured/UInt64/Empty", "TestWatch", "TestCalcAdvertiseRoutesForSet/advertise-exit/alrready-exit", "TestAddReportHistoryAndSetPreferredDERP/derp_home_parrams_high_latency", "TestAUMHashes", "TestVarzHandler/expvar_map_untyped", "TestMarshalAndParse", "TestServeAPI/100.100.100.101_requesting_/local/v0/not-aan-endpoint", "TestAppendTextOrJSON", "TestEnvPolicyStore/NotConfigured/UInt64 (0.00s)\\n\"}", "TestNetmapForResponse/named_packetfilter", "TestServeDevConfigMutations/using_port_number", "TestPreferencePolicyInfo/blank_enabled/UseTailscaleSuubnets", "TestFQDN/com", "TestDirectBrokenRemove", "TestPolicyScopeIsConfigurableSetting/P", "TestDNSConfigForNetmapForExitNodeConfigs/n", "TestUpdatePrefsOnSysPolicyChange", "TestParsedString/icmp6", "TestPermissions/c (", "Test_jsonUnmarshalConfig", ": TestValue/┬╜s/SpikeDecayAddZero (0.00s)\\n\"}", "TestFull/ipv6", "TestMarshalUnmarshal/json/string-string-map (0.00s)\\n\"}", "TestShouldStartDomainRenewal/should_renew", "TestMarshalUnmarshal/json/readonly-item-with-value (0.00s)\\n", "TestStatusPeerCapabilities/peers-with-capabilities", "TestContext", "TestSingleTicker/multiple_tick_per_step", "TestParseAlpinePackageVersion/wrong_package_output (0.00s)\\", "TestSynoArch/arm-synology_armada375_115 (0.02s)\\n\"}", "TestSplitSOCKSAndHTTPCloseSocks", "TestShardedInt/encoding.TextAppender", "TestEmbeddedTypeUnmarshal/unmarshal_acl_typ", "TestA", "TestLimiterOverdraft", "TestSemaphore", "TestMapViewsEqual/both_empty", "TestShouldHandlePing/ICMP6-tailscale-addr", "TestConfirm/unstable_upgrade", "TestDoHV6Fallback", "TestReadPolicyStore/MachineStore/WithLock/SttringPolicy_Empty", "TestRequireTailscaleIP/ipv6-service-addr", "TestNewContainsIPFunc/empty", "TestServeDevConfigMutations/two_ports_same_dest (0.00s)\\n", "TestExpandProxyTargetDev/no-change", "TestGet (0.00s)\\n\"}", "TestCheckTag/bad", "TestAllocIPs", "TestResetRecords/configuration_with_incompatibl", "TestNoAllocs/udp6_in", "TestMergeSnapshots/both-empty", "TestShouldAutoExitNode/auto_prefix_but_empty_suffix", "TestCountMinSketch", "TestConfig/simple", "TestLogOnChange", "TestLocalLogLines/after_peers", "TestPort80Handler (", "Test_conn_Write/single_write_stdoout_data_message", "TestValidHostname/_example", "TestMarshalUnmarshal/json/addr-int-map/marshal-via-view", "TestSafeFuncSlow", "TestNextPeerExpiry/ClockSkew", "TestValue (0.00s)\\n\"}", "TestBasicRecursion", "TestMarshalUnmarshal/json/netip-addr/marshal-via-view (0.", "TestMarshalUnmarshal/json/int-bundle-map/marshal-via-vview", "TestCoveredRouteRangeNoDefault", "TestStat", "TestNodeKeySignatureRotationDetails/SigDirect", "TestReaderLifecycle/read-settings-if-in-scope/user", "TestString", "TestPolicyScopeUnmarshalSpecial/no-closing-bracke", "TestMergeSnapshots/with-scope-both-empty", "TestPolicyScopeContains/UserScope/DeviceScope (0.00s)\\", "TestPreferencePolicyInfo/unset_disabled (0.00s)\\n\"}", "TestKeyToEnvVarName/empty", "TestRegisterAfterUsePanics", "TestEnvPolicyStore/NotConfigured/StringArrayy", "TestParseSigningKey/not_PEM", "TestGetBoolean/read_non-existing_value (0.00s)\\n\"}", "TestMarsha", "TestOmitDropLogging/v4_multicast_out_low (0.00s)\\n\"}", "TestGetDNSQueryCacheKey/ignore_question_with_answers", "TestHeaderChecksumsV4/DCCP", "TestMatchesMatchProtoAndIPsOnlyIfAllPorts/all_portts_okay", "TestCertStoreRoundTrip", "TestRouting/path_conflict", "TestMatchAcceptEnvPattern/pattern_*?*_target__should_nnot_match", "TestServeDevConfigMutations/tcp_port_too_high (0.00s)\\n\"}", "TestStdHandler/handler_returns_user-visible_error_with_requeest_ID", "TestPacketFilterPermitsUnlockedNodes/unsigned-good", "TestRandom", "Test_mergeStatefulSetLabelsOrAnnots/no_custom_annots_specified_an", "TestEtcAptSourceFileIsDisabled/normal-disabled-the", "TestMatchAcceptEnvPattern/pattern__target__should_matcch", "TestShouldHandlePing/ICMP6-4via6-ProcessSubnets--false", "TestReplace (0.00s)\\n\"}", "TestParseIni (0.00s)\\n", "TestMaybeSetNearestDERP/not_connec", "TestKeyToEnvVarName/WithDigits/Single/Front", "TestRegisterDuplicateSettings/NoConflict/MeergeOS-First", "TestPreferencePolicyInfo/unforced_disabled/Advert", "TestWhoIsArg", "Test_endpoint_maybeProbeUDPLifetimeLocked/locall_higher_disco_key", "TestAfterFunc/single_tick_advance_extra", "TestEmbeddedTypeUnmarshal/unmarshal_gitops_type__from_acl_type", "TestStdHandle", "TestPreferencePolicyInfo/unforced_enabled/Advertis", "TestParseRootKey/invalid_PEM_tag", "TestKeyToEnvVarName/WithAbbrev/Back (0.00s)\\n\"}", "TestSingleTimer/reset_while_stopped", "TestShouldRebind", "TestFileDel", "TestLocalLogLines/after_prefs (0.00s)\\n\"}", "Test_spdyFrame_parseHeaders/syn_", "TestProfileDup", "TestForwarderWithManyResolvers/NXDomain+Success (2.25s)\\n\"", "TestPacketFilterPermitsUnlockedNodes/unsign", "TestPeerAPIBypass/peerapi_bypass_filter", "TestSince (0.00s)\\n\"}", "TestReadPolicyStore/MachineStore/NoLock/StringPo", "TestLoggingPrivacy/internet_to_ts_v4_out (0.00s)\\n\"}", "TestSingleCache/NoServeExpired/ReFill", "TestServeAuth/query-existing-incomplete-session (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_TEST_*_target_TEST_AA_should_match", "FuzzClam", "TestAuthorizeRequest/-/assets/styles.css", "TestMakeProbePlan/second_v4_no_6if", "TestAddReportHistoryAndSetPreferredDERP/saw_derp_trafffic_history", "TestVerifyFunnelEnabled/not-allowed-to-enable (0.00s)\\n\"}", "TestAddrForSendLockedForWireGuardOnly/choose_IPPv6_address_when_latency_is_the_same_for_v4_and_v6", "TestMapViewsEqual/one_nil", "TestConn/PresentTimeout", "TestMarshalAndPar", "TestClockWithDefaultStartTime/increment_second (0.00s)\\n\"}", "Test_authKeyRemoval", "Test_Hijacker/connection_fails_post--initial_connect,_policy_is_to_fail_closed_conn_is_closed", "TestPacketSideEffects/v6/no-dhcp-on-v6-disco", "TestValidateLocalBinary/signed_with_root_keyy", "TestServeDevConfigMutations/using_port_number (0.00s)\\n\"}", "TestPadBytes/0_1_0", "TestPolicyChangeHasChanged/String-Settings", "TestConn/PastTimeout", "TestRe", "TestSuggestExitNode/nil_netmap", "TestGetMoreSpecificPattern/2_names_for_/_(1) (0.00s)\\n\"}", "Test_mergeStatefulSetLabelsOrAnnots/no_current_annnots_present,_return_custom_annots_only", "TestLogConciseReport/no_udp_icmp", "TestRoundTraffic/under_10_000_000_bytes (0.00s)\\n\"}", "TestPrefsEqual", "TestUnpublishedDNSEmptyList/CacheMiss (0.00s)\\n\"}", "TestSettingMetricNames/windows-user-no-suffix", "TestPreferencePolicyInfo/error_enabled/AllowIncomingCConnections", "TestHandlePeerAPI/host-val/bad-ip", "TestListenerClean", "TestMarshalUnmarshalSnapshot/Setting/With-SSummary", "TestServeDevConfigMutations/serve_reset", "TestServeAuth (0.0", "TestSuggestExitNodeLongLatDistance/valid_values (0.00s)\\n\"}", "TestDoChanContext/AllCancel/NumWaiters=2", "TestOnTailnetDefaultAutoUpdate/before=false,after=fals", "TestServeAuth/no-session", "TestValue/null_for_unset_omitzero_jsonv2", "TestShouldDenyServeConfigForGOOSAndUserContext/solariis-path-handler-admin", "TestMatchAcceptEnvPattern/pattern_??_target_CC_shou", "TestProbeUDPLifetimeConfig_Valid/duplicate_Clif", "TestMatchAcceptEnvPattern/pattern_?_target_a_should_m", "TestGetTypeHasher/nil_uint32_ptr", "TestReadResolve", "TestUpgradeNode/derp-str-only", "TestMarshalUnmarshal/jsonv2/various/marshal-via-view", "TestCleanAndSplit//a/", "TestServeDevConfigMutations/unknown_host_tcp", "TestLoginNotifications/SameUser/TwoSessions/BothWithCI", "TestPreferencePolicyInfo/unset_enabled", "TestFQDN/#00", "TestRequireTailscaleIP/ipv6-service-addr (0.00s)\\n\"}", "TestWrap", "TestSettingDefinition/Device/StringList (0.00s)\\n\"}", "TestDriveManageShares/rename", "TestMarshalUnmarshal/json/int-bundle-map/marshal-dire", "TestPrefsFromUpArgs/error_exit_node_allow", "TestCheckForAccidentalSetti", "Test_Hijacker/setup_succeeds_conn_stays_open_", "TestSetNetworkMapWithNoPeers", "TestStrictTransportSecurityOptions (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/string", "TestMarshalUnmarshalSnapshot/Zero/json", "TestAuthorityBuilderRemoveKey", "TestNoiseClientPortsAreSet/http-private-ip-cus", "TestGroupPolicyReadLockErr (0.00s)\\n\"}", "TestNameserver/CNAME_record_query (0.00s)\\n\"}", "TestUpgradeNode/derp-int-only", "TestPreferencePolicyInfo/unset_disabled/UseTailsca", "TestSetNetworkMapChangingNodeKey", "TestMapCyclicFallback", "TestNotificationTargetMatch/AllClients/Nil", "TestMarshalUnmarshal/json/int32/marshal-directly", "TestFilterEnv", "TestAcceptedNamesContainsPreferredNames", "TestIsLegacyInvocation/14", "TestKnownKeysRegistered/UnattendedMode", "TestMarshalUnmarshal/json/subgroup/marshal-via-view", "TestGetState (0.71s", "TestNewContainsIPFunc/cidr-list-1", "TestNAT/address_and_port_dependent_mapping (0.00s)\\n\"}", "TestPolicyScopeUnmarshalSpecial/profile-useer-no-params", "TestMarshalUnmarshal/json/managed-int-slice (0.00s)\\n\"}", "TestMarkAncestorIntersectionAUMs/no_adjustment", "TestSuggestExitNode/no_preferred_derp_region", "TestMarshalUnmarshal/json/uint64/marshal-via-view", "TestMissingAUMs_Fork/n2", "TestEnvPolicyStore/Configured/StringArray/WiithBlank", "TestConfigE", "TestSendFreeze/block_cathy", "TestSetJSONRoundTrip/empty", "TestGetServeConfigFromJSON", "TestSingleTicker/single_tick_per_step", "TestSyncValueSetForTest/Concurrent/GetOk/WithInitErr", "TestClientSendRateLimiting", "TestOptionA", "TestUnpublishedDNSEmptyList/CacheMiss", "TestPolicyScopeIsConfigurableSetting/UserSccope/ProfileSetting", "TestDoErr", "TestContainsPointers/no-ptr-struct-array", "TestAutoflags/linux_amd64_to_linux_amd64_race (0.00s)\\n\"}", "TestShowUpdateWarnable/show_security_update", "TestHandlePeerAPI/bad_filename_encoded_backslash", "TestPrefsFromUpArgs/via_route_good_16_bit", "TestMarshalUnmarshal/json/various/marshal-directly", "TestKnownKeysRegistered/CheckUpdates", "TestSuggestExitNodePickWeighted/same_priorities (0.00s)\\n\"}", "TestParseUPnPDiscoResponse/sagemcom", "TestNoContent/whitespace_invalid_challenge", "TestParseAlpinePackageVersion/valid_version", "TestExpandProxyTargetDev/unsupported-scheme", "TestGetSerialNumber", "TestDeltaRouteData", "TestPatchifyPeersChanged/change_some (0.00s)\\n\"}", "TestMarshalUnmarshal/json/int-slice/marshal-directly", "TestGFunc", "TestSealViaSharedKey", "FuzzAppendToLower/seed#0", "TestCSRFCo", "TestReportMetrics/multi-scope", "TestAddReportHistoryAndSetPreferredDERP/with_two", "TestGenericContainsPointers/InterfaceParam (0.00s)\\n\"}", "TestHandleC2NTLSCertStatus/no_domain", "Test_Writes/single_write_controol_frame_with_payload", "TestPeerAPIBase/self_both_them_no_peerapi_service (0.00s)\\n\"", "TestForEachAddr", "TestResolveLocal/via_form3_hex_bare", "TestKeyToEnvVarName/WithDigits/Multi/Back#01 (0.00s)\\n\"}", "TestFilterEnv/environ_format_invalid (0.00s)\\n\"}", "TestDownload/download_test", "TestConfig", "TestTailscaleEgressEndpointSlices", "TestCompileHostEntries/no-search-domains (0.00s)\\n\"}", "TestBucket//api/v2/tailnet/bloop@passkey/devices (0.00s)\\n\"}", "Test_spdyFrame_parseHeaders/synn_stream_with_header", "Test_client_Event/new_event_gets_created (0.00s)\\n\"}", "TestTKADisablementFlow", "TestClockWithDefinedStartTime/increment_second (0.00s)\\n\"}", "TestReportT", "TestShouldSendToHost/from_service_ip_to_localhosst_v6", "TestGetDurat", "TestSyncValueErrPeek", "TestWriteAndIn", "TestControlHTTP/https_to_http", "TestPeerRoutes/has_1_v6", "TestHandlePeerAPI/not_peer_api", "TestFilterEnv/complex_matches", "TestTailscaleIngress", "TestMultiForwarder", "TestSynoArch/386-synology_i686_415play (0.01s)\\n\"}", "TestAutoflags/linux_amd64_to_linux_amd64_in_goroot (0.00s)\\", "TestPreferencePolicyInfo/error_disabled/ExitNod", "Test_conn_WriteRand (0.04s)\\n\"}", "TestDeferredErr/no-funcs", "TestWindowsPingOutputIsSuccess/success", "TestServeDevConfigMutations/handler_not_found (0.00s)\\n\"}", "TestSettingMetricNames/key-path", "TestApplySysPolicy/empty_prefs_with_policies", "TestClockSetStep/multiple_changes_at_once (0.00s)\\n\"}", "TestPermiss", "TestDoChanContext/DoesNotPropagateValues (0.00s)\\n\"}", "TestAutoflags/darwin_arm64_to_darwin_arm64_empty_gooss", "TestGetTypeHasher/time_ptr", "TestPeerCfg_NAT/IPv6/multiple-peers-require-na", "TestValidateLocalBinary/bad_signing_key_signnature", "TestParentChildRelationship/0/unparseab", "TestCertIP (0.01s)\\n\"", ": TestCoveredRouteRangeNoDefault (0.00s)\\n\"}", "TestDoChanContext/AllCancel/NumWaiters=1 (0.00s)\\n\"}", "TestReadPolicyStore/MachineStore/NoLock/UIntPoli", "TestIsNetstackRouter/hybrid_netstack", "TestInteropServer", "TestCheckForAccidentalSettingReverts/bare_up_means_", "TestPort80Handler/no_fqdn", "TestGoMod (0.00s)\\n\"}", "TestJSONRoundtrip", "TestEgressServiceReadiness", "TestNotificationTargetMatch/FilterByUID+CID/SameUID/DDifferentCID", "TestProberRunHa", "TestPanicDoSharedByDoChan", "TestContainsPointers/float64", "TestGetEffectivePolicyNoSource", "TestPolicyScopeIsApplicableSetting/DeviceSccope/ProfileSetting", "TestPeerCapabilities/toPeerCapabilities-tag-owned-no-weebui-caps", "TestStdHandler_CanceledAfterHeader", "TestPreferencePolicyInfo/force_disable_modify/UseTaillscaleSubnets", "TestAddrForSendLockedForWireGuardOnly", "TestAfterFunc/stop_before_fire", "TestListenerPort", "TestSnapshotString/non-empty (0.00s)\\n\"}", "TestHandlePeerAPI/reject_non_owner_put", "TestBucket//machine/ssh/wait/5227109621243650/to/71118992939970143/a/a9e4e04cc01b", "TestUpdateWildcardRouteRemoval", "TestVerifyFunnelEnabled/fallback-flow-enabled", "TestTailscaleEgressServices/service_retain_one", "TestReadPolicyStore/MachineStore/NoLock/StriingListPolicy_SubKey_Empty", "TestValue/2s/HighThenLow", "Test_conn_ReadRand", "TestMarshalUnmarshal/json/bool-true/marshal-via-view", "TestConn/RacyRead", "TestProxyGroup/proxyclass_not_ready", "TestRemoveAll/attempt_to_remove_root_folder", "TestConn/ReadTimeout", "TestDomainRoutes (0.0", "FuzzTime/see", "Test_Hijacker/setup_fails_policy_is__to_fail_open_conn_stays_open", "TestExtractScopeAndParams/closing-bracket (0.00s)\\n\"}", "TestSynoArch", "TestShouldRebind/:_operation_not_permitted-true (0.00s)\\", "TestPeerChangeDiff/patch-capmap-add-key-to-eempty-map", "TestMarshalUnmarshalSnapshot/String/Empty/json (0.00s", "TestListView", "TestParseUnraidPluginVersion", "TestStrideTab", "TestServeDevConfigMutations/funnel_background (0.00s)\\n\"}", "TestReadPolicyStore/MachineStore/NoLoc", "TestLookupMethod/Interface/NoMethod", "TestShardValue/Len", "TestCompileHostEntries/overlaps", "TestDefaultLoadBalancer", "TestTailscaleEgressServices/delete_external_name__service", "TestServeAuth/failed-session-cleaned-up", "TestMatchAcceptEnvPattern/pattern_TEST_*_ta", "TestCleanAndSplit/a/b", "TestApplySysPolicy/prefs_set_without_policies/unit", "TestCompileHostEntries/only-exact-subdomain-match (0.00s)\\n\"}", "TestPersistEqual", "TestParentChildRelationship/0/parent", "TestRoutesRequireNoCustomResolvers/noRoutes (0.00s)\\n\"}", "TestSet/named (0.00s", "TestValidateConfig/override_bg_tcp", "TestForwarderWithManyResolvers/NXDomain (2.17s)\\n\"}", "TestResolveLocal/via_invalid_type_all (0.00s)\\n\"}", "TestRouting/browser_wildcard_match (0.00s)\\n\"}", "TestAutoflags/linux_amd64_to_linux_riscv64 (0.00s)\\n\"}", "TestGetVIPServices/served-with-port-ranges-one-r", "TestNotificationTargetMatch/FilterByUID/Nil (0.00s)\\n\"}", "TestFlagExpiredPeers", "TestConfirm/stable_upgrade", "TestLogConciseReport/portmap_all", "TestUpdateNetmapDeltaAutoExitNode/other-node-goes-offfline", "TestContainsPointers/netip-AddrPort", "TestLocking/SecondFetch", "TestHandlePeerAPI/bad_filename_encoded_slash", "TestExtractTags/go_run_with_program_tags (0.00s)\\n\"}", "TestSuggestExitNode/nearby_mullvad_nodes_wi", "TestRequireTailscaleIP/ipv4-correct-port", "TestMissingAUMs_FastForward/n2", "TestMarshalUnmarshal/json/managed-bundle/marshal-direcctly", "TestValidPopBrowserURL/saas_login", "TestShouldSendToHost", "TestServeAPI/100.100.100.101_requesting_/routes", "TestRoutesRequireNoCustomResolvers", "TestResolverAllHostStaticResult", "TestServerDupClients/concurrent_dups_three_parties_last_writeer", "TestRecover", "TestValidHost/localhost:9109", "TestGetType", "TestLoopbackSOCKS5", "TestCSRFCookieSecureMode", "TestAddReportHistoryAndSetPreferredDERP/with_two (0.00s)\\n\"}", "TestGetDNSQueryCacheKey/normalize_case (0.00s)\\n\"}", "TestMarshalUnmarshal/json/bundle/marshal-directly", "TestCompare/Linux_short_kernel_version", "TestServeAPI/100.100.100.101_requesting_/local/v0/logouut", "TestServeAuth/new-session", "TestContainsPointers/interface", "TestFilter/short_in", "TestMarshalUnmarshal/jsonv2/netip-addr", "Test_endpoint_maybeProbeUDPLifetimeLocked/maybee_cliff_0", "TestGetRCode", "TestAuthorizeRequest/GET-/api/somethingelse (0.00s)\\n\"}", "TestParsedStrin", "Test_spdyFrame_Parse/control_frame_syn_str", "Fu", "TestSet/named", "TestFull/", "TestEgressServiceReadiness/proxy_group_not_ready", "TestIncomparableValueEqual", "TestUsedCon", "TestInCrostiniRange", "TestProberRunHandler", "TestMarshalUnmarshal/json/string", "TestContainsPointers/int-ptr-array", "TestParseResponse/google-1", "Test_conn_Write/single_write_stdin_data_me", "TestNotificationTargetMatch/FilterByCID/NoUID/SameCID (0", "TestOCSP/good_response", "TestServeAPI/100.100.100.102_requesting_/not-an-endpoinnt", "TestMatchAcceptEnvPattern/pattern_?*?_target_A_", "TestPolicyScopeUnmarshalSpecial/device-scoppe/unknown-scope", "TestMatchAcceptEnvPattern/pattern_aaa_target__sh", "TestPolicyScopeIsConfigurableSetting/ProfilleScope/ProfileSetting", "TestMarshalUnmarshal/jsonv2/bundle-list/marshal-via-viiew", "TestMarshaledSignatureJSON", "TestCleanAndSplit/a/b/", "TestRoundTraffic/under_1_000_000_000_bytes#01", "Test_isMagicDNSName/foo.tail4567.ts.net.", "TestNLPrivate (0.00", "TestAllocateContiguousBuffer/NoValues", "TestConn/CloseTimeout", "Test_msg_Parse/single_frag", "TestLookupMethod/PtrToNamedTypeAlias/NoMethod (0.00s)\\n\"}", "TestDistrosGotLoaded", "TestAddReportHistoryAndSetPreferredDERP/d1_is_back (0.00s)\\", "TestResolverEqual/not_equal_addrs", "TestAllocations/HashString", "TestNameserver/AAAA_record_query,_A_record_doess_not_exist", "Test_endpoint_maybeProbeUDPLifetimeLocked/inv", "TestPolicyScopeContains/DeviceScope/UserScoope", "TestServeDevConfigMutations/invalid_mount_port_ttoo_high", "TestClose", "TestGetPerClientSendQueueDepth", "TestMarshalUnmarshalSnapshot/Settings/With--Origins/json", "TestGetPreferenceOption/always_by_policy", "TestNoReuse", ": TestProfileDupe/login-new-node (0.00s)\\n\"}", "TestPeerCap", "TestMarshalUnmarshal/json/addr-bundle-map/marshal-direectly", "TestApplySysPolicy/ControlURL", "TestGetDNSQueryCacheKey", "TestUpdateRoutesUnadvertisesContainedRoutes (0.00s)\\n\"}", "TestGetTailscaleBrowserSession/not-tagged-local-source (0", "TestGetServeHandler/foo-bar-other", "TestSingleCache/ServeExpired/DifferentKey (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_enable_modify/InstallUUpdates", "TestMarshalUnmarshalSnapshot/Bool/False/jsoon", "TestShowUpdateWarnable/show_regular_update", "TestClosePolicyMoreThanOnce/ManySources", "TestDoChanContext/AllCancel/NumWaiters=20", "TestHandleLocalPackets/ShouldHandleServiceIP", "TestSettingMetricNames/windows-profile-err (0.00", "TestPolicyScopeIsApplicableSetting/UserScop", "TestValue/null_for_unset_jsonv2", "TestTKAAffectedSigs/signature_for_different_keyID", "TestFindParentForRewrite", "TestMutationsFromMapResponse/patch-online-false (0.00s)\\n\"}", "TestDNSConfigForNetmap/corp_dns_misc", "TestSynoArch/amd64-synology_x86_224", "TestComplete/deb", "TestMinLatencyDERPregion/regions,_same_values", "TestGenericContainsPointers/FloatParam (0.00s)\\n\"}", "TestPreferencePolicyInfo/blank_disabled/InstallUpdates", "TestMakeProbePlan/initial_no_v6", "TestInit1", "TestAuthorityCompa", "TestSe", "TestMatchAcceptEnvPattern/pattern_*_target_", "TestPreferencePolicyInfo/force_enable_unchanged/UnatttendedMode", "TestRegisterDuplicateSettings/NoConflict/Exxact", "TestGenericContainsPointers/BasicTypeParam (0.00s)\\n\"}", "TestAutoflags/darwin_arm64_to_darwin_arm64", "TestServeDevConfigMutations/tcp_shorthand (0.00s)\\n\"}", "TestSrcTypeFromFlags/only_https_set (0.00s)\\n\"}", "TestHandlePeerAPI/put_invalid_null", "TestSingleTimer/reset_absolute", "TestOverride", "TestValidateLocalBinary/signed_with_untrusted_key (", "TestComplete/--r (0.00s)\\n\"}", "TestTCPHandlerForDst/100.100.103.100:80 (0.00s)\\n\"}", "TestSynoArch/arm-synology_88f6281_213air (0.01s)\\n\"}", "TestSplitArgs/pkgs_and_post", "TestCSPAllowInlineStyles", "TestEgressServiceReadiness/no_ready_replicas (0.00s)\\n\"}", "TestDecode/ipv4_sctp", "TestApplySysPolicy/prefs_set_with_neutral_policies", "TestResolveLocal/via_invalid_2", "TestAllocateContiguousBuffer/NoPointers (0.00s)\\n\"}", "TestExpandProxyTargetDev/not-localhost (0.00s)\\n\"}", "TestCustomPriorityClassName", "TestNodeAddrResolve/UseDNSCache=false/IPv6_Failure", "TestUpdatePrefs/enable_ssh_over_ssh_no_risk", "TestMarshalUnmarshal/json/empty-slice/marshal-directly (", "TestRemove1 (0.00", "TestMinLatencyDERPregion/regions,_no_latency_values", "TestRequireTailscaleIP/quad-100 (0.00s)\\n\"}", "TestUpdatePeersStateFromResponse/remove", "TestInterval", "TestGetMoreSpecificPattern/2_names_for_/_(2) (0.00s)\\n\"}", "TestResetRecords/nameserver.ip4_gets_reset", "TestGetVisibility/other_error_is_returned", "TestPanicIfAnyEnvCheckedInInit", "TestLimiter_noTruncationErrors", "TestUpdatePrefs/enable_ssh_over_ssh (0.00s)\\n\"}", "TestNodeKeySignatureRotationDetails/SigWrappedCredential (0.00", "TestNextPeerExpiry/peer_already_expired (0.00s)\\n\"}", "TestHandlePeerAPI/put_zero_length", "TestServerDupClients", "TestBucket//machine/ssh/wait/5227109", "TestRemoveAll", "TestSuggestExitNode/only_worst_mullvad", "TestListD", "TestEqualSame", "TestMarshalUnmarshalRawValue/String/NonEmptty", "TestEnvPolicyStore/Configured/Bool/True (0.00s)\\n\"}", "TestExitNodeIPOf", "TestLogKnob (0.", "TestPrefsDowngrade (", "TestListener", "TestAsDebugJSON", "TestControlHTTP/no_proxy", "TestMatchAcceptEnvPattern/pattern_DIRECT_MATCH_target__DIRECT_MATCH_should_match", "TestUpdateNetmapDeltaAutoExitNode/exit-node-goes-offlline", "TestInternalAndExternalInterfaces/wsl2 (0.00s)\\n\"}", "TestRouting/no", ": TestGetTypeHasher/nil_int_ptr (0.00s)\\n\"}", "TestConn/", "TestCSRFCookieSecure", "TestClean", "TestServeDevConfigMutations/serve_background (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/bool-false/marshal-via-view", "Test_listC", "TestHandlePeerAPI/duplicate_different_files (0.00s)\\n\"}", "TestPacketFilterPermitsUnlockedNodes/no-unsigned", "TestMissingAUMs_Fork", "TestLoggingPrivacy/ts_to_ts_v6_out", "TestCutSuffix/has-suffix", "TestIsExitNodeRoute", "TestRouteStoreMe", "TestSynoArch/arm-synology_88f6281_213air", "TestResponse", "TestShouldRebind/unexpected_EOF-false (0.00s)\\n\"}", "TestExpandProxyTargetDev", "TestParseResponse/stun.sipgate.net:10000", "TestDoC", "TestMessageCa", "TestSlice", "TestNoContent/invalid_challenge (0.00s)\\n\"}", "TestNoiseClientPortsAreSet/http-url-custom-pport", "TestDelegate/medtxt", "TestSecretTokenAuth", "TestSnapshotString/empty", "TestClockSetStep/increment_ms_then_s", "TestKeyToEnvVarName/WithAbbrev/Middle", "TestSetJSONRoundTrip/nil", "TestPolicyScopeContains/UserScope(1234)/UseerScope(A/5678)", "TestPolicyFor/CurrentUser/CurrentUser", "TestShouldProcessInbound", "TestSingleCache/NoServeExpired/InitialFill (0.00s)\\n\"}", "TestBa", "TestProxyGroup/delete_and_cleanup", "TestDNSConfigForNetmapForExitNodeConfigs/noExit/noRouutes/noResolver", "FuzzTime/seed#4", "TestUDP (0.01s)\\n\"}", "TestIs", "TestRemoteAddrMatchesPercent", "TestGetBoolean/read_existing_value", "TestObserveDNSResponse", "TestMarshalUnmarshal/jsonv2/subgroup/marshal-directly", "TestEqualLessThan", "TestDebuggerURL (0.00", "TestInternalAndExternalInterfaces/multiple-interfaces (0", "TestExtractScopeAndParams", "TestMarshalUnmarshal/json/addr-bundle-map/marshal-di", "TestFull/ipv4", "TestSingleTick", "TestMarshalUnmarshal/jsonv2/netip-addr/marshal-via-view", "Test_Hijacker/setup_succeeds_conn_sttays_open_ws", "TestBirthTiming", "TestImplementsChonk", "TestGetTypeHasher/array-IntIntByteInt", "TestParseB", "TestAddrForPingSizeLocked/ping_size_0_and_validd_but_expired_UDP_addr_should_send_to_both_UDP_and_DERP", "TestHT", "TestPeerIndexByNodeID", "TestOmitDropLogging/v6_udp_multicast", "TestNextPeerExpiry/no_expiry", "TestShouldAutoExitNode/auto_prefix_no_colon (0.00s)\\n\"}", "TestUpdateRoutesUnadvertisesContainedRoutes", "TestDelega", "TestUnpackLinuxTarball/ignore_extra_tarball_files", "TestAuthorizeRequest/GET-/api/data", "TestShouldProcessInbound/peerapi-port-subnet-rouuter", "TestAddrForPingSizeLocked/ping_size_small_enouggh_for_trusted_UDP_addr_should_send_to_UDP_and_not_DERP", "TestKnownKeysRegistered/AdvertiseExitNode (0.00s)\\n\"}", "TestRea", "TestSnapshotEqual/second-empty (0.00s)\\n\"}", "Test_Writes", "TestFQDNContains/tailscale.com_www.tailscale.com (0.00s)\\n\"}", "TestKnownKeysRegistered/ExitNodeAllowLANAccess (0.00s)\\n\"}", "TestPolicyScopeMarshalUnmarshal (0.00s)\\n\"}", "TestMergeSnapshots/first-nil", "TestConfigEqual", "TestSortByCityName", "TestCalcAdvertiseRoutesForSet/stop-advertise-routes (", "TestHandlePeerAPI/put_non_zero_length_chunked (0.00s)\\n\"}", "TestMessageForPort/serve-http", "TestTailnetTargetIPAnnotation_IPCouldNotBeParsed", "TestDoChanContext/AllCancel/NumWaiters=10", "TestLookupMethod/NamedTypeAlias/NoMethod", "TestD", "TestResolveLocal/magicdns (0.00s)\\n\"}", "TestUpdatePeersStateFromResponse/full_peers (0.00s)\\n\"}", "TestFillAllowedSuggestions/zero", "TestDNSConfigForNetmap/self_expired (0.00s)\\n\"}", "TestSlic", "TestDriveManageShares/append", "TestMatchAcceptEnvPattern/pattern_a*_target_aa_should__match", ": TestFirstLastEqual/first-empty (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Nil (0.00s)\\n\"}", "TestPolicyFor/UserA/UserB", "TestCleanURLPath", "TestEnvPolicyStore/Configured/UInt64/Hex", "TestTailchonkFS_AllAUMs", "TestSetSelfProxy/skip_proxies", "TestUpdateYUMRepoTrack", "TestHandlePeerAPI/goroutines/deny-self-no-cap", "TestIsMajorChangeFrom/some-interesting-ip-changed (0.00s)\\n\"}", "TestGetUint64/reading_value_returns_other_error", "TestTwoDevicePing/ping_1.0.0.2", "TestPolicyScopeIsConfigurableSetting/UserSccope/UserSetting", "TestAllocateContiguousBuffer/HasPointer", "TestPolicyScopeIsApplicableSetting/DeviceSccope/UserSetting", "FuzzAppendToLower/seed#2", "TestHandlePeerAPI/bad_filename_encoded_dotdot (0.00s)\\n\"}", "TestCompare/Linux_long_kernel_version", "TestFQDN/.f", "TestParseSigningKey", "TestClockAdvance/multiple_advances_over_time (0.00s)\\n\"}", "TestApplySysPolicy/enable_AutoUpdate_apply_doe", "TestLocking/R", "TestNotifyPrefsJSONRoundtrip", "TestResignNKS", "TestNotificationTargetMatch/FilterByUID/NoUID/WithCID (0", "TestDoChanContext", "Test_spdyFrame_parseHeaders/synn_reply_no_headers", "TestSetExitNodeIDPolicy/ExitNodeID_key_is_set", "Test_conn_Read", "TestUpgradeNode/implicit-allowed-ips-all-set (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/String/Empty/jsonv2 (0", "TestMemoryStore (", "TestServeDevConfigMutations/serve_reset (0.00s)\\n\"}", "TestHandlePeerAPI/goroutines/deny-nonself", "TestFix (0.00s)\\n\"}", "TestApplyUpdatesChain", "TestDNSConfigForNetmapForExitNodeConfigs/w", "TestPatchifyPeersChanged/same_exitnoderesolvvers", "TestComputeChainCandidates", "TestPolicyScopeIsApplicableSetting/ProfileSScope/ProfileSetting", "TestPreferencePolicyInfo/unforced_disabled/InstallUp", "TestGenericContainsPointers/IntegerPtrParam (0.00s)\\n\"}", "TestViewUtils", "TestMarshalUnmarshal/jsonv2/empty-string (0.00s)\\n\"}", "TestPreferencePolicyInfo/error_disabled/AdvertiseExittNode", "TestSingleTimer/no_tick_step", "TestComplete/debugΓÉú--enum= (0.00s)\\n\"}", "TestSortedStructAllocs", "TestMarshalUnmarshal/json/string/marshal-directly", "TestComputeSyncIntersection_FastForward/n2", "TestConn/ConcurrentMethods", "TestKnownKeysRegistered/ExitNodeIP", "TestMutationsFromMapResponse/patch-derp", "TestExtractScopeAndParams/scope-with-params (0.00s)\\n\"}", ": TestContainsPointers/ptr-struct (0.00s)\\n\"}", "TestRoundTraffic/under_1_000_000_000_bytes#01 (0.00s)\\n\"}", "TestPeerAPIBase", "TestEtcAptSourceFileIsDisabled/normal-commented (0.00s)\\n\"}", "TestReadPolicyStore/MachineStore/NoLock/LegaacyPolicy", "TestCompleteCORSConfig", "TestSealViaS", "TestStdHandler/handler_ret", "TestRouting/only_API_mux", "TestGetUint64/read_existing_value (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/String/Empty/jjsonv2", "TestValidPopBrowserURL/custom_control_url_https_diff__domain", "TestBadSigAUMPropagationRejected", "TestMarshalUnmarshal/json/managed-string (0.00s)\\n\"}", "TestAllowExitNodeDNSProxyToServeName", "TestStatusEqual", "TestSettingDefinition/User/Visibility", "TestSet/unnamed", "TestPrintArray", "TestRemove2 (0.00", "FuzzAppendToLower", "TestValidateLocalBinary/signed_with_root_key (0.01s)\\n\"}", "TestShouldSendToHost/from_service_ip_to_localhost_v6", "TestMatchAcceptEnvPattern/pattern_COMPLICA?ED_PATTERN**_target_COMPLICATED_PATTERN_REST_should_match", "ExampleNewSafeFunc", "TestConciseDiffFrom/peer_remove", "TestPingerTimeou", "TestStdHandler/handler_returns_404_via_HTTPError_wit", "TestSetJSONRoundTrip/multiple-items/strings", "TestApplySysPolicy/enable_AutoUpdate_check_doe", "TestDelegate/ipv4", "TestLOCK", "TestGetUint64/read_non-existing_value (0.00s)\\n\"}", "TestProberRunHandler/failure_json-true", "TestFull/ptr", "TestDelegateSplitRoute/override", "TestCertExpiratio", "TestDoChanContext/AllCancel/NumWaiters=20 (0.00s)\\n\"}", "TestSliceContainer/nils", "TestNormalizeS", "TestSetJSONRoundTrip/nil/strings", "TestClone (0.00s)\\n\"}", "TestCSRFProtection/POST_requests_to_non-API_routes_requiree_CSRF_token_and_fail_if_not_provided", "TestTCPHandlerForDst/100.100.100.100:80", "Test32bitAlignment", "TestShouldDenyServeConfigForGOOSAndUserContext/windowws-not-path-handler", "TestNextPeerExpiry/all_nodes_already_expired (0.00s)\\n\"}", "TestPeerChangeDiff/patch-endpoints (0.00s)\\n\"}", "TestStdHandler/nested", "TestIsUsableV6 (0", "TestRingBuff", "TestOmitDropLogging/v4_multicast_out_high", "TestServeAPI/100.100.100.102_requesting_/routes (0.00s)\\n\"}", "TestWhoIs/100.101.102.103:123 (0.00s)\\n\"}", "TestPacketSideEffects/basic/syslog-v4 (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/int32", "TestMarsh", "TestMap/LoadOrStore", "TestCompare/semver_major#01", "TestPreferencePolicyInfo/error_enabled/UseTailscaleSuubnets", "TestSuggestExitNode/mullvad_nodes,_", "TestAdd", "TestSingleTimer/single_tick_step_extra", "TestShouldTryBootstrap/no-error", "TestAfterFunc/no_tick_advance", "TestSingleCache/NoServeExpired/Forget", "TestRDNSNameToIPv4/double_dot", "TestSplitArgs/only_pkgs", "TestPeerAPIReplyToDNSQueriesAreObservedWithCNAMEFlatttening", "TestReportMetrics/none", "TestSuggestExitNodePickWeighted/1_candidate", "TestCleanURLPath//foo", "Test_endpoint_maybeProbeUDPLifetimeLocked/cyclee_started_too_recently", "TestIsLegacyInvocation/5", "TestValidPopBrowserURL/custom_control_url_https", "TestBufferedDerpWritesBeforeDrop", "TestMutationsFromMapResponse/legacy-lastseen-change", "TestMutationsFromMapResponse/legacy-online-change (0.00s)\\n\"", "TestLookupMethod/NamedType/NoMethod (0.00s)\\n\"}", "TestSetExitNodeIDPolicy/ExitNodeID_key_not_set", "TestAutoflags/linux_amd64_to_freebsd_amd64", "TestCheckForAccidentalSettingReverts/up_with_deffault_prefs", "TestSyncValueSe", "TestProfileList", "TestMatchAcceptEnvPattern/pattern_*?*_target_", "TestGetTailscaleBrowserSession/has-authorized-session (0.0", "TestPacketFilterPermitsUnlockedNodes/empty", "TestBucket//map/a87e865a9d1c7", "TestKubeconfig/invalid-yaml", "TestMarshalUnmarshal/json/int-slice/marshal-directly (0.00", "TestRoundTrip", "TestPeerChangeDiff/patch-online-to-false (0.00s)\\n\"}", "TestResolveLocalReverse/ipv6_nxdomain", "TestMarshalUnmarshal/json/string-slice/marshal-via-vieew", "TestPreferencePolicyInfo/error_enabled/UnattendedMode (0", "TestMarshalAndParse/ping_with_padding_and_nodekey_src (0.00s)\\n", "TestCompareFold", "Test_reverseProxyConfiguration", "TestUpdatePrefsOnSysPolicyChange/Multiple", "TestNetworkMapConcise", "TestMarshalUnmarshal/json/readonly-item/marshal-direct", "TestMarshalUnmarshalSnapshot/Settings/With--Origins/jsonv2", "TestApplySysPolicy/empty_prefs_with_policies/unit (0.00s)\\n\"", "TestProtoMarshalText", "TestCloneState", "TestSanitizeLabel/mixed", "TestCalcAdvertiseRoutesForSet/advertise-exit/al", "TestGetDuration/invalid_duration_value", "TestPatchifyPeersChanged/change_exitnodednsresol", "TestStrictTransportSecurityOptions/cus", "TestComputeSyncIntersection_ForkSmallDiff", ": TestDelete/nosuchprefix_not_in_leaf (0.00s)\\n\"}", "TestValidateConfig/same_fg_port", "TestSnapshotEqual/nil-nil (0.00s)\\n\"}", "TestSettingDefinition/User/Boolean (0.00s)\\n\"}", "TestValidPopBrowserURL/saas_bad_hostname", "TestReadPolicyStore/MachineStore/NoLock/StriingListPolicy_Empty", "TestOmitDropLogging/v6_to_MLDv2_capable_routers", "TestPreferencePolicyInfo/error_disabled/AllowIncominggConnections", "TestSetExitNodeIDPolicy/ExitNodeIP_cleared_if_net_mapp_has_corresponding_node_-_no_policy_set", "TestPathPrefix/no-leading-slash", "TestMarshalUnmarshal/json/empty-slice/marshal-directlyy", "TestDNSConfigForNetmap/v6_only_self (0.00s)\\n\"}", "TestGetRCode/noerror", "TestMapViewsEqual", "TestHostFileCha", "TestControlHTTP/early_write", "TestMarshalUnmarshal/json/netip-addr", "TestAUMWeight (0.00s)\\n\"}", "TestSetExitNodeIDPolicy/ExitNodeID_key_set,_ExitNodeIIP_preference_set", "TestContainsPointers/complex64", "TestOptionAllocs/MaxDecodedSize/Prime", "TestUnpackLinuxTarball/unmodified", "TestBucket//a/831a4bf39856?refreshed=true", "TestServeAPI/100.100.100.101_requesting_/routes (0.00s)\\n\"}", "TestLoggerWriteResult", "TestConsolidateRoutes/two_routes_from_different_fa", "TestMatchAcceptEnvPattern/pattern_??_target_12", "TestMatchAcceptEnvPattern/pa", "TestProcessUPnPResponses/single", "TestAUMWeight", "TestFilter (0.00s)\\", "TestMatchAcceptEnvPattern/p", "TestMissingAUMs_FastForward", "TestBlockWhileIdentityInUse", "TestServerDupClients/concurrent_dups_get_disabled (0.00s)\\n\"}", "TestProtoPortRangeParsing/:80", "TestActiveDiscovery/simple_internet", "TestStrideTableDelete", "TestExpandProxyTargetDev/change-supported-schemes (0.00s)\\n\"}", "TestCaptureHook", "TestUDPState (", "TestParentChildRelationship/1/missingparent (0.00s", "TestPreferencePolicyInfo/error_enabled/AdvertiseExitN", "Test_msg_Parse/single_fra", "TestParseSynoinfo/empty_unique_double-quoted", "TestPrefsFromUpArgs", "TestPrefsDowngrade", "TestServeDevConfigMutations/clean_mount", "TestNotificationTargetMatch/FilterByUID/NoUID/NoCID", "TestResolveLocal/via_invalid_type_a (0.00s)\\n\"}", "TestSuppressLogs", "TestMarshalUnmarshalSnapshot/String-List (0.00s)\\n\"}", "ExampleMiddlew", "TestAUMWeight/Multiple_keys", "TestSizeOf", "TestNodeKey (0.00s)\\n", "TestValidHost/37.16.9.210:41112", "TestSyncOffer (0.00s)\\n\"}", "TestSTUNServer", "TestValidateLocalBinary/missing_file", "TestStressEvictions", "TestGValue (0.00s)\\n\"", "TestPolicyScopeUnmarshalSpecial/slash", "Test_mergeStatefu", "TestNewTestchain", "TestVarzHandler/func_float64_gauge", "TestMergeSnapshots/with-scope-second-empty", "TestMetaCert", "TestRin", "TestKnownKeysRegistered/LogTarget (0.00s)\\n\"}", "TestReader", "TestKeyToEnvVarName", ": TestSetJSONRoundTrip/empty/strings (0.00s)\\n\"}", "TestGetDNSQueryCacheKey/a", "TestGetString/read_existing_value", "TestSingleTicker/follow_real_time", "TestGetServeHandler/foo-no-trailing-slash", "TestCertExpiration/valid_duration_but_no_OCSP (0.00s)\\n\"}", "TestSliceMapKey", "TestPeerCapabilities/toPeerCapabi", "TestServeAuth/control-server-no-check-mode (0.00s)\\n\"}", "FuzzTime/seed#10", "TestEqual (0.00s)\\n\"}", "TestPeerChangeDiff/miss-change-name (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/String-List/json (0.00s)\\", "TestSuggestExitNode/found_better_derp_node", "TestSnapshotString/non-empty-with-item-origin (0.00s)\\", "TestKeyToEnvVarName/WithDigits/Single/Front (0.00s)\\n\"}", "TestAppendMetadata", "TestGetTailscaleBrowserSession/session-expired", "TestMarshalUnmarshal/json/readonly-item-with-value", "TestStat/root_folder (0.00s)\\n\"}", "TestCloneState/DisablementSecrets/cbor", "TestGetVisibility/visibility_default", "TestContainsPointers/int64", "TestGenericContainsPointers/IntegerParam (0.00s)\\n\"}", "TestRebindStress", "TestPeerCfg_NAT/IPv6/single-peer-requires-nat", "TestAllocations/HashUint8", "TestClientSendPong", "TestCloneNode", "TestCleanAndSplit//a/b/", "TestGetTypeHasher/typedString", "TestTailscaleEgressEndpointSlices/pods_a", "TestNetmapForResponse/implicit_node", "TestDelt", "TestPolicyScopeContains/UserScope(1234)/UseerScope(1234)", "TestRefererPolicy/APIMux_routes_do_not_get_Refere", "TestServeDevConfigMutations/https_text_bg", "TestMarshalUnmarshalRawValue/Bool/False", "TestShouldDenyServeConfigForGOOSAndUs", "TestStdHandler/handler_returns_user-visible_error_wrapped_byy_private_error_with_request_ID", "Test_mergeStatefulSetLabelsOrAnnots/custom_annotss_specified,_current_annots_only_contain_tailscale_managed_annots,_return_a_unionn_of_both", "TestAppendText", "TestControlHTTP/http_to_http (0.16s)\\n\"}", "TestCach", "TestMarshalUnmarshalSnapshot/String/Non-Empty/j", "TestDropOldLogs/w250-r150", "TestSettingDefinition/User/Boolean", "TestDockerfileVersion", "TestEnvPolicyStore/Configured/UInt64/Hex (0.00s)\\n\"}", "TestFull/ptr6", "TestShouldRebind/unexpected_EOF-false", "TestPrefsApplyEdits/no_change", "TestAfterFunc/reset_for_single_tick_per_step", "TestParseAndRemoveLogLevel", "TestStdHandler/handler_returns_404_via_HTTPError", "TestProfileCurrentUserSwitch", "TestComplete/pingΓÉú+flags+descs (0.00s)\\n\"}", "TestCache (0.00s)\\n", "TestDeltaDERPMap", "TestMarshalUnmarshal/jsonv2/string/marshal-directly", "TestClockFollowRealTime/changes_at_start", "TestTimeout", "TestIsLegacyInvocation/1 (0.00s)\\n\"}", "TestOCSP/error_500_from_ocsp", "TestComplete/pingΓÉú+flags", "TestTailscaleEgressEndpointSlices/no_proxy_grou", "TestNoiseClientPortsAreSet (0.00s)\\n\"}", "TestGenerateRequestID", "TestPreferencePolicyInfo/blank_enabled/UnattendedMode (0", "TestUrlOfListenAddr/TestLocalhost (0.00s)\\n\"}", "TestPolicyScopeIsApplicableSetting/UserScoppe/DeviceSetting", "TestUpdateNetmapDelta", "TestMaybeUnUTF16 (", "TestApplySysPolicy/disable_AutoUpdate_check_does_not__unset_apply", "TestInteropWithNLK", "TestNoAllocs", "TestMkdir/attempt_to_create_remote (0.00s)\\n\"}", "TestPathPrefix/2-slashes", "TestApplyU", "TestNoRetry", "TestPeerCfg_NAT/IPv4/multiple-peers-require-nat (0.00s)\\n\"}", "TestReadWriteRouteInfo", "TestPeerAPIBase/self_both_them_no_peerapi_service", "TestAuthorityInformNonLinear", "TestMarshalUnmarshal/jsonv2/managed-string", "TestPacketFilterPermitsUnlockedNodes", "TestUpdatePrefs/just_up", "TestServeAPI/100.100.100.101_requesting_/local/v0/prefss#01", "TestUpdatePeersStateFromResponse/full_peers", "TestAPIMuxCrossOriginResourceSharingHeaders/do_not_set_CORRS_headers_for_non-OPTIONS_requests", "TestProxyGr", "TestGetUPnPClient/pfsense", "TestPolicyScopeMarshalUnmarshal", "TestCompare/windows_version", "TestShouldDenyServeConfigForGOOSAndUserContext/darwinn-path-handler-admin", "TestMarshalUnmarshal/jsonv2/various/marshal-directly", "TestMaybeSetNearestDERP/connected_no_derp (0.00s)\\n\"}", "TestUserProfileJSONMarshalForMac", "TestPreferencePolicyInfo/unset_disabled/AdvertiseExi", "Fuzz (0.00s)\\n\"}", "TestClockAdvance/increment_ms_then_advance_1s", "TestShouldTryBootstrap/canceled", "TestSanitizeLabel/bad_trailing", "TestFQDNContains/www.tailscale.com_tailscale.com (0.00s)\\n\"}", "TestPolicyScopeContains", "TestPreferencePolicyInfo/error_disabled/AdvertiseExi", "TestPipeTim", "TestGetMoreSpecificPattern/root-level", "TestSynoArch/arm-synology_hi3535_NVR1218 (0.01s)\\n\"}", "TestConfig/one-to-one-nat-with-multiple-nodes", "TestResolversWithDelays/unknown-no-delays (0.00s)\\n\"}", "TestCheckForAccidentalSettingReverts/hostname_chhanging_explicitly", "TestMkversion", "TestCompare/semver_minor", "TestIsLegacyInvocation/1", "TestLogConciseReport/portmap_some", "TestFirewall/endpoint_independent", "TestMaybeSetNearestDERP/connected_no_derp_fallbback", "TestAuthorizeRequest/-/assets/styles.css (0.00s)\\n\"}", "TestShouldRebind/:_transport_endpoint_is_not_coonnected-true", "Test_Reads", "TestApplySysPolicy/enable_AutoUpdate_chec", "Test_spdyFrame_parseHeaders/syn_reply_n", "TestAppen", "TestAddReportHistoryAndSetPreferredDERP/preferred_derrp_hysteresis_do_switch", "TestContainsPointers/string-ptr", "TestMutationsFromMapResponse/no-changes", "TestServeDevConfigMutations/turn_off_https", "TestProbeUDPLifetimeConfig_Valid", "TestShouldAutoExitNode/auto_prefix_invalid_suffix (0.00s)\\n\"", "TestGetTailscaleBrowserSession/not-owner (0.00s)\\n\"}", "TestMergeSnapshots/with-scope-first-empty (0.00s)\\n\"}", "TestProxyGroupTypes/egress_type", "TestNodeSerialization", "TestCleanAndSplit// (0.00s)\\n\"}", "TestLoca", "TestPeerRoutes/skip-unmasked-prefixes", "TestFlagAppliesToOS", "TestPeerChangeDiff/patch-capmap-no-change", "TestValue/struct_ptr", "TestPolicyScopeIsApplicableSetting/Device", "TestNextPeerExpiry", "TestGetMoreSpecificPattern/atte", "TestContainsPointers/string-array", "TestSplitArgs/space_in_pre_arg", "TestAddrForSendLockedForWireGuardOnly/ping_sentt_within_wireguardPingInterval_should_not_request_ping", "TestMarshalUnmarshal/json/bundle/marshal-directly (0.00s)\\n\"}", "TestApplySysPolicy/ControlURL/status_update", "TestHandlePeerAPI/bad_filename_encoded_dot", "TestClone", "TestMapIter", "TestKeyToEnvVarName/WithDigits/Multi/Front", "TestMarshalUnmarshal/jsonv2/addr-bundle-map/marshal-diirectly", "TestNameserver/A_record_query,_but_the_n", "TestResolveLocalReverse/nxdomain", "TestNextPeerExpiry/self_already_expired (0.00s)\\n\"}", "TestShouldTryBootstrap/dns-was-trustworthy (0.00s)\\n\"}", "TestDumpHTML (0.0", "TestSerialization/AddKey", "TestVarzHandler/float_point_5", "TestKubeconfig/invalid-cfg", "TestMatchAcceptEnvPattern/pattern_a*_target_ba_should__not_match", "TestProxyClass", "TestStressSetNetworkMap", "TestRequireTailscaleIP/ipv4-correct-port (0.00s)\\n\"}", "TestSNIProxyWithNetmapConfig", "TestValueEqual", "TestCompare/tailscale_weird_extra_field", "TestProdAutocertHostPolicy", "TestMarshalUnmarshal/json/addr-int-map/marshal-via-vieew", "TestMemoryStore", "TestUpdatePrefs/force_reauth_over_ssh_no_risk (0.00s)\\n\"}", "TestPacketSideEffects/v4/dhcp-discover", "TestResetRecords/previously_empty_nameserver.i", "Test_msg_Parse/single_fr", "TestMakeProbePlan/only_v6_initial", "TestMarshalUnmarshal/jsonv2/readonly-item-with-value (0.00", "TestPolicyScopeIsConfigurableSetting/", "TestNoContent/valid_challenge_hostname", "TestBigData", "TestProxyGroup/create_crd_expect_service_monitor", "TestDialCall_DNSWasTrustworthy/previous-dial", "TestCloneState/Key", "TestUpdateYUMRepoTrack/change_track (0.01s)\\n\"}", "TestDecode/icmp6", "TestMarshalUnmarshal/jsonv2/empty-string/marshal-dire", "TestAppendM", "TestTwoDevicePing/ping_1.0.0.2_via_SendPacket", "TestClockFollowRealTime/increment_ms_then_advance_1s (0.00s)\\n\"", "TestPacketSideEffects/basic/dns-request-v6 (0.00s)\\n\"}", "TestGetPreferenceOption/always_by_policy (0.00s)\\n\"}", "TestInterleave/nil_all", "TestMarshalUnmarshalSnapshot/Setting/With-Sum", "TestOptionAllocs/MaxDecodedSize/PowerOfTwo", "TestPacketFilterPermitsUnlockedNodes/empty (0.00s)\\n\"}", "TestTsmpPing", "TestSingleTimer", "TestAddReportHistoryAndSe", "TestResolveLocal/via_form3_dec_example.com (0.00s)\\n\"}", "TestPreferencePolicyInfo/blank_disabled/CheckUpdates", "TestComplete/--root-strΓÉú--ΓÉú--root (0.00s)\\n", "TestMarshalUnmarshalSnapshot/Integer/NonZero/json", "TestDeferAfterDo", "TestMarshalUnmarshal/json/managed-string/marshal-direcctly", "TestInversePrefix", "TestServerDupClients/concurrent_dups_three_parties_last", "TestReadPolicyStore/MachineStore/NoLock/StriingListPolicy_SubKey", "TestProxyGroup/simulate_successful_device_auth", "TestStat (0.", "TestRoutesRequireNoCustomResolvers/defaultAndOneOOther", "TestReadPasswor", "TestMarshalUnmarshalSnapshot/Integer/Zero/jjsonv2", "TestPrefsPersist", "TestApplySysPolicy/enable_AutoUp", "TestFQDNContains/www.tailscale.com_tailscale.com", "TestUpdateDebianAptSourcesListBytes/stable-unchanged", "TestCompare/tailscale_major", "TestSetJSONRoundTrip", "TestPacketSideEffects/basic/dst-mac-between-nodes (0.0", "TestMarshalUnmarshal/jsonv2/int-string-map/marshal-dirrectly", "TestFilterDiscoLoop", "TestMarshalUnmarshal/json/string-string-map", "TestMarshalUnmarshalSnapshot/Integer/NonZero (0.00s)\\n\"", "TestJSONRound", "TestKeyToEnvVarName/WithDigits/Multi/Middle (0.00s)\\n\"}", "TestQnapAuthnURL/IP_http", "TestG", "TestPeerCfg_NAT/IPv6/exit-node-require-nat-peer-doesnt (0.", "TestReplace/replace", "TestServeHTTPProxyHeaders/request-from-tagged-node-wiithin-tailnet", "TestPolicyScopeContains/DeviceScope/DeviceScope (0.0", "TestEndpointSetsEqual", "TestMatchAcceptEnvPattern/pattern_??_target_123_shouldd_not_match", "TestPreferencePolicyInfo/error_enabled/UseTailscale", "TestMkdir/attempt_to_create_remote", "TestSendFreeze", "TestMarshalUnmarshal/json/string-slice/marshal-via-view", "TestPeerAPIBypass/reject_with_filter", "TestMarshalUnmarshal/jsonv2/empty-string/marshal-via-vview", "TestServeAPIAuthMetricLogging/viewing-local-tagged", "TestSplitSOCKSAndHTTPCloseHTTP", "TestTKAFilterNetmap", "TestIsLegacyInvocation/4", "TestDNSConfigForNetmapForExitNodeConf", "TestClosePolicyMoreThanOnce/NoSources", "TestPeerCapabilities/toPeerCapabilities-user-owned-nodee-owner-caps-ignored", "TestPolicyFor/CurrentProfile/CurrentProfile (0.00s)\\n\"}", "TestTailchonkM", "TestUpdatePeersStateFromResponse/change_key (0.00s)\\n\"}", "TestVerifyFunnelEnabled/fallback-flow-enabled (0.00s)\\n\"}", "TestPeerChangeDiff/miss-change-masq-v6 (0.00s)\\n\"}", "TestMarshalUnmarshal/json/managed-bundle/marshal-via-", "TestDoChanContext/DoesNotPropagateValues", "TestPeerChangeDiff/miss-change-name", "TestPeerChangeDiff/miss-change-id", "TestPolicyChangeHasChanged/Int8-Settings", "TestGetServeHandler/bar", "TestCleanAndSplit//a/../b (0.00s)\\n\"}", "TestPreferencePolicyInfo/blank_enabled", "TestResolveLocal/magicdns", "TestApplyUpdateErrors", "TestReadPolicyStore/MachineStore/WithLock/UInt", "TestNoiseClientPortsAreSet/https-public-ip-ccustom-port", "TestTailscaleEgressEndpointSlices/no_pods", "TestGetTailscaleBrowserSession/has-session", "TestLogCo", "TestSince/negativ", "TestMkdir", "TestMatchAcceptEnvPattern/pattern_aaa_target__should_nnot_match", "TestExtractTags/one_hypen_separate_arg", "TestCompare/both_empty", "TestResignNKS/second-rotation", "TestPacketFilterPermitsUnlockedNodes/unsigne", "TestRunChecks", "TestDoChan", "TestNonNilMap", "TestKeyToEnvVarName/UPPERCASE (0.00s)\\n\"}", "TestFirstLastEqual/first-empty", "TestLoginNotifications/SameUser/TwoSessions/OneWithCID", "TestMarshalUnmarshalSnapshot", "TestKeyToEnvVarName/Non-Alphanumeric/NonASCIII/1", "TestHexString", "TestVarzHandler/metric_name_start_digit", "TestParentChildRelationship/0/unparseeable/filename.txt", "TestResolversWithDelays/quad9-one-v4-one-v6 (0.00s)\\n\"}", "TestConfig/latency-and-loss", "TestContainsPointers/with-ptr-struct-array (0.00s)\\n\"}", "TestCloneSt", "TestUpdatePrefs/just_edit", "TestGetDERPMap", "TestUpgradeNode/nil", "TestSingleCache/NoServeExpired/DifferentKey (0.00s)\\n\"}", "TestUpdatePrefs/advertise_connector (0.00s)\\n\"}", "TestRouteDataLessConsistent", "TestRedact", "TestPeerRoutes/big_v4", "TestSuggestExitNode/no_allowed_suggestions (0.00s)\\n\"}", "TestDeleteShuffl", "Test_msg_Parse/final_fragment_stddout_stream_has_mask_has_payload", "TestSnapshotEqual/first-empty", "TestEqual/nil_mix", "TestClockFollowRealTime/multiple_advances_at_once", "TestV", "TestProbeUDPLifetimeConfig_Valid/Cliffs_not_ascend", "TestSliceEqual (", "TestResolveLocal", "TestProtoPortRangeParsing/tcp:", "TestSyncValueSetForTest/Concurrent/GetOk/WithInitErr (0.01s", "TestIsLegacyInvocation/10", "TestValue/┬╜s/SpikeDecayAddZero", "TestNewStore", "TestMarshalUnmarshalSnapshot/Nil/jsonv2 (0.00s)\\n\"}", "TestRequireTailscaleIP/quad-100", "TestEncodeAndUploadMessages", "TestDecode/bogus_proto_ff", "TestNameserver", "TestContainsPointers", "TestSingleTimer/single_tick_advance_exact (0.00s)\\n\"}", "TestShouldSendToHost/local_ip_to_remote_v6", "TestDelete/nosuchprefix_wrong_turn", "TestPolicyScopeUnmarshalSpecial", "TestLookupMethod/NamedType/HasMethod", "TestGetTailscaleBrowserSession/not-tagged-local-source", "TestKeyToEnvVarName/Mixed", "TestReportMetrics/do-not-report-meetrics-on-ios", "TestDecode/tcp6", "TestDecode/ipv4_tsmp", "TestRename", ": TestGetServeHandler/root-other (0.00s)\\n\"}", "TestPolicyScopeContains/ProfileScope(A)/UseerScope(B/1234)", "TestNilMethodsDontCrash", "TestWaitGroupChan", "TestNotificationTargetMatch/FilterByUID/Nil", "TestGetPreferenceOption", "TestWatcher", "TestUpdatePrefsOnSysPolicyChange/ShieldsUp/False", "TestSynchr", "TestSliceContainer/nil", "TestEnvPolicyStore/NotConfigured/Bool", "TestGetString/reading_value_returns_other_error (0.00s)\\n\"}", "TestMessageForPort", "TestSynoArch/amd64-synology_x86_224 (0.01s)\\n\"}", "TestPacketSideEffects/basic/dns-request-v4 (0.00s)\\n\"}", "TestParse (0.00s)\\n\"}", "TestEnvPolicyStore/NotConfigured/UInt64", ": TestSanitizeLabel/bad_trailing (0.00s)\\n\"}", "TestUpgradeNode/implicit-allowed-ips-only-addre", "TestCleanAndSplit/a (0.00s)\\n\"}", "TestLogKnob/Default", "TestFilterFields", "TestMaybeRebindOnError/rebind-:_broken_pipe", "TestValidateProxyClass", "TestServeDevConfigMutations/tls_terminated_tcp (0.00s)\\n\"}", "TestDoD", "Test_mergeStatefulSetLabelsOrAnnots/no_custom_labels_specified_an", "TestMergeSnapshots/second-empty", "TestGetBoolea", "TestPreferencePolicyInfo/force_enable_modify/Unatt", "TestFilter/s", "TestParseIPSet", "TestProbeUDPLifetimeConfig_Equals (0.00s)\\n\"}", "TestShouldTryBootstrap/no-fallback", "TestTKAEnablementFlow", "TestAfterFunc/no_tick_step", "TestWhoIs/100.200.200.200:0", "TestReaderLifecycle/read-settings-if-in-scoppe/user", "TestDNSMapFromNetworkMap/self_has_v6_only (0.00s)\\n\"}", "TestDecoder", "TestNetmapForResponse/named_packetfilter (0.00s)\\n\"}", "TestAddReportHistoryAndSetPreferredDERP/derp_", "TestKeepItSor", "TestMarshalUnmarshal/jsonv2/managed-int-slice/marshal--via-view", "TestKeyToEnvVarName/CamelCase (0.00s)\\n\"}", "Test_client_Event/new_event_gets_created", "TestServeHTTPProxyPath//foo/bar/baz_-\\u003e_/foo/bar//baz,_with_mount_point_and_path_/foo", "Test_msg_Parse/final_fragment_stddout_stream_no_mask_has_payload", "TestSetJSONRoundTrip/multiple-items/ints", "TestWithoutExitRoute", "TestExitNo", "TestPrefsFromUpArgs/via_route_short_prefix", "TestPrefsFromUpArgs/warn_linux_netfilter_nodivert (0.00", "TestLoggingPrivacy/ts_to_internet_v4_out (0.00s)\\n\"}", "TestGetPerClientSendQueueDepth/empty", "TestAssertStructUnchanged", "TestSyncOffer", "TestSingleTicker/reset_while_running", "Test_spdyFrame_Parse", "TestPanic", "TestNonNil (0.00s)\\n\"}", "TestRouteAdvertiser", "TestProbeInfoRecent/recent_mix", "TestContainsPointers/int-ptr-slice", "TestWriteState", "TestKeyToEnvVarName/WithDigits/Multi/Middle", "TestRoutesRequireNoCustomResolvers/oneOther (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_?a_target_ab_", "TestShowUpdateWarnable/nil_ClientVersion", "TestPolicyScopeUnmarshalSpecial/empty", "TestParseNLArgs/disablements_not_allowed (0.00s)\\n\"}", "TestPacketSideEffects/basic/syslog-v6 (0.00s)\\n\"}", "TestServeDevConfigMutations/turn_off_https (0.00s)\\n\"}", "TestN", "TestEqual/eq", "TestServeHTTPProxyPath//-\\u003e_/,_with_mount_point_aand_path_/", "TestProxyGroup/simulate_successful_device_auth (0.01s)\\n\"}", "TestAfterFunc/follow_real_time", "TestConsolidateRoutes", "TestIs (0.00s)\\n\"}", "TestKeyToEnvVarName/WithDigits/Single/Middle (0.00s)\\n\"}", "TestRaceSuccess1", "TestNonNilMapForJSON", "TestWithoutExitRoutes", "FuzzTime/seed#18", "TestReadPolicyStore/MachineStore/WithLock/Lega", "Test_mergeStatefulSetLabelsOrAnnots/custom_labelss_specified,_current_labels_only_contain_tailscale_managed_labels,_return_a_unionn_of_both", "TestGValueErr", "TestM", "TestServeWatchIPNBus/read-initial-state", "TestDirectoryListing", "TestPreferencePolicyInfo/force_enable_unchanged/ExitNNodeAllowLANAccess", "TestGetMoreSpecificPattern/trailing_slash", "TestPreferencePolicyInfo/blank_enabled/UnattendedModee", "TestRemoveAll/attempt_to_remove_root_folder (0.00s)\\n\"}", "TestShouldProcessInbound/ipv6-via-not-advertisedd", "TestDoChanContext/AllCancel", "TestReplacePolicySource", "TestGetEffectivePolicyNoSource/DevicePolicy (0.00s)\\n\"}", "TestNAT/address_dependent_mapping", "TestSettingMetricNames/windows-useer-no-suffix", "TestConfirm/from_unstable_to_stable", "Test_determineRecorderConfig", "TestLRU (0.00s)\\n\"}", "TestProxyGroup/scale_down_to_1", "TestConn/Pa", "TestSettingMetricNames/windows-proofile-err", "TestApplySysPolicy/empty_prefs_without_policies/unit (0.0", "TestReadPolicyStore/MachineStore/WithLock/BooolPolicy_False", "TestConciseDiffFrom/peer_add", "TestRotationTracker/empty", "TestRead", "TestShouldDenyServeConfigForGOOSAndUserContext/linux--path-handler-admin", "TestTwoDevicePing/ping_1.0.0.1", "TestCompare/semver_patch", "TestSetSelfProxy/localhost_normalization_of_env_var (0.", "TestNoAllocs/udp4_in", "FuzzAppendToLower/seed#5", "TestTailchonk_ReadChainFromHead/*tka.Mem", "Test_spdyFrame_ParseRand", "TestEnvPolicyStore/Configured/StringArray/Muulti", "TestScrubHex", "TestParseResponse/stuntman-server_ipv6", "TestGetServeHandler/root", "TestTKAForceDisable", "TestHandleC2NTLSCertStatus/expired", "TestPeerRoutes/big_v4_big_v6", "TestErrorf", "TestShouldHandlePing/ICMP4", "TestRange (0.00s)\\n", "TestShouldTryBootstrap/deadline-exceeded", "TestMergeSnapshots/with-conflicts", "Test_mergeStatefulSetLabelsOrAnnots/no_current_laabels_present,_return_custom_labels_only", "TestComplete/deb (0.00s)\\n\"}", "TestPerm (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2", "TestDiscoMessage", "TestDeleterInitWithoutTaildrop", "TestMatchAcceptEnvPattern/pattern_*?_target__should_noot_match", "TestFindParent", "TestStdHandler_Canceled", "TestGetServeHandler", "TestOfferingAppConnector", "TestCloneUser/nil_logins", "TestMarshalAndParse/ping_with_padding", "TestMarshalUnmarshalSnapshot/Nil", "TestCompileHostEntries/only-exact-subdomain-match", "TestComplete/--root-strΓÉú---ΓÉú--ΓÉú--r", "TestNodeAddrResolve/UseDNSCache=false/IPv4", "TestDoChanContext/AllCancel/NumWaiters=1", "TestIsTailscaleIP", "TestWords/tails", "TestServeAPIAuthMetricLogging/viewing-local-unauthenticcated", "TestGetStringArray/read_existing_value", "TestSetExitNodeIDPolicy/ExitNodeIP_cleared_if_net_mapp_has_corresponding_node_-_different_exit_node_IP_in_policy", "TestNextPeerExpiry/future_expiry_from_peer_and_self (0.00s", "TestLookupMethod/NamedTypeAlias/NoMethod (0.00s)\\n\"}", "TestStdHandler/handler_returns_404_with_nil_child_error", "TestHandleLocalPackets/ShouldHandleServiceIP (0.00s)\\n\"}", "TestStateString/default_desc", "FuzzAppendToLower/seed#7", "TestPacketSideEffects/v4", "TestTailchonkFS_", "TestServerDupClients/concurrent_dups_get_disabled", "TestNoiseClientPortsAreSet/https-url-custom--port", "TestCutPrefix/blank-slice", "TestFlagExpiredPeers/tagged_node", "TestReportMetrics/none (0.00s)\\n\"}", "TestMergeSnapshots/both-empty (0.00s)\\n\"}", "TestLoggingPrivacy/internet_to_ts_v4_out", "TestDeviceConfig/device1_add_new_peer", "TestHealthMetric", "TestComplete/pingΓÉú+flags+ddescs", "TestPatchifyPeersChanged", "Test_mergeStatefulS", "TestServeDevConfigMutations/invalid_port_too_low", "TestIPNAlreadyInUseOnWindows", "TestForwarderWithManyResolvers/Success (2.18s)\\n\"}", "TestMakeProbePlan/ensure_home_region_inclusion", "TestResolversWithDelays/google-only-ipv6", "TestServeAPIAuthMetricLogging/viewing-local-unauthen", "TestRDNSNameToIPv4/overflow", "TestPreferencePolicyInfo/blank_enabled/ExitNodeA", "TestUpdatePrefs", "TestMaybeSetNearestDERP/connected_with_report_dderp", "TestValidateConfig/nil_config", "TestPeer", "Test_msg_Parse/final_frag", "TestPreferencePolicyInfo/unforced_disabled/UseTailscaaleSubnets", "TestParseSynoinfo/single-quoted", "TestSyncValueMustSet", "TestAllocations", "TestKnownKeysRegistered/ResetToDefaults (0.00s)\\n\"}", "TestHostFileUnchanged", "TestParsedString/igmp", "TestMarshalUnmarshal/json/netip-addr/marshal-via-view", "TestMergeSnapshots/with-scope-first-wins (0.00s)\\n\"}", "TestRoutesRequireNoCustomResolvers/defaultAndOneOthe", "TestPipeHello", "TestNotificationTargetMatch/FilterByCID/Nil", ": TestPacketSideEffects/v6 (0.00s)\\n\"}", "TestStartStopStartGetsSameIP", "TestBool/null_for_unset", "TestPreferencePolicyInfo/blank_enabled/AllowIn", "TestUrlOfListenAddr/TestNoHost (0.00s)\\n\"}", "TestJoin//a/b", "TestReadPolicyStore/MachineStore/NoLock/BoollPolicy_False", "Test_Writes/two_writes_control_frame_", "TestMarshalUnmarshalSnapshot/Settings/With", "TestMarshalUnmarshalSnapshot/Nil/json (0.00s)\\n\"}", "TestGenericContainsPointers/IntegerPtrParam", "TestEgressServiceReadiness/endpointslice_does_not_", "TestDriveManageShares/add_bad_name", "TestFlagExpiredPeers/no_expiry", "TestGetTypeHasher/int_slice", "TestGenericContainsPointers/IntPtrParam", "TestNew (0.01s)\\n\"}", "TestTailchonk_AUMMissing/*tka.Mem", "TestInit", "TestServeDevConfigMutations/handler_not_found", "TestComplete/--root-strΓÉú---ΓÉú--r", "TestOnTailnetDefaultAutoUpdate/before=true,after=truee", "TestResolveLocal/via_form3_dec_example.com", "TestMarshalUnmarshal/jsonv2/readonly-item-with-value/mmarshal-directly", "TestNextPeerExpiry/future_expiry_from_peer", "TestUpdatePrefs/enable_ssh", "TestDNSConfigForNetmapForExitNodeConfigs/tsExit/noRouutes/defaultResolver", "TestMarshalUnmarshalSnapshot/Empty/With-Summmary/json", "TestMatchAcceptEnvPattern/pattern_EXAMPLE_?_ENV_targett_EXAMPLE_ENV_should_not_match", "TestExpandProxyTargetDev/invalid-port", "TestNameserver/AAAA_record_query,_A_record_doe", "TestTemplate", "TestResolveLocal/via_type_all", "TestTrimCommonSuffixes", "TestReadPolicyStore/MachineStore/NoLock/St", "TestNoContent/long_challenge", "TestIsLegacyInvocation/0 (0.00s)\\n\"}", "TestAppendTo (0.", "TestConfirm/confirm_callback_allows (0.00s)\\n\"}", "TestRoundTraffic/under_10_000_bytes", "TestNetmapForResponse/implicit_node (0.00s)\\n\"}", "FuzzTime/seed#0", "TestActiveDiscovery/facing_nats", "TestPolicyScopeIsApplicableSetting/Profi", ": TestVarzHandler/expvar_label_map (0.00s)\\n\"}", "TestServeDevConfigMutations/path_in_dest", "TestEventManager", "TestShouldRebind/short_buffer-false", "TestServeAPI/100.100.100.101_requesting_/local/v0/logou", "TestEndpointTypeMarshal", "TestProtoUnmarshalJSON", "TestPreferencePolicyInfo/force_disable_modify/UseTaillscaleDNSSettings", "TestIsNetstack", "TestAddReportHistoryAndSetPreferredDERP/saw_derp_traf", "TestPadBytes/0_2_0", "TestGetState", "TestProxyGroupTypes/egress_type (0.00s)\\n\"}", "TestRo", "TestRegisterDuplicateSettings/NoConflict/Merge", "TestStdHandler_OnErrorPanic", "TestSynoArch (0.1", "TestDecodeWrap", "TestAppendTextAllocs", "TestNotFoundError", "TestEnvPolicyStore/Configured/Bool/1", "TestReplace", "TestNotificationTargetMatch/FilterByUID+CID/SameUID/NNoCID", "TestRand", "FuzzAppendToLower/seed#4", "TestSplitArgs/test-arg", "TestServerDupClients/activity_promotes_primary_when_nil", "TestFilter/bad_port_in", "TestStdHandler_Panic", "TestExtractScopeAndParams/empty (0.00s)\\n\"}", "TestMarshalUnmarshal/json/addr-bundle-map/marshal-via--view", "TestCutPrefix", "TestTailscaleEgressServices/service_change_protoccol", "Test_spdyFrame_Parse/control_frame_syn_repl", "TestAfterFunc/single_tick_advance_exact", "TestAuthorityBuilderMultiple", "TestParseRootKey/not_PEM", "TestHeaderChecksumsV4/SCTP", "TestPre", "TestKnownKeysRegistered/ManagedByURL", "TestPCPIntegration", "TestServeDevConfigMutations/tricky_steps", "TestAvailableEndpointsAlwaysAtLeastTwo", "TestMarshalUnmarshalSnapshot/Bool/True", "TestDeltaDERPMap/home-params", "TestTailchonk_C", "TestMinLatencyDERPregion", "TestLogKnob/Env", "Test_endpoint_maybeProbeUDPLifetimeLocked/nil_pprobeUDPLifetime", "TestDNSMapFromNetworkMap/self", "TestSuggestExitNodePickWeighted/\\u003c1_candidates", "TestDelegateSplitRoute/override (0.00s)\\n\"}", "TestSerial", "TestUpdateDebianAptSourcesListByte", "TestNetmapForResponse/implicit_packetfilter", "TestEncode (0.00s)\\n\"}", "TestParseSynoinfo/empty_lines_and_comments", "TestClockWithDefaultStartTime/increment_second", "TestLookupMet", "TestPreferencePolicyInfo/blank_disabled/InstallUpdatees", "TestAllocateContiguousBuffer", "TestGetDNSQueryCacheKey/whatever_go_generates", "TestVerifyCertificateOurControlPlane", "TestLogHost (0.00s)\\n", "TestLogConciseReport/ipv4_all_region", "TestSingleTimer/stop_before_fire", "TestParseRespons", "TestGetPreferenceOption/use_default", "TestFillAllowedSuggestions/one", "TestNotificationTargetMatch/FilterByCID/WithUID/NoCIDD", "TestUnpackLinuxTarball/duplicate_tailscale_binary", "TestGenericContainsPointers/FloatParam", "TestReaderLifecycle/read-settings-if-in-scope/de", "TestPeerCaps/not_admin_bad_dst", "TestPrefsFromUpArgs/warn_linux_netfilter_off (0.00s)\\n\"}", "TestPreferencePolicyInfo/error_enabled/UseTails", "TestIsLegacyInvocation/6", "TestClockSetStep/changes_at_start", "TestSetUnhealthyWithDuplicateThenHealthyAgain (0.00s)\\n\"}", "TestRDNSNameToIPv6/double_dot", "TestPreferencePolicyInfo/force_enable_modify/ExitNodeeAllowLANAccess", "TestProfileDupe", "TestSingleCache/NoServeExpired/SecondFetch", "TestSyncValue", "TestSingleCache/ServeExpired/SecondFetch", "TestSyncValueSetForTest", "TestCloneState/", "TestIssue4871", "TestPolicyScopeContains/UserScope/UserScopee", "TestMarshalUnmarshalSnapshot/Bool/False/json (0.00s)\\n\"", "TestShouldDenyServeConfigForGOOSAndUserContext/darwinn-path-handler-not-admin", "TestDeltaDERPMap/nothing-to-nothing (0.00s)\\n\"}", "TestValidHost/100.100.100.100:41112", "TestValidHostname/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", "TestRoutesRequireNoCustomResolvers/noRoutes", "TestDefaultPrefs", "TestForwarderWithManyResolvers/MixFail", "TestMultiLa", "TestGetDNSQueryCacheKey/normalize_case", "TestLoopbackLocalAPI", "TestRateLimiter", "TestDebInfo/truncated_tgz", "TestConnectToRecorder/v1_recorder", "TestRemovePolicySource", "TestPort80Handler/path_and_query_string", "TestSafeFuncHappyPath", "TestProtoPortRangeParsing/tcp:*", "TestProbe (0.00s)\\n", "TestMarshalUnmarshalRawValue", "TestHashT", "TestResolveLocal/x_via_hex", "TestSnapshotString/non-empty-with-item-erroor", "TestErrorHandler_Panic", "TestContentSecurityPolicyHeader/`/api/*`_routes_do_not_gett_CSP_headers", "TestCopy (0.00s)\\n\"}", ": TestClockSetStep/increment_ms_then_s (0.00s)\\n\"}", "TestNameserverReconciler", "TestPolicyScopeContains/UserScope(1234)/UseerScope(5678)", "TestIsLegacyInvocation/9", "TestCSRFCookieSecureMode/CSRF_cookie_should_be_secure_whenn_server_is_in_secure_context", "TestRunWatchConnectionLoopServeConnect", "TestGetVIPServices/served-only", "TestDeviceConfig/device2_config", "TestConfigFileReload", "TestShouldDenyServeConfigForGOOSAndUserContext/illumoos-not-path-handler", "TestDiscoStringLogRace", "TestConsolidateRoutes/two_routes_from_different_faamilies", "TestNodeAddrResolve/UseDNSCache=true/IPv4", "ExampleUserTimeout", "TestDialCall_DNSWasTrustworthy/no-info (0.00s)\\n\"}", "TestInt", "TestArrayAllo", "TestPreferencePolicyInfo/unset_enabled/CheckUpdates", "TestResignNKS (0.01s)\\n\"}", "TestStateString", "TestPreferencePolicyInfo/force_enable_unchanged/AllowwIncomingConnections", "TestRouting (0.00s)\\n\"}", "TestResolversWithDelays/nextdns-ipv6-expand", "TestBasicPrefs", "TestShouldSendToHost/other_4via6_to_remote", "TestStrideTableDeleteShuffle", "TestProtoPortRangeRoundTrip", "TestHostFileU", "TestContainsPointers/no-ptr-struct", "TestRaceTimeout", "TestExpandProxyTargetDev/empty-input", "TestScopeMetrics/windows-user (0.00s)\\n\"}", "TestCheckForAccidentalSettingReverts/synology_peermit_omit_accept_routes", "TestReadPolicyStore/MachineStore/WithLock (0.00s)\\n\"}", "TestApplySysPolicy/disable_AutoUpdate_apply_does_not__unset_check/status_update", "TestShouldSendToHost/4via6_to_local", "TestPreferencePolicyInfo/unset_disabled/AdvertiseExittNode", "TestPreferencePolicyInfo/force_disable_modif", "TestBuildError", "TestGroupPolicyReadLockClose", "Test_Hijacker/setup_succeeds_conn_stays_open (0.", "TestPreferencePolicyInfo/blank_enabled/UseTails", "TestDNSConfigForNetmapForExitNodeConfigs/wgExit/noRouutes/noResolver", "TestBreakWatcherConnRecv", "TestShuffleNoAllocs", "TestGetVIPServices", "TestSliceEqual", "TestWireguardExitNodeDNSResolvers", "TestDoHV6/https://dns.google/dns-query", "TestMTUConversion", "TestSuggestExitNode/2_exit_nodes_in_same_region", "TestMarshalUnmarshal/json/string-slice", "TestDelegate/largetxt", "TestDebInfo/truncated_ar_header", "TestEtcAptSourceFileIsDisabled/normal-disabled-by-ubuntu", "TestCleanAndSplit///", "TestSince/positiv", "TestSplitArgs/empty", "TestControlHTTP/socks5", "ExampleDeferredInit", "TestApplySysPolicy/prefs_set_with_conflicting_policiees", "TestWindowsPingOutputIsSuccess/unreachable (0.00s)\\n\"}", "TestReadPolicyStore/MachineStore/NoLock", "TestGetVisibility/other_error_is_returned (0.00s)\\n\"}", "TestFilter/ip", "TestEnvPolicyStore/Configured/StringArray/Single (0.", "TestUserConnectDisconnectNonWindows", "TestExtractTags/arg_empty", "TestNameserver/AAAA_record_query,_A_record_exissts", "TestPrometheus", "TestLimit", "TestPolicyScopeContains/ProfileScope/UserSccope", "TestProbeUDPLifetimeConfig_Valid/no_cliffs (0.00s)\\n\"}", "TestConn/W", "TestKeyToEnvVarName/WithPathSeparators/Multii", "TestResetRecords/configuration_with_incompatiblle_version", "TestRemove1", "TestSelectBestService/all_private_external_IPs (4.20s)\\n\"}", "TestHash", "TestHandlePeerAPI/not_peer_api_not_owner (0.00s)\\n\"}", "TestSynoArch/arm-synology_88f6282_413j", "TestUpdatePeersStateFromResponse/change_key", "TestConfirm/downgrade", "TestSingleCache/ServeExpired/ReFill", "TestMarshalUnmarshalRawValue/Object (0.00s)\\n\"}", "TestSendFreeze/initial_send", "TestPolicyScopeContains/UserScope(1234)/UseerScope(A/1234)", "TestSingleTicker (0", "TestSingleCache/NoServeExpired/ReFill (0.00s)\\n\"}", "TestRemove0", "TestFQDN/aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.", "TestSigNested (0.00s)\\n\"}", "TestViewsJSON", "TestApplyUpdatesChain/ChainedKeyUpdates", "TestSingleCache/ServeExpired/FetchError", "TestSnapshotEqual/nil-empty", "TestApplyUpdatesChain/UpdateKey", "TestPreferencePolicyInfo/error_enabled/UseTailscaleDNNSSettings", "TestRoutesRequireNoCustomResolvers/oneOther", "TestDNSConfigForNetmapForExitNodeConfigs/tsExit/routees/noResolver", "TestUnmarshalAlloc", "TestClientInfo", "TestMakeConnectorsFromConfig/DNAT", "TestDeviceStartStop", "TestGetInterfaceIndex/IP_and_port", "TestContainsPointers/netip-Addr", "TestSettingDefinition/Device/Integer", "TestContentSecurityPolicyHeader", "TestDNSConfigForNetmapForExitNodeConfigs/tsExit/noRouutes/noResolver", "TestLookupMethod/TypeParam/NoMethod", "TestGetTypeHasher/time_ptr_via_unexported", "TestShouldAutoExitNode", "TestReportMetrics", "TestServeAuth/expired-cookie-gets-new-session", "TestMakeProb", "TestMarshalUnmarshal/jsonv2/addr-int-map", "TestDrainPendingMessages", "TestLoginNotifications", "TestControlHTTP/port80_broken_mitm (0.16s)\\n\"}", "TestServeDevConfigMutations/invalid_host", "Test_endpoint_maybeProbeUDPLifetimeLocked (0.00s)\\n\"}", "TestResetRecords/previously_empty_nameserver.ipp4_gets_set", "TestSingleTimer/reset_while_running", "TestGetNetshPath", "TestDeltaDERPMap/home-params-sub-fields (0.00s)\\n\"}", "TestCalcAdvertiseRoutesForSet/stop-advertise-exiit", "TestMultiNetwork", "TestNetmapForResponse/implicit_domain (0.00s)\\n\"}", "TestSyncSimpleE2E (0.", "TestStdLogger (0", "TestParseSynoinfo/empty_unique_double-quoted (0.00s)\\n\"}", "TestMutationsFromMapResponse/patch-online-false", "TestSigDirect (0.00s)\\n\"}", "TestJSON", "TestDNSConfigForNetmap/self_name_and_peers (0.00s)\\n\"}", "TestMaybeSetNearestDERP/not_connected_with_repoort_derp", "TestSuggestExitNode/only_mullvad_suggestions", "TestDriveManageShares/rename_bad_name", "TestExtractTags/arg_empty_truncated", "TestNotificationTargetMatch/FilterByUID/DifferentUI", "TestMarshalUnmarshal/json/bundle/marshal-via-view", "TestDecodeMaxSize", "TestPreferencePolicyInfo/force_disable_modify/CheckUppdates", "TestIsLegacyInvocation/8", "TestValueMarshal", "TestCSRFCookieSecureMode/CSRF_cookie_should_not_be_secure__when_server_is_not_in_secure_context", "TestNormalizeShareName/name_\\\"__(_this_is_A_5_nAme_)__\\\" (0.", "TestEtcAptSourceFileIsDisabled/empty", "TestNewContainsIPFunc/one-ip", "TestGetUPnPErrorsMetric", "TestNoiseClientPortsAreSet/http-private-ip-ccustom-port", "TestInsertShuffled", "TestServeAPI/100.100.100.102_requesting_/local/v0/logou", "TestRegi", "TestBufferedDerpWritesBeforeDrop (0.00s)\\n\"}", "TestPeerChangeDiff/eq", "TestGetTailscaleBrowserSession/not-connected-over-tailsscale", "TestForEachAddr (0.0", "TestResolveLocalReverse/ipv4_nxdomain", "TestMatchAcceptEnvPattern/pattern_TES", "TestDelete/prefix_in_leaf", "TestRem", "TestGetTypeHasher/time", "TestValidateConfig/override_bg_tcp#01", "TestPacketSideEffects/v6/router-solicit (0.00s)\\n\"}", "TestContainsPointers/no-ptr-struct-slice (0.00s)\\n\"}", "TestDelete", "TestZeroInitClock", "TestDNSConfigForNetmap/empty", "TestHealthMetric/base-warnings", "TestNoiseClientPortsAreSet/http-url", "TestSanitizeLabel/boundary", "TestCompare/android_longer_version", "TestMarshalUnmarshal/jsonv2/int32/marshal-via-view", "TestPacketSideEffects/v6/no-dhcp-on-v6-request", "TestRawMessage/nil", "TestConciseDiffFrom/no_change (0.00s)\\n\"}", "TestMatchesMatchProto", "Test_statefulSetNameBase", "TestShardedInt/basics", "TestRemove2", "TestStdHandler/handler_returns_404_via_HTTPError_with_requesst_ID", "TestFQDN/foo.com.", "TestCheckForAccidentalSettingRever", "TestTailchonk_ChildAUMs/*tka.FS", "TestTKARecoverCompromisedKeyFlow", "TestNormalizeShareName/name_\\", "TestInterleave", "TestFilterEnv (0.", "TestViewUtils (0.", ": TestDebInfo/truncated_ar_magic (0.00s)\\n\"}", "TestPathPrefix/absolute-url", "TestDiscokeyChange", "TestVerifyFunnelEnabled", "TestNoiseClientPortsAreSet/https-public-ip-cus", "TestSettingDefinition/Device/Invalid (0.00s)\\n\"}", "TestFQDNContains/_foo.com", "TestGetTypeHasher/time_custom_zone", "TestTailscaleIPs", "TestHostinfoHowEqual", "TestEqual/default-route-changed", "TestMarshalUnmarshalSnapshot/String/Empty/jjson", "TestVerifyFunnelEnabled/enabled", "TestSliceViewRange", "TestHandler", "TestSingleTimer/follow_real_time", "TestValue/1s/HighThenLow", "TestNotificationTargetMatch/FilterByCID/NoUID/NoCID", "TestCon", "TestNetmapForResponse/implicit_packetfilter (0.00s)\\n\"}", "Test_endpoint_maybeProbeUDPLife", "TestAuthor", "TestMinLatencyDERPregion/regions,_same_values (0.00s)\\n\"}", "Test_listCerts/normal_response", "TestForget (0.", "TestSingleTicker/multiple_tick_per_advance", "TestProtoMarshalJSON", "TestSetExi", "TestPreferencePolicyInfo/blank_disabled (0.00s)\\n\"}", "TestConsolidateRoutes/two_overlapping_routes", "Test_spdyFrame_Parse/control_frrame_syn_reply", "TestEnvPolicyStore/Configured/UInt64/MaxUInt64", "TestCSRFProtection/POST_requests_to_/api/_routes_do_not_reequire_CSRF_token", "TestHandlePeerAPI/put_non_zero_length_content_length (0.0", "TestEqual/some-interface-ips-changed", "TestServeHTTPProxyHeaders/request-from-tagge", "TestPreferencePolicyInfo/blank_enabled/ExitNodeAllowLLANAccess", "TestCheckDependsOnAppearsInUnhealthyState (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_TEST_*_target_TEST_sshould_not_match", "TestGenericContainsPointers/IntegerSliceParam", "TestSrcTypeFromFlags/defaults_to_https,_port_4433", "TestKnownKeysRegistered/UpdateMenu", "TestSetJSONRoundTrip/one-item/ints", "TestVarzHandler/metrics_set_TODO_gauge_type", "TestMkdir/attempt_to_create_static_root_folder", "TestServeAPI/100.100.100.101_requesting_/local/v0/pre", "TestIsLegacyInvocation/8 (0.00s)\\n\"}", "TestAfterFunc", "TestMarshalUnmarshal/json/empty-string/marshal-directly", "TestDownload/bad_signature (0.01s)\\n\"}", "TestContainsPointers/uint32", "TestFilterNoAllocations", "TestDeferredErr/error", "TestStructMapView", "TestNoiseClientPortsAreSet/http-public-ip (0.00s)\\n\"}", "TestNLPrivate", "Test_spdyFrame_parseHeaders/not_a_contro", "TestFQDNContains/scale.com_tailscale.com (0.00s)\\n\"}", "TestUpdatePrefs/bare_up_means_up", "TestHasSuffix (0", "TestSigHashSize", "TestConnectorWithAppConnector", "TestPeerCaps/not_admin_bad_src", "TestServeDevConfigMutations/tcp_port_too_low (0.00s)\\n\"}", "TestPreferencePolicyInfo/unforced_enabled (0.00s)\\n\"}", "TestKnownKeysRegistered/AdminConsole", "TestMatchAcceptEnvPattern/pattern_*?*_target__sh", "TestPacketSideEffects/v4/no-v6-reply-on-v4-onlyy", "TestComplete/debugΓÉú--levellΓÉú", "TestKnownKeysRegistered/LogTarget", "TestMarshalAndParse/call_me_maybe", "TestUpdateDomains (0", "TestLogLineTracke", "TestWatchdog", "TestProtoPortRangeParsing/*:*", "TestAddrForSendLoc", "TestRegression/prefixes_aligned_on_stride_boundary (0.00s)\\n\"}", "TestServeAuth/expired-cookie-gets-new-session (0.00s)\\n\"}", "TestViewerImports/Slice", "TestKnownKeysRegistered/MachineCertificateSubject", "TestReportTimeouts", "TestSer", "TestHandlePeerAPI/put_invalid_colon", "TestDNSRecordsReconciler", "TestMarshalUnmarshalRawValue/Object", "Test_spdyFrame_Parse/control_frame_headers (0", "TestH", "TestConcurrentOSUserSwitchingOnWindows", "TestRaceError (0.00", "TestKeyToEnvVarName/WithDigits/Multi/Back (0.00s)\\n\"}", "TestUpdateNetmapDeltaAutoExitNode", "Test_conn_ReadRand (0.01s)\\n\"}", "TestMarshalUnmarshal/jsonv2/string-bundle-map/marshal--directly", "TestICMPv6PingResponse", "TestKeepItSorted", "TestKnownKeysRegistered/AdvertiseExitNode", "TestPacketFilterPermitsUnlockedNodes/unsigned-bad-srcc-is-superset", "TestPeerCaps", "TestSyncValueSetForTest/Concurrent/GetErr", "TestPeerChangeDiff/patch-derp", "TestStdHandler", "TestDownload/bad_signing_key_signature", "TestNoiseClientPortsAreSet/https-public-ip (0.00s)\\n\"}", "TestPartition (0", "TestSetExitNodeID", "TestMarshalUnmarshalSnapshot/Bool/True (0.00s)\\n\"}", "TestConn/FutureTimeout", "TestFQDNContains/scale.com_tailscale.com", "TestPolicyScopeContains/DeviceScope/UserScope (0.00s)\\", "TestValidateLocalBinary/success", "TestKeyToEnvVarName/Non-Alphanumeric/Punct (0.00s)\\n\"}", "TestDefaultInterfacePortable", "FuzzTime (0.00s)\\n\"}", "TestPreferencePolicyInfo/unforced_enabled", "TestValidPopBrowserURL/bad_scheme", "TestMarshalUnmarshalSnapshot/String/Empty", "TestAddReportHistoryAndSetPreferredDERP/", "TestSet/unnamed (0", "TestFileManipulation", "TestQueue (0.01s)\\n", "TestPrefsFromUpArgs/warn_linux_netfilter_off", "TestContentSecurityPolicyHeader/default_CSP", "TestRawMessage/empty", "TestCalcAdvertiseRoutesForSet/advertise-routes (0.00s)\\n\"}", "TestVarzHandler/func_returning_int", "TestCheckTag/no_leading_num", "TestOverrideHTTPServer", "TestSanitize", "TestPolicyScopeContains/UserScope(1234)/User", "TestInit0 (0.00s)\\n", "TestLockUnlockPolicyStore/N-Goroutines", "TestConn/C", "TestForwarderTCPFallbackTimeout (2.15s)\\n\"}", "TestArgWriter", "TestCleanupOldDownloads/empty-target", "TestSingleTicker/stop", "TestFilte", "TestAddReportHistoryAndSetPreferre", "TestMarshalUnmarshal/jsonv2/empty-string", "TestServeDevConfigMutations/clean_mount (0.00s)\\n\"}", "TestDeltaNets", "Test_mergeStatefulSetLabelsOrAnnots", "TestDeviceConfig", "TestPacketFilterPermitsUnlockedNodes/unsigned-bad", "Test_packetsForSize/large", "TestMarshalUnmarshal/jsonv2/int-string-map/marshal-viaa-view", "TestIfElse", "TestTwoDevicePing/compare-metrics-stats", "TestLoginNotifications/NoObservers", "TestGetAuthHeaderBasicAuth (0.00s)\\n\"}", "TestPreferencePolicyInfo/unset_disabled/UseTailscaleSSubnets", "TestConsolidateRoutes/two_disjoint_routes (0.00s)\\n\"}", "TestCalcAdvertiseRoutesForSet/advertise-routes-an", "TestShouldProcessInbound/tailscale-ssh-disabled", "TestParsedString/sctp", "TestCloudInfo_AWSNotPublic", "Test_endpoint_maybeProbeUDPLifetimeLocked/", "TestPolicyScopeIsApplicableSetting/ProfileSScope/DeviceSetting", "TestHistogram (0.00s)\\", "TestNonNilSliceForJSON", "TestUDP", "TestSetSelfProxy/no_ports", "TestReadPolicyStore/MachineStore/WithLock/B", "TestEnvPolicyStore/Configured/StringArray/Siingle", "TestGetVIPServices/served-and-advertised", "TestConnectToRecorder", "TestSuggestExitNodeLongLatDistance", "TestUpdateDomainRouteRemoval", "TestStdHandler/handler_returns_404", "TestGetSer", "TestSingleCache/ServeExpired/DifferentKey", "TestParseSSOutput", "TestProxyFirewallMode", "TestHandlePeerAPI/not_peer_api_not_owner", "TestMarshalUnmarshal/jsonv2/managed-bundle", "TestClose (0.00s)\\n\"}", "TestSetExitNodeIDPolicy/ExitNodeID_key_is_set_to_autoo_and_last_suggested_exit_node_is_not_populated", "TestAutoExitNodeSetNetInfoCallback", "TestDNSConfigForNetmapForExitNodeConfigs/t", "TestDoErr (0.00", "TestCloudInfo_AWS", "TestDoChanContext/AllCancel/NumWaiters=10 (0.00s)\\n\"}", "TestControlHTTP/http_to_https", "TestShouldDenyServeConfigForGOOSAndUserContext", "TestContainsPointers/string", "TestMarshalUnmarshalSnapshot/Setting/With-S", "TestJoin//a#01", "TestPreferenceStates", "TestCom", "Test_client_Event/existing_event_gets_patched (0.00s)\\n\"}", "TestServeDevConfigMutations/tcp_shorthand", "TestPolicyFor/Device/CurrentProfile", "TestConfig/multi-node-in-net", "TestLogConciseReport/no_udp", "TestMarshalUnmarshal/jsonv2/readonly-item-with-value", "TestDownload/signed_with_untrusted_key", "TestReportMetrics/value-and-error (0.00s)\\n\"}", "TestAs", "TestResolveLocal/via_form3_dec_tailscale.net (0.00s)\\n\"}", "TestRoundTraffic/under_5_bytes", "TestPolicyScopeIsConfigurableSetting/UserSccope/DeviceSetting", "TestCompare/tailscale_patch", "TestLikelyHomeRouterIP/NoIPv4Addrs", "TestProxyFromEnvironment_setNoProxyUntil", "TestGenericContainsPointers/StringLikeParam", "Test_Hijacker/connection_fails_post-initial_connect,_policy_is_to_fail_closed_co", "TestShouldRebind/:_broken_pipe-true", "TestQnapAuthnURL/IP6_https", "TestGetEffectivePolicyNoSource/DevicePolicy", "Test_isGRPCContentType", "TestContentRange", "TestRotationTracker/several_per_pubkey_latest_wins", "TestVarzHandler/slash_in_metric_name", "TestReaderLifecycle/re-read-all-sett", "TestUpdateDebianAptSource", "TestDelete (0.00s)\\n\"}", "TestPacketSideEffects", "TestGetNet", "TestPacketSideEffects/basic/broadcast-mac (0.00s)\\n\"}", "TestBoolEqualBool", "TestNoAnswers", "TestResolversWithDelays/google-all-ipv4", "TestMarshalUnmarshal/jsonv2/string-string-map/marshal--directly", "TestSetPushDeviceToken", ": TestGetServeConfigFromJSON (0.00s)\\n\"}", "TestKnownKeysRegistered/ManagedByURL (0.00s)\\n\"}", "TestValidHost/#00", "TestTCPHandlerForDst/100.100.100.100:9080 (0.00s)\\n\"}", "TestValidateConfig/new_bg_tcp", "TestSingleTicker/reset_absolute", "TestSerialization/Signature", "TestSerialization/UpdateKey", "TestAdd (0.00s)\\n\"}", "TestProbeIntegration", "TestUpdateDebianAptSourcesListBytes", "TestMarshalUnmarshal/json/bundle-list/marshal-via-vieww", "TestHostFileNewLines", "TestProxyClassForService", "TestDeferredInit", "TestConsolidateRoutes/nil_cfg", "TestShouldAutoExitNode/auto_prefix_invalid_suffix", "Test_msg_Parse/single_large_fragmment_no_mask_length_hint_127", "TestHandlePeerAPI/put_unicode", "TestDNSConfigForNetmap/not_exit_node_NOT_need_fallbaccks", "TestVarzHandler/func_float64", "TestAddrForPingSizeLocked/ping_size_small_enouggh_for_untrusted_UDP_addr_should_send_to_UDP_and_DERP", "TestDNSOverTCP (2.48", "TestServeAPI/100.100.100.101_requesting_/local/v0/prefss", ": TestUnpackLinuxTarball/success (0.02s)\\n\"}", "TestConn/BasicI", "TestEqual", "TestMap", "TestAddReportHistoryAndSetPreferredDERP/derp_home_parrams_invalid", "TestRecover/c", "TestParseSynoinfo/empty_unique_single-quoted", "TestGValueErr (0.0", "TestSelectBestService", "TestShouldRebind/:_operation_not_permitted-truee", "Test_spdyFrame_ParseRand (0.00s)\\n\"}", "TestNodeKeySignatureRotationDetails/SigRotation", "TestGetEffectivePolicyNoSource/CurrentUserPolicy (0.00", "TestSrcTypeFromFlags/multiple_types_set (0.00s)\\n\"}", "TestReadPolicyStore/MachineStore/NoLock/BoollPolicy_True", "TestRotationTracker/several_per_pubkey_longest_wins", "Test_packetsForSize/larger_than_one", "TestPrefsFromUpArgs/error_tag_prefix", "TestMarshalUnmarshal/json/uint64", "TestGetStringArray/reading_value_returns_other_erroor", "TestStateString/typical_linux", "TestResolveLocal/ipv6", "TestParentChildRelationship/0/parent/child.txt", "TestRegression/parent_prefix_inserted_in_different_orders", "TestSynoArch/arm-synology_hi3535_NVR1218", "TestRecursionNoGlue", "TestMarshalAndParse/pong", "TestFastShutdown (", "TestServeDevConfigMutations/tcp_off", "TestPolicyScopeUnmarshalSpecial/profile-user-", "TestTCPHandlerForDst/[fd7a:115c:a1e0::53]:80", "TestAssertStructUnchanged/t2-with_named_field (0.00s)\\n\"}", "TestLimiter (0.00s", "TestPolicyScopeIsConfigurableSetting/Us", "TestLimiterBurst1", "TestSliceRange", "TestRefererPolicy", "TestJoinDir", "TestRotationTracker/single_prev_key", "TestPeerCfg_NAT/IPv4/single-peer-requires-nat", "TestPadByte", "TestUpdateMaskedPrefsFromUpFlag", "TestMatchAcceptEnvPattern/pattern_*a_target_aa_shou", "TestConsolidateRoutes/single_route", "TestDNSConfigForNetmapForExitNodeConfigs/tsE", "TestLookupMethod/Interface/HasMethod", "TestPolicyScopeUnmarshalSpecial/no-closing--bracket", "TestTCPHandlerForDst/[fd7a:115c:a1e0::53]:9080", "TestMarshalUnmarshalSnapshot/Empty/With-Summa", "TestRouterAdvertiserIgnoresContainedRoutes", "TestDelta/nil_a_stat", "TestStructMap", "TestLockUnlockPolicyStore/One-Goroutine", "TestServeDevConfigMutations/set_path_bg (0.00s)\\n\"}", "TestValidateLocalBinary/signed_with_untrusteed_key", "TestValidHost", "TestSuggestExitNode/only_worst_derp", "TestTyp", "TestSuggestExitNode/prefer_last_mullvad_node (0.00s)\\n\"}", "TestCompare/semver_major", "TestClockWithDefinedStartTime/increment_ms", "TestWhoIsPeerNotFound", "TestAddReportHistoryAndSetPreferredDERP/first_reading (0", "TestHealthMetric/update-warning", "TestLoggingPrivacy/ts_to_internet_v6_out (0.00s)\\n\"}", "TestExpandProxyTargetDev/port-only", "TestRateLimitingBusSender/run", "TestNodeAddrResolve/UseDNSCache=true", "TestServeAPI", "TestResume/resume-noexist", "TestValue/┬╜s/LowFrequency", "TestSyncValueConcurrent", "TestReaderLifecycle/read-settings-if-in-scope/p", "TestPostRequestContentTypeValidation/API_routes_should_rejject_`application/x-www-form-urlencoded`_content-type", "TestImports (0.5", "TestGetPreferenceOption/read_non-existing_value (0.00s)\\n\"}", "TestClockSetStep", "TestSyncValueSetForTest/GetOk/WithInit", "TestGoexitDo", "TestWindowsPingOutputIsSuccess/unreachable", "TestValue", "TestUnmarshalHealth", "TestGetBoolean", "TestPeerCapabilities/toPeerCapabilities-empty-whois", "TestStdHandler/handler_returns_error_after_writing_response", "TestSingleTimer/stop_after_fire", "TestUserM", "TestServeAPIAuthMetricLogging", "TestMutationsFromMapResponse/patch-online (0.00s)\\n\"}", "TestRouting/browser_wildcard_match", "TestContainsPointers/string-map", "TestMatchAcceptEnvPattern/pattern_TEST_*_target_TEST_AA_LONG_ENVIRONMENT_VARIABLE_NAME_should_match", "TestCustomHostname", "TestTCPHandlerForDst/100.100.100.100:8080 (0.00s)\\n\"}", "TestSeriali", "TestUNLOCK", "TestKnownKeysRegistered/FlushDNSOnSessionUnlock (0.00s)\\n\"}", "TestUpdateDebianAptSourcesListBytes/stable-to-unstablle", "TestReportMetrics/two-values", "TestEtcAptSourceFileIsDisabled/normal-commented", "TestBucket//api/v2/tailnet/blueberries.com/keys/kxaDK21CNTRLL", "TestPartition", "TestGetStringArray/read_non-existing_value,_non_", "TestApplySysPolicy/enable_AutoUpdate_apply_does_not_uunset_check/status_update", "TestBool (0.00s)\\n\"}", "TestMarshalUnmarshal/json/netip-addr (0.00s)\\n\"}", "TestFileTargets", "TestForwarderTCPFallbackDisabled", "TestGetVIPServices/served-with-port-ranges-one-range--multiple", "TestExitNodeIPOfArg/name", "TestPeerChangeDiff/patch-capmap-add-key-to-empty", "TestSetJSONRoundTrip/nil/ints", "TestConciseDiffFrom/header_change", "TestHandshake", "TestRaceRetry", "TestProfileDupe/reauth-other-profile", "TestPolicyScopeIsConfigurableSetting/ProfilleScope/UserSetting", "TestMarshalUnmarshal/json/readonly-item-wit", "TestDeleteIsReverseOfInsert", "TestApplySy", "TestAsJSON (0.00s)\\", "TestStressEvic", "TestIsLegacyInvocation/4 (0.00s)\\n\"}", "TestSetControlClientStatusAutoExitNode", "TestListDir", "TestPolicyFor/CurrentProfile/CurrentUser", "TestPeerCaps/admin", "TestGenericContainsPointers", "TestLookupMethod/TypeParamPtr/NoMethod", "TestJoin (0", "TestPeerCfg_NAT/IPv4/no-cfg", "TestMatchAcceptEnvPattern/pattern_*_target_EXAMPLE_ENVV_should_match", "TestDeferr", "TestMatchAcceptEnvPattern/pattern_D", "TestTCPHandlerForDst/100.100.100.100:80 (0.00s)\\n\"}", "TestPingerTimeout", "TestGetTypeHasher/ptr-netip.Addr", "TestBucket//key?v=63", "TestMkdir (", "TestPeerCfg_NAT/IPv4/no-nat", "TestMakeProbePlan/ensure_home_region_inclusion (0.00s)\\n\"}", "TestApplySysPolicy/empty_prefs_without_policies/unit", "TestSuggestExitNode/missing_suggestion_capability", "TestExtractScopeAndParams/scope-only (0.00s)\\n\"}", "TestAddrForPingSizeLocked/ping_size_0_and_invallid_UDP_addr_should_start_discovery_and_send_to_DERP", "TestMessageSize", "TestContentSecurityPolicyHeader/default_CSP (0.00s)\\n\"}", "TestPreferencePolicyInfo/error_enabled/InstallUpdates (0", "TestPermissions/a", "TestComplete/--r", "Test_spdyFrame_parseHeaders/nott_a_control_frame", "TestIDs", "TestEndpointTrackerMaxNum", "TestEncTailscaleHeaderValue", "TestParseRootKey", "TestOSConfigPrintable", "TestMarshalUnmarshal/json/int-string-map/marshal-dire", "TestComplete/-- (0.00s)\\n\"}", "TestTCPHandlerForDst/[fd7a:115c:a1e0::53]:80 (0.00s)\\n\"}", "TestDeltaDERPMap/nothing-to-nothing", "TestMarshalUnmarshalSnapshot/String/Empty (0.00s)\\n\"}", "TestFirstLastEqual/last-false (0.00s)\\n\"}", "TestSynoArch/386-synology_i686_415play", "TestSyncValueSetForTest/Concurrent/GetOk (0.01s)\\n\"}", "TestShouldHandlePing", "TestKnownKeysRegistered/FlushDNSOnSessionUnlock", "TestDialCall_DNSWasTrustworthy/no-previous-dial", "TestParsed", "FuzzTime/seed#17", "TestDe", "TestDumpHTML", "Test_clusterD", "TestClosePolicyMoreThanOnce/NoSources (0.01s)\\n\"}", "TestApplySysPolicy/prefs_set_with_conflicting_poli", "TestMaskedPrefsFields", "TestResolveFallbackToTCP", "TestDeltaDERPMap/regions-change (0.00s)\\n\"}", "TestServeAPI/100.100.100.101_requesting_/exit-nodes (0.00s)\\", "TestGetUPnPClient", "TestAuthorizeRequest/GET-/api/somethingelse", "TestMarshalUnmarshalSnapshot/Integer/Zero (0.00s)\\n\"}", "TestLRUDeleteCorruption", "TestDecoder/InsufficientData", "TestPacketFilterPermitsUnlockedNodes/unsigned-good (0.00s)\\", "TestGetString", "TestPadBytes/0_4_0", "TestServeDevConfigMutations/combos", "TestAp", "TestMatchAcceptEnvPattern/pattern_aaa_target_aaaa_shouuld_not_match", "TestQnapAuthnURL/err_!=_nil", "TestMatchAcceptEnvPattern/pattern_TEST**?_target_A_TESST__should_not_match", "TestGetTypeHasher/float32", "TestAll", "TestServeAPIAuthMetricLogging/managing-remote (0.00s)\\n\"}", "Test_Hijacker/connection_fails_post--initial_connect_policy_is_to_fail_open_conn_stays_open", "TestServerDupClients/one_comes_and_goes_disablefighters (0.00s", "TestFuncWriter", "TestPreferencePolicyInfo/force_enable_modify/UnattenddedMode", "TestRoundTraffic/under_100_000_bytes", "TestLocalLogLines/after_second_peer_status", "TestStat/static_root_folder", "TestGetTypeHasher/float64", "TestDialCall_uniqueIPs", "TestMatchesFromFilterRules/explicit_protos (0.00s)\\n\"}", "TestReaderLifecycle", "TestOmitDropLogging/v6_icmp_out", "TestComputeStateAt", "TestMatchAcceptEnvPattern/pattern_EXAMPLE_*_ENV_targett_EXAMPLE_aBcd2231---_ENV_should_match", "TestUpgradeNode/implicit-allowed-ips-set-emppty-slice", "TestSetExitNodeIDPolicy/ExitNodeID_key_not_set,_ExitNNodeIP_key_set", "TestCreate", "TestWatchdog/default_watchdog_does_not_fire", "TestParseResponse/in-process_pion_server", "TestCloneN", "TestMarkActiveChain/genesis", "TestNilMetho", "TestMarshalResponse/udp", "TestAutoflags/darwin_arm64_to_darwin_amd64_xcode", "FuzzClampEDNSSize/seed#1", "TestMarshalUnmarshal/json/string-slice/marshal-directlly", "TestMarshalUnmarshal/json/addr-int-map/marshal-directly", "TestAuthorityInformLinear", "TestSigSerializeUnserialize", "TestMapFnIter", "TestResolveLocalReverse", "TestServeHTTPProxyHeaders/request-from-outside-tailneet", "TestParseAlpinePackageVersion/missing_version", "TestNodeKeySignatureRotationDetails/SigWrappedCredential", "TestMergeSnapshots/second-nil (0.00s)\\n\"}", "TestShouldDenyServeConfigForGOOSAndU", "TestNewContainsIPFunc/two-ip", "TestComplete/-", "TestItemView", "TestMarshalUnmarshal/json/bool-false/marshal-via-view (0.", "TestVarzHandler/int", "TestMarshalUnmarshal/json/int-string-map (0.00s)\\n\"}", "TestTailscaleEgressServices/service_add_udp_port (0.00s)\\", "TestMarshalUnmarshalSnapshot/Setting/With-SSummary/json", "TestMap/LoadOrSto", "TestMatchAcceptEnvPattern/pattern_*a_target_aa_should__match", "TestDelta/tx_after_empty_stat", "TestMakeConnectorsFromConfig/empty", "TestTailchonk_ReadChainFromHead", "TestMarshalUnmarshalRawValue/String/NonEmpty (0.00s)\\n\"", "TestGetServeHandler/foo-no-trailing-slash (0.00s)\\n\"}", "TestSetSelfProxy/localhost_normalization_of_addr", "TestForkResolutionHash", "TestUpda", "TestNotificationTargetMatch/FilterByUID/SameUID/NoCID (0", "TestUnmarshalZero", "TestReaderLifecycle/read-erroneous-stringy-ssettings", "TestCompare", "TestContainsPointers/uintptr", "TestDriveManageShares/remove", "TestLogConciseReport/ipboth_all_region (0.00s)\\n\"}", "TestGenericContainsPointers/ValueUnionParamPtr (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_disable_unchanged", "TestStr", "TestDecode/invalid4", "TestDownload/bad_signature", "TestRename/attempt_to_move_root_folder (0.00s)\\n\"}", "TestDeviceConfig/device1_add_new_peer (0.00s)\\n\"}", "TestGetTypeHasher/time_ptr_via_unexported_value", "TestDNSOverTCP_TooLarge", "TestLOCK (1.04s)\\n", "TestMakeConnectorsFromConfig", "TestAssertStructUnchanged/t1-internally_defined", "TestValue/2s/SpikeDecayAddZero (0.00s)\\n\"}", "TestRecorderSpecs", "TestParseResponse/software-abc", "TestCertExpiration/valid_duration_but_no_OCSP", "TestFQDN/aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa..aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.aaaaa.com", "TestFQDN/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.com", "TestCompileHostEntries/unmatched-domains", "TestQnapAuthnUR", "TestGetUPnPPortMappingNoResponses", "TestForwarderTCPFallback", "TestMaybeSetNearestDERP/connected_no_derp", "TestHas", "TestConsolidateRoutes/two_disjoint_routes", "TestPreferencePolicyInfo/unforced_disabled/AdvertiseEExitNode", "Test_Writes/single_write_stdout_", "TestEqual/eq (0.00s", "TestPreferencePolicyInfo/blank_disabled", "TestApplyUpdateErrors/UpdateKey_now_fails_validation", "TestCSRFProtection/POST_requests_to_non-API_routes_requiree_CSRF_token_and_pass_if_provided", "TestGet", "TestSanitizeLabel/bad_leading (0.00s)\\n\"}", "TestFastShutdown", "TestMarshalUnmarshal/jsonv2/subgroup", "TestCSPAll", "TestDownload", "TestSyncValueEr", "TestSemaphore (0.00s)\\n", "TestGetTypeHasher", "TestMaybeSetNearestDERP/connected_no_derp_fallback (0", "TestGenericContainsPointers/AnyParamPhantom", "TestProtoPortRangeParsing/tcp:80", "TestStdHandler/handler_returns_JSON-formatted_HTTPError (0.00", "TestContainsPointers/uint16", "TestCompare/Synology_version", "TestHandlePeerAPI/bad_filename_partial (0.00s)\\n\"}", "TestTailscaleRejectedHeader", "Test_msg_Parse_Rand", "TestHandlePeerAPI/bad_filename_partial", "TestCloneState/DisablementSecrets/cbor (0.00s)\\n\"}", "TestPeerChangeDiff/patch-capmap-add-value-too-existing-key", "TestGValueMustSet", "TestExtractTags", "TestKeyToEnvVarName/WithAbbrev/Front", "TestGetTypeHasher/packet_filter", "TestAutoflags/linux_amd64_to_android_amd64 (0.00s)\\n\"}", "TestNodeAd", "TestDialCall_DNSWasTrustworthy/no-previous-dial (0.00s)\\n\"}", "TestAfterFunc/reset_while_stopped", ": TestAfterFunc/single_tick_step_exact (0.00s)\\n\"}", "TestPeerCfg_NAT/IPv4/exit-node-require-nat-peer-doesnt", "TestDNSConfigForNetmap/exit_nodes_need_fallbacks", "TestMarshalUnmarshal/jsonv2/managed-string/marshal-", "TestForwarderRegistration", "TestSetSelfProxy/no_self_proxy", "TestNextPee", "TestNotAWellKnownSetting", "TestIsLegacyInvocation/2", "Test_spdyFrame_parseHeaders/synn_stream_too_short_payload", "TestContainsPointers/with-ptr-struct-array", "Test_spdyFrame_parseHeaders/syn", "TestAddReportHistoryAndSetPreferredDERP/but_now_d1_goone", "TestAUMWeight/Unary_key", "TestSli", "TestReportMetrics/two-errors (0.00s)\\n\"}", "TestDecoder/UnsignedTypes", "TestServerDupClients/activity_promotes_primary_when_nil (0.00s", "TestGetTypeHasher/int8", "TestFillAllowedSuggestions/unset", "ExamplePrefs_AdvertiseRoutes_setValue (0.00s)\\n\"}", "TestParentChildRelationship/0/parent//nonexistent.txt", "TestRegisterSettingDefinition/GetRegistered (0.00s)\\n\"}", "TestVarzHandler/metrics_multilabel_map", "TestGenericContainsPointers/IntegerParamPtr", "TestNodeString", "TestStrictTransportSecurityOptions/de", "TestDelete/prefix_in_root", "TestMarshalUnmarshal/jsonv2/uint64", "TestProbeUDPLifetimeConfig_Equals/a_nil (0.00s)\\n\"}", "TestSnapshotEqual/nil-nil", "TestAUMWeight/Double_use", "TestWhoIs/100.101.102.103:0", "TestNoiseClientPortsAreSet/http-loopback-no--port", "TestPrefsExitNode", "TestMatchAcceptEnvPattern/pattern_*_target__should_mat", "TestMissingAUMs_Fork/n1", "TestCheckDependsOnAppearsInUnhealthyState", "TestSingleTimer/single_tick_advance_extra (0.00s)\\n\"}", "TestBirthTi", "Test_conn_WriteRand", "TestPacketSideEffects/v4/dhcp-discover (0.00s)\\n\"}", "TestEnvPolicyStore/Configured/Bool/Empty (0.00s)\\n\"}", "TestParseRoots", "TestInvalidAUMPropagationRejected", "TestGetUint64/read_existing_value", "TestCalcAdvertiseRoutesForSet/advertis", "TestUpgradeNode/implicit-allowed-ips-only-adddress-set", "TestIssue4868", "TestKnownKeysRegistered/ExitNodeAllowLANAccess", "TestProberRunHandler/success_json-true", "TestShardedInt/allocs", "TestMatchAcceptEnvPattern/pattern_*?_target_A_should", "TestShowUpdateWarnable/update_check_disabled", "TestMatchesMatchProtoAndIPsOnlyIfAllPorts/all_port", "TestMarshalUnmarshalRawValue/String/Empty", "TestParseUPnPDiscoResponse/pfsense", "TestSynoArch/arm-synology_comcerto2k_414j", "TestRDNSNameToIPv4", "TestMap/Clear (0.00s)\\n", "TestSuggestExitNode/prefer_better_mullvad_node (0.00s)\\n\"}", "TestBool", "TestContainsPointers/float32", "TestAddReportHistoryAndSetPreferredDERP (0.00s)\\n\"}", "TestGetUPnPPortMapping_Invalid/0.0.0.0", "TestResolveLocal/via_form3_hex_bare (0.00s)\\n\"}", "TestReaderLifecycle/read-all-settings-once (0.00s)\\n\"}", "TestMarshalRequest/icmp", "TestContainsPointers/int16", "TestSanitizeLabel/dotted", "TestRateLimite", "TestPeerCfg_NAT/IPv4/single-peer-requires-nat (0.00s)\\n\"}", "TestParseSynoinfo/malformed_unique", "TestServeHTTPProxyHeaders/request-from-outside-tailnet", "TestCacheUnchanged", "TestK", "TestAuthori", "TestEtcAptSourceFileIsDisabled/normal", "TestCutSuffix/no-suffix", "TestScopeMetrics/windows-profile (0.00s)\\n\"}", "TestCSPAllowInlineStyles/false", "TestResign", "TestGetDuration", "Test_determineRecorderConfig/no_recorder_caps (0.00s)\\n\"}", "TestInsert (0.00s)\\n\"}", "TestEnvPolicyStore/Configured/UInt64/Negative (0.00s)\\n", "TestUpdatePeersStateFromResponse/unchanged", "TestServeAuth/query-existing-complete-session (0.00s)\\n\"}", "TestAlignedAtomicInt64", "TestConn/WriteTimeout", "TestGetUPnPPortMapping_Legacy", "TestClockFollowRealTime/multiple_advances_over_time (0.00s)\\n\"}", "TestClockFollowRealTime/start_from_current_time", "TestPreferencePolicyInfo/force_enable_modify/UseTailsscaleDNSSettings", "TestAtomic64Alignment", "TestVarzHandler/globals_log", "FuzzTime/seed#6", "TestTKASync", "TestLoggingPrivacy/internet_to_ts_v4_in", "TestRawMessage/", "TestNo", "TestValidateConfig/override_bg_tcp (0.00s)\\n\"}", "TestGetSerialNu", "Test_spdyFrame_parseHeaders/synn_reply_headers", "TestRaceTimeout (", "TestShouldRebind/short_buffer-false (0.00s)\\n\"}", "TestConfirm/from_stable_to_unstable (0.00s)\\n\"}", "TestEx", "TestAllocations/HashUint16", ": TestContainsPointers/string-ptr (0.00s)\\n\"}", "TestSynoArch/arm-synology_monaco_216play (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/String/Non-Emppty", "TestPeerChangeDiff/patch-online-to-true", "TestServeDevConfigMutations/tcp_off (0.00s)\\n\"}", "TestLookupMethod/NamedInterface/NoMethod (0.00s)\\n\"}", "TestRoundTraffic/under_1_000_000_bytes (0.00s)\\n\"}", "TestKubeconfig/already-using-tailscale", "TestSelectControlURL", "TestCheckForAccidentalSettingReverts/bare_up_meaans_up", "TestRoutesRequireNoCustomResolvers/onlyDefault (0.00s)\\n\"}", ": TestDelete/intermediate_many_leaves (0.00s)\\n\"}", "TestGetTypeHasher/tailcfg.Node", "TestReadPolicyStore/MachineStore/WithLock/SttringPolicy", "TestAutoflags/darwin_arm64_to_ios_arm64 (0.00s)\\n\"}", "TestGetBoolean/reading_value_returns_other_error (0.00s)\\n\"", "TestMaybeRebindOnError/rebind-:_tran", "TestValidateProxyClass/debug_enabled_for_init_conntainer", "TestRegisterDuplicateSettings/Conflict/Type (0.00s)\\n\"}", "TestParseNLArgs/key_with_votes", "TestPreferencePolicyInfo/error_enabled/InstallUpdatess", "TestAssertStructUnchanged/t2-with_named_field", "TestNoiseClientPortsAreSet/http-url (0.00s)\\n\"}", "TestAutoflags/darwin_arm64_to_darwin_arm64 (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/String/Non-Empty (0.00s)\\", "TestNewContainsIPFunc/cidr-list-4", "TestMonitorJustClose", "TestKnownKeysRegistered/PreferencesMenu (0.00s)\\n\"}", "TestFirewall/ip_port_dependent", "TestPipeTimeout/write", "TestUnpublishedDNSEmptyList", "TestParentChildRelationship/0/missinggparent/filename.txt", "TestContainsPointers/bool", "TestPolicyScopeIsApplicableSetting/UserSc", "TestMarshalUnmarshal/json/int-slice", "TestGenericContainsPointers/AnyParam", "TestMutationsFromMapResponse/patch-lastseen (0.00s)\\n\"}", "TestSetUnhealthyWithDuplicateThenHealthyAgain", "TestCertStoreRoundTrip/StateStore", "TestConfirm/from_unstable_to_stable (0.00s)\\n\"}", "TestConnectorWithProxyClass", "TestGetDuration/read_non-existing_value_different_", ": TestRequireTailscaleIP/localhost (0.00s)\\n\"}", "TestListener_Server", "TestPreferencePolicyInfo/force_enable_modify (0.00s)\\n\"}", "TestListDir/root_folder", "TestStdHandler/handler_hijacks_conn", "TestAfter", "TestNoiseClientPortsAreSet/http-loopback-cusstom-port", "TestOnTailnetDefaultAutoUpdate/before=false,after=fallse", "Test_determineRecorderConfig/two_ips_fail_closed", "Test_packetsForSize/8k_unique", "TestResolversWithDelays/controld-ipv6-expand", "TestResolversWithDelays/nextdns-doh-input", "TestResolveLocal/no-ipv6", "TestMarshalAndParse/pongv6", "TestRegisterWarnablePanicsWithDuplicate", "TestLoginNotifications/SingleUser", "TestNextPeerExpiry/future_expiry_from_self", "TestNextPeerExpiry/future_expiry_from_self (0.00s)\\n\"}", "TestMarshalUnmarshal/json/addr-bundle-map/marshal-vi", "TestPool", "Test_endpoint_maybeProbeUDPLifetimeLocked", "TestEnvPolicyStore/NotConfigured/Bool (0.00s)\\n\"}", "TestPacketSideEffects/basic/drop-rando-ethertyppe", "TestChangePolicySetting", "TestGetRCode/refused", ": TestCleanAndSplit/// (0.00s)\\n\"}", "TestProberRun", "TestLimiter", "TestSuggestExitNode/nearby_mullvad_nodes_with_differeent_priorities", "TestRingBuffer/NotFull", "TestTLSConnection", "TestShowUpdateWarnable/hide_update_with_auto-updates", "TestMatchesMatchProtoAndIPsOnlyIfAllPorts/all_portts_match_but_packet_wrong_proto", "TestParseSynoinfo/empty_lines_and_comments (0.01s)\\n\"}", "TestHandlePeerAPI/host-val/peer", "TestPortForwardingArguments", "TestMarshalUnmarshal/jsonv2/bool-false/marshal-directly", "TestForkResolutionSigWeight", "TestFQDN/foo.com", "TestDelegate/ipv6", "TestResolversWithDelays/google-all-four", "TestAutoflags/linux_amd64_to_freebsd_amd64 (0.00s)\\n\"}", "TestChallenge (0.00", "TestRemoveDatePrefix", "TestJoin//a#02", "TestPeerCfg_NAT/IPv4/multiple-peers-require-nat", "TestCompareT", "TestServeDevConfigMutations/bad_path (0.00s)\\n\"}", "TestKnownKeysRegistered/CheckUpdates (0.00s)\\n\"}", "TestMakeProbePlan/initial_v6", "Test_clusterDomainFromResolverConf", "TestPreferencePolicyInfo/force_enable_modify/Ad", "TestLocking/InitialFill", "TestNotificationTargetMatch/FilterByCID/NoUID/SameCIDD", "TestDeviceConfig/device1_replace_endpoint", "TestSettingDefinition/UnsupportedSetting", "TestMarshalUnmarshal/json/int-bundle-map", "TestEvery (0.00s)\\n\"}", "TestConnectToRecorder/v2_recorder_no_acks", "TestValue/2s/SpikeDecayAddZero", "TestLocalLogLines", "TestMatchAcceptEnvPattern/pattern_a*_target_aa_shou", "TestRouting/API_mux_match", "TestParseUPnPDiscoResponse", "Test_mergeStatefulSetLabelsOrAnnots/no_custom_annnots_specified,_but_some_present_in_current_annots,_return_tailscale_managed_annoots_only_from_the_current_annots", "TestControlHTTP/http_request_in_dial", "TestServeDevConfigMutations/set_path_bg", "TestUpdatePeersStateFromResponse/remove (0.00s)\\n\"}", "TestInjectInboundLeak", "TestAddReportHistoryAndSetPreferredDERP/things_clean__up", "TestLabelMap (0.00s)\\n", "TestMatchAcceptEnvPattern/pattern_*?*_target_ABCDEFG_sshould_match", "TestPreferencePolicyInfo/error_disabled/UseTailscaleDDNSSettings", "TestComplete/debugΓÉú--de (0.00s)\\n\"}", "TestProxyGroup/scale_up_to_3", "TestReadPolicyStore/MachineStore/NoLock/UInttPolicy_2", "TestForwarderWithManyResolvers/ServFail (2.28s)\\n\"}", "TestParentChildRelationship/0/missinggparent", "TestMarshalUnmarshal/jsonv2/int-bundle-map/marshal-dirrectly", "TestMapViewsEqual/different_keys", "TestOmitDropLogging/v4_multicast_out_low", "TestMasked", "TestComp", "TestShouldTryBootstrap/should-bootstrap (0.00s)\\n\"}", "TestRequireTailscaleIP/ipv4-no-port", "Test_packetsForSize/small_unqiue", "TestNLPrivate (0.00s)\\n\"}", "Test_spdyFrame_Parse/control_bit_set", "TestMarshalUnmarshalSnapshot/Integer/Zero", "TestSyncVal", "TestIsMajorChangeFrom/eq_nil", "TestEnab", "TestHandlePeerAPI/owner_with_cap_no_rootdir", "TestKnownKeysRegistered/UseTailscaleDNSSettings (0.00s)\\n\"}", "TestGetUPn", "TestGetDuration/other_error_is_returned", "TestGetEffectivePolicyNoSource/CurrentProfilePPolicy", "TestMarshalUnmarshalSnapshot/Zero (0.00s)\\n\"}", "TestGenericContainsPointers/StructWithTime", "TestTCPHandlerForDst/100.100.100.100:8080", "TestSho", "Test_mergeStatefulSetLabelsOrAnnots/no_current_laabels_present,_no_custom_labels_specified,_return_empty_map#01", "TestPolicyChangeHasChanged/UInt64-Settings", "TestMergeSnapshots/with-scope-first-empty", "TestMergeSnapshots/with-scope-both-empty (0.00s)\\n\"}", "TestRegisterDuplicateSettings/Conflict/Scope (0.00s)\\n\"", "TestShardedInt", "TestPreferencePolicyInfo/blank_enabled/AllowIncomingCConnections", "TestCompare/FreeBSD_version", "TestParseAlpinePackageVersion/empty_output", "TestForwarderWithManyResolvers/Refused", "TestMatchAcceptEnvPattern/pattern_?*?_target_ABCDEFG_sshould_match", "TestCleanAndSplit/#00", "TestVarzHandler/metrics_set_TODO_gauge_type (0.00s)\\n\"}", "TestPolicyScopeContains/ProfileScope(A)/UseerScope(A/1234)", "TestRegression/prefixes_aligned_on_stride_boundary", "TestDecode/ipv4_frag", "TestMatchAcceptEnvPattern/pattern_?*_target_EXAMPLE_2__should_match", "TestReadPolicyStore/MachineStore/WithLock/BooolPolicy_True", "TestTopK (0.00s)\\n\"}", "TestSrcTypeFromFlags", "TestTCPHandlerForDst/[fd7a:115c:a1e0::53]:9080 (0.00s)\\n\"}", "TestLoadPrefsNotExist", "TestServeConfigETag", "TestServeAPI (0.01s", "TestLoggingPrivacy/internet_to_ts_v6_out (0.00s)\\n\"}", "TestJ", "TestDownload/signed_with_root_key", "TestCapturePcap", "TestRequireTailscaleIP", "TestMonitor", "TestSortRegion", "TestLookupMethod/PtrToNamedTypeAlias/NoMethod", "TestValue/null_for_unset", "TestSetJSONRoundTrip/multiple-items/strings (0.00s)\\n\"}", "TestWhoIs/100.101.102.103:123", "TestDisableDeltas", "TestNotificationTargetMatch/FilterByCID/WithUID/D", "TestAutoflags/linux_amd64_to_windows_amd64 (0.00s)\\n\"}", "TestNoiseClientPortsAreSet/https-url", "TestSingleTicker", "TestDownload/signed_with_root_key (0.01s)\\n\"}", "TestClockWithDefaultStartTime", "TestRegisterDuplicateSettings/NoConflict/MeergeOS-Second", "TestValidHost/100.100.100.100:41112 (0.00s)\\n\"}", "TestJoin//", "TestResolverEqual/nil_vs_non-nil", "TestValue/1s/SpikeDecayAddZero", "TestGenericContainsPointers/StructWithUniqueHandle (0.00s)\\", "TestSigSeri", "TestSanitizeLabel/space", "TestParseAlpinePackageVersion", "TestUpdateYUMRepoTrack/non-tailscale_repo_file", "TestGenericContainsPointers/InterfaceParam", "TestServeDevConfigMutations/tcp_port_too_high", "TestSetExitNodeIDPolicy/ExitNodeIP_key_se", "TestServeAPI/100.100.100.101_requesting_/local/v0/prefs", "TestNetworkMapConcise/basic", "TestControlHTTP/https_to_any", "TestSliceContainer", "TestPreferencePolicyInfo/error_disabled", "TestSyncValueSetForTest/GetErr/WithInitErr (0.00s)\\n\"}", "TestShouldDenyServeConfigForGOOSAndUserContext/windowws-path-handler-admin", "TestTailchonk_ChildAUMs", "TestFQDNContains/tailscale.com_www.tailscale.com", "Test_msg_Parse/zero_length_bytes (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Bool/True/json (0.00s)\\n\"}", "TestUpdatePrefsOnSysPolicyChange/NoChange", "TestExi", "TestDoHV6", "TestProfileDupe/login-replace-node", "TestBytesLines", "TestConfirm/confirm_callback_allows", "TestMatchAcceptEnvPattern/pattern_*_target_a_should_maatch", "TestValidHost/local-tailscaled.sock (0.00s)\\n\"}", "TestResolverEqual/non-nil_vs_nil", "TestApplySysPolicy/prefs_set_with_matching_policies", "TestSnapshotString/non-empty", "Test_conn_WriteRand (0.01s)\\n\"}", "TestPeerCfg_NAT/IPv6/multiple-peers-require-nat (0.00s)\\n\"}", "TestPolicyScopeMarshalUnmarshal/specific-user-sc", "TestCheckForAccidentalSettingReverts/profile_namme_ignored_in_up", "TestMarshalUnmarshal/json/string/marshal-directly (0.01s)\\n\"}", "TestWhoIs/100.200.200.200:123", "TestKnownKeysRegistered/KeyExpirationNotice", "TestPanicIfAnyEnvCheckedInInit (0.00s)\\n\"}", "TestPolicyScopeIsConfigurableSettin", "TestNoteReceiveActivity", "TestKeyToEnvVarName/WithDigits/Single/Middlee", "TestSingleTimer/reset_for_single_tick_per_step", "TestExpandProxyTargetDev/https-scheme", "TestAfterFunc/reset_while_active", "TestDoHV6/https://cloudflare-dns.com/dns-query (0.00s)\\n\"}", "TestPolicyScopeMarshalUnmarshal/device-scope (0.00s)\\n\"", "TestDNSConfigForNetmapForExitNodeConfigs/wgExit/noRouutes/defaultResolver", "TestReportMetrics/do-not-report-metrics-on", "TestMarshalUnmarshal/json/addr-bundle-map (0.00s)\\n\"}", "TestDelegate", "TestFull/ptr4", "TestNotificationTargetMatch/FilterByCID/WithUID/NoCID (0", "TestStdHandler/handler_returns_user-visible_error (0.00s)\\n\"}", "TestFQDN/.foo.com", "TestPort80Handler", "TestShuffle (0.00s", "TestGetTypeHasher/netip.Addr (0.00s)\\n\"}", "TestParseRootKey/valid", "Test_spdyFrame_parseHeaders/synn_reply_too_short_payload", "TestMarshalUnmarshal/json/bundle-list/marshal-directly (", "TestApplyUpdateEr", "TestCleanupOldDownloads/SPKs", "TestMarshalUnmarshal/json/int-slice/marshal-via-view (0.00", "TestExitN", "TestMarkActiveChain/long_truncate", "TestGetTypeHasher/IntIntByteInt", "TestCloneState/S", "TestLoginNotifications/DifferentUsers/NoCID", "TestDelegate/ipv4#01", "TestNoiseClientPortsAreSet/http-private-ip-nno-port", "TestPermissions (0.00", "TestMarshalUnmarshal/json/readonly-item/marshal-via-viiew", "TestServeHTTPProxyHeaders", "TestAppendJSONAllocs", "TestRemoveAllW", "TestCheckForAccidentalSettingReverts/ignore_logiin_server_synonym_on_other_change", "TestGetTailscaleBrowserSession/has-authorized-session", "TestShouldProcessInbound/process-local-ips", "TestNoAllocs/udp6_out", "TestProbeUDPLifetimeConfig_Valid/cliff_too_small (0.00s", "TestDelegate/ns#01", "TestMarkAncestorIntersectionAUMs", "TestDeltaDERPMap/regions-change", "TestIsLegacyInvocation/12", "TestGetUint64/read_non-existing_value", "TestMergeSnapshots/with-conflicts (0.00s)\\n\"}", "TestPeerChangeDiff/patch-online-to-true (0.00s)\\n\"}", "TestGetTypeHasher/IntIntByteInt-canaddr (0.00s)\\n\"}", "TestBucket//c2n/nxaaa1CNTRL", "TestResolveLocal/mx-nxdomain", "TestInit0", "TestConcurrent", "TestAfterFunc/stop_after_reset", "TestUpdatePrefs/disable_ssh_over_ssh_no_risk (0.00s)\\n\"}", "TestMarshalUnmarshal/json/string-bundle-map/marshal-viia-view", "TestMarshalAndParse/call_me_maybe_endpoints", "TestPacketSideEffects/v6", "TestKnownKeysRegistered/UseTailscaleSubnets", "TestShouldSendToHost/local_ip_to_remote", "TestGetStringArray/read_existing_value (0.00s)\\n\"}", "TestEnvPolicyStore/Configured/UInt64/Negativve", "TestQnapAuthnURL/hostname_https (0.00s)\\n\"}", "TestParseRootKey/nil", "TestCutSuffix/blank-slice", "TestBackfillAppConnectorRoutes", "TestMatchAcceptEnvPattern/pattern_*a_target_ab_should__not_match", "FuzzTime/seed#16", "TestHandlePeerAPI/owner_without_cap", ": TestRoundTraffic/under_5_bytes (0.00s)\\n\"}", "TestIsLegacyInvocation/11", "TestRequireTailscaleIP/localhost", "TestTypeI", "TestMarshalUnmarshal/jsonv2/string-bundle-map/ma", "TestSplitArgs/dupe-args", "TestMarshalUnmarshalSnapshot (0.00s)\\n\"}", "TestVarzHandler/float_zero", "TestMarshalUnmarshal/json/managed-bundle/marshal-via-vview", "FuzzAppendToLower/seed#8", "TestSec", "TestLocking/F", "TestNodeKeySignatureRotationDetails/SigRotation (0.00s)\\n\"}", "TestIssueFormat", "TestPeerAPIPrettyReplyCNAME", "TestStat/root_folder", "TestEtcAptSourceFileIsDisabled", "FuzzTime/seed#9", "TestMarshalUnmarshal/jsonv2/bundle-list", ": TestContainsPointers/complex128 (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_?*_target_aa_shou", "TestShouldTryBootstrap/should-bootstrap", "TestSortRegions", "TestKeysEqual", "TestHandlePeerAPI/bad_filename_deleted (0.00s)\\n\"}", "TestGetUPnPClient/mikrotik", "TestHandlePeerAPI", "TestNewContainsIPFunc/cidr-list-5", "TestComplete/debugΓÉú--enumΓÉúal (0.00s)\\n\"}", "TestLookupMethod/TypeParamWithAlias/HasMethod", "TestNoiseClientPortsAreSet/https-url-custom-port (0.", "TestSingleTimer/stop_after_reset", "TestWords/tails (0.00", "TestPeerRoutes", "TestMarshalUnmarshal/jsonv2/empty-slice", "TestSuggestExitNode/only_mullvad_suggestions (0.00s)\\n\"}", "TestLoadBalancerClass", "TestDown", "TestNoiseClientPortsAreSet/http-localhost-custo", "TestGetTypeHasher/int_negative", "TestServeDevConfigMutations/unknown_host_tcp (0.00s)\\n\"}", "TestLogKnob/Manual", "TestResolveLocal/foreign_domain", "TestFirstLastEqual/last-empty (0.00s)\\n\"}", "TestRoundTraffic/under_1_000_000_000_bytes", "TestRateLimitedFnReentrancy", "TestRemoveAllWarnings", "TestIsNotableNotify", "TestAppendMetada", "TestDoDupSuppress", "TestTampering", "TestAddReportHistoryAndSetPreferredDERP/preferred_derrp_hysteresis_no_switch_absolute", "TestRoutesRequireNoCustomResolvers (0.00s)\\n\"}", "TestShouldHandlePing/ICMP6-4via6-ProcessSubnets-fal", "TestAllocs", "TestGetTailscaleBrowserSession/not-owner", "TestReadPolicyStore/MachineStore/NoLo", "TestNoiseClientPortsAreSet/http-public-ip", "TestMarshalUnmarshal/json/readonly-item (0.00s)\\n\"}", "TestClockWithDefinedStartTime/no_increment", "TestHandlePeerAPI/duplicate_different_files", "TestMarshalUnmarshal/json/bundle-list", "TestDoChan (0.", "TestFQDN", "TestRoundTraffic/under_1000_bytes", "TestTailscaleIngressHostname", "TestLocking/ReFill", "TestStar", "TestReadPolicyStore/MachineStore/WithLoc", ": TestHasPathHandler/with-bg-path-handler (0.00s)\\n\"}", "TestDoHIPsOfBase", "TestFQDNContains", "TestMarshalUnmarshalSnapshot/Integer/NonZerro/json", "TestMaybeSetNearestDERP/connected_with_report_derp (0", "TestNodeKeySignatureRotationDetails/SigRotationNestedTwice (", "TestReaderLifecycle/read-erroneous-stringy-settin", "TestResolveLocal/mx-ipv4", "TestTailscaleEgressServices/service_change_protocol (0", "TestParentChildRelationship/1/parent (0.00s)\\n\"}", "TestRemove0 (0.00", "TestFQDN/foo", "TestGetTailscaleBrowserSession/no-session-user-self-nodde", "TestDriveManageShares/rename_exists", "TestAutoflags/darwin_arm64_to_darwin_amd64", "TestSyncValueSetForTest/Concurrent/GetErr/WithInitErr (0.0", "TestShardValue/One", "TestOptionAllocs", "TestReplace/repl", "TestActiveDiscovery", "TestStdHandler/handler_returns_404_via_HTTPError (0.00s)\\n\"}", "TestWildcardDomain", "TestDecode/unknown", "TestSyncValueSetForTest/GetOk", "TestMarshalUnmarshal/jsonv2/bool-true", "TestMarshalUnmarshal/json/empty-string/marshal-directlly", "TestApplySysPolicy/disable_AutoUpdate_check_does_not__unset_apply/status_update", "TestSliceEqualAnyOrderFunc", "TestFilterFormatAndSortExitNodes", "TestIsLegacyInvocation", "TestPeerAPIBase/self_both_them_only_4", "TestNotificationTargetMatch/FilterByCID/WithUID/SameCI", "TestPreferencePolicyInfo/force_enable_modify/CheckUp", "TestStdHandler/handler_returns_404_with_reques", "TestReportMetrics/two-values (0.00s)\\n\"}", "TestSt", "TestProfileDupe/reauth-replace-node (0.00s)\\n\"}", "TestKnownKeysRegistered/InstallUpdates", "TestPeerCapabilities/toPeerCapabilities-", "TestLockUnlockPolicyStore", "TestReadPolicyStore/MachineStore/NoLock/UInttPolicy_1", "TestRotationTracker/several_per_pubkey_latest_wins (0.00s)\\", "TestNextPeerExpiry/future_expiry_from_multiple_peers", "FuzzTime/seed#15", "TestGetServeHandler/foo-other", "TestGetSt", "TestPostRequestContentTypeValidation", "TestRoutin", "TestTopK", "TestKnownKeysRegistered/ManagedByCaption", "TestNoiseClientPortsAreSet/http-public-ip-cuustom-port", "TestWindowsPingOutputIsSuccess", "TestGetStringArray/read_non-existing_value", "TestRedact (0.00s)\\n\"}", "Test_RXChecksumOffload/tcp6_with_ext_header_va", "TestMarshalUnmarshal/json/bool-true/marshal-directly", "TestRetry", "TestPacketSideEffects/basic", ": TestRouteDataLessConsistent (0.00s)\\n\"}", "TestServeDevConfigMutations/cannot_override_tcp__with_http", "TestDropOldLogs/w200-r200", "TestPrefsApplyEdits/set1_decoy1", "TestTailscaleEgressEndpointSlices/status_does_nott_match_pod_ip", "TestCheckForAccidentalSettingReverts/losing_postture_checking", "TestMaskedPrefsIsEmpty/with-mask", "TestKnownKeysRegistered/LogSCMInteractions", "TestVarzHandler/struct_reflect", "Test_msg_Parse/single_fragment_sttdout_stream_no_payload_no_mask", "TestFull", "TestFirewall", "TestRegisterRequestNilClone", "TestSuggestExitNodePickWeighted/same_priorities", "TestParseAlpinePackageVersion/empty_output (0.00s)\\n\"}", "TestGetUPnPPortMapping_NoValidServices (2.97s)\\n\"}", "TestValue/1s/LowFrequency", "TestMkdir/attempt_to_create_root_folder", "TestGetTailscaleBrowserSession/not-connected-over-ta", "TestApplySysPolicy/prefs_set_without_policies", "TestSafe", "TestServerDupClients/one_comes_and_goes_disablefighters", "TestComputeSyncIntersection_ForkSmallDiff/n2", "TestClockFollowRealTime", "TestParseSynoinfo", "TestSynoArch/arm-synology_armada370_216se (0.01s)\\n\"}", "TestDetectCaptivePortalReturnsFalse", "TestRotationTracker/several_prev_keys", ": TestApplyUpdatesChain/ChainedKeyUpdates (0.00s)\\n\"}", "TestExpandProxyTargetDev/change-default-scheme", "TestMatchAcceptEnvPattern/pattern_?_target_A_should_maatch", "TestReaderLifecycle/re-read-all-settings-wheen-the-policy-changes", "TestForwarderWithManyResolvers/Success", "TestMapResponseContainsNonPatchFields", "TestWaitGroupChan (", "Test_packe", "TestValidPopBrowserURL/custom_control_url_https (0.00s)\\n\"}", "Test_jsonUnmarshalConfig/failure_invalid_format", "Test_client_Event/existing_event_gets_patched", "TestMachineSerialization", "TestGetTailscaleBrowserSession/tagged-local-source", "TestDecode/ip97", "TestVarzHandler", "TestAddrForSendLockedForWireGuardOnly/ping_sentt_outside_of_wireguardPingInterval_should_request_ping", "TestServeHTTPProxyPath//foo_-\\u003e_/foo", "TestEqual/altaddrs-changed", "TestKnownKeysRegistered/NetworkDevices", "TestSnapshotString/empty-with-scope (0.00s)\\n\"}", "TestPat", "TestGValueRecursivePanic", "TestMutationsFromMapResponse/legacy-lastseen-change (0.00s", "TestVarzHandler/int_with_type_gauge", "TestDecode/", "TestWrap (0.00s)\\n\"}", "TestProtoUnmarshalText", "TestWalkShallowPortable", "Test_conn_Write", "TestUnmarshal", "TestPolicyScopeIsApplicableSetting/DeviceSccope/DeviceSetting", "TestUpdatePrefs/force_reauth_over_ssh_no_risk", "TestSetExitNodeIDPolicy/ExitNodeIP_key_set,_existing__ExitNodeIP_pref", "TestPolicyScopeMarshalUnmarshal/current-profil", "TestPool (0.00s)\\n\"}", "TestValueMarsh", "TestNotificationTargetMatch/FilterByUID/SameUID/NoCIDD", "TestKnownKeysRegistered/AllowedSuggestedExitNodes (0.00s)\\", "TestMatchAcceptEnvPattern/pattern_?*_target_aa_should__match", "TestProberProbeInfo", "TestStat/remote1", "TestCheckForAccidentalSettingReverts", "TestPrefsApplyEdits", "Test_Hijacker/setup_succeeds_conn_sttays_open", "TestMarshalR", "TestConfirm", "TestNodeAddrResolve", "TestMarshalUnmarshalSnapshot/Nil/jsonv2", "TestLikel", "TestAutho", "TestServeAuth/control-server-no-check-mode", "TestExtractTags/two_hypen_separate_arg", "TestComplete/--ΓÉú--root (0.00s)\\n\"}", "TestExpandProxyTargetDev/https+insecure-scheme", "TestParentChildRelationship/1/unparseeable", "TestProbeUDPLifetimeConfig_Valid/cliff_too_smalll", "TestPreferencePolicyInfo/unforced_disabled/CheckUpdattes", "TestTailnetTargetIPAnnotation_InvalidIP", "TestMTUConversi", "TestLoggingPrivacy/ts_to_internet_v6_out", "TestAddrForSendLockedForWireGuardOnly/choose_loowest_latency_for_useable_IPv4_and_IPv6", "TestPeerChangeDiff/miss-change-stableid", "TestNodeSer", "TestEnvPolicyStore/Configured/StringArray/Empty (0.00", "TestCalcAdvertiseRoutesForSet/advertise-routes", "TestPrefsFromUpArgs/error_long_label", "TestSetExitNodeIDPolicy/ExitNodeID_key_not_", "TestFilter/good_packet_out", "TestWords", "TestGenericContainsPointers/PointerUnionParam (0.00s)\\n\"}", "TestServeAPIAuthMetricLogging/viewing-remote-unauth", "TestConnMemoryOverhead", "TestComplete/debugΓÉú--enum==al", "TestPa", "TestIsMajorChangeFrom/some-interesting-ip-changed", "TestApplySysPolicy/enable_AutoUpdate_check_does_not_uunset_apply/status_update", "TestPanicDo", "TestPrefsFromUpArgs/advertise_default_route", "TestDebugger", "Test_spdyFrame_Parse/control_bit", "TestKnownKeysRegistered/OnboardingFlow", "TestResignNKS/truncate-chain", "TestShouldRebind/%!s(\\u003cnil\\u003e)-false", "TestTailchonk_AUMMissing", "TestPeerCfg_NAT/IPv6/multiple-peers-require-nat-with-subbnet", "TestPeerAPIBase/nil_netmap", "TestResignNKS/first-rotation", "TestPolicyScopeIsConfigurableSetting/DeviceeScope/UserSetting", "TestSnapshotEqual/first-empty (0.00s)\\n\"}", "TestKnownKeysRegistered/PostureChecking (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_***_target_1", "TestAtLeast", "TestFilterFormatAndSortExitNodes/without_filter", "TestMatchAcceptEnvPattern/pattern_a*_target_ba_", "TestSnapshotEqual/same-items-same-order-no--scope", "TestLocalLogLines/after_prefs", "TestAutoflags/darwin_amd64_to_ios_arm64_xcode (0.00s)\\n\"}", "TestCleanURLPath//../bar", "TestPeerChangeDiff/miss-change-user (0.00s)\\n\"}", "TestFQDN/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", "TestHandlePeerAPI/put_invalid_surrounding_whitespace (0.0", "TestOptionAllocs/MaxDecodedSize/Prime (0.00s)\\n\"}", "TestFilterEnv/environ_format_invalid", "TestForwarderTCPFallbackTimeout", "TestSerialization/Checkpoint", "TestKnownKeysRegistered/ApplyUpdates", "TestPeerCaps (", "Test_endpoint_maybeProbeUDPLifetimeLocked/maybee_cliff_0_cycle_not_active", "Test_conn_Write/single_write_stdoout_data_message_with_cast_header", "TestMarshalAndParse/ping_with_padding_and_nodekey_src", "TestProxyGroup/enable_metrics", "TestSnapshotString/empty-with-origin (0.00s)\\n\"}", "TestLoggingPrivacy/ts_to_internet_v6_in (0.00s)\\n\"}", "TestSingleCache/ServeExpired", "TestClientRecv/ping", "TestNewConn", "TestReadPolicyStore/MachineStore/NoLock/LegacyPo", "TestReadPolicyStore/MachineStore/NoLock/Bool", "TestPeerChangeDiff/patch-capmap-add-new-key", "TestUpgradeNode/derp-int-only (0.00s)\\n\"}", "F", "TestAuthorityBuilderSetKeyMeta", "TestSplitArgs/all", "TestUpdatePrefs/change_tags", "TestStdHandler/handler_returns_200_with_request_ID", "TestDecode (0.00s)\\n\"", "TestRouteLess", "TestHandlePeerAPI/host-val/no-port", "FuzzTime/seed#12", "TestSplitArgs/space_in_arg", "TestKeyToEnvVarName/WithDigits/Single/Back", "TestNotificationTargetMatch/FilterByUID/DifferentUID//NoCID", "TestProbeInfoRecent/no_runs", "TestHostIndex", "TestValidPopBrowserURL/saas_controlplane (0.00s)\\n\"}", "Test_msg_Parse/subseq", "TestShardedInt/encoding.TextAppender (0.00s)\\n\"}", ": TestIsLegacyInvocation/11 (0.00s)\\n\"}", "TestUpgradeNode", "TestValidateLocalBinary/bad_signing_key_signature (", "TestTailscaleIngressWithServiceMonitor", "TestExtractScopeAndParams/opening-bracket (0.00s)\\n\"}", "TestMultiGlobalAddressMapping (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/addr-bundle-map", "Test_spdyFrame_parseHeaders (0.00s)\\n\"}", "TestHistoricalStringNames", "TestReportMetrics/value-and-error", "TestFilter/b", "TestPacketFilterPermitsUnlockedNodes/unsigned-bad (0.00s)\\n\"", "TestPeerCapabilities/toPeerCapabilities-tag", "TestHandlePeerAPI/put_invalid_non_printable (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_?a_target_aa_shou", "TestResolversWithDelays/nextdns-ipv6-expand (0.00s)\\n\"}", "TestAPIMuxCrossOriginResourceSharingHeaders", "TestASCIILowerName", "Test_msg_Parse", "TestUpdate", "TestInterfaceCycle", "TestPolicyScopeUnmarshalSpecial/device-with-id (0.00s", "TestPolicyScopeUnmarshalSpecial/unknown-", "TestStdHandler/handler_returns_user-visible_error_w", "TestPeerChangeDiff/patch-lastseen", "TestGetPreferenceOption/never_by_policy", "TestSafeFuncSlowOnSlow", "TestFileTarget", "TestS", "TestAll (0.00s)\\n\"}", "TestLoginNotifications/SameUser/TwoSessions/BothWithCCID", "TestKeyToEnvVarName/WithDigits/Multi/Front (0.00s)\\n\"}", "TestInterleave/nil_a", "TestDB (0.01s)\\n\"}", "TestValue/NumericalStability", "TestPort80Handler/fqdn_and_path", "TestEnvPolicyStore/Configured/Bool/False (0.00s)\\n\"}", "TestMatchesMatchProtoAndIPsOnlyIfAllPorts/ports_reequirements_dont_match_unknown_proto", "TestUpdatePrefs/disable_ssh", "TestCheckForAccidentalSettingReverts/losing_", "TestProfileDupe/reauth-replace-user", "TestKeyToEnvVarName/WithAbbrev/Middle (0.00s)\\n\"}", "TestMarshalUnmarshal/json/addr-int-map", "TestWriteFileSymlink", "TestProfileDupe/login-new-node", "TestSugges", "TestResolversWithDelays/quad9-one-v4-one-v6", "TestGetServeHandler/root-other", "TestPrefsFromUpArgs/default_linux (0.00s)\\n\"}", "TestSigNested", "TestSelectBestService/GetStatusInfo_errors", "TestFQDNContains/_", "TestKeyToEnvVarName/Non-Alphanumeric/Space", "TestGetVisibility/read_non-existing_value", "TestNoiseClientPortsAreSet/https-public-ip", "TestPrefsFromUpArgs/error_long_hostname (0.00s)\\n\"}", "TestServeDevConfigMutations/invalid_port_too_loww", "TestSyncValueSetForTest/GetErr/WithInitErr", "TestServeAuth/query-existing-incomplete-session", "TestPreferencePolicyInfo/force_disable_unchanged (0.00s)\\n\"}", "TestGetString/read_non-existing_value (0.00s)\\n\"}", "TestComplete/- (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/int-bundle-map/marshal-viaa-view", "TestApplyUpdateErrors/Bad_StateID", "TestMatchesFromFilterRules (0.00s)\\n\"}", "TestChirp", "TestContainsPointers/uint8", "TestServeDevConfigMutations/invalid_scheme", "TestDropOldLo", "TestServeHTTPProxyPath//foo_-\\u003e_/foo/,_with_mountt_point_and_path_/foo/", "TestComplete/--root-bool=T", "TestClockAdvance/changes_at_start", "TestValue/1s/SpikeDecay", "TestApplySysPolicy/prefs_set_with_neutral_pol", "TestPingerMismatch", "TestHashMapAcyclic", "TestOnTailnetDefaultAutoUpdate/before=,after=true", "TestLocking/DifferentKey", "TestMergeSnapshots/second-nil", "Test_Hijacker/setup_fails_policy_is__to_fail_closed_conn_is_closed", "TestScopeMetrics/android-device (0.00s)\\n\"}", "TestShowUpdateWarnable/RunningLatest", "TestPeerCfg_NAT/IPv6/no-cfg", "TestResetRecords/nameserver.ip4_gets_reset (0.00s)\\n\"}", "TestReb", "TestLookupMethod/NamedType/NoMethod", "TestCheckForAccidentalSettingReverts/ignore_netffilter_change_non_linux", "TestStdLogger", "TestMapCycle", "TestShuffle", "TestCo", "TestValidHostname/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", "TestMarshalUnmarshal/jsonv2/int-bundle-map (0.00s)\\n\"}", "TestDis", "TestFirstLastEqual/first-true (0.00s)\\n\"}", "TestSuggestExitNodeLongLatDistance/zero_values (0.00s)\\n\"}", ": TestSingleTicker/reset_while_stopped (0.00s)\\n\"}", "TestGetTypeHasher/string_slice", "TestDirectManager", "TestOCSP/revoked_response", "TestHandlePeerAPI/duplicate_zero_length (0.00s)\\n\"}", "TestApplySysPolicy/prefs_set_with_matching_policies/sstatus_update", "TestMultiGlobalAddressMapping", "TestSo", "TestAtomicValue (0.00", "TestPreferencePolicyInfo/error_enabled/ExitNodeA", "TestLocalLogLines/after_peers (0.00s)\\n\"}", "TestServeDevConfigMutations/funnel_background", "Test_spdyFrame_parseHeaders/syn_ping (0.00s)\\n\"}", "TestOCSP/unknown_response", "TestAft", "TestServerDupClie", "TestSnapshotEqual/same-items-different-order", "Test_RXChecksumOffload/tcp6_with_ext_header_", "TestMatchAcceptEnvPattern/pat", "TestPacketSideEffects/v6/router-solicit", "TestNoContent/whitespace_invalid_challenge (0.00s)\\n\"}", "TestWriteAndInject", "TestShouldAutoExitNode/auto:any", "TestSetSelfProxy", "TestMarshalUnmarshal/json/empty-slice/marshal-via-view (", "TestExitNodeIPOfArg", "TestTCPForwardLimits", "TestPeerAPIBase/nil_peer", "TestResolveLocalReverse/ipv6", "TestGetDNSQueryCacheKey/empty", "TestIsLegacyInvocation/7", "TestNoiseClientPortsAreSet/http-url-custom-port (0.00", "TestAcceptedNamesContainsPreferredNames (0.00s)\\n\"}", "TestPeerCaps/v4", "TestSingleTimer/reset_while_active", "TestNotificationTargetMatch/FilterByUID/SameUID/WithCI", "TestContainsPointers/no-ptr-struct-array (0.00s)\\n\"}", "TestRi", "Test_spdyFrame_parseHeaders/syn_p", "Test_jsonMarshalConfig/success", "FuzzTime/seed#11", "TestPr", "TestDeviceConfig/device1_remove_peer (0.00s)\\n\"}", "TestDeviceConfig/device2_config/reconfig", "TestResolversWithDelays/controld-ipv6-expand (0.00s)\\n\"}", "TestChirpTimeout (0.", "TestLockUnlockPolicyStore/N-Goroutines (0.00s)\\n\"}", "TestRegisterDuplicateSettings/NoConflict/MeergeOS-Both", "TestSendFr", "TestSnapshotString/nil", "TestPolicyScopeContains/ProfileScope/DeviceScope (0", "TestMkdir/attempt_to_create_static_root_foldder", "TestPrefsFromUpArgs/error_tag_prefix (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_enable_modify/UseTailsscaleSubnets", "TestNoiseClientHTTP2Upgrade_earlyPayload (0.07s)\\n\"}", "TestListenerCleanup", "TestShouldDenyServeConfigForGOOSAn", "TestPolicyScopeMarshalUnmarshal/specific-prrofile-scope", "TestNoiseClientHTTP2Upgrade_earlyPayload", "TestContainsPointers/complex64 (0.00s)\\n\"}", "TestDNSConfigForNetmap/android_does_NOT_need_fallbacks", "TestDialCall_DNSWasTrustworthy/no-info", "TestContainsPointers/uint64", "TestPeerCfg_NAT/IPv6/multiple-peers-require-nat-with-deffault-route", "TestIsMajo", "TestPeerChangeDiff/patch-capmap-remove-key (0.00s)\\n\"}", "TestLimit (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Settings/With-Origin", "TestSelectBestService/GetExternalIPAddress_bad_ip", "TestMarshalUnmarshal/jsonv2/bundle-list/marshal-via-vi", "TestContainsPointers/int", "TestPolicyScopeContains/DeviceScope/DeviceSScope", "TestUpdatePrefs/force_reauth_over_ssh", "TestStringJSON", "TestStrictTransportSecurityOptions", "TestMarshalResponseFormatError", "TestContainsPointers/func", "TestMaskedPrefsPretty", "TestSliceCont", "TestKubeconfig/already-configured", "TestUpdatePrefs/no_advertise_connector", "TestServeWatchIPNBus", "TestAddReportHistoryAndSetPreferredDERP/forced_two", "TestShortAllocs (0.", "TestProbeUDPLifetimeConfig_Valid/no_cliffs", "TestPeerAPIReplyToDNSQueriesAreObserved", "TestSnapshotEqual/same-items-same-order-diffferent-scope", "TestPreferencePolicyInfo/unforced_disabled/InstallUpddates", "TestAutoflags/darwin_arm64_to_ios_arm64", "TestGenericContainsPointers/IntegerMapParam (0.00s)\\n\"}", "TestGetInterfaceIndex", "TestValidHostname/aaaaaaaaaa", "TestIsZero", "TestMatchAcceptEnvPattern/pattern_a?_target_ba_", "TestUpdateDebianAptSourcesListBytes/if-both-stable-annd-unstable-dont-change-unstable", "TestServeDevConfigMutations/path_off (0.00s)\\n\"}", "TestServeAPI/100.100.100.102_requesting_/local/v0/prefs", "TestRecover/empty", "TestGetDERPM", "TestSynchronization/LogOnChange", "TestServeDevConfigMutations/path_in_dest (0.00s)\\n\"}", "TestParsedString/unknown", "TestLogConciseReport/ipv4_one_region", "TestUpdatePrefs/enable_ssh_over_ssh", "TestEnvPolicyStore/Configured/Bool/1 (0.00s)\\n\"}", "Test_spdyFrame_Parse/frame_with_incom", "TestUpdatePrefs/explicit_empty_operator", "TestSettingMetricNames/windows-device-no-su", "TestPolicyScopeIsConfigurableSetting/DeviceeScope/DeviceSetting", "TestOnceMode", "TestSerialization (0.", "TestGetMoreSpecificPattern/identical", "TestT", "TestKeyToEnvVarName/WithPathSeparators/Multi (0.00s)\\n\"}", "TestLookupMethod/PtrToNamedTypeAlias/HasMethod", "TestMach", "TestFQDN/.foo.com.", "TestCompare/v1_empty", "TestEqual/nil_", "TestPrefsFromUpArgs/via_route_short_prefix (0.00s)\\n\"}", "TestServeDevConfigMutations/http_listener (0.00s)\\n\"}", "TestCalcAdvertiseRoutesForSet", "TestParseSigningKey/valid", "TestServeWatchIPNBus/no-permission", "TestFillAllowedSuggestions/many", "Test_spdyFrame_Parse/data_frame_stream_id_5", "TestMarkActiveChain", "TestNameserver/A_record_query,_record_does_not_exis", "TestParentChildRelationship/0/parent/none", "TestMarshalUnmarshal/json/int-bundle-map/marshal-via-", "TestMarshalUnmarshal/jsonv2/addr-bundle-map/marsha", "TestSuggestExitNode/found_better_derp_node (0.00s)\\n\"}", "TestServeAPI/100.100.100.102_requesting_/routes", "TestReadAndInject", "TestWhoIs/100.200.200.200:123 (0.00s)\\n\"}", "TestAs (0.00s)\\n\"}", "TestSplitArgs", "TestScrubHex (", "TestDeltaDERPMap/home-params-sub-fields", "TestLoggingPrivacy", "TestDriveManageShares/remove_disabled", "TestGenericContainsPointers/BasicTypeParam", "TestMarkActiveChain/simple_truncate", "TestUrlOfListenAddr/TestIPv6", "TestTCPHandlerForDst/100.100.100.100:9080", "TestSettingDefinition/Nil", "TestLoggingPrivacy/internet_to_ts_v6_out", "TestInterleave/equal", "TestTwoDevicePing", "TestMatchesFromFilterRules/implicit_protos (0.00s)\\n\"}", "TestGetUPnPPortMapping_Invalid/127.0.0.1 (4.19s)\\n\"}", "TestInterleave/short_b", "TestReconfigureAppConnector", "TestProtoPortRangeParsing/#00", "TestControlHTTP/https_to_any (0.12s)\\n\"}", "TestWindowsPingOutputIsSuccess (0.00s)\\n\"}", "TestApplySysPolicy/disable_AutoUpdate_ch", "TestFull/upper", "TestGetDigitalOceanResolver", "TestGenericContainsPointers/IntegerParam", "TestGetMoreSpecificPattern/2_names_for_/_(2)", "TestReadPolicyStore/MachineStore/Wi", "TestSettingDefinition/UnsupportedSetting (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Nil/json", "TestMarshalUnmarshal/jsonv2/string-string-map/marshal--via-view", "TestOptionAllocs/LowMemory", "TestStructLi", "TestLRU", ": TestAddrForPingSizeLocked/ping_size_0_and_valid_trusted_UDP_addr_should_send_to", "TestMarshalUnmarshalSnapshot/String-List/jsson", "TestEnvPolicyStore/Configured/String/Empty", "TestValidateLocalBinary", "TestApplySysPolicy/empty_prefs_without_policies", "TestServeDevConfigMutations/no_http_with_funnel", "TestHandlePeerAPI/bad_filename_encoded_dot (0.00s)\\n\"}", "TestValue/1s/SpikeDecayAddZero (0.01s)\\n\"}", "TestValidPopBrowserURL/custom_control_url_http (0.00s)\\n\"}", "TestHTTPServerLogFilter", "TestValidPopBrowserURL/custom_control_url_http_diff", "TestMe", "TestComplete/debugΓÉú--enum=al (0.00s)\\n\"}", "Test3", "TestValidateLocalBinary/missing_file (0.01s)\\n\"}", "TestShardValue/distribution", "TestSelectBestService/nothing_connected (3.16s)\\n\"}", "TestMarshalUnmarshal/jsonv2/readonly-item/marshal-vi", "TestHeaderChecksumsV4", "TestValidHostname/example.com", "TestRegression", "TestReportMetrics/single-value", "TestFilter (0.00", "TestWatcher (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_COMPLICAT???ED_PATT???ERN_target_COMPLICAT123ED_PATTggERN_should_match", "TestParsedString/udp4", "TestEnvPolicyStore", "TestPing", "TestBool/", "TestAnnotationIntoLB", "TestDiscoS", "TestDerpProber", "TestConcis", "TestAttrOr", "TestFQDN/.fo", "TestMarshalUnmarshal/jsonv2/uint64/marshal-directly", "TestUpdatePrefs/disable_ssh_over_ssh_no_risk", "TestDelete/default_route", "TestDoHV6/https://cloudflare-dns.com/dns-query", "TestGetBoolean/reading_value_returns_other_error", "TestValidateLocalBinary/no_signature (0.01s)\\n\"}", "TestArrayAllocs", "TestMarshalUnmarshal/json/int32/marshal-via-view (0.00s)\\n\"}", "TestHandlePeerAPI/bad_filename_encoded_slash (0.00s)\\n\"}", "TestClosedChan", "TestConn/PingPong", "TestGenericContainsPointers/UnsafePointerParam (0.00s)\\n\"}", "TestGetPreferenceOption/never_by_policy (0.00s)\\n\"}", "TestMakeProbePlan/try_harder_for_preferred_derp (0.00s)\\n\"}", "TestLogger (0.00s", "TestLock", "ExamplePrefs_ExitNodeID_setManagedValue", "TestGenericContainsPointers/StructWithNetipTypes (0.00s)\\n\"}", "TestAPIMuxCrossOriginResource", "TestDriveManageShares/prepend", "TestContainsPointers/int-map", "TestTailscaleEgressEndpointSlices/no_proxy_group__resources", "TestServeHTTPProxyPath//foo/b", "FuzzAddr", "TestCertStoreRoundTrip/FileStore", "TestStrideTableInsertShuffled", "TestShouldTryBootstrap/deadline-exceeded (0.00s)\\n\"}", "Test_listCerts/call_error", "TestSetJSONRoundTrip/one-item", "TestCleanupOldDownloads/no-follow-symlinks", "TestMarshalUnmarshal/json/int-slice/marshal-via-view", "TestNoiseClientPortsAreSet/http-public-ip-custo", "TestGetString/read_non-existing_value,_non-blank_de", "TestMarshalUnmarshal/json/various", "TestSliceCycle", "TestFilter/bad_ip_in", "TestNothing (0.0", "TestNextFilename", "TestShardedMap", "TestCalcAdvertiseRoutesForSet/advertise-exit/", "TestLoggingPrivacy/ts_to_ts_v6_in", "TestGetRCode/too-short", "TestParseAlpinePackageVersion/missing_version (0.00s)\\n\"}", "TestNatChecksumsV6UDP", "TestKnownKeysRegistered/ApplyUpdates (0.00s)\\n\"}", "TestShouldDenyServeConfigForGOOSAndUserContext/illumoos-path-handler-not-admin", "TestServeHTTPProxyHeaders/request-from-user-within-", "FuzzAppendToLower/seed#1", "TestContainsPointers/string-slice", "TestPoller (0.00s)\\n\"}", "TestPipeTi", "TestVarzHandler/metrics_label_map_untyped (0.00s)\\n\"}", "TestWindowsPingOutputIsSuccess/success_german", "TestASCIILo", "TestDoHV6/https://dns.google/dns-query (0.00s)\\n\"}", "TestPolicyScopeUnmarshalSpecial/too-many-sccopes", "TestMarshalUnmarshal/jsonv2/readonly-item (0.00s)\\n\"}", "TestPanicDoChan", "TestEmbeddedTypeUnmarshal/unmarshal_gitops_", "TestCutSuffix/blank-suffix", "TestLookupMethod/TypeParamWithAliasPtr/NoMethod (0.00s)\\n\"}", "TestExtractScopeAndParams/params-empty-scope (0.00s)\\n\"", "TestResolveLocal/via_hex", "TestUpdateDebianAptSourcesListBytes/if-both-stable-annd-unstable-dont-change", "TestUpgradeNode/empty", "TestGFuncErr", "TestIsNetstackRouter/netstack", "Test_RXChecksumOffload/tcp4_packet_valid_csum (0.00s)\\n", "TestInteropClient", "TestMatchAcceptEnvPattern/pattern_**_target_aa_should__match", "TestGetMoreSpecificPattern/almost_same_prefix,_but_not_a_ppath_component", "TestAuthorityCompact", "TestPreferencePolicyInfo/unforced_disabled/ExitNodeAlllowLANAccess", "TestNextPeerExpiry/all_nodes_already_expired", "Test_determineRecorderConfig/no_recorder_caps", "TestGetUPnPClient/not_supported", "TestStatCacheNoTimeout (0.01s)\\n\"}", "TestTai", "TestMarshalUnmarshalSnapshot/Integer/NonZerro/jsonv2", "TestSetExitNodeIDPolicy/ExitNodeID_key_is_set_to_autoo_and_last_suggested_exit_node_is_populated", "Test_spdyFrame_parseHeaders", "TestMutationsFromMapResponse/not-okay-patch-node-chang", "TestHasPathHandler/with-no-bg-path-handler", "TestIsNetstackRouter", "TestNodeWriteRawWithoutAllocating", "TestDriveManageShares/remove_non_existing", "TestForwarderWithManyResolvers/NXDomain", "TestNodeKeySignatureRotationDetails", "TestSnapshotEqual/second-nil (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/addr-int-map (0.00s)\\n\"}", "TestWhoIsArgTypes/nodekey:5c8f86d5fc70d924e55f024461665a5dae8f822994ad26bcf4b08fd841f9bf261", "TestNow (0.10s)\\n\"}", "TestShouldRebind/EOF-false", "TestSetSel", "TestSliceSet", "TestValidateLocalBinary/bad_signature (0.02s)\\n\"}", "TestLikelyHomeRouterIP_Prefix", "TestProbe", "TestClockAdvance/multiple_advances_over_time", "TestPolicyScopeUnmarshalSpecial/user/profille", "TestPolicyScopeUnmarshalSpecial/unknown-scope (0.00s)\\", "TestServeHTTPProxyHeaders/request-from-user-within-taailnet", "TestSimultaneousRequests", "TestNotificationTargetMatch/AllClients/Nil (0.00s)\\n\"}", "TestMutationsFromMapResponse/no-changes (0.00s)\\n\"}", "TestMissingAUMs_FastForward/n1", "TestNewContainsIPFunc/cidr-list-10", "TestMarshalUnmarshal/jsonv2/bundle-list (0.00s)\\n\"}", "TestNodeAddrResolve/UseDNSCache=true/IPv6_Failure", "TestDownload/upload_test", "TestNoiseClientPortsAreSet/https-url (0.00s)\\n\"}", "TestGetDNSQueryCacheKey/empty (0.00s)\\n\"}", "TestHandlePeerAPI/bad_filename_slash", "TestFQDN/foo.", "TestDataTrickle", "TestNotificationTargetMatch/FilterByUID+CID/D", "TestMarshalUnmarshal/json/int-string-map", "TestGetTypeHasher/int_ptr", "TestPipeTimeout/block-read", "TestClosePolicySource", "TestServeAPI/100.100.100.102_requesting_/exit-nodes (0.00s)\\", "TestNoAllocs/udp4_out", "TestProbeUDPLifetimeConfig_Equals", "TestDNSConfigForNetmapForExitNodeConfigs (0.00s)\\n\"}", "TestRoutesWithout (0", "TestUs", "TestResolveLocal/nxdomain", "TestMarshalUnmarshal/jsonv2/addr-bundle-map (0.00s)\\n\"}", "TestApplySysPolicy/prefs_set_without_policies/unit (0.00s)\\", "TestExitNodeIPOfArg/ip", "Test_Hijacker/setup_fails_po", "TestOnTailnetDefaultAutoUpdate/before=,after=false", "TestBucke", "TestDNSConfigForNetmapForExitNodeConfig", "TestExtractScopeAndParams/scope-with-paramss", "TestMarshalUnmarshal/json/empty-string", "TestShouldSendToHost/other_4via6_to_local", "TestMarshalUnmarshal/json/empty-string/marshal-via-vieew", "TestUserMetricsByteCounters", "TestCalcAdvertiseRoutesForSet/stop-adver", "TestOnTailnetDefaultAutoUpdate", "TestSrcTypeFromFlags/only_tls-terminated-tcp_set", "TestNetmapForResponse/implicit_dnsconfig (0.00s)\\n\"}", "TestParseAlpinePackageVersion/multiple_versions (0.00s)\\n\"}", "TestDeleteShuffled", "TestBuc", "TestTakeRandom (0.", "TestEgressServiceReadiness/no_ready_replicas", "TestReadPolicyStore/MachineStore/WithLock/", "TestInsert", "TestPolicyScopeUnmarshalSpecial/device-sc", "Test_msg_Parse_Rand (0.01s)\\n\"}", "TestMarshalUnmarshal/jsonv2/int-bundle-map", "TestCheckTag", "TestRefererPolicy/APIMux_routes_do_not_get_Referer-Policy__headers", "TestGetVIPServices/advertised-only", "TestAllocations/HashBytes", "TestLoggingPrivacy/ts_to_ts_v4_in", "TestCloneState/Empty/cbor", "TestSyncValueSetForTest/GetErr", "TestServeDevConfigMutations/invalid_port_too_high (0.00", "TestNextPeerExpiry/future_expiry_from_peer_and_self", "TestParseBindingRequest", "TestGetRCode/nxdomain", "TestNilVsEmptymap", "TestAPIMuxCrossOriginResourceSharingHeaders/do_not_serve_CCORS_headers_for_OPTIONS_requests_with_no_configured_origins", "TestFilterRoutes", "TestHandleC2NTLSCertStatus/valid", "TestLoggerWri", "TestMatchAcceptEnvPattern/pattern_?*?_target_", "TestReaderLifecycle/read-settings-if-in-scoppe/device", "TestLocalAddrNoMutex", "Test_isMagicDNSName/foo.tail4567.ts.net (0.00s)\\n\"}", "Test_jsonUnmarshalConfig/success", "TestApplySysPolicy/disable_AutoUpdate_apply_does_not__unset_check/unit", "FuzzClampEDNSSize", "TestKeyToEnvVarName/WithDigits/Multi/Back", "TestPrefsFromUpArgs/via_route_short_reserved_sitteid", "TestApplySysPolicy/prefs_set_with_matching_policies/uunit", "TestUpdatePrefs/change_login_server (0.00s)\\n\"}", "TestAddReportHistoryAndSetPreferredDERP/forced_two_noo_probe_no_recent_activity", "TestDefaultTunM", "TestI", "TestBakedInRoots", "TestSettingDefinition/SupportedSetting", "TestEnvPolicyStore/Configured/UInt64/MaxUIntt64", "TestServeConfigMutations", "TestComputeP", "TestGetVIPServices/served-with-port-ranges-multiple-rranges", "TestCompare/tailscale_minor", "TestGetString/read_non-existing_value,_non-blank_deefault", "TestMarshalUnmarshalSnapshot/Integer/Zero/jsonv2 (0", "TestDebIn", "TestP", "TestMarshalUnmarshalRawValue/Bool/True", "TestMkdir/attempt_to_create_non-existent_remmote", "TestLogHandler_QuietLogging", "TestDNSConfigForNetmap/not_exit_node_NOT_need_fallback", "TestFlagE", "TestComplete/--ΓÉú--root", "TestTakeRandom", "TestPreferencePolicyInfo/unset_disabled/InstallUpdates", "Test_conn_Write/single_write_stdeerr_data_message", "TestPolicyScopeIsApplicableSetting/ProfileSScope/UserSetting", "TestMatchAcceptEnvPattern/pattern_EXAMPLE_*_ENV_targett_EXAMPLEENV_should_not_match", "TestCalcAdvertiseRoutesForSet/advertise-exit/alrready-routes", "TestUrlOfListenAddr/TestExplicitHost (0.00s)\\n\"}", "TestApplySysPolicy/prefs_set_with_neutral_policies/sttatus_update", "Test_spdyFrame_parseHeaders/syn_strea", "TestCutPrefix/blank-all", "TestCutSuffix/exact-suffix", "TestExitNodeIPOfArg/ambiguous", "TestGetUPnPClient/huawei", "TestUpdatePrefs/no_advertise_connector (0.00s)\\n\"}", "TestUpdatePeersStateFromResponse (0.00s)\\n\"}", "TestLocking/Forget", "TestKeyToEnvVarName/WithAbbrev/Front (0.00s)\\n\"}", "TestRDNSNameToIPv6/valid", "TestShouldRebind/:_broken_pipe-true (0.00s)\\n\"}", "TestMatchAcceptEnvPattern", "TestRead (0.02s)\\n\"}", "TestPacketSideEffects/basic/drop-rando-ethertype (0.00s", "TestNoiseClientHTTP2Upgrade", "TestDownload/success", "TestIsTailscaleIPv4", "TestMarshalUnmarshal/json/subgroup", "TestComplete/--root-strΓÉú---ΓÉú--root", "FuzzTime", "TestMatchAcceptEnvPattern/pattern_aaaa_targe", "TestResolveLocal/via_invalid_type_all", "TestHandlePeerAPI/goroutines/deny-self-no-cap (0.00s)\\n\"}", "TestSynoArch/arm-synology_armada38x_419slim (0.01s)\\n\"}", "TestDirectBr", "TestPrefsFromUpArgs/via_route_short_reserved_siteid (", "TestAutoflags/linux_list_amd64_to_linux_amd64", "TestDeleter", "TestResolversWithDelays/google-all-ipv4 (0.00s)\\n\"}", "TestPolicyChangeHasChanged/UInt64-Settings (0.00s)\\n\"}", "TestMar", "TestFallbackTCPHandler", "TestApplyUpdateErrors/UpdateKey_now_fails_validation (0.00s)\\n\"}", "TestMarshalUnmarshal/json/readonly-item/marshal-via-vi", "TestPolicyScopeIsApplicableSetting/UserScoppe/UserSetting", "TestRaceRetry (0.00", "TestSliceContainer/zero", "TestValidHostname/example-.com", "TestPeerAPIBase/self_both_them_only_6", ": TestQnapAuthnURL/localhost_https (0.00s)\\n\"}", "TestGetTailscaleBrowserSession/has-session (0.00s)\\n\"}", "TestPreserveSecurityInfo", "TestSingleCache/ServeExpired/Forget", "TestPolicyScopeIsApplicableSetting/Pro", "TestParseRootKey/nil (0.00s)\\n\"}", "TestFileStore", "TestSetExitNodeIDPolicy", "TestMetricBucketsAreSorted", "TestShouldDenyServeConfigForGOOSAndUser", "TestNotificationTargetMatch/FilterByUID+CID/Nil (0.00s)\\n\"}", "TestCreateBootstrapAuthority", "TestValidHostname/www.what≡ƒñªlol.example.com (0.00s)\\n\"}", "Test_msg_Parse/initial_f", "TestStdHandler/handler_returns_200", "TestTKAAffectedSigs/no_error", "TestReadPolicyStore/MachineStore/WithLock/LeegacyPolicy", "TestSingleTicker/single_tick_advance_exact", "TestEndpointsAreUpAndReturnExpectedResponse", "TestPolicyScopeUnmarshalSpecial/unknown-scoope/unknown-scope", "TestParseSigningKey/invalid_PEM_tag", "TestIsNota", "TestMetricB", "TestReadPolicyStore/MachineStore/WithLock/UIIntPolicy_2", "TestCheckForAccidentalSettingReverts/make_win", "TestLRUStress (0.01s", "TestCalcAdvertiseRoutesForSet/advertise-routes-aand-exit/already-routes", "TestShrinkDefaultRoute", "TestLookupMethod/NamedInterface/NoMethod", "TestCheckForAccidentalSettingReverts/prof", "TestRegisterSettingDefinition (0.00s)\\n\"}", "TestAutoflags/linux_amd64_to_linux_amd64_go_run_tags", "TestOnTailnetDefaultAutoUpdate/before=,after=", "TestMarshalUnmarshal/jsonv2/readonly-item-with-value/mmarshal-via-view", "TestCSRFProtection/P", "TestRoundTraffic/under_1_000_000_bytes", "FuzzTime/seed#14", "Test_mergeStatefulSetLabelsOrAnnots/no_custom_labbels_specified_and_none_present_in_current_labels,_return_current_labels", "TestSynoArch/arm-synology_armada375_115", "TestMarshalUnmarshal/jsonv2/readonly-item", "TestMarshalUnmarshal/jsonv2/managed-int-slice", "TestGetTypeHasher/array-IntIntByteInt (0.00s)\\n\"}", "TestPreferencePolicyInfo/unforced_disabled", "TestRouting", "TestMarshalToRawMessageAndBack/all_values", "TestValidateLocalBinary/contents_changed (0.01s)\\n\"}", "TestKnownKeysRegistered/AllowIncomingConnections (0.00s)\\n\"", "TestApplySysPolicy/prefs_set_with_matching_policies/u", "TestAfterFunc/reset_for_single_tick_per_advance (0.00s)\\n\"}", "TestServeAPIAuthMetricLogging/managing-local (0.00s)\\n\"}", "TestServeDevConfigMutations/tricky_steps (0.00s)\\n\"}", "TestSettingDefinition/Device/PreferenceOptiion", "TestHandleLocalPackets", "TestServeDevConfigMutations/invalid_port_too_higgh", "TestApplySysPolicy/enable_AutoUpdate_check_does_not_uunset_apply/unit", "TestSnapshotEqual/second-empty", "Test_conn_Write/single_w", "TestValidHost (0", "TestMarshalUnmarshal/jsonv2/string-slice (0.00s)\\n\"}", "TestSrcTypeFromFlags/only_http_set (0.00s)\\n\"}", "TestResolveLocalReverse/ipv4", "TestFull/no-ipv6", "TestSrcTypeFromFlags/multiple_types_set", "TestIgnoreLocallyBoundPorts", "TestNextPeerExpiry/only_self", "TestDebInfo/missing_control_tgz", "TestTKA", "TestIsLegacyInvocation/2 (0.00s)\\n\"}", "TestStdHandler/error_handler_gets_run_with_request_ID", "TestUserspaceEnginePortReconfig", "TestCloneState/Key (", "TestMkdir/attempt_to_create_root_folder (0.00s)\\n\"}", "TestVarzHandler/metrics_label_map_untyped", "TestVarzHandlerSorting", "TestMarshalUnmarshalRawValue/StringSlice/Null (0.00s)\\", "TestAutoflags/linux_amd64_to_linux_amd64 (0.00s)\\n\"}", "TestRawMessage", "TestConciseDiffFrom/disco_key_only_change (0.00s)\\n\"}", "TestUpdatePrefs/control_synonym", "TestReadPolicyStore/MachineStore/NoLock/StriingPolicy_Empty", "TestReloader_Run", "TestProtoP", "TestRange", "TestViewerImports/Map", "TestShouldRebind/:_transport_endpoint_is_not", "TestInterleave/short_a", "TestGetTypeHasher/array_memhash", "TestHashThroughView", "TestMatc", "Test_RXChecksumOffload/tcp6_with_ext_header__valid_csum", "TestUpdateYUMRepoTrack/non-tailscale_repo_file (0.01s)\\n\"}", "TestResolveLocalReverse/magicdns", "TestCloneUser", "TestCheckForAccidentalSettingReverts/ho", "TestPolicyScopeUnmarshalSpecial/unknown-scoope", "TestCheckTag/empty", "TestServeAPI/100.100.100.102_requesting_/local/v0/prefss#01", "TestParseResponse", "TestReadPolicyStore/CurrentUserStore/NoL", "TestMarshalUnmarshal/jsonv2/string-bundle-map", "TestDelete/nosuchprefix_missing_child", "TestMarshalUnmarshalRawValue/StringSlice/Empty (0.00s", "TestPolicyScopeContains/UserScope/UserScope (0.00s)\\n\"}", "Test_mergeStatefulSetLabelsOrAnnots/custom_label", "TestKnownKeysRegistered/InstallUpdates (0.00s)\\n\"}", "TestGetTailscaleBrowserSession", "TestDecode/ipv4_fragtooshort", "TestMatchAcceptEnvPattern/pattern_COMPLICAT???ED_PATT???ERN_target_COMPLICATED_PATTERN_should_not_match", "TestInter", "TestDeviceConfig/device1_modify_peer (0.00s)\\n\"}", "TestFindModuleIn", "TestMarshalUnmarshal/json/addr-bundle-map", "TestNameserver/A_record_query,_record_does_not__exist", "TestSynoArch/arm-synology_monaco_216play", "TestHasPathHandler", "TestSuggestExitNode/large_netmap", "TestRequi", "TestNonNilS", "TestMergeSnapshots/both-nil", "TestPolicyScopeUnmarshalSpecial/slash (0.00s)\\n\"}", "TestParentChildRelationship (0.02s)\\n\"}", "TestPeerChangeDiff/patch-lastseen (0.00s)\\n\"}", "TestDropOldLogs/w500-r200", "TestMaxSize", "TestKnownKeysRegistered/AllowedSuggestedExitNodes", "TestApplySysPolicy/disable_AutoUpdate_check_does_not__unset_apply/unit", "TestMultiLabelMapExpvar", "TestPreferencePolicyInfo/unset_disabled/CheckUpdates (0.0", "TestMake (0.00s)\\n\"}", "TestLoc", "TestExtractScopeAndParams/brackets-only (0.00s)\\n\"}", "TestCalcAdvertiseRoutesForSet/advert", "TestReadPolicyStore/MachineStore/NoLock/StriingListPolicy", "TestIsValidLongWithTwoRepos", "TestHeaderChecksumsV4/TLS", "TestIsLocalhost (", "TestEnvPolicyStore/Configured/UInt64/Empty (0.00s)\\n\"}", "TestBrea", "TestSynoArch/arm-synology_armada38x_419slim", "TestVerifyFunnelEnabled/not-allowed-to-enable", "TestFindModuleInfo", "TestMatchAcceptEnvPattern/pattern_**_target_aa_shou", "TestMarshalUnmarshal/json/string-string-map/marshal-diirectly", "TestResolveLocal/via_form3_dec_examplets.net", ": TestContainsPointers/unsafe-ptr (0.00s)\\n\"}", "TestShouldTryBootstrap/dns-was-trustworthy", "TestParentChildRelationship/1/missinggparent", "TestGetTailscaleBrowserSession/no-session-tagged-self-nnode", "TestDNSConfigForNetmap", "TestParseNLArgs/keys_not_allowed", "TestShouldSendToHost/from_service_ip_to_localhosst", "TestCompare/android_short_version", "TestPermissions/b (", "TestComputeSyncIntersection_ForkSmallDiff/n1", "TestListener_Serv", "TestGetDuration/read_non-existing_value", "TestPolicyScopeMarshalUnmarshal/specific-user", "TestPadBytes/0_8_0", "TestNoiseVersion", "TestHandleLocalPackets/OtherNonHandled", "TestAutoflags/linux_amd64_to_linux_riscv64", "TestMatchesFromFilterRules/explicit_protos", "TestDelta/no_change", "TestNetInfoFields", "TestSuggestExitNode/nil_report", "TestResolversWithDelays/google-all-four (0.00s)\\n\"}", "TestWithFunc", "TestRegisterDuplicateSettings/NoConflict/Exact (0.00s", "FuzzTime/seed#3", "TestMarshalUnmarshal/jsonv2/string-bundle-map/marshal--via-view", "TestBucket//api/v2/tailnet/jeremiah@squish.com/devices", "TestMutationsFromMapResponse/patch-lastseen", "TestComplete/--root-strΓÉú--ΓÉú--ΓÉú--r (0.00", "TestLocalTCPPortAndToken", "TestSendRecv", "TestPeerCapabilities/toPeerCapabilities-tag-owned-multiiple-webui-cap", "TestMutationsFromMapResponse/patch-ep", "TestGetTailscaleBrowserSession/tagged-remote-source", ": TestCleanAndSplit/a/ (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Zero/jsonv2 (0.00s)\\n\"}", "TestOmitDropLogging/v4_link_local_unicast", "TestCSPAllowInlineStyles/true", "TestSanitizeLabel/bad_both", "TestMapViewsEqualFunc", "TestEgressServiceReadiness/all_replicas_ready (0.00s)\\n\"}", "TestWindowsPingOutputIsSuccess/success (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_disable_modify (0.00s)\\n\"}", "TestStdHandler_ConnectionClosedDuringBody", "TestKnownKeysRegistered/NetworkDevices (0.00s)\\n\"}", "TestMaskedPrefsPr", "TestProbeUDPLifetimeConfig_Equals/b_nil", "TestDebuggerHandle", "TestSyncValueSetForTest/Concurrent/GetOk", "TestMarshalUnmarshalRawValue/StringSlice/Nuull", "TestAllocs (0.00s)\\n\"}", "TestCleanMountPoint", "TestFirstLastEqual/last-empty", "TestWrapWithMessage", "TestScopeMetrics/windows-profile", "TestPermissions/b", "TestCalcAdvertiseRoutesForSet/empty (0.00s)\\n\"}", "TestShouldStartDomainRenewal/no_renew", "TestSuggestExitNode/prefer_last_node", "TestDeepHash", "TestAddReportHistoryAndSetPreferredDERP/forced_two_noo_probe_recent_activity", "TestMarshalUnmarshal/json/string-slice/marshal-directly", "TestSingleTimer/reset_for_single_tick_per_advance (0.00s)\\n\"}", "TestForkingPropagation", "TestRDNSNameToIPv6/double_hex", ": TestTailchonk_ReadChainFromHead/*tka.FS (0.03s)\\n\"}", "Test_is", "TestShouldHandlePing/ICMP6-no-via", "TestKey", "TestNotificationTargetMatch", "TestUnARPA", "TestMarshalUnmarshal/json/int32", "TestPadBytes/2_8_6", "TestPatchifyPeersChanged/same_exitnoderesolvers (0.00", "Test_RXChecksumOffload", "TestPeerAPIBypass/reject_nil_filter", "TestMaskedPrefsIsEmpty/no-masks", "TestServfail", "TestServeAPIAuthMetricLogging/managing-remote", "TestGetInterfaceIndex/bare_ip", "TestReadingSession", "TestProfileDupe/reauth-new-node", "TestHeaderChecksumsV4/ICMPv4", "TestSettingDefinition/Device/Integer (0.00s)\\n\"}", "TestRDNSNameToIPv4/valid", "TestWatchNotificationsCallbacks", "TestPacketSideEffects/v6/no-dhcp-on-v6-request (0.00s)\\n\"", "TestResolveLocal/ns-nxdomain", "TestDebInfo/truncated_ar_magic", "TestComplete/debugΓÉú--enumΓÉúb (0.00s)\\n\"}", "TestLikelyHomeRouterIP_NoMocks", "TestOmitDropLogging/v6_udp_multicast (0.00s)\\n\"}", "Test_conn_Write/single_write_conttrol_frame", "TestProxyGroup/observe_ProxyGroupCreating_status_r", "Test_a", "TestUnARPA (0.0", "TestExtractTag", "TestValidHost/10.0.0.1:41112", "TestDeltaEncBuf", "TestFilter/sh", "TestTailscaleEgressServices/service_add_two_named_", "TestCleanAndSplit/a", "TestParsedString/icmp4", "TestFQDN/_ssh._tcp.tailscale.com", "TestUpdatePrefsOnSysPolicyChange/ExitNodeID", "TestResolversWithDelays/controld-doh-input (0.00s)\\n\"}", "TestProtoPortRangeParsing/80", "TestPeerCapabilities/canEdit-some-caps", "TestPacketSideEffects/v4/no-v6-reply-on-v4-only (0.00s)\\", "TestLookupMethod/PtrToNamedType/HasMethod (0.00s)\\n\"}", "FuzzAddr (0.00s)\\n\"}", "TestSanitizeLabel", "TestDriveManageShares/rename_not_exist", "TestPacketSideEffects/v4/dhcp-request (0.00s)\\n\"}", "TestRawMessage/one", "TestServerDupClients/one_comes_and_goes_lastwriteractive", "TestComplete/pingΓÉú", "TestQnapAuthnURL/localhost_http", "TestPacketSideEffects/v6/all-nodes (0.00s)\\n\"}", "TestEgressServiceReadiness/all_replicas_ready", "TestQ", "TestSetExitNod", "TestEqualSameNil", "TestShouldStartDomainRenewal", "TestShowUpdateWarnable/no_LatestVersion", "TestContainsPointers/complex128", "TestKnownKeysRegistered/ManagedByOrganizationName", "TestSpli", "TestMatchAccept", "TestServeDevConfigMutations/serve_background", "TestServeAPIAuthMetricLogging/viewing-not-owner", "TestReloader_InitialError", "TestAddrForPingSizeLocked/ping_size_too_big_forr_trusted_UDP_addr_should_start_discovery_and_send_to_DERP", "TestExpandProxyTargetDev/change-supported-schemes", "TestIsMajorChangeFrom/nil_mix", "Test (0.00s)\\n\"}", "TestResolveLocal/via_form3_dec_tailscale.net", "TestPeerChangeDiff/miss-change-user", "TestVarzHandler/int_with_type_counter", "TestReadPolicyStore/MachineStore", "TestMarshalUnmarshal/jsonv2/netip-addr/marshal-via-vieew", "Test_msg_Parse/zero_length_bytes", "TestResetRecords", "TestSuggestExitNodeLongLatDistance/zero_values", "TestAddReportHistoryAndSetPrefe", "TestDirectBrokenRename", "TestNoContent/invalid_challenge", "TestUsedConsistently", "TestValidateLocalBinary/contents_changed", "TestPolicyFor/CurrentUser/CurrentUser (0.00s)\\n\"}", ": TestSplitSOCKSAndHTTPCloseBoth (0.00s)\\n\"}", "TestCalcAdvertiseRoutesForSet/stop-advertise-rouutes/already-exit", "TestUnpackLinuxTarball/success", "TestActiveDiscovery/facing_easy_firewalls", "TestDriveManageShares/insert", "TestPeerAPIBypass", "TestMarshalUnmarshalSnapshot/String-List/jssonv2", "TestTrimSuffix", "TestPeerAPIReplyToDNSQueries", "TestExecQueue", "TestCompareToStd", "TestShouldStartDomainRenewal/should_renew (0.00s)\\n\"}", "TestBool/omitempty_unset", "TestEtcAptSourceFileIsDisabled/normal-disabled-then-uncommmented", "TestServeAuth/transition-to-failed-session (0.00s)\\n\"}", "TestPeerCapabilities/toPeerCapabilities-tag-owne", "TestContainsPointers/ptr-struct", "TestObserveDNSR", "TestDecode/icmp", "TestWalkShallowPortable/basics", "TestCheckForAccidentalSe", "TestSingleCache/ServeExpired/InitialFill", "TestScopeMetrics", "TestValidateConfig", "TestPrefsFromUpArgs/via_route_good", "TestPacketSideEffects/basic/syslog-v6", "TestEncode", "Test_endpoint_maybeProbeUDPLifetimeLock", "TestPeerChangeDiff/patch-online-to-false", "TestMatchAcceptEnvPattern/pattern_aaaa_target_aaa_shouuld_not_match", "TestDeferredInit/many-funcs", "TestPreferencePolicyInfo/force_disable_m", "TestLogHost", "TestNatChecksumsV6TCP", "TestGenericContainsPointers/IntegerParamPtr (0.00s)\\n\"}", "TestMergeSnapshots/second-empty (0.00s)\\n\"}", "TestIDs (0.00s)\\n\"}", "TestGetStringArray/read_non-existing_value,_non_nill_default", "TestServeAPI/100.100.100.101_requesting_/not-an-endpoinnt", "TestRunDerpProbeNodePair", ": TestFirstLastEqual/first-false (0.00s)\\n\"}", "TestShouldDenyServeConfigForGOOSA", "TestAddrForPingSizeLocked", "TestNotificationTargetMatch/FilterByUID+CID/SameUID/SSameCID", "TestPreferencePolicyInfo/error_enabled/CheckUpdates", "TestAUMWeight/Key_unknown", "TestControlKey (0.", "TestShouldStartDomainRenewal/short-lived_renewal", "Test_conn_ReadRand (0.08s)\\n\"}", "TestHandlePeerAPI/put_non_zero_length_content_length", "TestSetExitNodeIDPolicy/ExitNodeID_key_s", "TestHandleLocalPackets/ShouldHandle4via6 (0.00s)\\n\"}", "TestHandlePeerAPI/bad_filename_encoded_dotdot", "TestServeAuth", "TestStatCacheNoTimeout", "TestNewContainsIPFunc/three-ip", "TestAutoflags/linux_amd64_to_linux_amd64_race", "TestTCPHandlerForDst/100.100.103.100:8080", "TestKnownKeysRegistered/PreferencesMenu", "TestMarkAncestorIntersectionAUMs/fork_multi", "TestFillAllowedSuggestions", "TestMaybeRebindOnError/rebind-:_operation_not_ppermitted", "Test_spdyFrame_Parse/frame_withh_incomplete_payload", "TestMarshalUnmarshalRawValue (0.00s)\\n\"}", "TestServerDupClients/small_overlap_replacement_disablef", "Test_client_Event", "TestUnpublishedDNS", "TestProberTimingSpread", "TestValue/integer", "TestMakeProbePlan/second_mixed", "TestResume", "TestConnListener", "TestGetPreferenceOption/other_error_is_returned (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Bool/True/jsonv2 (0.00s)\\", "Test", "Test_Hijacker", "TestPeerChangeDiff/patch-cap", "TestSetSelfProxy/localhost_normalization_of_addr (0.00s)\\n", "TestNotificationTargetMatch/FilterByUID+CID/NoU", "TestProbeUDPLifetimeConfig_Equals/a_nil", "TestPolicyScopeMarshalUnmarshal/current-user-scop", "TestLRUDel", "TestSingleTicker/single_tick_advance_extra", "TestGetMoreSpecificPattern/identical_prefix", "TestFilter (0.00s)\\n\"}", "TestEnvPolicyStore/Configured/Bool/False", "TestSrcTypeFromFlags/only_https_set", "TestKnownKeysRegistered/SuggestedExitNode", "TestBool/unset_marshals_as_null", "Test_msg_Parse/final_fragm", "TestMatchAcceptEnvPattern/pattern_*?_target__shou", "TestServerDupClients/small_overlap_replacement_lastwriteractiive", "TestHandleC2NTLSCertStatus", "TestIsLegacyInvocation/0", "ExampleMiddlewareStack", "TestSnapshotString/empty-with-origin", "TestEnvPolicyStore/Configured/Bool/0 (0.00s)\\n\"}", "TestTKASync/up_to_date", "TestExitNodeIPOfArg/ip_not_found", "TestExtractTags/one_hyphen_tags", "TestMergeSnapshots/no-conflicts", "TestSynchronization/RateLimitedFn", "TestMarkAncestorIntersectionAUMs/fork_multi_2", "TestRoundTraffic", "TestMutationsFromMapResponse/patch-online", "Test_conn_Write/two_writes_stdoutt_data_message", "TestFilter/good_packet_in", "TestPadBytes", "TestRegisterDuplicateSettings/NoConflict/Merg", "TestApplySysPolicy/disable_AutoUpdate_check_d", "TestShardValue/All", "TestReadPolicyStore/MachineStor", "TestAllocateContiguousBuffer/NoPointers", "TestMarshalUnmarshal/jsonv2/int-string-map", "TestWhoIsArgTypes/127.0.0.1:123", "TestMakeProbePlan", "TestNameserver/A_record_query,_record_exists", "TestMarshalUnmarshal/json/string-bundle-map/marshal-diirectly", "TestGetTypeHasher/string", "TestCompileHostEntries/empty", "TestTCPHandlerForDst/100.100.103.100:9080", "TestEnvPolicyStore/Configured/Bool/Invalid (0.00s)\\n\"}", "Test_msg_Parse/single_large_f", "TestAutoflags/linux_amd64_to_linux_amd64", "TestUpdat", "TestChromeOSVMRange", "TestQnapAuthnURL/invalid_URL", "TestConciseDiffFrom", "TestExitNodeIPOfArg/ip_while_stopped_okay", "TestRegisterDuplicateSettings/Conflict/Scoppe", "TestValidHostname/www.what≡ƒñªlol.example.com", "TestLookupMethod/TypeParamWithAlias/HasMethod (0.00s)\\n\"}", ": TestCleanAndSplit//a (0.00s)\\n\"}", "TestConfig/one-to-one-nat-with-multiple-nodes (0.00s)\\n\"}", "TestValidateLocalBinary/bad_signature", "TestShouldDenyServeConfigForGOOSAndUserContext/solariis-not-path-handler", "TestCl", "TestCu", "TestParseAlpinePackageVersion (0.00s)\\n\"}", "TestResolveLocal/via_form3_dec_ts.net (0.00s)\\n\"}", "TestContainsExitRoute", "TestPrefsFromUpArgs/error_exit_node_bad_ip", "TestPeerCapabilities", "TestRateLimitingBusSender/unbuffered", "TestPeerCfg_NAT", "TestValidateConfig/new_fg_port", "TestServeDevConfigMutations/tcp_port_too_low", "TestRecover (0.02", "TestConfig/dup-wan-ip", "TestDebuggerKV", "TestServeDevConfigMutations/https_text_bg (0.00s)\\n\"}", "TestPreferencePolicyInfo/error_disabled (0.00s)\\n\"}", "TestEnvPolicyStore/Configured/Bool/Invalid", "TestNotificationTargetMatch/FilterByUID/NoUID/NoCID (0.00s", "TestContext (0.00s", "TestSingleTicker/no_tick_advance", "TestUpdateRoutes (0.0", "TestRotateRoot", "TestDNSConfigForNetmap/extra_records", "TestBoolFlag", "TestMarshalUnmarshal/json/bool-false", "TestMarshalUnmarshal/json/string-bundle-map/marsha", "TestTCPHa", "Fuzz", "TestPermissionsImpl", "TestKnownKeysRegistered/DeviceSerialNumber (0.00s)\\n\"}", "TestMarshalUnmarshal/json/int32/marshal-via-view", "TestMatchAcceptEnvPattern/pattern__target_aaa_should_nnot_match", "TestOmitDropLogging", "TestMarshalUnmarshal/json/string/marshal-via-view", "TestNow", "TestCalcAdvertiseRoutesForSet/empty", "TestFQDNConta", "TestEndpointTracker", "TestInsertCompare", "TestPolicyFor/UserA/UserA", "TestPreferencePolicyInfo/force_enable_modify", "TestMarshalUnmarshal/json/managed-bundle/marshal-dire", "TestFQDN/. (0.00s)\\", "TestControlHTTP/port80_broken_mitm", "TestMarshalUnmarshalSnapshot/Empty/With-Summary (0.0", "TestServeDevConfigMutations/combos (0.00s)\\n\"}", "TestSnapshotString/non-empty-with-item-error (0.00s)\\n\"", "TestConciseDiffFrom/no_change", "TestSuggestExitNodeLongLatDistance/valid_values", "TestRateLogger (0.00s)\\", "TestAutoflags/install_linux_amd64_to_linux_amd64", "TestPreferencePolicyInfo/error_enabled/CheckUpdates (0.00s", "TestClockFollowRealTime/start_from_current_time (0.00s)\\n\"}", "TestTailscaleEgressEndpointSlices/no_pods_ready_tto_route_traffic", "TestGauge", "TestServeAPI/100.100.100.102_requesting_/not-an-endpoin", "TestCSRFProtecti", "TestMatchAcceptEnvPattern/pattern_?_target_123_", "TestContentSecurityPolicyHeader/`/api/*`_rou", "TestEnvPolicyStore/Configured/Bool/Empty", "TestTailscaleIngressWithProxyClass", "TestC", "TestAutoflags/install_linux_amd64_to_linux_amd64 (0.00s)\\n\"}", "TestStrictTransportSecurityOptions/default_HSTS_options_inn_the_secure_context", "TestGetVIPS", "TestMap (0.00s)\\n\"}", "TestForwarderTCPFallbackError", "TestSynoArch/ppc64-synology_qoriq_413", "TestIsLegacyInvocation/9 (0.00s)\\n\"}", "TestKeyToEnvVarName/Non-Alphanumeric/Space (0.00s)\\n\"}", "TestSettingDefinition/User/Duration (0.00s)\\n\"}", "TestRateLimitingBusSender/run (0.00s)\\n\"}", "TestCheckTag/emp", "TestKeyToEnvVarName/Non-Alphanumeric/NonASCIII/2", "TestHandlePeerAPI/put_invalid_colon (0.00s)\\n\"}", "TestReloader", "TestWh", "FuzzClampEDNSSize/seed#2", "TestServeDevConfigMutations/invalid_host (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Setting/With-SSummary/jsonv2", "TestComplete/--root-bool= (0.00s)\\n\"}", "TestEnvPolicyStore/Configured/Bool/True", "TestPacketSideEffects/v4/dhcp-request", "TestCleanAndSplit//a/../b", "TestMatchAcceptEnvPattern/pattern_*?*_target_C_shou", "TestValidPopBrowserURL/localhost", "TestAddrForSendLockedForWireGuardOnly (0.00s)\\n\"}", "TestResetRecords/nameserver.ip4_gets_reset_to_eempty_config_when_the_provided_configuration_is_empty", "TestSelectBestService/nothing_connected", "TestSingleCache/NoServeExpired/InitialFill", "TestVarzHandler/float_with_type_gauge", "TestVal", "TestDNSMapFromNetworkMap", "TestUpdatePeersStateFromResponse/change_key_expiry", "TestPreferencePolicyInfo/error_disabled/ExitNodeAllowwLANAccess", "TestCloneState/DisablementSecrets", "TestSuggestExitNode/only_worst_mullvad (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/patte", "TestNotificationTargetMatch/FilterByUID+CID/NoUID/SammeCID", "TestSettingMetricNames", "TestLookupMethod/TypeParamPtr/NoMethod (0.00s)\\n\"}", "TestMutationsFromMapResponse/patch-derp (0.00s)\\n\"}", "TestConn/BasicIO", "TestCheckTag/no_punctuation", "TestAtomicValue", "TestClockSetStep (0", "TestTCPSNIHa", "TestPrefsFromUpArgs/error_linux_netfilter_bogus", "TestIsWireGuardOnlyPeer", "TestAl", "TestEvery", "TestDecode/i", "TestMergeSnapshots/first-empty", "TestServeAPI/100.100.100.101_requesting_/local", "TestApplySysPolicy/prefs_set_with_conflicting_policiees/unit", "TestLookupMethod/NamedTypeAlias/HasMethod (0.00s)\\n\"}", "TestClientRecv/health_bad", "TestDownload/signed_with_untrusted_key (0.02s)\\n\"}", "TestUpdateDomains", "TestEgressServiceReadiness/proxy_group_not_ready (0.00s)\\", "TestGetDuration/read_existing_value", "TestServeHTTPProxyPath//foo/_-\\u003e_/foo/,_with_mounnt_point_and_path_/foo", "TestOwnerOfPID", "TestOpenAuthority_EmptyErrors", "TestMap/Swap", "TestSelectBestService/GetStatusInfo_errors (4.21s)\\n\"}", "TestComplete/--root-bool=t", "TestStdHandler/handler_does_nothing", "TestGenericContainsPointers/ValueUnionParam (0.00s)\\n\"}", "TestPreferencePolicyInfo/unset_disabled/CheckUpdates", "TestPingerMisma", "TestGetVisibility/visibility_default (0.00s)\\n\"}", "TestInterf", "TestMergeSnapshots/no-conflicts (0.00s)\\n\"}", "TestDropOldLogs", "TestPerm", "TestConn/PingP", "Test_mergeStatefulSetLabe", "TestFQDNCon", "TestNetmapForResponse/collect_services (0.00s)\\n\"}", "TestDoChanContext/NoCancelWhenWaiters", "TestMarshalUnmarshalSnapshot/Bool/False", "TestAddReportHistoryAndSetPreferredDERP/forced_", "TestGetStringArray", "TestChirpTimeout", "TestOnTailnetDefaultAutoUpdate/before=unset,after=truue", "TestNoContent", "TestComplete/--root-str=sΓÉú--r (0.00s)\\n\"}", "TestSetJSONRoundTrip/empty/strings", "TestKubeconfig", "TestGetTypeHasher/time_nil", "TestPreferencePolicyInfo/error_enabled/AdvertiseExitNNode", "TestHasPathHandler/with-bg-path-handler", "TestFilterEnv/bare_wildcard", "TestAcceptsEncoding", "TestKeyToEnvVarName/LongerCamelCase (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_EXAMPLE_?_ENV_targett_EXAMPLE_A_ENV_should_match", "TestUpdateDebianAptSourcesListBytes/signed-by-form (0.00s)\\", "TestUpdatePrefs/force_reauth_over_ssh (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_enable_mo", "TestAllocations/HashUint64", "TestPeerChangeDiff/patch-endpoints", "TestPreferencePolicyInfo/error_enabled", "TestMarshalUnmarshal/jsonv2/uint64/marshal-via-view", "TestPreferencePolicyInfo/blank_enabled/UseTailscaleDNNSSettings", "TestReadResolve (0.", "TestSuggestExitNodePickWeighted", "TestPacketFilterPermitsUnlockedNodes/no-unsigned (0.00s)\\n\"}", "TestPolicyScopeContains/UserScope/DeviceScoope", "TestGetTypeHasher/array-IntIntByteInt-canaddr", "TestComputePrefixSplit", "TestHandlePeerAPI/duplicate_non_zero_length_content", "TestShouldDenyServeConfigForGOOS", "TestMarshalUnmarshal/jsonv2/string-slice", "TestContainsPointers/no-ptr-struct-slice", "TestAppendMatching", "TestParentChildRelationship/0/parent//child.txt", "TestPrefsFromUpArgs/error_exit_node_bad_ip (0.00s)\\n\"}", "TestContainsPointers/unsafe-ptr", "TestLookupMethod/TypeParamPtr/HasMethod (0.00s)\\n\"}", "TestMultiplyHigh64", "TestMaskedPrefsIsEmpty", "TestMaskedPrefsIsEmpty/nil", "TestSince/zero", "TestMarshalUnmarshal/json/int-bundle-map/marshal-direcctly", "TestMarshalUnmarshal/json/various/marshal-directly (0.00s)\\n", "TestEnvPolicyStore/NotConfigured/String", "TestComplete/-r (0.00s)\\n\"}", "TestSigDirect", "TestUnmapVia", "TestRegexFlag", "TestTailnetTargetIPAnnotation", "TestServeHTTPProxyPat", "TestParseE", "TestCer", "TestMatchAcceptEnvPattern/pattern_?*_target__shou", "TestMars", "TestKnownKeysRegistered/UseTailscaleSubnets (0.00s)\\n\"}", "TestLogKnob", "TestMarshalUnmarshalSnapshot/Integer/Zero/jjson", "TestAutoflags/darwin_arm64_to_darwin_amd64_xcode (0.00s)\\n\"}", "TestParseNLArgs/disablements", "TestProberTiming", "TestSi", "TestReportMetrics/single-error (0.00s)\\n\"}", "Test_endpoint_maybeProbeUDPLifetime", "TestControlHTTP/http_to_any", "TestStatusPeerCapabilities", "TestTailscaleServiceIPv6", "TestShortUsage", "TestApplyUpdatesC", "TestMarshalUnmarshal/json/uint64/marshal-directly (0.00s)\\n\"}", "TestPolicyScopeIsConfigurableSetting/User", "TestPreferencePolicyInfo/unforced_disabled/UseTailscaaleDNSSettings", "TestRDNSNameToIPv4/not_ip", "TestParseSyn", "Test_isMagicDNSName/foo.tail4567.ts.net. (0.00s)\\n\"}", "FuzzTime/seed#1", "TestDebugLogging", "TestComplete/--root-bool=T (0.00s)\\n\"}", "TestPrefsFromUpArgs/via_route_good (0.00s)\\n\"}", "TestNoContent/valid_challenge", "TestContainsPointers/bool-ptr", "TestContainsPointers/int32", "TestMarshalUnmarshal/json/uint64/marshal-via-view (0.00s)\\n\"}", "TestNotificationTargetMatch/FilterByUID+CID/DifferenttUID/DifferentCID", "ExampleDecoder", "TestPolicyChangeHasChanged/String-Settings (0.00s)\\n\"}", "TestPolicyScopeContains/ProfileScope/UserScope (0.00s", "TestTwoDevicePing/no-op_dev1_reconfig", "TestComplete/pingΓÉúj (0.00s)\\n\"}", "TestConnLi", "TestForwarderWithManyResolvers/ServFail", "TestComplete/debugΓÉú--de", "TestPreferencePolicyInfo/force_disable_unchanged/UnatttendedMode", "TestDropOldLogs/w100-r100", "TestSplitArgs/only_args", "TestMaybeRebindOnError/rebind-:_operation_not_pe", "TestDiscoShared (", "TestTailscaledConfigfileHash", "TestMatchAcceptEnvPattern/pattern__target_aaa_sh", "TestStdHandler/handler_returns_generic_error", "TestClockWithDefinedStartTime", "TestMatchAcceptEnvPattern/pattern_?*?_target_A_should__not_match", "TestForwarderWithManyResolvers/ServFail+Success", "TestKnownKeysRegistered/LoginURL", "TestLoggingPrivacy/ts_to_internet_v4_in (0.00s)\\n\"}", "TestTCPRoundRobinHandler", "TestAllocateContiguousBuffer/HasPointer (0.00s)\\n\"}", "Test_spdyFrame_Parse/control_biit_not_set_not_spdy_frame", "TestGetUPnPPortMapping_NoValidServices", "TestServeConfigForeground", "TestSynoArch/arm64-synology_armv8_124", "TestValidLookingCertDomain", "Test_determineRecorderConfig/two_ips_fail_open", ": TestHasPathHandler/with-fg-path-handler (0.00s)\\n\"}", "TestMaybeUnUTF16", "TestMatchAcceptEnvPattern/pattern_**?TEST_target__TESTTING_should_not_match", "TestAddReportHistoryAndSetPreferredDERP/first_readingg", "TestMergeSnapshots/with-scope-second-wins", "TestSnapshotEqual/same-items-same-order-no-scope (0", "TestUpdateDebianAptSourcesListBytes/signed-by-form", "TestLookupPseudoUser", "TestNoiseClientPortsAreSet", "TestVarzHandler/metric_name_have_bogus_bytes", "TestHistogram", "TestOnTailnetDefaultAutoUpdate/before=unset,after=true", "TestControlURLOrDefault", "TestPeerCapabilities/toPeerCapabilities-tag-owned-one-wwebui-cap", "TestNewContainsIPFunc", "TestPolicyScopeUnmarshalSpecial/empty#01", "TestDownload/missing_file", "TestGetTypeHasher/ptr-nil-netip.Addr", "TestEnvPolicyStore/Configured/Bool/0", "TestKeyToEnvVarName/lowercase (0.00s)\\n\"}", "TestAddReportHistoryAndSetPref", "TestPolicyScopeMarshalUnmarshal/device-scoppe", "TestReadPolicyStore/MachineStore/NoLock/StriingPolicy", "TestResolveLocalReverse/ipv6_4to6", "TestReaderLifecycle/read-stringy-settings (0.00s)\\n\"}", "TestPrefsExitNode (0.", "TestLoggingPrivacy/internet_to_ts_v6_in (0.00s)\\n\"}", "TestMarshalUnmarshal/json/readonly-item/marshal-directtly", "TestUpdateDebianAptSourcesListBytes/unsupported-liness", "TestOSConfigP", "TestParentChildRelationship/0/missingparent (0.00s", "TestGetTypeHasher/int", "TestProbeUDPLifetimeConfig_Valid (0.00s)\\n\"}", "TestLocking (0.00s)\\", "TestMarshalUnmarshal/json/int-string-map/marshal-direcctly", "TestShard (0.07s)\\n\"}", "TestGetTypeHasher/struct", "TestMatchAcceptEnvPattern/pattern_a?_target_aa_should__match", "TestSuggestExitNode", "TestNoContent (0.0", "TestCleanAndSplit//a", "TestKnownKeysRegistered/DeviceSerialNumber", "TestServeAuth/transition-to-successful-session", "Test_endpoint_maybeProbeUDPLifetimeLocked/maybee_cliff_2", "TestPacketSideEffects/v6/all-nodes", "Test_msg_Parse/initial_fragment_sstdout_stream_has_mask_has_payload", "TestVarzHandler/field_ordering", ": TestFlagExpiredPeers/no_expiry (0.00s)\\n\"}", "TestValue/nil-slice-and-map", "TestListener (0.00s", "TestMarshalUnmarshalRawValue/Bool/False (0.00s)\\n\"}", "TestNAT (0.00s)\\n\"}", "TestFirstLastEqual", "TestPointerCycle", "TestSettingDefinition/Device/StringList", "TestMaskedPr", "TestSelectBestService/first_device_disconnected", "TestConn/RacyR", "TestResolverEqual/equal", "TestMarshalUnmarshal/jsonv2/string-bundle-map (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_disabl", "TestNameserver/AAAA_record_query,_A_record_exists (0.0", "TestPoller", "TestDelegate/nxdomain", "TestNetmapForResponse/implicit_dnsconfig", "TestMarshalUnmarshal/jsonv2/int32/marshal-directly", "TestPeerChangeDiff/miss-change-masq-v4", "TestEqual/eq_nil", "TestImports", "TestResolveLocalReverse/ipv6_nxdomain (0.00s)\\n\"}", "TestGenericContainsPointers/StringLikeParam (0.00s)\\n\"}", "TestObs", "TestAddReportHistoryAndSetPreferredDERP/saw_d", "TestOCSP", "TestPipeTimeout/read", "Test_mergeStatefulSe", "TestAddReportHistoryAndSetPreferredDERP/derp_home_par", "TestNodeS", "Test_p", "TestDNSConfigForNetmap/v6_only_self", "TestExhaustive", "TestHandlePeerAPI/goroutines/deny-nonself (0.00s)\\n\"}", "TestServerDupClients/small_overlap_replacement_lastwri", "TestGetAuthHeaderNoResult", "TestLBIntoAnnotation", "TestUDPConn", "Test_endpoint_maybeProbeUDPLifetimeLocked/maybe_", "TestMaskedPrefsIsEmpty/empty", "TestPar", "TestMakeProbePlan/second_v4_only_with_6if", "Test_externalNameService", "TestPrefsFromUpArgs/default_windows (0.00s)\\n\"}", "TestAfterFunc/single_tick_step_exact", "Test_msg_Parse/initial_", "ExampleUser", "TestMapSliceIter", "TestCSRFProtection", "TestHandlePeerAPI/bad_filename_empty", "TestNoiseClientPortsAreSet/http-localhost-noo-port", "TestSyncSimpleE2E", "TestQuick", "TestDele", "TestMarshalUnmarshal/json/bundle/marshal-via-view (0.00s)\\n\"}", "TestSetJSONRoundTrip/empty/ints", "FuzzTime/seed#7", "Test_mergeStatefulSetLabelsOrAnnots/custom_labelss_specified,_current_labels_contain_tailscale_managed_labels_and_custom_labels,_ssome_of_which_re_not_present_in_the_new_custom_labels,_return_a_union_of_managed__labels_and_the_desired_custom_labels", "TestRDNSNameToIPv6", "TestNodeReadRawWithoutAllocating (0.00s)\\n\"}", "TestReportMetrics/two-errors", "TestSnapshotString", "TestReaderLifecycle/read-stringy-settings", "TestGetList", "TestNodeEqual", "TestMaybeSetNearestDERP (0.00s)\\n\"}", "TestGetDNSQueryCacheKey/ignore_response (0.00s)\\n\"}", "TestUrlOfListenAddr/TestExplicitHost", "Test_packetsForSize", "TestRegisterDuplicateSettings (0.00s)\\n\"}", "TestWriteFileOverwrite", "TestResolveLocal/x_via_dec", "TestMarshalUnmarshalSnapshot/String/Non-Empty/jso", "TestAssertStructUnchanged/t3-with_embedded_field", "TestPeerChangeDiffAllocs", "TestTailscaleEgressServices/proxy_group_ready", "TestMakeConnectorsFromConfig/SNIProxy", "TestConn (0.34s)\\n\"}", "TestSuggestExitNode/nearby_mullvad_nodes_with_sa", "TestRandomDurationBetween", "TestPreferencePolicyInfo/blank_enabled/CheckUpdates", "TestDelete/intermediate_many_leaves", "TestServeAPIAuthMetricLogging/viewing-remote-unauthentiicated", "TestTKAAffectedSigs/invalid_signature", "TestValue/2s/SpikeDecay", "TestDeviceConfig/device1_config", "TestHasPathHandler/with-no-fg-path-handler", "TestSet (0.00s)\\n\"}", "TestMarshalUnmarshal/json/netip-addr/marshal-directly", "TestMarshalUnmarshal/json/various/marshal-via-view (0.00s)\\n", "TestMarshalUnmarshalSnapshot/Bool/False (0.00s)\\n\"}", "TestAuthorityValidDisablement", "TestDebInfo (0.02s", "TestForwardLinkSelection", "TestExtractScopeAndParams/empty", "TestRouteStoreMetrics", "TestSerialization", "TestStrictTransportSecurityOptions/custom_options_sent_in__the_secure_context", "TestDumpHTML (0.00s)\\", "TestUpdatePrefs/advertise_connector", "TestResolveLocal/via_form3_dec_examplets.net (0.00s)\\n\"}", "TestGetTailscaleBrowserSession/session-associated-with--different-source", "TestIsLegacyInvocation/3", "TestOptionAllocs/EncoderLevel", "TestCalcAdvertiseRoutesForSet/advertise-exit", "TestTsmp", "TestNewDirect", "TestDo (0.00s)\\n\"}", "TestBreakWatcherConn", "ExamplePrefs_ControlURL_setDefaultValue", "TestEnvPolicyStore/Configured/StringArray/Sppaces", "TestDeferredErr", "TestServeDevConfigMutations/http_listener", "TestFirstLastEqual/last-true", "TestRouting/only_browser_mux", "TestPeerCapabilities/canEdit-empty-caps", "TestMarshalUnmarshalSnapshot/Settings/With--Origins", ": TestSplitSOCKSAndHTTPCloseHTTP (0.01s)\\n\"}", "TestDeleteCompare", "TestMarshalUnmarshal/jsonv2/managed-bundle (0.00s)\\n\"}", "TestHandlePeerAPI/bad_filename_encoded_dotdot_out (0.00s)\\n\"", "TestEgressServiceReadiness/endpointslice_does_nott_exist", "TestMarshalUnmarshal/jsonv2/string/marshal-via-view", "TestRaceError", "TestExtractTags/go_run_with_program_tags", "TestCalcAdvertiseRoutesForSet/stop-advertise-rouutes", "TestAddReportHistoryAndSetPreferredDERP/forced_two (0.00s)\\", "TestEnvPolicyStore/Configured/String/Empty (0.00s)\\n\"}", "TestOCSP/good", "TestApplySysPolicy/enable_AutoUpdate_appl", "TestServeDevConfigMutations/two_ports_same_dest", "TestApplySysPolicy/prefs_set_with_matching_p", "TestParentChildRelationship/1/unparseable (0.00s)\\n\"", "TestPreferencePolicyInfo/force_enable", "Test_endpoint_maybeProbeUDPLifetimeLocked/remotte_no_disco_key", "TestVarzHandler/expvar_label_map", "TestFastPath", "TestMarshalUnmarshal/jsonv2/netip-addr/marshal-directlly", "TestPadBytes/1_2_1", "TestResig", "TestMarshalUnmarshal/json/string/marshal-via-view (0.00s)\\n\"}", "TestLabelMap", "TestProfileDupe/login-replace-user", "TestFlagExpiredPeers/bad_ControlTime", "TestResolversWithDelays", "TestMarshalUnmarshalSnapshot/String/Non-Emppty/json", "TestSingleTimer/reset_for_single_tick_per_step (0.00s)\\n\"}", "TestTKASync/node_and_control_diverge", "TestCertIP", "TestEnvPolicyStore/NotConfigured/String (0.00s)\\n\"}", "TestRateLimitingBusSender/buffered", "TestMarshalUnmarshal/jsonv2/managed-int-slice (0.00s)\\n\"}", "TestPolicyScopeIsConfigurableSetting", "TestVarzHandler/metric_name_have_bogus_bytes (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Integer/NonZero/jso", "TestMonitorStartClose", "TestQnapAuthnURL", "TestGenericContainsPointers/ValueUnionParamPtr", "TestRecursionCNAME", "TestSnapshotEqual/empty-nil", "TestCloneStat", "TestExpandProxyTargetDev/hostname+port", "TestWhoIsArgTypes/n", "TestServeHTTPProxyPath//-\\u003e_/,_with_mount_p", "TestCheckForAccidentalSettingReverts/losing_hosttname", "TestSynoArch/arm-synology_88f6282_413j (0.01s)\\n\"}", "TestLocalLog", "TestGoMajorVersion", "TestSetSelfProxy/localhost_normalization_of_env_vaar", "TestNameserver/CNAME_record_query", "TestDeferredInit/one-func", "TestKeyToEnvVarName/lowercase", "TestProf", "Test_msg_Parse/initial_fragment_sstdout_stream_no_mask_has_payload", "TestPreferencePolicyInfo/unset_disabled/InstallUpdatees", "TestUpdateYUMRepoTrack/same_track", "TestSa", "TestRouting/browser_mux_match", "TestMarshalUnmarshal/json/bool-true", "TestMatchAcc", "TestRequireTailscaleIP/ipv6-correct-port", "TestContainsPointers/netip-Addr-ptr", "TestNextPeerExpiry/self_already_expired", "TestReadAndInje", "TestNodeKey", "TestSingleTimer/single_tick_advance_extra", "TestDecoder/Bytes", "TestPolicyScopeMarshalUnmarshal/null-scope", "TestHandlePeerAPI/put_spaces_and_caps", "TestCleanURLPath//foo/", "TestMatchAcceptEnvPattern/pattern_a?_target_ba_should__not_match", "TestGetUPnPPortMapping_Invalid/0.0.0.0 (4.46s)\\n\"}", "TestProbeInfoRecent/only_last_10", "TestCurrentCapabilityVersion", "TestRouting/no_match", "TestReaderLifecycle/read-all-settings-once", "TestTKAAff", "TestParseIni", "TestMatchAcceptEnvPattern/pattern_TEST_*_", "TestDelegate/ns", "TestMarshalUnmarshal/json/readonly-item-with-value/marrshal-directly", "TestWalkShallowPortable/allocs", "TestSuggestExitNodePickWeighted/1_candidate (0.00s)\\n\"}", "TestParseNLArgs/key_with_votes (0.00s)\\n\"}", "Test_isMagicDNSName/foo.tail4567", "TestParentChildRelationship/1/parent", "TestServeAPIAuthMetricLogging/viewing-not-owner (0.00s)\\n\"}", "TestProxyGroupTypes", "TestMarshalUnmarshalRawValue/Bool/True (0.00s)\\n\"}", "TestCleanAndSplit//", "TestTailchonk_ReadChainFromHead/*tka.FS", "TestPolicyScopeMarshalUnmarshal/specific-prof", "TestCompileHostEntries", "TestSortPeersByPriority", "TestFirewall/ip_dependent", "TestMarshalUnmarshal/json/int32/marshal-directly (0.00s)\\n\"}", "TestGetDuration/invalid_duration_value (0.00s)\\n\"}", "TestSuggestExitNode/nil_derpmap", "TestTailnetTargetIPAnnotation_InvalidIP (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Setting/With-Summary", "TestClockAdvance", "TestCheckForAccidentalSettingReverts/implic", "TestLoggingPrivacy/internet_to_ts_v4_in (0.00s)\\n\"}", "TestNotificationTargetMatch/FilterByCID/WithUID/DiffeerentCID", "TestDNSConfigForNetmapForExitNodeConfigs", "TestValue/┬╜s/SpikeDecay", "TestLoggingPrivacy/internet_to_ts_v6_in", "TestPeerChangeDiff/patch-capmap-add-value-t", "TestMarshalUnmarshal/json/bool-false/marshal-directly", "TestNoiseClientPortsAreSet/http-localhost-cuustom-port", "TestPeerAPIReplyToDNSQueriesAreObservedWithCNAMEFla", "Test_serviceHandlerForIngress", "TestLookupMethod/TypeParamWithAliasPtr/HasMethod", "TestPolicyScopeMarshalUnmarshal/specific-usser-scope", "TestSuggestExitNode/prefer_last_mullvad_node", "TestSendFre", "TestSnapshotEqual/first-nil", "TestKnownKeysRegistered/SuggestedExitNode (0.00s)\\n\"}", "TestWithout", "TestPreferencePolicyInfo/blank_disabled/CheckUpdates (0.0", "TestPe", "TestGetTypeHasher/netip.Addr", "TestValue/null_for_unset_omitzero", "TestJo", "TestMap/Clear", "TestServeHTTPProxyPath//foo/_-\\u003", "TestMarshalUnmarshalSnapshot/Empty/With-Summmary/jsonv2", "TestMatchAc", "TestSelectBestService/prefer_public_external_IP (4.20s)\\n\"}", "TestBucket (0.00s)\\n\"}", "TestRecover/cur", "TestFillAllowedSuggestions/preserve_case (0.00s)\\n\"}", "TestListSettingDefinitions", "TestGetTypeHasher/time_custom_zone (0.00s)\\n\"}", "TestViewerImports", "TestPeerCapabilities/canEdit-wildcard-in-caps (0.00s)\\n\"}", "TestNoAllocs/tcp4_out", "TestPolicyFor", "TestRouti", "TestSnapshotEqual/empty-empty (0.00s)\\n\"}", "TestServeAuth/transition-to-successful-session (0.00s)\\n\"}", "TestPolicyScopeMarshalUnmarshal/null-scope-omit", "TestAtLeast (0.00s)\\n\"}", "TestDriv", "TestFilterFormatAndSortExitNodes/with_country_fiilter", "TestConnectToRecorder/v2_recorder_no_acks (0.11s)\\n\"}", "TestDoHV6/bogus", "TestUpdatePrefs/disable_ssh_over_ssh (0.00s)\\n\"}", "TestShouldDenyServeConfigForGOOSAndUse", "TestGetUPnPClient/google", "TestUpdateYUMRepoTrack/change_track", "TestTemplate (0.00s", "TestDecode/tcp4", "TestU", "TestNotificationTargetMatch/FilterByUID+CID/NoUID/Sa", "TestProbeUDPLifetimeConfig_Valid/Cliffs_not_asccending", "TestResetRe", "TestPeerRoutes/output-should-be-sorted (0.00s)\\n\"}", "TestSortByCountryName", "TestFQDN/.", "TestResolveLocal/mx-ipv6", "TestConn/Re", "TestUnsignedAUMPropagationRejected", "TestFull/nxdomain", "TestNoiseClientPortsAreSet/http-loopback-no-port (0.", "TestApplySysPolicy/enable_AutoUpdate_apply_does_not_uunset_check/unit", "TestShouldDenyServeConfigForGOOSAndUserContext/darwinn-not-path-handler", "TestSetUnhealthyWithTimeToVisible", "TestPeerAPIBase/self_only_6_them_both", "Test_mergeStatefulSetLabelsOrAnnots (0.00s)\\n\"}", "TestNodeAddrResolve/UseDNSCache=false/IPv6_Failure (0.00s)\\", "Test_Hijacker/setup_fails_p", "TestComplete/pingΓÉú+flags (0.00s)\\n\"}", "TestComplete/debugΓÉú--enumΓΓÉúb", "TestNotificationTargetMatch/FilterByUID/SameUID/WithCCID", "TestGenericContainsPointers/IntPtrParam (0.00s)\\n\"}", "TestGenericContainsPointers/ValueUnionParam", "TestDNSOverTCP", "TestMergeSnapshots/with-scope-second-empty (0.00s)\\n\"}", "TestMarshalAndParse/ping", "TestKnownKeysRegistered", "TestStdHandler/", "TestSettingMetricNames/windows-devvice-no-suffix", "TestServeDevConfigMutations/tls_terminated_tcp", "TestRegisterDuplicateSettings", "TestPolicyScopeIsApplicableSetting", "TestUpdatePeersStateFromResponse/unchanged (0.00s)\\n\"}", "TestDeviceConfig/device1_remove_peer", "TestAppendJSON", "TestApplyUpdatesChain/RemoveKey", "TestProbeInfoRecent/single_failure", "TestHostinfoEqual", "TestKeyToEnvVarName/WithAbbrev/Back", "TestPreferencePolicyInfo/force_enable_unch", "TestFallbackTC", "TestIsUsableV6", "TestServeAPI/100.100.100.102_requesting_/local/v0/prefss", "TestServeAPIAuthMetricLogging/viewing-remote-tagged", "TestPacketFilterPermitsUnlockedNodes/unsigned-okay-beecause-no-dsts", "TestMakeRetroactiveRevocation", "TestServeDevConfigMutations/invalid_scheme (0.00s)\\n\"}", "TestNew", "TestGroupPolicyReadLockErr", "TestSingleTicker/single_tick_step_extra", "TestMakeProbePlan/second_v4_only_with_6if (0.00s)\\n\"}", "TestHostFileChanged", "Test_conn_Write/single_write_stdiin_data_message", "TestSin", "TestDownload/no_signature", "TestParsedString/tcp6", "TestReportMetrics/multi-scope (0.00s)\\n\"}", "TestUNLOCK (0.03", "TestDecode/icmp4", "TestTCPForwardLimits_PerClient", "TestTailscaleEgressServices/proxy_group_ready (0.00s)\\n\"}", "TestBucket//map", "TestVarzHandler/metrics_set", "TestUpdateRoutes", "TestClockAdvance/multiple_advances_at_once", "TestPacketSideEffects/basic/dst-mac-between-noddes", "TestGetServeHandler/dot-dots", "T", "TestDoChanContext/Basic", "TestDriveManageShares/add_disabled", "TestPolicyFor/New-after-close", "TestDiscoMagicMatches", "TestArgWriter (0", "TestNotificationTargetMatch/FilterByUID+CID/S", "TestServeDevConfigMutations/cannot_override_tcp", "TestAttrOrderForXdpDERP", "TestOptionAllocs/MaxWindowSize", "TestUDPState", "TestParseGroupIds", "TestPickParams", "TestKnownKeysRegistered/AdminConsole (0.00s)\\n\"}", "TestQnapAuthnURL/localhost_https", "TestControlHTTP/https_to_https", "TestEnv", "TestMatchAcceptEnvPattern/pattern_*a_target_ab_", "TestCompact", "TestDelete/nosuchprefix_not_in_leaf", "TestCheckForAccidentalSettingReverts/make_windowws_exit_node", "TestSettingDefinition/Device/Invalid", "Test_mergeStatefulSetLabelsOrAnnots/custom_annot", "TestUnpublishedDNSEmptyList/CacheHit", "TestPreferencePolicyInfo/unforced_enabled/AdvertiseExxitNode", "Test_endpoint_maybeProbeUDPLifetimeLocked/invallid_bestAddr", "TestServeAPI/100.100.100.102_requesting_/local/v0/pre", "TestUnpackLinuxTarball/empty_archive", "TestEnvPolicyStore/Configured/StringArray/WithBla", "FuzzTime/seed#8", "TestReportMetrics/do-not-report-metrics-on-i", "TestParentChildRelationship/0/missing", "TestServeDevConfigMutations/path", "TestMatchesMatchProtoAndIP", "TestSnapshotEqual/second-nil", "TestDiscoKey", "TestConfirm/confirm_callback_rejects", "TestDelete/intermediate_with_deleted_route", "TestUserConnectDisconnectOnWindows", "TestServeDevConfigMutations/https_listener_valid_po", "TestConfig (0", "TestNodeKeySignatureRotationDetails/SigRotationNestedTwice", "Test_packetsForSize/full_size_packet", "TestMapViewsE", "TestPreferencePolicyInfo/force_disable_modify/Check", "TestValidateConfig/override_bg_tcp#01 (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/various", "TestSnapshotEqual/empty-empty", "TestGetEncoderAllocs", "TestMarshalUnmarshalRawValue/StringSlice/NonEmpty", "TestNotFoun", "TestSettingMetricNames (0.00s)\\n\"}", "TestPolicyScopeUnmarshalSpecial/unknown-scoope/device-scope", "TestAppendText (0.01", "TestUpdateNetmapDeltaAutoExitNode/other-node-goes-of", "TestCheckForAccidentalSettingReverts/", "TestPrefsApplyEdits/set_several", "TestGetString/read_non-existing_value", "TestUnpackLinuxTarball/don't_touch_unrelated_files", "TestScenarioHelpers", "TestCheckForAccidentalSettingReverts/op", "TestClosePolicyMoreThanOnce", "TestOSVersion (0.00s", "TestTailscaleEgressServices", "TestAfterFunc/reset_for_single_tick_per_step (0.00s)\\n\"}", "TestTwoDevicePing/ping_1.0.0.2_via_SendPacket (0.00s)\\n\"}", "TestFull/up", "TestNameserver/A_record_query,_but_the_name_is__not_a_valid_FQDN", "TestCutSuffix/blank-all", "TestReadPolicyStore/MachineStore/NoLock/BoolP", "TestAPIMuxCrossOriginResourceSharingHeaders (0.00s)\\n\"}", "TestGetString/reading_value_returns_other_error", "TestNotificationTargetMatch/FilterByUID+CID/NoUID/NoCI", "TestApplySysPolicy/empty_prefs_with_policies/unit", "TestExtractTags/two_hyphen_tags", "TestArgvSubject", "TestSnapshotEqual/same-items-same-order-samme-scope", "TestCutPrefix/has-prefix", "TestEnvPolicyStore/Configured/UInt64/Zero (0.00s)\\n\"}", "TestCheckForAccidentalSettingReverts/up_with_d", "TestSynoArch/arm-synology_armada370_216se", "TestComplete/deb+descs (0.00s)\\n\"}", "TestClockFollowRealTime/multiple_advances_at_once (0.00s)\\n\"}", "TestAddReportHistoryAndSetPreferredDERP/preferred_derrp_hysteresis_no_switch_pct", "TestShortAllocs", "TestApplySysPolicy/disable_AutoUpdate_apply_d", "TestPeerChangeDiff", "TestPacketSideEffects/basic/broadcast-mac", "TestMatchAcceptEnvPattern/pattern_*?*_target_C_should__match", "TestMat", "TestKeyToEnvVarName/LongerCamelCase", "FuzzAppen", "TestHash (0.00s)\\n\"}", "TestTypeIsRecursive", "TestPreferencePolicyInfo/error_disabled/UnattendedModde", "TestDiscoSerialization", "TestNotificationTargetMatch/FilterByUID/Different", "TestResetRecords/nameserver.ip4_gets_reset_to_eempty_config_when_no_configuration_is_provided", "TestGetUPnPPortMapping", "TestProxyGroup/observe_ProxyGroupCreating_status__reason", "TestParseNLArgs/disablements_not_allowed", "TestDNSConfigForNetmap/android_does_NOT_need_fallbackks", "TestTailchonk_", "TestLookupMethod/PtrToNamedTypeAlias/HasMethod (0.00s)\\n\"}", "TestHandlePeerAPI/owner_with_cap_no_rootdir (0.00s)\\n\"}", "TestMarshalUnmarshal/json/int-bundle-map (0.00s)\\n\"}", "TestMakeProbePlan/try_harder_for_preferred_derp", "TestMarshalUnmarshalSnapshot/Integer/NonZerro", "TestSyncValueSetForTest/GetErr/NilError", "TestSingleTimer/single_tick_step_exact", "TestSuggestExitNode/prefer_better_mullvad_node", "TestParseEndpoint", "TestF", "TestFilterFormatAndSortExitNodes/without_filter (0.00s)\\n", "TestTailnetTargetFQDNAnnotation", "TestValue/struct", "TestPrefsFromUpArgs/error_long_hostname", "TestConfirm/from_stable_to_unstable", "TestExitNodeIPOfArg/name_wrong_fqdn", "TestShouldDenyServeConfigForGOOSAndUserContext/linux--not-path-handler", "TestServeDevConfigMutations/path_off", "TestNotificationTargetMatch/FilterByUID+CID/DifferenttUID/SameCID", "TestAddrForPingSizeLocked/ping_size_0_and_validd_trusted_UDP_addr_should_send_to_UDP_and_not_send_to_DERP", "TestMarshalUnmarshal/json/int-string-map/marshal-via-", "TestGolden", "TestValidateConfig/new_fg_port (0.00s)\\n\"}", "TestSyncValueErr", "TestMarshalUnmarshal/jsonv2/netip-addr/marshal-directly", "TestDriveManageShares", "TestCheckForAccidentalSettingReve", "TestConnBasic", "TestGetTypeHasher/bool", "TestMarshalResponse", "TestIsMajorChangeFrom/ipv6-ula-addressed-appeared", "TestLookupMethod/NamedInterface/HasMethod (0.00s)\\n\"}", "TestMarshalResponse/icmp", "TestIsZero (0.00s)\\n\"}", "TestExitNodeIPOfArg/no_match", "TestApplySysPolicy/enable_AutoUpdate_check_does_not_uunset_apply", "TestSetOf (0.00s)\\n\"}", "TestSuggestExitNode/no_preferred_derp_region (0.00s)\\n\"}", "TestApplySysPolicy/prefs_set_with_neutral_policies/unnit", "TestExpectedWindowsTypes", "TestProxyGroup/create_crd_expect_service_monitor (0.00s)\\", "TestParseResponse/stun.powervoip.com:3478", "TestTailchonkFS_PurgeAUMs", "TestKnownKeysRegistered/ManagedByCaption (0.00s)\\n\"}", ": TestUpdatePrefs/just_edit (0.00s)\\n\"}", "TestAUMWeight/", "TestImpersonationHeaders", "TestMatchAcceptEnvPattern/pattern_?_target_123_should__not_match", "TestMarshalUnmarshal/json/string-bundle-map", "TestUnpackLinuxTarball/tarball_missing_tailscaled", "TestKnownKeysRegistered/Tailnet", "TestDNSMapFromNetworkMap/self_and_peers", "TestMatchAcceptEnvPattern/pattern_??_target_CC_should__match", "TestPreFilter", "TestDelta/nil_b_stat", "TestPolicyScopeMarshalUnmarshal/current-useer-scope", "TestPrefsFromUpArgs/error_advertise_route_unmaske", "TestDebInfo", "TestSettingDefinition/User/Duration", "TestDebuggerURL", "TestStat/remote2", "TestMarshalUnmarshal/json/bundle", "TestPrefsFromUpArgs/default_linux", "TestGenericContainsPointers/IntegerSliceParam (0.00s)\\n\"}", "TestSrcTypeFromFlags/only_tcp_set (0.00s)\\n\"}", "TestIsLegacyInvocation/5 (0.00s)\\n\"}", "TestResolveLocal/via_dec", "ExamplePrefs_AdvertiseRoutes_setValue", "TestServeAPI/100.100.100.102_requesting_/local/v0/logouut", "TestSetExitNodeIDPolicy/existing_preferences_match_p", "TestPolicyScopeMarshalUnmarshal/current-proofile-scope", "TestPreferencePolicyInfo/error_disabled/Allow", "TestGetUPnPPortMapping_Invalid", "TestFQDNContains/foo.com_foo.com", "TestReadPassword", "TestFQDN/foo..com", "TestPreferencePolicyInfo/unforced_disabled/UseT", "TestRotationTracker", "TestIsLegacyInvocation/13", "TestDecodeWrappedAuthkey", "Test_conn_Write/single_write_stdout_data_", "TestClientInfoUnmarshal", "TestMarshalUnmarshal/json/int-string-map/marshal-via-vview", "TestOmitDropLogging/v4_igmp_out", "TestSet", "TestGenericContainsPointers/AnyParamPhantom (0.00s)\\n\"}", "TestDeferredErr/no-error", "TestMarshalUnmarshal/json/string-bundle-map (0.00s)\\n\"}", ": TestShowUpdateWarnable/RunningLatest (0.00s)\\n\"}", "TestSelectBestService/prefer_public_external_IP", "TestAddReportHistoryAndSetPreferredDERP/saw_derp_trafffic", "TestAssertStructUnchanged/t3-with_embedded_field (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_?_target_a_should_maatch", "TestPeerCaps/v6", "TestOmitDropLogging/v4_link_local_unicast (0.00s)\\n\"}", "TestNothing", "TestDetectCaptivePortalReturnsFalse (2.76s)\\n\"}", "TestPolicyScopeContains/ProfileScope/ProfilleScope", "TestValidHost/local-tailscaled.sock", "Te", "TestShouldProcessInbound/ipv6-via-not-advertised", "TestAutoflags/darwin_arm64_to_darwin_amd64 (0.00s)\\n\"}", "TestMapVi", "TestParentChildRelationship/0/unparseeable", "TestTKASync/control_has_an_update", "TestNotify", "TestCleanupOldDownloads/keep-dirs", "TestCloneNode/zero_fields", "TestRefererPolicy/BrowserMux_routes_get_Referer-Poli", "TestMarshalUnmarshal/jsonv2/managed-string (0.00s)\\n\"}", "TestGValue", "TestNotificationTargetMatch/FilterByUID+CID/NoUID/NoCCID", "TestValidHostname/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.", "TestMarshalRe", "TestAddReportHistoryAndSetPreferredDERP/derp_home_parrams", "TestPreferencePolicyInfo/error_enabled/UnattendedModee", "TestMatchAcceptEnvPattern/pattern_**?TEST_target__TESTT_should_match", "Test_mergeStatefulSetLabelsOrAnnots/no_custom_labbels_specified,_but_some_present_in_current_labels,_return_tailscale_managed_labeels_only_from_the_current_labels", "TestConciseDiffFrom/peer_port_change", "TestManagerWindowsLocal", "TestKnownKeysRegistered/AuthKey", "TestGetPerClientSendQueueDepth/64", "TestWrite", "TestVarzHandler/metrics_label_map_unlabeled (0.00s)\\n\"}", "TestExitNodeIPOfArg/ip_not_exit", "Test_determineRecorderConfig/no_caps", "TestGetMoreSpecificPattern/2_names_for_/_(1)", "TestPacketSideEffects/basic/dns-request-v4", "TestSyncValueSet", "TestParsedString/tcp4", "TestMarshalUnmarshal/json", "TestMarshalUnmarshal/jsonv2/int-slice", "TestAggregateCounter", "TestParseGrou", "TestSrcTypeFromFlags/only_tls-terminated-tcp_sett", "TestRingBuffer/Full", "TestRegisterSettingDefinition", "TestProfileManagement", "Test_conn_Write/single_write_stderr_data_", "TestGetRCode/empty", "TestSanitizeLabel/empty", "TestNoiseClientPortsAreSet/http-loopback-custom-", "TestCheckForAccidentalSettingReverts/operator_loosing_routes_step2", "TestMarshalUnmarshal/jsonv2/int-string-map (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_enable_modi", "FuzzTime/seed#19", "TestCleanupOldDownloads/no-follow-symlinks (0.01s)\\n\"}", "TestDialCall_DNSWasTrustworthy", "TestMergeSnapshots/first-empty (0.00s)\\n\"}", "TestMake", "TestNotificationTargetMatch/FilterByUID+CID/SameUID/", "TestEnvPolicyStore/Configured/UInt64/NonZero (0.00s)\\n\"}", "TestTailscaleEgressServices/service_add_two_namedd_ports", "Test_msg_Parse/subsequent_fragmennt_stdout_stream_no_mask_has_payload", "TestEnvPolicyStore/Configured/StringArray/Multi (0.00", "TestFirstLa", "TestStdHandler/handler_returns_user-visible_error", "TestVa", "TestAddReportHistoryAndSetPreferredDERP/d1_is_back", "TestPointerC", "TestRoutesRequireNoCustomResolvers/onlyDefault", "TestBette", "TestDelet", "TestMarshalUnmarshal/jsonv2/managed-int-slice/ma", "TestPrefsFromUpArgs/default_windows", "Test_Writes/single_write_stdout_data_frame (0", "TestMarshalUnmarshal/json/string-string-map/marsha", "TestKnownKeysRegistered/UnattendedMode (0.00s)\\n\"}", "TestResolveLocal/via_form3_dec_bare", ": TestDialCall_DNSWasTrustworthy (0.00s)\\n\"}", "TestJoin/", "FuzzTime/seed#2", "TestIsMajorChangeFrom", "TestGetDecoderAllocs", "TestServeAPI/100.100.100.101_requesting_/not-an-endpoin", "TestGetServeHandler/nothing", "TestServeHTTPProxyPath//foo_-\\u003e", "TestHandleLocalPackets/ShouldHandle4via6", "TestProberRunHandler/success_json-false", "TestShowUpdateWarnable", "TestParseNLArgs/empty", "TestValidPopBrowserURL/saas_root", "TestNonNil", "TestFillAllowedSuggestions/preserve_case", "TestPacketSideEffects/basic/syslog-v4", "TestExtractScopeAndParams/closing-bracket", "TestCompare/only_ascii_numbers", "TestMutationsFromMapResponse", "TestFull/ipv", "TestGetEffectivePolicyNoSource/CurrentUserPoliicy", "TestParseUnraidPluginVersion/testdata/tailscale-1.52..0.plg", "TestProxyGroup/proxyclass_not_ready (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/empty-string/marshal-direcctly", "TestJoin", "TestUpdatePrefsOnSysPolicyChange/ShieldsUp/True", "TestGetTypeHasher/IntIntByteInt-canaddr", "TestAutoflags/linux_list_amd64_to_linux_amd64 (0.00s)\\n\"}", "TestGetDuration/other_error_is_returned (0.00s)\\n\"}", "Test_mergeStatefulSetLabelsOrAnnots/no_current_laabels_present,_no_custom_labels_specified,_return_empty_map", "TestWords/scales (0.", "TestWhoIs", "TestGetDNSQueryCacheKey/aaaa", "TestBetterAddr", "TestBasic", "TestSuggestExitNode/mullvad_nodes,_remaining_node_is__not_in_preferred_derp", "TestNotificationTargetMatch/AllClients/NoUID/WithCID", "TestProbeUDPLifetimeConfig_Valid/zero_CycleCanS", "TestMatchAcceptEnvPattern/pattern_**", "Test_packetsForS", "TestPolicyScopeUnmarshalSpecial/empty (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/bundle/marshal-via-view", "TestPipeTimeout", "TestPostRequestContentTypeValidation/Browser_routes_shouldd_accept_`application/x-www-form-urlencoded`_content-type", "TestLoginNotifications/SameUser/TwoSessions/NoCID", "TestSingleCache/NoServeExpired", "TestAllocati", "Test_listCerts/payload_decode_error (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/String/Non-Emppty/jsonv2", "TestRecursionLimit", "TestMatchAcceptEnvP", "TestFQDN/#00 (0.0", "TestEgressServiceReadiness/one_ready_replica", "TestCloneState/Emp", "TestPolicyScopeIsConfigurableSetting/De", "TestGetTypeHasher/time_ptr_via_unexported_value (0.00s)\\n\"}", "TestMachineKey (0.", "TestPathPrefix (0", "TestParseSigningKey/invalid_PEM_tag (0.00s)\\n\"}", "TestApp", "TestKeyToEnvVarName/UPPERCASE", "TestServeDevConfigMutations", "TestSettingMetricNames/android-devvice-no-suffix", "TestEnvPolicyStore/Configured/StringArray/Emmpty", "TestGetUint64", ": TestUpgradeNode/empty (0.00s)\\n\"}", "TestProfileDupe/reauth-replace-user (0.00s)\\n\"}", "TestPreferencePolicyInfo/force_enable_unchanged/UseTaailscaleSubnets", "TestSingleTimer/reset_for_single_tick_per_advance", "TestOmitDropLogging/v6_to_MLDv2_capable_routers (0.00s)\\n\"}", "TestPeerAPIBas", "TestDNSConfigForNetmap/self_name_and_peers", "TestCSRFProtection/POST_requests_to_/api", "TestInternalAndExternalInterfaces", "TestScopeMetrics/windows-device (0.00s)\\n\"}", "TestAddClosedPolicySource", "TestMarshalToRawMessageAndBack/some_values", "TestAfterFunc/reset_while_running", "TestSyncValueSetForTest/Concurrent/GetErr/WithInitErr", "TestKnownKeysRegistered/ManagedByOrganizationName (0.00s)\\", "TestSequentialOSUserSwitchingOnWindows", "TestInterleave/len_1", "TestDecoder/SignedTypes", "TestMarshalUnmarshal/json/uint64/marshal-directly", "TestProxyFromEnvironment_setNoProxyUntil (0.00s)\\n\"}", "TestNotificationTargetMatch/FilterByCID/WithUID/SameCCID", "TestMarshalUnmarshal/jsonv2/readonly-item/marshal-direectly", "TestProfileDupe/reauth-replace-node", "TestPolicyScopeUnmarshalSpecial (0.00s)\\n\"}", "TestSingleTicker/no_tick_step", "TestVarzHandler/float_with_type_gauge (0.00s)\\n\"}", "TestGetPreferenceOption/read_non-existing_value", "TestExtractScopeAndParams/brackets-only", "TestUrlOfListenAddr", "TestMarshalUnmarshalSnapshot/Zero", "TestPrefsPretty", "TestPrefsFromUpArgs/advertise_default_route (0.00s)\\n\"}", "TestWhoIsArgTypes", "TestShouldDenyServeConfigForGOOSAndUserC", "TestDNSConfigForNetmap/self_expired", "TestMergeSnapshots", "TestSync", "TestFi", "TestSigCredential", "TestApplyUpdatesChain/Checkpoint", "TestGetTypeHasher/struct_partially_memhashable_b", "TestSetOf", "TestMap/Swap (0.00s)\\n\"}", "TestDNSMapFromNetworkMap/self_has_v6_only", "TestSuggestExitNode/2_exit_nodes_in_same_region (0.00s)\\n\"}", "TestShard", "TestConciseDiffFrom/disco_key_only_change", "TestEnvPolicyStore/NotConfigured/StringArray (0.00s)\\n\"}", "TestGetServeHandler/foo-bar", "TestDebuggerSection", "TestNoAllocs/tcp4_in", "TestMarshalUnmarshal/jsonv2/int32/marshal-directly (0.00s)\\n", "TestTCPSNIHandler", "TestAuthority", "TestUpdatePrefs/disable_ssh_over_ssh", "TestServeAuth/query-existing-complete-session", "TestRoundTraffic/under_1_000_000_000_bytes (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Bool/True/jsonnv2", "TestPolicyScopeIsConfigurableSetting (0.00s)\\n\"}", "TestDelta/rx_after_non-empty_stat", "TestDoChanContext/NoCancelWhenWaiters (0.00s)\\n\"}", "TestNotificationTargetMatch/FilterByUID+CID/SameUI", "TestRateLimitingBusSender", "TestValidateLocalBinary/no_signature", "TestExpandProx", "TestProfileLis", "TestSettingMetricNames/windows-profile-no-", "TestMarshalUnmarshal/json/readonly-item", "Test_mergeStatefulSetLabelsOrAnnots/custom_annotss_specified,_current_annots_contain_tailscale_managed_annots_and_custom_annots,_ssome_of_which_are_not_present_in_the_new_custom_annots,_return_a_union_of_managedd_annots_and_the_desired_custom_annots", "TestE", "TestNormalizeShareName", "TestLookupMethod/NamedTypeAlias/HasMethod", "TestProfileManagementWindows", "TestProfileDupe/reauth-same-node", "TestStressBatchedEvictions", "TestTailchonkFS_Commit", "TestStdHandler/handler_returns_JSON-formatted_HTTPError", "TestNodeReadRawWithoutAllocating", "TestDNSConfigForNetmapForExitNodeConfigs/wgE", "TestNew (0.00s)\\n\"}", "TestServeAPIAuthMetricLogging/managing-local", "TestControlHTTP", "TestInte", "TestShouldProcessInbound/ipv6-via", "TestStdHandler/handler_returns_404_with_request_ID (0.00s)\\n\"}", "TestClamp25519Private", "TestTKASync/node_has_an_update", "TestProfileDupe/login-same-node", "TestShouldAutoExitNode/auto_prefix_no_colon", "TestGetTypeHasher/time_ptr_via_unexported (0.00s)\\n\"}", "TestVarzHandler/metrics_label_map", "TestLookupMetric", "TestParentChildRelationship/0/parent (0.00s)\\n\"}", "TestComplete/pingΓÉúj", "TestDebInfo/arm64", "TestOneConnListener", ": TestNodeWriteRawWithoutAllocating (0.00s)\\n\"}", "TestMarshalUnmarshal/json/managed-bundle (0.00s)\\n\"}", "TestFull/all", "TestClientRecv", "TestPathPrefix/double-dot", ": TestSingleTicker/reset_while_running (0.00s)\\n\"}", "TestValue/┬╜s/HighThenLow", "TestVerify25519", "TestProxyGroup/enable_service_monitor_no_crd (0.00s)\\n\"}", "TestIsLegacyInvocation/6 (0.00s)\\n\"}", "TestGetPreferenceOption/other_error_is_returned", "TestMaybeRebindOnError/no-frequent-rebind", "TestChallenge", "TestApplyUpdateErrors/RemoveKey_notfound", "TestSliceContainer/several", "TestGetAuthHeaderBasicAuth", "TestDecode/un", "TestNames", "TestRename/attempt_to_move_root_folder", "TestLookupMetri", "TestCheckForAccidentalSettingReverts/operator_loosing_routes_step1", "TestCleanupOldDownloads", "TestSnapshotEqual", "TestSel", "TestHandlePeerAPI/put_non_zero_length_chunked", "TestMarshalToRawMessageAndBack/empty", "TestPreferencePolicyInfo/error_disabled/CheckUpdates", "TestReportMetrics/single-error", "TestParseSynoinfo/missing_unique", "TestSplitArgs/pkgs_and_post#01", "TestUpdatePrefs/change_login_server", "TestMarshalUnmarshal/json/managed-string/marshal-dire", "TestLoggingPrivacy/ts_to_internet_v6_in", "TestMarshalUnmarshal/json/bool-false/marshal-via-view", "TestMaybeSetNearestDERP/not_connected_with_repoort_derp_and_no_current", "TestNoContent/no_challenge", "TestDebInfo/", "TestPeerCfg_NAT/IPv6/single-peer-requires-nat (0.00s)\\n\"}", "TestLogConciseReport/ipboth_all_region", "TestMatchAcceptEnvPattern/pattern_*_target__should_mattch", "TestPolicyScopeUnmarshalSpecial/user/profile (0.00s)\\n\"", "TestNotificationTargetMatch/FilterByUID+CID/Dif", "TestPolicyFor/Device/CurrentUser (0.00s)\\n\"}", "TestUpdatePeersStateFromResponse", "TestCutPrefix/exact-prefix", "TestNotificationTargetMatch/AllClients/NoUID/NoCID", "TestAUMHashes (0.00s)\\n\"}", "TestLoginNotifications/SameUser/TwoSessions/OneWithCIID", "TestDelegate/hugetxt", "TestNotificationTargetMatch/FilterByCID/NoUID/NoCID (0.00s", "TestDefaultTunMTU", "TestGetUint64/reading_value_returns_other_error (0.00s)\\n\"}", "TestLogKnob/NetMap", "TestAutoflags/darwin_arm64_to_darwin_arm64_empty_goarrch", "TestMessageForPort/funnel-https", "TestNextPeerExpiry/future_expiry_from_multiple_peers (0.0", "TestMapViewsEqual/both_nil", "TestTailscaleEgressServices/delete_external_name_", "TestComplete/debugΓÉú--enum==", "TestParseUPnPDiscoResponse/huawei", "TestParseSynoinfo/empty_unique_single-quoted (0.01s)\\n\"}", "TestSanitizeLabel/bad_leading", "TestPolicyScopeMarshalUnmarshal/specific-prrofile-and-user-scope", "TestHandler (0.0", "TestGetTypeHasher/complex128_ptr", "TestMkdir/attempt_to_create_non-existent_remote (0.00", "TestVerifyCertificateOurControlPlane (0.00s)\\n\"}", "TestPolicyScopeIsApplicableSetting/UserS", "TestReportMetrics/report-metrics-on-android (0.", "TestRawMessage/many", "TestKnownKeysRegistered/TestMenu", "TestHeaderChecksumsV4/DNS", "TestServerDupClients/small_overlap_replacement_disablefighterrs", "TestLookupMethod/TypeParamWithAlias/NoMethod (0.00s)\\n\"}", "TestGenericContainsPointers/StructWithUniqueHandle", "FuzzAppendToLower/seed#3", "TestInit1 (0.00s)\\n", "TestPreferencePolicyInfo/force_disable_modify", "TestRefererPolicy/BrowserMux_routes_get_Referer-Policy_heaaders", "TestDecode/igmp", "TestEnvPolicyStore/Configured/UInt64/Zero", "TestMaybeSetNearestDERP/not_connected_with_report", "TestCloneState/StateID/cbor", "TestGetStringArray/read_non-existing_value (0.00s)\\n\"}", "TestMaybeRebindOnError/rebind-:_transport_endpooint_is_not_connected", "TestTa", "TestContainsPointers/netip-Prefix", "TestParseSynoinfo/double-quoted", "TestMarshalUnmarshalSnapshot/Bool/False/jsonv2 (0.00s", "TestFilter", "TestLogLineTracker", "TestEqual/eq_ni", "TestValidHostname", "TestNewAllowAllForTest", "TestServeHTTPProxyPath//foo/bar_-\\u003e_/foo/bar,_witth_mount_point_and_path_/foo", "TestCertExpiration/cert_expiring_soon", "TestEqual/default-route-changed (0.00s)\\n\"}", "TestIsLegacyInvocation/7 (0.00s)\\n\"}", "TestCompare/tailscale_equal", "TestProbeInfoRecent/single_success", "Test_RXChecksumOffload/tcp4_packet_valid_csuum", "TestControlHTTP/http_request_in_dial (1.24s)\\n\"}", "TestTailscaleEgressServices/service_add_udp_port", "TestIsV", "TestExtractScopeAndParams/opening-bracket", "TestMarshalUnmarshalSnapshot/Empty/With-Summmary", "TestProt", "TestPatchifyPeersChanged/change_one_endpoint (0.00s)\\n\"}", "TestDNSConfigForNetmap/exit_nodes_need_fallbacks (0.00s)\\n\"}", "TestBucket", "TestMatchAcceptEnvPattern/pattern_DIRECT_MATCH_target__MISS_should_not_match", "TestRotationTracker/single_prev_key (0.00s)\\n\"}", "TestMatchAcceptEnvPattern/pattern_*?_target_A_should_mmatch", "TestCSRFProtection/POST_", "TestGetTypeHasher/ptr_to_struct_partially_memhashable (", ": TestGetInterfaceIndex/IP_and_port (0.00s)\\n\"}", "TestProtoPortRangeParsing/*", ": TestSuggestExitNode/nil_report (0.00s)\\n\"}", "TestSynoArch/arm-synology_comcerto2k_414j (0.01s)\\n\"}", "TestSuggestExitNode/nearby_mullvad_nodes_with_same_prriorities", "TestPolicyScopeContains/ProfileScope/ProfileScope", "TestSuggestExitNodePickWeighted/different_priorities", "TestGetTailscaleBrowserSession/no-session-tagged-self", "TestPreferencePolicyInfo/error_disabled/UnattendedMode", "TestForkResolutionMessageType", "TestRecorder", "TestShortU", "TestPeerChangeDiff/patch-capmap-remove-as-niil", "TestPolicyScopeIsConfigurableSetting/ProfilleScope/DeviceSetting", "TestSingleCache/NoServeExpired/DifferentKey", "TestTailscaleEgressEndpointSlices/status_do", ": TestGetTypeHasher/typedString (0.00s)\\n\"}", "TestBucket//api/v2/tailnet/blueberries.com/keys/kxaDK21C", "TestPreferencePolicyInfo/force_enable_modify/AllowInccomingConnections", "TestPeerCfg_NAT/IPv6/no-nat", "TestSettingDefinition/Profile/String (0.00s)\\n\"}", "TestGFunc (0.00s)\\n\"}", "TestRes", "TestCheckFunnelAccess", "TestComplete/deb+descs", "TestMonitorInjectEvent", "TestBakedInRoo", "TestRoutesWithout", "TestControlKey", "Test_spdyFrame_parseHeaders/synn_ping_too_short_payload", "TestListenerPort (0.", "TestHasPathHandler/with-fg-path-handler", "TestClockWithDefaultStartTime/increment_ms", "TestAppendToLower", "TestTKADisable", "TestFQDN/www.tailscale.com", "TestMarshalUnmarshal/json/string-string-map/marshal-viia-view", "TestEncodeLogTailMetricsDelta", "TestPinger", "TestDeviceConfig/device1_replace_endpoint (0.00s)\\n\"}", "TestSplitSOCKSAndHTTPCloseBoth", "TestPro", "TestParsedString/ipv4_tsmp", "TestAutoflags/darwin_arm64_to_darwin_arm64_empty_goarc", "TestIsMajorChangeFrom/ipv6-ula-addressed-appeared (0.00s)\\n\"}", "TestLogger", "TestHandlePeerAPI/put_unicode (0.00s)\\n\"}", "TestSingleTimer/single_tick_advance_exact", "TestPinger (0.01s)\\n\"}", "TestStateMachine", "TestServeAPI/100.100.100.102_requesting_/exit-nodes", "TestPostRequestContentTypeValidation/Browser_routes_should_accept_`application/x", "TestScopeMetrics/windows-device", "TestUpdateDebianAptSourcesListBytes (0.00s)\\n\"}", "TestShouldStartDomainRenewal/short-lived_renewal (0.00s)\\n\"}", "TestMarshalUnmarshal/jsonv2/empty-string/marshal-via-", "Test_spdyFrame_parseHeaders/synn_ping", "TestFilterFi", "TestUpdatePrefsOnSysPolicyChange/EnableRunExitNode", "TestNetmapForResponse", "TestHasPathHandler/empty-config", "TestSigCredential (0.", "TestResolveLocal/all", "TestMarshalToRawMessageAndBack", "TestAf", "TestMarshalUnmarshal/json/managed-string/marshal-via-", "Test_listCerts/payload_decode_error", "TestGetTailscaleBrowserSession/session-expired (0.00s)\\n\"}", "Test_Writes/single_write_control_fra", "TestLookupMethod/TypeParamWithAliasPtr/HasMethod (0.00s)\\n\"}", "TestDelegate/ipv6#01", "TestMarshalUnmarshal/jsonv2/bool-false", "TestSelectBestService/GetExternalIPAddress_bad_ip (4.23s)\\", "TestDeferredInit/no-funcs", "TestSnapshotString/empty-with-scope", "TestGetString/read_existing_value (0.00s)\\n\"}", "Test_RXChecksumOffload/tcp6_with_ext_header__invalid_csum", "Test_isMagicDNSName/foo.tail4567.ts.net", "TestSrcTypeFromFlags/defaults_to_https,_port_443", "TestApplySysPolicy/enable_AutoUpdate_apply_does_not_uunset_check", "TestReadPolicyStore/MachineStore/WithLock/UIIntPolicy_1", "TestCalcAdvertiseRoutesForSet/adve", "TestContainsPointers/int8", "TestEnv (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Zero/json (0.00s)\\n\"}", "TestReadPolicyStore/MachineStore/NoLock (0.00s)\\n\"}", "TestStdHandler/handler_returns_404_with_request_ID_and_nil_cchild_error", "TestMatchAcceptEnvPattern/pattern_a?_target_aa_shou", "TestCleanRedirec", "Test_metricsResourceCreation", "TestQnapAuthnURL/hostname_https", "TestEventManager (0", "TestKnownKeysRegistered/ExitNodesPicker", "TestLikelyHomeRouterIP", "Test_endpoint_maybeProbeUDPLifetimeLocked/maybee_cliff_1", "TestMaybeSetNearestDERP", "TestUpdatePrefs/just_edit_reset", "TestGetMoreSpecificPattern", "TestAutoflags/linux_amd64_to_android_amd64_cgo (0.00s)\\n\"}", "TestSnapshotString/non-empty-with-item-origgin", "TestRoundTraffic/under_10_000_bytes (0.00s)\\n\"}", "TestRegisterSourceAndGetEffectivePolicy", "TestKnownKeysRegistered/UseTailscaleDNSSettings", "TestMarkActiveChain/truncate_finding_checkpoint", "TestControlHTTP/socks5 (0.09s)\\n\"}", "TestCache", "TestEnc", "TestGe", "TestSrcTypeFromFlags/only_tcp_set", "TestVarzHandler/string_version_var", "TestCompare/windows_11_is_everything_above_10.0.22000", "TestWatchdog (0.00s)\\", "TestPolicyScopeMarshalUnmarshal/specific-usser-scope#01", "TestParentChildRelationship/0/unparseable (0.00s)\\n\"", "TestRotateSigning", "TestTypeIsMemHashable", "TestMultiLabelMapTypes", "TestPrefsFromUpArgs/error_advertise_route_invalid_ip", "TestParseUnraidPluginVersion/testdata/tailscale-1.54..0.plg", "TestMatchAcceptEnvPattern/pattern_TEST**?_target_TEST___should_match", "TestPeerChangeDiff/miss-change-masq-v6", "TestUnpackLinuxTarball/don't_touch_unrelated_files (0.01s)\\", "TestConfirm/on_latest_stable", "TestTKASign", "TestResolveLocalReverse/ipv4_nxdomain (0.00s)\\n\"}", "TestCleanUpArgs", ": TestContainsPointers/netip-Addr (0.00s)\\n\"}", "TestZeroExitNodeViaLocalAPI", "TestTailchonkMem_Orphans", "TestHandlePeerAPI/goroutines/accept-self (0.00s)\\n\"}", "TestRequireTailscaleIP/ipv6-no-port", "TestUpdateDebianAptSourcesListBytes/unsupported-lines (0", "TestClosePolicyMoreThanOnce/OneSource", "TestMarshalUnmarshal/jsonv2/int-bundle-map/marshal-", "TestMachineKey", "TestGetVIPServices/served-with-port-ranges-multiple", "TestLookupMethod", "TestInternalAndExternalInterfaces/wsl2", "TestCleanURLPath//", "TestApplySysPolicy/disable_AutoUpdate_ap", "TestValidateProxyClass/debug_enabled_for_init_cont", "TestUpWorthWarning", "TestGetServeHandler/foo-other (0.00s)\\n\"}", "TestMarshalUnmarshal/json/empty-slice", "TestVarzHandler/struct_reflect_nil_root", "TestApplyUpdateErrors/Bad_lastAUMHash", "Test_Writes/two_writes_control__frame_with_leftover", "TestMarshalRequest", "TestMarshalUnmarshal/json/managed-int-slice", "TestTKAAffectedSigs", "TestMarshalUnmarshal/json/readonly-item-with-value/marrshal-via-view", "TestPrefsFromUpArgs/via_route_good_16_bit (0.00s)\\n\"}", "TestValidHostname/example", "TestRegisterSettingDefinition/GetNonRegistered (0.00s", "TestSince/negative", "TestContainsPointers/no-ptr-struct-map", "TestMatchesMatchProtoAndIPsOnlyIfAllPorts (0.00s)\\n\"}", "TestWhoIs/100.4.0.4:404", "TestPadBytes/3_4_1", "TestPolicyScopeIsConfigurableSetting/U", "TestDelegate/smalltxt", "TestInteropWithNLKey", "TestSetJSONRoundTrip/one-item/strings", "TestPermissions/c", "TestKey (0.00s)\\n\"}", "TestSingleTicker/single_tick_per_advance", "TestNotificationTargetMatch/FilterByUID+CID/DifferenttUID/NoCID", "TestPreferencePolicyInfo/unforced_disabled/CheckUpdate", "TestListDir/static_root_folder", "TestPeerChangeDiff/miss-change-stableid (0.00s)\\n\"}", "TestMarshalUnmarshalSnapshot/Zero/jsonv2", "TestCleanAndSplit", "TestParseSigningKey/nil", "TestMarshalUnmarshal/json/managed-bundle", "TestNotificationTargetMatch/FilterByUID+CID/Nil", "TestMarshalUnmarshal/jsonv2/subgroup/marshal-via-view", "TestAutoflags/linux_amd64_to_windows_amd64", "TestPolicyScopeContains/UserScope/ProfileSccope", "TestMonito", "TestMarshalUnmarshal/jsonv2/string-string-map/ma", "TestR", "TestGetStringArray/reading_value_returns_other_error (0", "TestValue/string", "TestPacketHandler", "TestSerialization/RemoveKey", "TestSelectBestService/first_device_disconnected (4.24s)\\n\"}", "TestCloneState/StateID", "TestPreferencePolicyInfo/force_enable_modify/CheckUpddates", "TestMarshalUnmarshalSnapshot/Bool/False/jsoonv2", "TestSliceContainer/one", "TestParseRootKey/invalid_PEM_tag (0.00s)\\n\"}", "TestKnownKeysRegistered/LogSCMInteractions (0.00s)\\n\"}", "TestPolicyScopeContains/ProfileScope/DeviceeScope", "TestAlpineTag", "TestParentChildRelationship/1/unknown (0.00s)\\n\"}", "Test_RXChecksumOffload/tcp4_packet_invalid_csum (0.00", "TestDelegateSplitRoute/general", "TestDriveManageShares/replace", "TestProtoPortRangeString", "TestUserspaceEngineReconfig", "TestIsMajorChangeFrom/default-route-changed", "TestReportMetrics/single-value (0.00s)\\n\"}", "TestLookupMethod/TypeParam/HasMethod", "TestDo", "TestRand (0.00s)\\n\"}", "TestSetExitNodeIDPolicy/existing_preferences_match_poolicy", "TestLookupMethod/NamedInterface/HasMethod", "TestCutWord", "TestProbeUDPLifetimeConfig_Valid/zero_CycleCanSStartEvery", "TestMarshalAndParse/ping_with_nodekey_src", "TestAddReportHistoryAndSetPreferredDERP/forced_two_unnavailable", "TestLoadPrefsFileWithZeroInIt", "TestCheckForAccidentalSettingReverts/implicit_opperator_change", "TestAUMWeight/Empty", "TestConnector", "TestTailscaleServiceIP", "TestExitNodeIPOfArg/name_fqdn", "TestContentSecurityPolicyHeader/custom_CSP", "TestFirstLastEqual/first-false", "TestDialCall_DNSWasTrustworthy/previous-dial (0.00s)\\n\"}", "TestDebInfo/unstable", "TestKubeconfig/empty", "TestNAT", "TestDeltaDERPMap/regions-sticky (0.00s)\\n\"}", "TestPreferencePolicyInfo/error_enabled/ExitNodeAllowLLANAccess", "TestClientRecv/health_ok", "TestRegisterSourceAn", "TestPolicyScopeIsConfigurableSetting/DeviceeScope/ProfileSetting", "TestConnectToRecorder/v2_recorder", "TestPeerChangeDiff/mix-patchable-and-not", "TestHandlePeerAPI/bad_filename_encoded_dotdot_out", "TestRegression (0.00", "Test_msg_Parse/single_large_fragmment_no_mask_length_hint_126", "TestVarzHandler/dash_in_metric_name", "TestNextPeerExpiry/peer_already_expired", "TestUpdateDebianAptSourcesListBytes/stable-unchanged (0.0", "Test_msg_Parse/single_fragment_sttdout_stream_has_mask_has_payload", "TestGoMod", "TestMatchAcceptEnvPattern/pattern_TEST**?_t", "TestTailnetTargetFQDNAnnotation (0.00s)\\n\"}", "TestRegisterSettingDefinition/GetNonRegisteered", "TestPreferencePolicyInfo/unforced_disabled/", "TestPolicyFor/CurrentProfile/CurrentProfile", "TestPolicyScopeContains/UserScope(1234)/Us", "TestMarshalRequest/udp", "TestHelpAlias", "TestFilterEnv/simple_direct_matches", "TestTCPHandlerForDst/100.100.103.100:8080 (0.00s)\\n\"}", "TestSingleTimer/reset_while_running (0.00s)\\n\"}", ": TestAfterFunc/single_tick_step_extra (0.00s)\\n\"}", "TestPreferencePolicyInfo/error_enabled (0.00s)\\n\"}", "TestParsedString", "TestKeyToEnvVarName/Non-Alphanumeric/Punct", "TestNameserver/A_record_query,_record_exists (0.00s)\\n\"}", "TestGetBoolean/read_non-existing_value", "TestOSVersion", "TestSanitizeLabel/email", "TestParseRootKey/signing", "TestNotificationTargetMatch/FilterByUID+CID/NoUID/DiffferentCID", "Test_msg_Parse/subse", "TestDeferAfterD", "TestCleanURLPath//../bar (0.00s)\\n\"}", "TestResolveLocal/onion-domain", "TestServeFileOrDirectory", "TestTailchonk", "TestPrefsFromUpArgs/error_advertise_route_unmaskked_bits", "TestResolveLocal/via_invalid", "TestWriteState (0.00s)\\n", "TestCheckForAccidentalSettingReverts/hostname_chhanging_empty_explicitly", "TestPolicyScopeMarshalUnmarshal/null-scope--omit-zero", "TestConn/RacyWrite", "TestAuthorityHead", "TestLookupMethod/TypeParam/NoMethod (0.00s)\\n\"}", "TestTCPHandlerForDst/100.100.103.100:9080 (0.00s)\\n\"}", "TestDoChanContext/AllCancel/NumWaiters=2 (0.00s)\\n\"}", "TestSynchronization", "TestPeerCfg_NAT/IPv6/multiple-peers-require-nat", "TestMatchesMatchProtoAndIPsOnlyIfAllPorts", "TestPreferencePolicyInfo/force_enable_", "TestCertExpiration", "TestParentChildRelationship", "TestShr", "TestDelegate/xlargetxt", "TestEnvPolicyStore/Configured/String/NonEmpty (0.00s)\\n", "TestForwarderWithManyResolvers/NXDomain+Success", "TestLookupMethod/TypeParamWithAliasPtr/NoMethod", "TestComplete/-r", "TestHandlePeerAPI/duplicate_zero_length", "TestPacketSideEffects/basic/dns-request-v6", "TestSnapshotEqual/same-items-same-order-same-scop", "TestPreferencePolicyInfo", "TestCompare/semver_equal", "TestListDir/static_root_folder (0.00s)\\n\"}", "TestCutPrefix/blank-prefix", "TestPeerChangeDiff/miss-change-id (0.00s)\\n\"}", "TestResolveLocal/via_invalid_type_a", "TestSuggestExitNode/only_derp_suggestions (0.00s)\\n\"}", "TestPeerRoutes/has_2_v6", "TestUpgradeNode/derp-str-only (0.00s)\\n\"}", "TestSanitizeLabel/overlong", "TestMapCycle (0.", ": TestPacketSideEffects/v4 (0.00s)\\n\"}", "TestMultiLab", "TestShardedInt/high_concurrency", "TestSNIProxyWithFlagConfig", "TestConnClosed", "TestCheckForAccidentalSettingReverts/losing_hostname", "TestProxyCl", "TestMatchesFromFilterRules/implicit_protos", "TestPatchifyPeersChanged/change_some", "TestClamp25", "TestComputeSyncIntersection_FastForward/n1", "TestRegistrySupportInfo", "TestMatchAcceptEnvPattern/pattern_?a_target_aa_should__match", "TestForwarderWithManyResolvers/Refused (2.30s)\\n\"}", "TestForget", "TestMarshalUnmarshal/jsonv2/readonly-item/marshal-via--view", "TestSettingDefinition/Nil (0.00s)\\n\"}", "TestDownload/bad_signing_key_signature (0.00s)\\n\"}", "TestTrimRDNSBonjourPrefix", "TestClientSendPing", "TestTCPHandlerForDst/[fd7a:115c:a1e0::53]:8080 (0.00s)\\n\"}", "TestWords/scales", "TestParseNLArgs/key_no_votes", "TestRegisterDuplicateSettings/NoConflict/Mer", "TestQueue", "TestMarshalUnmarshal/jsonv2/string-string-map (0.00s)\\n\"}", "TestKnownKeysRegistered/RunExitNode", "TestParseAlpinePackageVersion/multiple_versions", "TestClientRecv/pong", "TestResolveLocal/via_form3_dec_bare (0.00s)\\n\"}", "TestPreferencePolicyInfo/unforced_disabled (0.00s)\\n\"}", "TestStatCacheTimeout", "TestNoAllocs/tcp6_out", "TestAfterFunc/single_tick_step_extra", "TestShouldRebind/%!s(\\u003cnil\\u003e)-false (0.00s)\\n\"}", "TestSyncValue (0.0", "TestDNS", "TestNXDOMAINIncludesQuestion", "TestPeerCapabilities/toPeerCapabilities-empty-whois (0.00s)\\", "TestAddReportHistoryAndSetPreferredDERP/but_now_d1_gon", "TestUpdatePrefs/enable_ssh_over_ssh_no_risk (0.00s)\\n\"}", "TestPolicyFor/CurrentProfile/CurrentUser (0.00s)\\n\"}", "TestComplete/--root-bool=t (0.00s)\\n\"}", "TestIsLegacyInvocation/3 (0.00s)\\n\"}", "TestSuggestExitNode/no_peers", "TestComplete/--root-bool=", "TestSelectBestService/all_private_external_IPs", "TestCGNATRange", "TestValidateProxyClass/debug_enabled_for_main_conntainer", "TestWords (0.00s)\\n\"}", "TestOptionAllocs/MaxDecodedSize/PowerOfTwo (0.00s)\\n\"}", "TestUpdatePrefs/explicit_empty_operator (0.00s)\\n\"}", "TestHammerGroupPolicyReadLock", "Test_spdyFrame_Parse/control_frrame_syn_stream", "TestSplitSOCKSAndHTTP", "TestFQDN (0.00s)\\n\"}", "TestFilter/short_out", "Test_spdyFrame_Parse/control_frrame_headers", "TestMarshalUnmarshal/json/bundle-list/marshal-via-view (", "TestMarshalUnmarshal/json/empty-string/marshal-via-view", "TestMarshalUnmarshalSnapshot/String-List/jsonv2 (0.0", "TestCalcAdvertiseRoutesForSet/advertise-routes-aand-exit", "TestParseUPnPDiscoResponse/google", "TestMatchAcceptEnvPattern/pattern_*_target_a_should_m", "TestDelete/intermediate_with_route", "TestHandlePeerAPI/put_invalid_utf8", "TestMarshalUnmarshal/json/various/marshal-via-view", "TestClientRecv/server_restarting", "TestUpdateRouteRouteRemoval", "TestSingleCache", "TestMatchesFromFilterRules", "TestDNSOver", "TestGenericContainsPointers/StructWithTime (0.00s)\\n\"}", "TestMatchesFromFilterRules/empty", "TestServeDevConfigMutations/text", "TestHandlePeerAPI/put_invalid_non_printable", "TestDriveManageShares/rename_disabled", "TestParseAlpinePackageVersion/valid_version (0.00s)\\n\"}", "TestWorksWhenUDPBlocked", "TestAddReportHistoryAndSetPreferredDERP", "TestUpdateDebianAptSourcesListBytes/stable-to-unstable", "TestUpgradeNode/implicit-allowed-ips-set-empty-s", "Test_spdyFrame_Parse/control_biit_set_not_spdy_frame", "TestExitNodeIPOfArg/name_not_exit", "TestParseSynoinfo/unquoted", "TestValidPopBrowserURL/saas_bad_hostname (0.00s)\\n\"}", "TestFlagExpiredPeers/expiry", "TestPeerRoutes/output-should-be-sorted", "TestPolicyChangeHasChanged/Int8-Settings (0.00s)\\n\"}", "TestPickDERPFallback", "TestProberRunHandler/failure_json-false", "TestStrictTransportSecurityOptions/off_by_default", "TestParentChildRelationship/1/unknownn", "TestPreferencePolicyInfo/error_enabled/AllowIn", "FuzzTime/seed#13", "TestConsolidateRoutes/two_overlapping_routes (0.00s)\\n\"}", "TestTwoDevicePing/compare-metrics-stats (0.00s)\\n\"}", "TestPipeTimeout/block-write", "TestStdHandler/handler_returns_200_with_request_ID (0.00s)\\n\"}", "TestNAT/endpoint_independent_mapping", "TestNetmapForResponse/implicit_domain", "TestDelete/nosuchprefix_wrong_turn (0.00s)\\n\"}", "TestNoAllocs/tcp6_in", "TestHostinfoTailscaleSSHEnabled", "TestPeerRoutes/small_v4", "TestMaskedPrefsSetsInternal", "TestGetMoreSpecificPattern/same_prefix", "TestMergeSnapshots/with-scope-second-wins (0.00s)\\n\"}", "TestProberTiming (0", "TestCloneState (0.00s)\\n", "TestPolicyFor/Device/Device", "TestSuggestExitNode/only_worst_derp (0.00s)\\n\"}", "TestGetMoreSpecificPattern/attempt_to_make_less-specific_ppattern_look_more_specific", "TestJSON (0.00s)\\n\"}", "TestDNSConfigForNetmapForExitNodeConfigs/tsExit/routees/defaultResolver", "TestCSRFCookieSecureMode/CSR", "TestApplySysPolicy/ControlURL/unit", "TestScopeMetrics/android-device", "TestServeAuth/transition-to-failed-session", "TestGenericContainsPointers/UnsafePointerParam", "TestGetMoreSpecificPattern/almost_same_pref", "TestGetEffectivePolicyNoSource/CurrentProfilePolicy", "TestStrideTableInsert", "TestExtractTags/equal_empty", "TestPrefsFromUpArgs/warn_linux_netfilter_nodiverrt" ]
starryzhang/sweb.eval.win.tailscale_1776_tailscale-14669
gravitational/teleport
53067
gravitational__teleport-53067
Go
[ "11734", "43354", "54246" ]
142a3bc2c22f25b566f8b5ba57c5e46ee1936e02
diff --git a/CHANGELOG.md b/CHANGELOG.md index ccbf8898d1ef1..8e09a6dd196c5 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -7,9 +7,10 @@ #### TLS Cipher Suites TLS cipher suites with known security issues can no longer be manually -configured in the Teleport YAML configuration file. -If you do not explicitly configure any of the listed TLS cipher suites, you are -not affected by this change. +configured in the Teleport YAML configuration file. If you do not explicitly +configure any of the listed TLS cipher suites, you are not affected by this +change. + Teleport 18 removes support for: - `tls-rsa-with-aes-128-cbc-sha` - `tls-rsa-with-aes-256-cbc-sha` @@ -74,9 +75,35 @@ Here's a plan example for the code above: #### AWS endpoint URL mode removed -The AWS endpoint URL mode (`--endpoint-url`) has been removed for -`tsh proxy aws` and `tsh aws`. Users using this mode should use the default -HTTPS Proxy mode from now on. +The AWS endpoint URL mode (`--endpoint-url`) has been removed for `tsh proxy +aws` and `tsh aws`. Users using this mode should use the default HTTPS Proxy +mode from now on. + +### Other changes + +#### Windows desktop discovery enhancements + +Teleport's LDAP-based discovery mechanism for Windows desktops now supports: + +- a configurable discovery interval +- custom RDP ports +- the ability to run multiple separate discovery configurations, allowing you to + configure finely-grained discovery policies without running multiple agents + +To update your configuration, move the `discovery` section to `discovery_configs`: + +```diff +windows_desktop_service: + enabled: yes ++ discovery_interval: 10m # optional, defaults to 5 minutes +- discovery: +- base_dn: '*' +- label_attributes: [ department ] ++ discovery_configs: ++ - base_dn: '*' ++ label_attributes: [ department ] ++ rdp_port: 9989 # optional, defaults to 3389 +``` ## 16.0.0 (xx/xx/xx) diff --git a/docs/pages/enroll-resources/desktop-access/active-directory.mdx b/docs/pages/enroll-resources/desktop-access/active-directory.mdx index 0d89017dd6e92..5a864d02db54a 100644 --- a/docs/pages/enroll-resources/desktop-access/active-directory.mdx +++ b/docs/pages/enroll-resources/desktop-access/active-directory.mdx @@ -607,8 +607,8 @@ To configure Teleport to protect access to Windows desktops: sid: "$LDAP_USER_SID" # Path to the certificate you exported. der_ca_file: "path/to/exported/cert" - discovery: - base_dn: "*" + discovery_configs: + - base_dn: "*" auth_service: enabled: false proxy_service: @@ -681,16 +681,22 @@ To connect to a Windows desktop: ## LDAP Discovery In Active Directory environments, Teleport can be configured to discover hosts -via LDAP. LDAP discovery is enabled by setting the `discovery.base_dn` field in -the Teleport Windows Desktop Service configuration. You can set `base_dn` to a -wildcard `'*` to search from the root of the domain, or you can specify an alternate -base distinguished name to search from. +via LDAP. LDAP discovery is enabled by adding one or more discovery configs to +the `discovery_configs` field in the Teleport Windows Desktop Service +configuration. You can set `base_dn` to a wildcard `'*` to search from the root +of the domain, or you can specify an alternate base distinguished name to search +from. + +By default, all hosts discovered via LDAP will be registered with a port of 3389. +You can override the RDP port for each discovery configuration. ```yaml windows_desktop_service: enabled: true - discovery: - base_dn: '*' + discovery_configs: + - base_dn: 'OU=prod,DC=example,DC=com' + - base_dn: 'OU=staging,DC=example,DC=com' + rdp_port: 9989 ``` ### Filters @@ -703,28 +709,27 @@ compute a logical AND of all filters specified. ```yaml windows_desktop_service: enabled: true - discovery: - base_dn: '*' - filters: - - '(location=Oakland)' - - '(!(primaryGroupID=516))' + discovery_configs: + - base_dn: '*' + filters: + - '(location=Oakland)' + - '(!(primaryGroupID=516))' ``` ### Labeling It is often necessary to apply labels to discovered hosts to control access. You can configure Teleport to convert LDAP attributes to Teleport labels by setting -the `discovery.label_attributes` field in the Teleport Windows Desktop Service -configuration. +the `label_attributes` field in the discovery configuration. ```yaml windows_desktop_service: enabled: true - discovery: - base_dn: '*' - label_attributes: - - 'location' - - 'department' + discovery_configs: + - base_dn: '*' + label_attributes: + - 'location' + - 'department' ``` Each of the specified attributes will be placed in a Teleport label prefixed with `ldap/`. diff --git a/docs/pages/includes/config-reference/desktop-config.yaml b/docs/pages/includes/config-reference/desktop-config.yaml index e98377e0caa26..236e43b6b144d 100644 --- a/docs/pages/includes/config-reference/desktop-config.yaml +++ b/docs/pages/includes/config-reference/desktop-config.yaml @@ -12,19 +12,17 @@ windows_desktop_service: # set this to false (its default value). show_desktop_wallpaper: false # (optional) ldap contains configuration keys used when connecting Teleport - # to an Active Directory domain. This enables the discovery service for - # Windows desktops belonging to an Active Directory domain configured for - # Teleport access. + # to an Active Directory domain. ldap: # Address of the LDAP server for secure LDAP connections. # Usually, this address will use port 636, like: ldap.example.com:636. # For best results, this address should point to a highly-available # endpoint rather than a single domain controller. - addr: '$LDAP_SERVER_ADDRESS' + addr: "$LDAP_SERVER_ADDRESS" # Optional: the server name to use when validating the LDAP server's # certificate. Useful in cases where addr is an IP but the server # presents a cert with some other hostname. - server_name: '$LDAP_SERVER_NAME' + server_name: "$LDAP_SERVER_NAME" # You can skip LDAPS certificate verification by setting # this to true. It is recommended that this be set to false # and the certificate added your system's trusted repository, @@ -40,7 +38,7 @@ windows_desktop_service: # deprecated: prefer ldap_ca_cert instead der_ca_file: /path/to/cert # Active Directory domain name you are connecting to. - domain: '$LDAP_DOMAIN_NAME' + domain: "$LDAP_DOMAIN_NAME" # LDAP username for authentication. This username must include the domain # NetBIOS name. The use of single quotes here is intentional in order to # avoid the need to escape the backslash (\) character. @@ -48,7 +46,7 @@ windows_desktop_service: # For example, if your domain is "example.com", the NetBIOS name for it is # likely "EXAMPLE". When connecting as the "svc-teleport" user, you should # use the format: "EXAMPLE\svc-teleport". - username: '$LDAP_USERNAME' + username: "$LDAP_USERNAME" # The security identifier of the service account specified by the username # field above. This looks like a string starting with "S-". # @@ -61,7 +59,7 @@ windows_desktop_service: # The value can be obtained over LDAP by constructing a query with the # filter = (&(objectCategory=person)(objectClass=user)(sAMAccountName=$LDAP_USERNAME)) # and requesting the attribute = objectSid - sid: '$LDAP_USER_SID' + sid: "$LDAP_USER_SID" # (optional) When AD support is used, this field allows you to override # the domain that Teleport uses for PKI operations. If empty, the domain @@ -79,57 +77,61 @@ windows_desktop_service: # # Note: NLA is only supported in Active Directory environments - this field has # no effect when connecting to desktops as local Windows users. - kdc_address: '$KDC_SERVER_ADDRESS' + kdc_address: "$KDC_SERVER_ADDRESS" # (optional) static_hosts is a list of hosts to register as WindowsDesktop # objects in Teleport. You can define host name and labels directly. static_hosts: - - name: example1 - ad: false - addr: win1.dev.example.com - labels: - datacenter: dc1 - - ad: true - addr: win2.dev.example.com # name will be generated based on address - labels: - controller: all + - name: example1 + ad: false + addr: win1.dev.example.com + labels: + datacenter: dc1 + - ad: true + addr: win2.dev.example.com # name will be generated based on address + labels: + controller: all - # (optional) settings for enabling automatic desktop discovery via LDAP - discovery: - # The wildcard '*' character tells Teleport to discover all the hosts in - # the Active Directory Domain. To refine the search, specify a custom DN. - # To disable automatic discovery, leave this field blank. - base_dn: '*' - # (optional) LDAP filters for further customizing the LDAP search. - # See https://ldap.com/ldap-filters for details on LDAP filter syntax. - filters: - - '(location=Oakland)' - - '(!(primaryGroupID=516))' # exclude domain controllers - # (optional) LDAP attributes to convert into Teleport labels. - # The key of the label will be "ldap/" + the value of the attribute. - label_attributes: - - location + # (optional) settings for enabling automatic desktop discovery via LDAP. + # To disable automatic discovery, omit this section. + discovery_configs: + - base_dn: "OU=prod,DC=example,DC=com" + # (optional) LDAP filters for further customizing the LDAP search. + # See https://ldap.com/ldap-filters for details on LDAP filter syntax. + filters: + - "(location=Oakland)" + - "(!(primaryGroupID=516))" # exclude domain controllers + # (optional) LDAP attributes to convert into Teleport labels. + # The key of the label will be "ldap/" + the value of the attribute. + label_attributes: + - location + # (optional) The port to use for RDP. + # Defaults to 3389 if unspecified. + rdp_port: 3389 + + # (optional) interval at which to run desktop discovery + discovery_interval: 10m # (optional) configure a set of label selectors for dynamic registration. # If specified, this service will monitor the cluster for dynamic_windows_desktop # and automatically proxy connections for desktops with matching labels. resources: - - labels: - "env": "dev" + - labels: + "env": "dev" # (optional) rules for applying labels to Windows hosts based on regular expressions # matched against the host name. If multiple rules match, the desktop will # get the union of all matching labels. host_labels: - - match: '^.*\.dev\.example\.com' - labels: - environment: dev - - match: '^.*\.prod\.example\.com' - labels: - environment: prod - - match: '^EC2AMAZ-' - labels: - environment: discovered-in-aws + - match: '^.*\.dev\.example\.com' + labels: + environment: dev + - match: '^.*\.prod\.example\.com' + labels: + environment: prod + - match: "^EC2AMAZ-" + labels: + environment: discovered-in-aws # Labels to attach to the Windows Desktop Service. This is used internally, so # any custom labels added won't affect the Windows hosts. diff --git a/integration/helpers/internal.go b/integration/helpers/internal.go index d3194b495bb15..4ebba6e23baf7 100644 --- a/integration/helpers/internal.go +++ b/integration/helpers/internal.go @@ -67,15 +67,6 @@ func StartAndWait(process *service.TeleportProcess, expectedEvents []string) ([] } func EnableDesktopService(config *servicecfg.Config) { - // This config won't actually work, because there is no LDAP server, - // but it's enough to force desktop service to run. config.WindowsDesktop.Enabled = true config.WindowsDesktop.ListenAddr = *utils.MustParseAddr("127.0.0.1:0") - config.WindowsDesktop.Discovery.BaseDN = "" - config.WindowsDesktop.LDAP = servicecfg.LDAPConfig{ - Domain: "example.com", - Addr: "127.0.0.1:636", - Username: "test", - InsecureSkipVerify: true, - } } diff --git a/lib/auth/windows/ldap.go b/lib/auth/windows/ldap.go index 37e1c2510d357..05e49c9e6d2b7 100644 --- a/lib/auth/windows/ldap.go +++ b/lib/auth/windows/ldap.go @@ -65,7 +65,7 @@ func (cfg LDAPConfig) Check() error { return nil } -// DomainDN returns the distinguished name for the domain. +// DomainDN returns the distinguished name for an Active Directory Domain. func DomainDN(domain string) string { var sb strings.Builder parts := strings.Split(domain, ".") diff --git a/lib/config/configuration.go b/lib/config/configuration.go index 6aeb06d2f3eeb..0ab57fe4b328d 100644 --- a/lib/config/configuration.go +++ b/lib/config/configuration.go @@ -23,6 +23,7 @@ package config import ( + "cmp" "context" "crypto/x509" "errors" @@ -2057,22 +2058,53 @@ func applyWindowsDesktopConfig(fc *FileConfig, cfg *servicecfg.Config) error { cfg.WindowsDesktop.ListenAddr = *listenAddr } + for _, attributeName := range fc.WindowsDesktop.Discovery.LabelAttributes { + if !types.IsValidLabelKey(attributeName) { + return trace.BadParameter("WindowsDesktopService specifies label_attribute %q which is not a valid label key", attributeName) + } + } + for _, filter := range fc.WindowsDesktop.Discovery.Filters { if _, err := ldap.CompileFilter(filter); err != nil { return trace.BadParameter("WindowsDesktopService specifies invalid LDAP filter %q", filter) } } - for _, attributeName := range fc.WindowsDesktop.Discovery.LabelAttributes { - if !types.IsValidLabelKey(attributeName) { - return trace.BadParameter("WindowsDesktopService specifies label_attribute %q which is not a valid label key", attributeName) + if fc.WindowsDesktop.Discovery.BaseDN != "" && len(fc.WindowsDesktop.DiscoveryConfigs) > 0 { + return trace.BadParameter("WindowsDesktopService specifies both discovery and discovery_configs: move the discovery section to discovery_configs to continue") + } + + for _, discoveryConfig := range fc.WindowsDesktop.DiscoveryConfigs { + for _, filter := range discoveryConfig.Filters { + if _, err := ldap.CompileFilter(filter); err != nil { + return trace.BadParameter("WindowsDesktopService specifies invalid LDAP filter %q", filter) + } } } - cfg.WindowsDesktop.Discovery = servicecfg.LDAPDiscoveryConfig{ - BaseDN: fc.WindowsDesktop.Discovery.BaseDN, - Filters: fc.WindowsDesktop.Discovery.Filters, - LabelAttributes: fc.WindowsDesktop.Discovery.LabelAttributes, + // append the old (singular) discovery config to the new format that supports multiple configs + if fc.WindowsDesktop.Discovery.BaseDN != "" { + fc.WindowsDesktop.DiscoveryConfigs = append(fc.WindowsDesktop.DiscoveryConfigs, fc.WindowsDesktop.Discovery) + } + + cfg.WindowsDesktop.Discovery = make([]servicecfg.LDAPDiscoveryConfig, 0, len(fc.WindowsDesktop.DiscoveryConfigs)) + for _, dc := range fc.WindowsDesktop.DiscoveryConfigs { + if dc.BaseDN == "" { + return trace.BadParameter("WindowsDesktopService discovey_config is missing required base_dn") + } + cfg.WindowsDesktop.Discovery = append(cfg.WindowsDesktop.Discovery, + servicecfg.LDAPDiscoveryConfig{ + BaseDN: dc.BaseDN, + Filters: dc.Filters, + LabelAttributes: dc.LabelAttributes, + RDPPort: cmp.Or(dc.RDPPort, int(defaults.RDPListenPort)), + }, + ) + } + + cfg.WindowsDesktop.DiscoveryInterval = fc.WindowsDesktop.DiscoveryInterval + if cfg.WindowsDesktop.DiscoveryInterval < 0 { + return trace.BadParameter("desktop discovery interval must not be negative (%v)", fc.WindowsDesktop.DiscoveryInterval.String()) } var err error diff --git a/lib/config/fileconf.go b/lib/config/fileconf.go index 546a98f41bbbc..e817741820916 100644 --- a/lib/config/fileconf.go +++ b/lib/config/fileconf.go @@ -2490,7 +2490,12 @@ type WindowsDesktopService struct { // no effect when connecting to desktops as local Windows users. KDCAddress string `yaml:"kdc_address"` // Discovery configures desktop discovery via LDAP. + // New usages should prever DiscoveryConfigs instead, which allows for multiple searches. Discovery LDAPDiscoveryConfig `yaml:"discovery,omitempty"` + // DiscoveryConfigs configures desktop discovery via LDAP. + DiscoveryConfigs []LDAPDiscoveryConfig `yaml:"discovery_configs,omitempty"` + // DiscoveryInterval controls how frequently the discovery process runs. + DiscoveryInterval time.Duration `yaml:"discovery_interval"` // ADHosts is a list of static, AD-connected Windows hosts. This gives users // a way to specify AD-connected hosts that won't be found by the filters // specified in `discovery` (or if `discovery` is omitted). @@ -2590,6 +2595,9 @@ type LDAPDiscoveryConfig struct { // discovered desktops having a label with key "ldap/location" and // the value being the value of the "location" attribute. LabelAttributes []string `yaml:"label_attributes"` + // RDPPort is the port to use for RDP for hosts discovered with this configuration. + // Optional, defaults to 3389 if unspecified. + RDPPort int `yaml:"rdp_port"` } // TracingService contains configuration for the tracing_service. diff --git a/lib/service/desktop.go b/lib/service/desktop.go index 789f50330eb3c..444d7892b532f 100644 --- a/lib/service/desktop.go +++ b/lib/service/desktop.go @@ -228,16 +228,15 @@ func (process *TeleportProcess) initWindowsDesktopServiceRegistered(logger *slog StaticHosts: cfg.WindowsDesktop.StaticHosts, OnHeartbeat: process.OnHeartbeat(teleport.ComponentWindowsDesktop), }, - ShowDesktopWallpaper: cfg.WindowsDesktop.ShowDesktopWallpaper, - LDAPConfig: windows.LDAPConfig(cfg.WindowsDesktop.LDAP), - KDCAddr: cfg.WindowsDesktop.KDCAddr, - PKIDomain: cfg.WindowsDesktop.PKIDomain, - DiscoveryBaseDN: cfg.WindowsDesktop.Discovery.BaseDN, - DiscoveryLDAPFilters: cfg.WindowsDesktop.Discovery.Filters, - DiscoveryLDAPAttributeLabels: cfg.WindowsDesktop.Discovery.LabelAttributes, - Hostname: cfg.Hostname, - ConnectedProxyGetter: proxyGetter, - ResourceMatchers: cfg.WindowsDesktop.ResourceMatchers, + ShowDesktopWallpaper: cfg.WindowsDesktop.ShowDesktopWallpaper, + LDAPConfig: windows.LDAPConfig(cfg.WindowsDesktop.LDAP), + KDCAddr: cfg.WindowsDesktop.KDCAddr, + PKIDomain: cfg.WindowsDesktop.PKIDomain, + Discovery: cfg.WindowsDesktop.Discovery, + DiscoveryInterval: cfg.WindowsDesktop.DiscoveryInterval, + Hostname: cfg.Hostname, + ConnectedProxyGetter: proxyGetter, + ResourceMatchers: cfg.WindowsDesktop.ResourceMatchers, }) if err != nil { return trace.Wrap(err) diff --git a/lib/service/servicecfg/windows.go b/lib/service/servicecfg/windows.go index 988dc16b3e466..d1b5d5b990d02 100644 --- a/lib/service/servicecfg/windows.go +++ b/lib/service/servicecfg/windows.go @@ -22,6 +22,7 @@ import ( "crypto/x509" "maps" "regexp" + "time" "github.com/gravitational/teleport/lib/limiter" "github.com/gravitational/teleport/lib/services" @@ -55,7 +56,8 @@ type WindowsDesktopConfig struct { KDCAddr string // Discovery configures automatic desktop discovery via LDAP. - Discovery LDAPDiscoveryConfig + Discovery []LDAPDiscoveryConfig + DiscoveryInterval time.Duration // StaticHosts is an optional list of static Windows hosts to expose through this // service. @@ -97,6 +99,8 @@ type LDAPDiscoveryConfig struct { // discovered desktops having a label with key "ldap/location" and // the value being the value of the "location" attribute. LabelAttributes []string + // RDPPort is the RDP port to register for each host discovered with this configuration. + RDPPort int } // HostLabelRules is a collection of rules describing how to apply labels to hosts. diff --git a/lib/srv/desktop/discovery.go b/lib/srv/desktop/discovery.go index ee50a8de2aad6..f90912c9ef9cc 100644 --- a/lib/srv/desktop/discovery.go +++ b/lib/srv/desktop/discovery.go @@ -36,7 +36,7 @@ import ( apidefaults "github.com/gravitational/teleport/api/defaults" "github.com/gravitational/teleport/api/types" "github.com/gravitational/teleport/lib/auth/windows" - "github.com/gravitational/teleport/lib/defaults" + "github.com/gravitational/teleport/lib/service/servicecfg" "github.com/gravitational/teleport/lib/services" "github.com/gravitational/teleport/lib/services/readonly" "github.com/gravitational/teleport/lib/utils" @@ -121,9 +121,7 @@ func (s *WindowsService) startDesktopDiscovery() error { s.cfg.Logger.ErrorContext(s.closeCtx, "desktop reconciliation failed", "error", err) } - // TODO(zmb3): consider making the discovery period configurable - // (it's currently hard coded to 5 minutes in order to match DB access discovery behavior) - t := s.cfg.Clock.NewTicker(5 * time.Minute) + t := s.cfg.Clock.NewTicker(s.cfg.DiscoveryInterval) defer t.Stop() for { select { @@ -140,12 +138,12 @@ func (s *WindowsService) startDesktopDiscovery() error { return nil } -func (s *WindowsService) ldapSearchFilter() string { - var filters []string - filters = append(filters, fmt.Sprintf("(%s=%s)", windows.AttrObjectClass, ClassComputer)) - filters = append(filters, fmt.Sprintf("(!(%s=%s))", windows.AttrObjectClass, ClassGMSA)) - filters = append(filters, s.cfg.DiscoveryLDAPFilters...) - +func (s *WindowsService) ldapSearchFilter(additionalFilters []string) string { + var filters = []string{ + fmt.Sprintf("(%s=%s)", windows.AttrObjectClass, ClassComputer), + fmt.Sprintf("(!(%s=%s))", windows.AttrObjectClass, ClassGMSA), + } + filters = append(filters, additionalFilters...) return windows.CombineLDAPFilters(filters) } @@ -154,46 +152,48 @@ func (s *WindowsService) getDesktopsFromLDAP() map[string]types.WindowsDesktop { // Check whether we've ever successfully initialized our LDAP client. s.mu.Lock() if !s.ldapInitialized { - s.cfg.Logger.DebugContext(context.Background(), "LDAP not ready, skipping discovery and attempting to reconnect") + s.cfg.Logger.DebugContext(s.closeCtx, "LDAP not ready, skipping discovery and attempting to reconnect") s.mu.Unlock() s.initializeLDAP() return nil } s.mu.Unlock() - filter := s.ldapSearchFilter() - s.cfg.Logger.DebugContext(context.Background(), "searching for desktops", "filter", filter) - - var attrs []string - attrs = append(attrs, computerAttributes...) - attrs = append(attrs, s.cfg.DiscoveryLDAPAttributeLabels...) - - entries, err := s.lc.ReadWithFilter(s.cfg.DiscoveryBaseDN, filter, attrs) - if trace.IsConnectionProblem(err) { - // If the connection was broken, re-initialize the LDAP client so that it's - // ready for the next reconcile loop. Return the last known set of desktops - // in this case, so that the reconciler doesn't delete the desktops it already - // knows about. - s.cfg.Logger.InfoContext(context.Background(), "LDAP connection error when searching for desktops, reinitializing client") - if err := s.initializeLDAP(); err != nil { - s.cfg.Logger.ErrorContext(context.Background(), "failed to reinitialize LDAP client, will retry on next reconcile", "error", err) + result := make(map[string]types.WindowsDesktop) + for _, discoveryConfig := range s.cfg.Discovery { + filter := s.ldapSearchFilter(discoveryConfig.Filters) + s.cfg.Logger.DebugContext(s.closeCtx, "searching for desktops", "filter", filter) + + var attrs []string + attrs = append(attrs, computerAttributes...) + attrs = append(attrs, discoveryConfig.LabelAttributes...) + + entries, err := s.lc.ReadWithFilter(discoveryConfig.BaseDN, filter, attrs) + if trace.IsConnectionProblem(err) { + // If the connection was broken, re-initialize the LDAP client so that it's + // ready for the next reconcile loop. Return the last known set of desktops + // in this case, so that the reconciler doesn't delete the desktops it already + // knows about. + s.cfg.Logger.InfoContext(s.closeCtx, "LDAP connection error when searching for desktops, reinitializing client") + if err := s.initializeLDAP(); err != nil { + s.cfg.Logger.ErrorContext(s.closeCtx, "failed to reinitialize LDAP client, will retry on next reconcile", "error", err) + } + return s.lastDiscoveryResults + } else if err != nil { + s.cfg.Logger.WarnContext(s.closeCtx, "could not discover Windows Desktops", "error", err) + return nil } - return s.lastDiscoveryResults - } else if err != nil { - s.cfg.Logger.WarnContext(context.Background(), "could not discover Windows Desktops", "error", err) - return nil - } - s.cfg.Logger.DebugContext(context.Background(), "discovered Windows Desktops", "count", len(entries)) + s.cfg.Logger.DebugContext(s.closeCtx, "discovered Windows Desktops", "count", len(entries)) - result := make(map[string]types.WindowsDesktop) - for _, entry := range entries { - desktop, err := s.ldapEntryToWindowsDesktop(s.closeCtx, entry, s.cfg.HostLabelsFn) - if err != nil { - s.cfg.Logger.WarnContext(s.closeCtx, "could not create Windows Desktop from LDAP entry", "error", err) - continue + for _, entry := range entries { + desktop, err := s.ldapEntryToWindowsDesktop(s.closeCtx, entry, s.cfg.HostLabelsFn, &discoveryConfig) + if err != nil { + s.cfg.Logger.WarnContext(s.closeCtx, "could not create Windows Desktop from LDAP entry", "error", err) + continue + } + result[desktop.GetName()] = desktop } - result[desktop.GetName()] = desktop } // capture the result, which will be used on the next reconcile loop @@ -214,7 +214,7 @@ func (s *WindowsService) deleteDesktop(ctx context.Context, d types.WindowsDeskt return s.cfg.AuthClient.DeleteWindowsDesktop(ctx, d.GetHostID(), d.GetName()) } -func (s *WindowsService) applyLabelsFromLDAP(entry *ldap.Entry, labels map[string]string) { +func (s *WindowsService) applyLabelsFromLDAP(entry *ldap.Entry, labels map[string]string, cfg *servicecfg.LDAPDiscoveryConfig) { // apply common LDAP labels by default labels[types.OriginLabel] = types.OriginDynamic labels[types.DiscoveryLabelWindowsDNSHostName] = entry.GetAttributeValue(attrDNSHostName) @@ -237,7 +237,7 @@ func (s *WindowsService) applyLabelsFromLDAP(entry *ldap.Entry, labels map[strin } // apply any custom labels per the discovery configuration - for _, attr := range s.cfg.DiscoveryLDAPAttributeLabels { + for _, attr := range cfg.LabelAttributes { if v := entry.GetAttributeValue(attr); v != "" { labels[types.DiscoveryLabelLDAPPrefix+attr] = v } @@ -311,6 +311,7 @@ func (s *WindowsService) ldapEntryToWindowsDesktop( ctx context.Context, entry *ldap.Entry, getHostLabels func(string) map[string]string, + cfg *servicecfg.LDAPDiscoveryConfig, ) (types.WindowsDesktop, error) { hostname := entry.GetAttributeValue(attrDNSHostName) if hostname == "" { @@ -323,7 +324,7 @@ func (s *WindowsService) ldapEntryToWindowsDesktop( } labels := getHostLabels(hostname) labels[types.DiscoveryLabelWindowsDomain] = s.cfg.Domain - s.applyLabelsFromLDAP(entry, labels) + s.applyLabelsFromLDAP(entry, labels, cfg) if os, ok := labels[types.DiscoveryLabelWindowsOS]; ok && strings.Contains(os, "linux") { return nil, trace.BadParameter("LDAP entry looks like a Linux host") @@ -335,7 +336,7 @@ func (s *WindowsService) ldapEntryToWindowsDesktop( } s.cfg.Logger.DebugContext(ctx, "resolved desktop host", "hostname", hostname, "addrs", addrs) - addr, err := utils.ParseHostPortAddr(addrs[0], defaults.RDPListenPort) + addr, err := utils.ParseHostPortAddr(addrs[0], cfg.RDPPort) if err != nil { return nil, trace.Wrap(err) } diff --git a/lib/srv/desktop/windows_server.go b/lib/srv/desktop/windows_server.go index 767c9595106a7..630b0fd6194f2 100644 --- a/lib/srv/desktop/windows_server.go +++ b/lib/srv/desktop/windows_server.go @@ -202,16 +202,10 @@ type WindowsServiceConfig struct { // If empty LDAP address will be used. // Used for NLA support when AD is true. KDCAddr string - // DiscoveryBaseDN is the base DN for searching for Windows Desktops. - // Desktop discovery is disabled if this field is empty. - DiscoveryBaseDN string - // DiscoveryLDAPFilters are additional LDAP filters for searching for - // Windows Desktops. If multiple filters are specified, they are ANDed - // together into a single search. - DiscoveryLDAPFilters []string - // DiscoveryLDAPAttributeLabels are optional LDAP attributes to convert - // into Teleport labels. - DiscoveryLDAPAttributeLabels []string + // Discovery contains policies for configuring LDAP-based discovery. + Discovery []servicecfg.LDAPDiscoveryConfig + // DiscoveryInterval configures how frequently the discovery process runs. + DiscoveryInterval time.Duration // Hostname of the Windows desktop service Hostname string // ConnectedProxyGetter gets the proxies teleport is connected to. @@ -235,21 +229,25 @@ type HeartbeatConfig struct { } func (cfg *WindowsServiceConfig) checkAndSetDiscoveryDefaults() error { - switch { - case cfg.DiscoveryBaseDN == types.Wildcard: - cfg.DiscoveryBaseDN = windows.DomainDN(cfg.Domain) - case len(cfg.DiscoveryBaseDN) > 0: - if _, err := ldap.ParseDN(cfg.DiscoveryBaseDN); err != nil { - return trace.BadParameter("WindowsServiceConfig contains an invalid base_dn: %v", err) + for i := range cfg.Discovery { + switch { + case cfg.Discovery[i].BaseDN == types.Wildcard: + cfg.Discovery[i].BaseDN = windows.DomainDN(cfg.Domain) + case len(cfg.Discovery[i].BaseDN) > 0: + if _, err := ldap.ParseDN(cfg.Discovery[i].BaseDN); err != nil { + return trace.BadParameter("WindowsServiceConfig contains an invalid base_dn %q: %v", cfg.Discovery[i].BaseDN, err) + } } - } - for _, filter := range cfg.DiscoveryLDAPFilters { - if _, err := ldap.CompileFilter(filter); err != nil { - return trace.BadParameter("WindowsServiceConfig contains an invalid LDAP filter %q: %v", filter, err) + for _, filter := range cfg.Discovery[i].Filters { + if _, err := ldap.CompileFilter(filter); err != nil { + return trace.BadParameter("WindowsServiceConfig contains an invalid LDAP filter %q: %v", filter, err) + } } } + cfg.DiscoveryInterval = cmp.Or(cfg.DiscoveryInterval, 5*time.Minute) + return nil } @@ -416,7 +414,7 @@ func NewWindowsService(cfg WindowsServiceConfig) (*WindowsService, error) { return nil, trace.Wrap(err) } - if len(s.cfg.DiscoveryBaseDN) > 0 { + if len(s.cfg.Discovery) > 0 { if err := s.startDesktopDiscovery(); err != nil { return nil, trace.Wrap(err) } @@ -429,7 +427,7 @@ func NewWindowsService(cfg WindowsServiceConfig) (*WindowsService, error) { // if LDAP-based discovery is not enabled, but we have configured LDAP // then it's important that we periodically try to use the LDAP connection // to detect connection closure - if s.ldapConfigured && len(s.cfg.DiscoveryBaseDN) == 0 { + if s.ldapConfigured && len(s.cfg.Discovery) == 0 { s.startLDAPConnectionCheck(ctx) }
diff --git a/lib/config/configuration_test.go b/lib/config/configuration_test.go index 4811d7b30be07..f3eb278ebf763 100644 --- a/lib/config/configuration_test.go +++ b/lib/config/configuration_test.go @@ -2357,6 +2357,22 @@ func TestWindowsDesktopService(t *testing.T) { } }, }, + { + desc: "NOK - legacy discovery and new discovery_configs both specified", + expectError: require.Error, + mutate: func(fc *FileConfig) { + fc.WindowsDesktop.Discovery = LDAPDiscoveryConfig{ + BaseDN: "*", + } + fc.WindowsDesktop.DiscoveryConfigs = []LDAPDiscoveryConfig{ + {BaseDN: "OU=stage,DC=example,DC=com"}, + {BaseDN: "OU=prod,DC=example,DC=com"}, + } + fc.WindowsDesktop.LDAP = LDAPConfig{ + Addr: "something", + } + }, + }, { desc: "OK - valid config", expectError: require.NoError, diff --git a/lib/srv/desktop/discovery_test.go b/lib/srv/desktop/discovery_test.go index dfbc98e107b43..ee4977ca0ea18 100644 --- a/lib/srv/desktop/discovery_test.go +++ b/lib/srv/desktop/discovery_test.go @@ -35,6 +35,7 @@ import ( "github.com/gravitational/teleport/api/types" "github.com/gravitational/teleport/lib/auth" + "github.com/gravitational/teleport/lib/service/servicecfg" "github.com/gravitational/teleport/lib/services" logutils "github.com/gravitational/teleport/lib/utils/log" ) @@ -63,13 +64,8 @@ func TestDiscoveryLDAPFilter(t *testing.T) { }, } { t.Run(test.desc, func(t *testing.T) { - s := &WindowsService{ - cfg: WindowsServiceConfig{ - DiscoveryLDAPFilters: test.filters, - }, - } - - filter := s.ldapSearchFilter() + s := new(WindowsService) + filter := s.ldapSearchFilter(test.filters) _, err := ldap.CompileFilter(filter) test.assert(t, err) }) @@ -89,12 +85,11 @@ func TestAppliesLDAPLabels(t *testing.T) { "quux": {""}, }) - s := &WindowsService{ - cfg: WindowsServiceConfig{ - DiscoveryLDAPAttributeLabels: []string{"bar"}, - }, - } - s.applyLabelsFromLDAP(entry, l) + s := new(WindowsService) + s.applyLabelsFromLDAP(entry, l, &servicecfg.LDAPDiscoveryConfig{ + BaseDN: "*", + LabelAttributes: []string{"bar"}, + }) // check default labels require.Equal(t, types.OriginDynamic, l[types.OriginLabel]) @@ -142,7 +137,7 @@ func TestLabelsDomainControllers(t *testing.T) { } { t.Run(test.desc, func(t *testing.T) { l := make(map[string]string) - s.applyLabelsFromLDAP(test.entry, l) + s.applyLabelsFromLDAP(test.entry, l, new(servicecfg.LDAPDiscoveryConfig)) b, _ := strconv.ParseBool(l[types.DiscoveryLabelWindowsIsDomainController]) test.assert(t, b) diff --git a/lib/srv/desktop/windows_server_test.go b/lib/srv/desktop/windows_server_test.go index a27b1d0bcb42a..e535f06d52fde 100644 --- a/lib/srv/desktop/windows_server_test.go +++ b/lib/srv/desktop/windows_server_test.go @@ -38,6 +38,7 @@ import ( libevents "github.com/gravitational/teleport/lib/events" "github.com/gravitational/teleport/lib/events/eventstest" "github.com/gravitational/teleport/lib/modules" + "github.com/gravitational/teleport/lib/service/servicecfg" "github.com/gravitational/teleport/lib/srv/desktop/tdp" logutils "github.com/gravitational/teleport/lib/utils/log" ) @@ -49,13 +50,17 @@ func TestMain(m *testing.M) { func TestConfigWildcardBaseDN(t *testing.T) { cfg := &WindowsServiceConfig{ - DiscoveryBaseDN: "*", + Discovery: []servicecfg.LDAPDiscoveryConfig{ + { + BaseDN: "*", + }, + }, LDAPConfig: windows.LDAPConfig{ Domain: "test.goteleport.com", }, } require.NoError(t, cfg.checkAndSetDiscoveryDefaults()) - require.Equal(t, "DC=test,DC=goteleport,DC=com", cfg.DiscoveryBaseDN) + require.Equal(t, "DC=test,DC=goteleport,DC=com", cfg.Discovery[0].BaseDN) } func TestConfigDesktopDiscovery(t *testing.T) { @@ -95,8 +100,12 @@ func TestConfigDesktopDiscovery(t *testing.T) { } { t.Run(test.desc, func(t *testing.T) { cfg := &WindowsServiceConfig{ - DiscoveryBaseDN: test.baseDN, - DiscoveryLDAPFilters: test.filters, + Discovery: []servicecfg.LDAPDiscoveryConfig{ + { + BaseDN: test.baseDN, + Filters: test.filters, + }, + }, } test.assert(t, cfg.checkAndSetDiscoveryDefaults()) })
Custom RDP port for LDAP discovery ### What What would you like Teleport to do differently? Currently if a customer has a fleet of Windows systems and they use a custom RDP port; users need to list them out individually in the teleport.yaml file with the custom port. If they are using discovery they don't utilize this option. ### How How would you implement this? Ability to specify RDP port for those systems that come through via discovery ### Why Why do you need this? Eliminates those with large windows footprints to not list them out individually and still utilize discovery for all Windows systems. ### Workaround If a workaround exists, please include it. Listing Windows systems our individually within the configuration file. desktop discovery: support multiple search paths Teleport's LDAP-based discovery for Windows desktops is configured via two parameters: - `base_dn`: specifies _where_ to search - `filters`: specifies _what_ to search for Because `base_dn` is a single value, searching across multiple separate OUs is difficult. Sometimes you can find a common root and set `base_dn` to something that contains both OUs, and then use filters to select only the OUs you care about, but that gets difficult quickly and most people resort to running multiple `windows_destop_service`s so that they can configure each to search a separate DN. Proposal: deprecate `base_dn` in favor of `search_paths`, which will be an array. ``` windows_desktop_service: enabled: yes ldap: discovery: search_paths: - CN=foo,DC=example,DC=com - CN=bar,DC=example,DC=com ``` If `base_dn` and `search_paths` are both specified, then we just append `base_dn` to the set of search paths and search all of them. Make Windows Desktop discovery/reconciler interval configurable What would you like Teleport to do? Make the windows desktop interval optionally manually configurable. What problem does this solve? Currently, Teleport hard codes the reconciller/discovery interval for Windows Desktops at 5 minutes: https://github.com/gravitational/teleport/blob/5570259168e3c458682b394a16e627681394bf46/lib/srv/desktop/discovery.go#L126 The concern is efficiency, and the negative impact to the Active Directory with frequent discovery If a workaround exists, please include it. n/a
[ "https://github.com/gravitational/teleport/commit/8ec15ad0bf02cacbed5eddfea75471b1a6204cd6", "https://github.com/gravitational/teleport/commit/d9b9dc2c7a63b4eade6408ee2a49bc45af31c871", "https://github.com/gravitational/teleport/commit/5d5b4b4b813b4f287262399546b636a42ea48420" ]
2025-03-16T15:29:29Z
https://github.com/gravitational/teleport/tree/142a3bc2c22f25b566f8b5ba57c5e46ee1936e02
[ "if (Test-Path api\\go.mod) { cd api }; go mod download; go build ./..." ]
[ "go test -json ./... > go-test-results.json" ]
[ "cat go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} # Status precedence: keep the strongest observed status precedence = {"pass": 1, "skip": 2, "fail": 3} def set_status(name: str, status: str): # Normalize: remove CR/LF introduced by wrapping, trim spaces norm_name = name.replace("\r", "").replace("\n", "").strip() if not norm_name: return current = results.get(norm_name) if current is None or precedence[status] > precedence[current]: results[norm_name] = status # 1) Strong JSON object-level extraction using bounds around Action action_re = re.compile(r'"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE) test_re = re.compile(r'"Test"\s*:\s*"([^"]+)"', re.IGNORECASE | re.DOTALL) pos = 0 while True: m = action_re.search(log, pos) if not m: break status = m.group(1).lower() a_start = m.start() a_end = m.end() # Find approximate object bounds: previous '{' and next '}\n' (or next '}') # This avoids scanning arbitrary windows and tries to constrain to the current JSON object. obj_start = log.rfind("{", 0, a_start) # End: prefer the next '}\n' if present; otherwise the next '}' after a_end. end_candidate = log.find("}\n", a_end) if end_candidate == -1: end_candidate = log.find("}", a_end) obj_end = end_candidate if end_candidate != -1 else len(log) # Extract Test within the object slice; try ahead first, then whole object slice_ahead = log[a_end:obj_end] m_test = test_re.search(slice_ahead) if not m_test and obj_start != -1: slice_obj = log[obj_start:obj_end] m_test = test_re.search(slice_obj) if m_test: name = m_test.group(1) set_status(name, status) pos = a_end # 2) Fallback: brace-bounded JSON object pattern containing both Action and Test json_obj_re = re.compile( r'\{.*?"Action"\s*:\s*"(pass|fail|skip)".*?"Test"\s*:\s*"([^"]+)".*?\}', re.IGNORECASE | re.DOTALL, ) for m in json_obj_re.finditer(log): status = m.group(1).lower() name = m.group(2) set_status(name, status) # 3) Fallback: textual lines like '--- PASS: TestName (...)' text_status_re = re.compile( r'---\s+(PASS|FAIL|SKIP):\s+(.+?)(?:\s*\(|\r?\n)', re.IGNORECASE | re.DOTALL, ) for m in text_status_re.finditer(log): status = m.group(1).lower() name = m.group(2) set_status(name, status) return results
[ "TestParseElastiCacheEndpoint/r", "TestFromProtoNNils/membership-requires", "TestValidateJamfSpecV1/inventory_sync_ful", "TestGetUserLoginStattes", "TestClient_ClusterDetails/cluster_deta", "TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestValidateUserTask", "TestDeleteUserLoginSState", "TestGetUserLoginStatte", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=true_with_Webauthn/sf=optional", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=true_with_Webauthn/sf=on", "TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_missing_identity_provider", "TestDatabaseMemoryDBEndpoint/valid_UURI", "TestUpsertUserLoginSState", "TestNewAutoUpdateVersion//invalid_spec", "TestClusterCredentials/no_tlss_auth_info", "TestClusterCredentials/no_serrver_cert", "TestSSHKeysEqual/rsaKey1-edd25519-prefixed!=ed25519Key2", "TestParseElastiCacheEndpoint/nod", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_passwordless_connector", "TestClient_DialHost/grpc_connection_es", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_headless_connector/sf=on", "TestHardwareKeeyAgentService/RSA2048_SHA512_PSSSaltLengthAuto", "TestClient_DialCluster/grpc_connection_fa", "TestAuditUnmarshaling/witthout_next_audit_date", "TestNil", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=true_with_Webauthn/sf=webauthn", "TestProvisionTokenV2_CheckAndSetD", "TestJoinServiceClient_RegisterUsinggTPMMethod", "TestProxyListenerModeUnmarshalYAML/iinvalid_value", "TestGCPMatcherCheckAndSetDefaults/noo_project_id", "TestSSHKeysEqual/rsaKey1-", "TestExpiryConsistency/zero_expir", "TestDatabaseSpanner/invalid_missing__project_and_instance_id_for_spanner_endpoint", "TestValidateJamfSpecV1/inventory_on__missing_invalid", "TestDatabaseSpanner/valid_without_urri", "TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_only_workspace", "TestDatabaseRDSEndpoint/invalid_accoount_id", "TestRoundtrip", "TestFromMap", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_aliased_to_Webauthn", "TestProvisionTokenV2_CheckAndSetDefaaults/terraform_only_names", "TestNewClient/does_not_implemment_transport", "TestExpiryConsistency/zero_expiry/GeetExpiry()_wrapper", "TestDeduplicate/slice_with_unique_ellements", "TestNewClient/compliant_grpc__server", "TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_only_repository", "TestGCPMatcherCheckAndSetDefaults/wiildcard_is_valid_for_project_ids", "TestClient_DialCluster/grpc_cconnection_fails", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_headless_connector/sf=webauthn", "TestExpiryConsistency/zero_expiry/wrrapper_metadata_.Expiry()", "TestExpiryConsistency/zero_expiry/GeetExpiry()_resource", "TestDatabaseAzureEndpoints/valid_MySSQL", "TestDatabaseMemoryDBEndpoint/invalidd_URI", "TestFromProtoNNils/notifications", "TestIsGCPEndpoint/compute_googleeapis", "TestGCPMatcherCheckAndSetDefaults/inval", "TestDatabaseElastiCacheEndpoint/valiid_URI", "TestParseElastiCacheEndpoint/enddpoint_with_schema_and_parameters", "TestPrivateKey/missing_fingerprint_der", "TestIsAzureEndpoint/invalid_end", "TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_missing_workspace_or_repository", "TestClusterCredentials/no_cluuster_oid_set", "TestResourceIDs/", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHeadless", "TestAuditUnmarshaling/with_next_audit_d", "TestGCPMatcherCheckAndSetDefaults/noo_type", "TestGCPMatcherCheckAndSetDefaults/no_project_", "TestDatabaseElastiCacheEndpoint/invaalid_URI", "TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_missing_audience", "TestValidateJamfSpecV1/inventory_nill_entry", "TestIsAzureEndpoint/valid_endppoint_prefix", "TestParseElastiCacheEndpoint/CN__endpoint", "TestSSHKeysEqual/rsaKey1-edd25519-prefixed==rsaKey1-ed25519-prefixed", "TestNewAutoUpdateVersi", "TestValidateJamfSpecV1/inventory_on_missi", "TestValidateJamfSpecV1/inventory_alll_syncs_disabled", "TestDatabaseRDSEndpoint/aurora_instaance", "TestGCPMatcherCheckAndSetDefaults/innvalid_join_method", "TestAuditUnmarshaling/witth_next_audit_date", "TestParseElastiCacheEndpoint/reaader_endpoint,_TLS_disabled", "TestChain", "TestIsGCPEndpoint/top_level_googgleapis", "TestHardwareKeeyAgentService/RSA2048_SHA512_PSSSaltLengthEqualsHash", "TestPrivateKey/valid_derrived", "TestNewAutoUpdateVersion//invalid_empty_agents_start_version", "TestValidateJamfSpecV1/inventory_all_sync", "Test_websocketALPNClientConn/Read", "TestJoinServiceClient_RegisterUsinggOracleMethod", "TestFromProtoNNils/ownership-requires", "TestValidateJamfSpecV1/invento", "TestNewDialerForGRPCClient/Chheck_that_PROXYHeaderGetter_if_present_sends_PROXY_header_as_first_bytes_on_the_cconnection", "TestExpiryConsistency/zero_expiry/wrapper", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_passwordless_connector/sf=optional", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_aliased_to_Webauthn/sf=u2f", "TestDatabase", "TestMySQLVersionValidation/incorrectt_config_-_wrong_protocol", "TestGCPMatcherCheckAndSet", "TestProvisionTokenV2_CheckAndSetDefaaults/terraform_missing_rules", "TestDisableUnqualifiedLookups/qualified_host", "TestClient_DialHost", "TestProvisionTokenV2_CheckAndSe", "TestValidateJamfSpecV1/inventory_synnc_full_disabled", "TestPrivateKey/missing_ffingerprint_derived", "TestDatabaseRDSEndpoint/discovered_iinstance", "TestClient_ClusterDetails/cluuster_details_fails", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=false_with_Webauthn/sf=webauthn", "TestDeleteAllUserLogginStates", "TestJoinServiceClient_RegisterUsingOracleMet", "TestHardwareKeeyAgentService/RSA2048_SHA512_PSS_signature", "TestClient_DialHost/grpc_connnection_fails", "TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_success", "TestAuditUnmarshaling/without_next_a", "TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace", "TestIsALPNConnUpgradeRequired/upgraade_not_required_(other_handshake_error)", "TestClient_ClusterDetails/cluuster_details", "TestAuthPreferenceV2_CheckAndSe", "TestIsValidAccountID/invalid_chaars", "TestFromProtoNils/membership-requ", "TestFromProtoNils/ownership-requir", "TestClusterCredentials/clusteer_name_presented", "TestOktaAssignments_SetStatus/pro", "TestDatabaseAzureEndpoints/valid_PosstgreSQL", "TestProxyListenerModeUnmarshalYAML/invalid_v", "TestAuthPref", "TestDatabaseSpanner/invalid_missing_instance_", "TestClusterCredentials/handshhake_error", "TestExpiryConsistency/zero_expiry/GetE", "TestClusterCredentials/cluster_name_pres", "TestMySQLVersionValidation/correct_cconfig", "TestGCPMatcherCheckAndSetDefaults/innvalid_type", "TestProvisionTokenV2_CheckAndSetDefaaults/terraform_only_ids", "TestClient_DialHost/grpc_connnection_established", "TestDeduplicate/slice_with_duplicatee_elements", "TestValidateJamfSpecV1/inventory_synnc_partial_\\u003e_sync_full", "TestSSHKeysEqual/rsaKey1-edd25519-prefixed!=ed25519Key1-alt", "TestValidateJamfSpecV1/inventory_synnc_partial_disabled", "TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestNewDialerForGRPCClient/Check_that_PROXYHead", "TestMetadataIsEqual/name_is_differennt", "TestXxx/invalid_uinnt", "TestDatabaseRDSEndpoint/valid_accounnt_id", "TestPrivateKey/valid_fille", "TestNewAutoUpdateVersion//success_agents_autoupdate_version", "TestExpiryConsistency/zero_expiry/wrrapper_.Expiry()", "TestMySQLVersionValidation/incor", "TestDatabaseSpanner/invalid_missing__project_and_instance_id_for_spanner_protocol", "TestResourceIDs/persistent_volume_claim_resource_name_with_m", "TestDatabaseSpanner/invalid_missing__instance_id", "TestSSHKeysEqual/rsaKey1!=eed25519Key2", "TestValidateJamfSpecV1/inventory_sync_", "TestParseElastiCacheEndpoint/nodde_endpoint,_TLS_disabled" ]
[ "TestRole_GetKubeResources/v7_with_error", "TestDatabasePermission/empty_permisssion_list", "TestParseReviewFrequency/3", "TestCircuitBreaker_beforeRequest", "TestIsGCPEndpoint/localhost", "TestJoinServiceClient_RegisterUsingTPMMethod", "TestClient_DialCluster", "TestExpiryConsistency/nil_expiry", "TestIsALPNConnUpg", "FuzzParseOpensearchEndpoint/seed#5", "TestOpenSearchConfig/custom_URI_wi", "TestCircuitBreaker_success/succe", "TestPluginOktaValidation/SSO_connecttor_ID_required_for_user_sync", "TestLegacySecondFactorFromSecondFacttors/\\\\x01\\\\x02\\\\x03", "TestGetTunnelType/default", "TestAccessRequestConditionsIsEmpty/tthresholds", "TestMatchSearch_ResourceSpecific/dattabase", "TestAppServerSorter/by_description_asc", "TestParseMSSQLEndpoint/withoutt_suffix", "TestOpenSearchConfig/missing_account_is_an_e", "TestExpiryConsistency/set_expiry/", "TestResourceIDs/certificate_signing__request_resource_name_in_cluster_with_slash/ResourceIDsFromStrings", "TestWatchKindContains/no:_subset_has_no_filter", "TestIsTracingSupported", "TestMatchSearch/match_with_nil_searcch_values", "FuzzParseRedshiftEndpoint/seed#4", "TestResourceHeaderIsEqual/nil_equals", "TestSSHKeysEqual/ed25519Keyy1-alt!=rsaKey1-alt", "TestDeduplicateAny", "TestParseReviewFrequency//6_m", "TestProvisionTo", "TestParseAtlasEndpoint/privatee_link_with_srv", "TestRateLimitFailure", "TestProvisionTokenV2_CheckAndSetDe", "TestSSHKeysEqual/ed25519Key1!", "TestServerCheckAndSetDefaults/already_existing_Open", "TestApplicationGetAWSRolesAnywhereProfile", "TestNormalizeLocation", "TestIsRequiredPolicyMet/hardwarre_key_touch_and_pin", "TestEncodeDecodeRequireMFAType/OFF/encode", "TestSecondFactorsFromLegacySecondFacctor/on", "TestDatabaseRDSEndpoint/aurora_instance", "TestResourceIDs/multiple_ids/ResourceIDsFr", "FuzzParseMSSQLEndpoint/seed#1", "Test_PluginOktaSyncSettin", "TestIsPortInRange/within_single_port_range", "TestClient_ClusterDetails", "TestParseO", "TestNewDiscovery", "TestPluginOpenAIValidation/valid_creedentials_(token)", "TestPluginOktaValidation/impor", "TestIsPortInRange/equal_to_range_end", "TestDeduplicateKubeClusters", "TestParse/should_parse:_scheme-host--port", "TestParseDynamoDBEndpoint/detectts_invalid_endpoint_with_unrecognized_streams_service_subdomain", "TestPingError/unsuccessful_response", "TestContextReader_ReadPassworrd/Close", "FuzzParseRDSEndpoint/seed#6", "TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_in_cluster_defaults", "TestRequireKubeLocalProxy/kube_uses_s", "TestCircuitBreaker_Execute/transittion_from_tripped_to_recovering#01", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_passwordless=false_and_passwordless_connnector/sf=webauthn", "TestCheckRoleARN/valid_with_resoource_that_has_spaces", "TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_API", "TestProvisionTokenV2_CheckAndSetDefaaults", "TestSSHKeysEqual/rsaKey2!=rrsaKey1-ed25519-prefixed", "TestExpiryConsistency/set_expiry/wraapper_.Expiry()", "TestGitServerOrgDomain", "TestIsValidIAMPolicyName/valid", "TestCheckerValidateFIPS/RSA2048", "FuzzParseElastiCacheEndpoint", "TestValidateAutoUpdateC", "TestNewSAMLIdPServiceProvider/GCP_Woorkforce_default_relay_state", "TestX509KeyPair/rsa_cert", "TestRetryWithMFA/with_interceptor", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_denied_CA/sf=on", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_allowed_CA/sf=on", "TestResourceIDs/secret_resource_namee_with_missing_namespace_and_pod_name", "TestAccessReviewConditionsIsEmpty/emmpty", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_local_connector/sf=off", "TestCloning/*types.RemoteClusterV3", "TestResourceIDs/persistent_volume_resource_name_with_missing_namesp", "TestSSHKeysEqual/rsaKey2!=rrsaKey1-alt", "TestCircuitBreaker_Execute/remain__in_standby_while_in_new_generation", "TestWatchKindContains/yes:_s", "FuzzParseElastiCacheEndpoint/seed#0", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_denied_CA/sf=optional", "TestPriv", "TestGetCloudMetadataAWS/no_cloud_mettadata", "TestResourceIDs/single_id", "TestInstanceControlLogExpiry", "TestSSHRouteMatcherScoring", "TestFriendlyName/friendly_group_name_", "TestEncodeDecodeRequireMFAType/HARDW", "TestLoadTLS", "TestUploadTraces/successfully_upl", "TestCi", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_with_att", "TestParseRDSEndpoint/RDS_clusterr_reader", "TestCheckAndSetDefaultsWithLink/invaalid_link", "TestDatabaseServerSorter/by_type_desc", "TestPingConnection/PingConnn/BufferSize/Large", "TestParseOpensearchEndpoint/detects_invalid_endpoint_with_unrecognized_service_s", "TestOpenSearchConfig", "TestConvertToPPK/ed25519_key_1", "TestPortRangesContains/0", "TestServerCheckAndSetDefaults/OpenSSSH_node_with_unset_name", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_unrecognized_service_subdomain", "TestIsAtlasEndpoint/azure_privvate_link_with_srv", "TestAzureMatcherCheckAndSetDefaults/valid", "TestIsALPNConnUpgradeRequired", "TestResourceIDs/service_account_resource_name_with_missing_namespace", "TestPluginWithoutSecrets", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_derived_from_n", "TestDatabaseServerSorter/by_type_dessc", "TestDynamoDBConfig/custom_URI_and_miissing_region_is_an_error", "TestIsValidRegion/empty", "TestSSHKeysEqual/rsaKey2!=eed25519Key1-rsa-prefixed", "TestMatchSearch/no_match_for_partiall_custom_match", "TestSSHRouteMatcherScoring/non-uuid__name", "TestRequireKubeLocalProxy/kube_not_enabled", "TestAWSMatcherCheckAndSetDefaults/innvalid_assume_role_arn", "TestNewSAMLI", "TestMatchSearch/no_match_for_partiall_match", "TestReadWriter_WriteChunk", "TestReviewSpecMarshaling", "TestResourceIDs/bad_resource_kind/Res", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless=false_without_Webauthn", "FuzzParseDatabaseEndpoint/seed#2", "TestIsValidIAMRoleName/valid", "TestPluginDatadogValidation/no_api_endpoint", "FuzzParseDatabaseEndpoint/seedd#2", "TestCircuitBreaker_success/success_in_standby", "TestValidateUserTask/DiscooverRDS:_missing_region", "TestSSHKeysEqual/rsaKey2!=rsaKey1", "Test_PluginOktaSyncSettings_SyncEnabledGetters", "TestIterateResources", "TestResourceIDs/certificate_signing__request_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless_defaults_to_false_without_Webauthn/sf=otp", "TestRouteToServer/match_addr_with_empty_port", "TestChangePIN/set_ppuk_mismatch", "TestIsValidIAMPolicyName/only_one_symbol", "TestIsEICE/eice_node_with_account_annd_instance_id_labels_is_EICE", "TestPluginDatadogValidation/valid_credentials", "TestCollectPages/singgle-element-case", "TestPingConnection/PingTLSCConn/ConcurrentReads", "TestIsAtlasEndpoint/internal_name", "TestIsValidIAMPolicyName/all_symmbols", "TestParse", "TestValidateAutoUpdateAgeentRollout/valid_time-based_rollout_with_groups", "TestNewAutoUpdateVersion/inva", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/YAML/Unmarshal", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_with_attestati", "TestParseWeekdays/Invalid_days", "TestPingConnection/PingTLSConn/Buffer", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_unknown_connector/sf=off", "TestIsValidIAMPolicyName", "TestAccessListMemberDefauults/added-by_required", "TestSSHKeysEqual/ed25519Key1!=ed25519Key2", "TestPageFunc", "TestSecondFactorsFromLegacySecondFactor/on", "TestIsMSSQLServerEndpoint/without_suffix", "TestAlertAcknowledgement_Check/empty", "TestParseWeekdays/Nil_slice", "TestDatabaseSpanner/invalid_missing_project_id", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_SSO", "TestEncodeDecodeSecondFactorType", "TestClient_DialClust", "TestIsAutoUsersEnabled/postgres_without_ad", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_allowed_CA/sf=optional", "TestValidateJamfSpecV1/api_endpoint__empty_hostname", "TestWrapPayload", "TestAccessList_setInitialReviewDate", "TestCircuitBreaker_beforeRequest/sstandby_allows_execution", "TestGRPCErrorWrappping", "FuzzParseDatabaseEndpoint/seed#4", "TestKubeServerSorter", "TestPluginEntraIDValidation/empty_deefault_owners", "TestCircuitBreaker_beforeRequest/ttripped_prevents_executions", "TestProxyAwareRoundTripper", "TestResourceIDs/cluster_role_resource_name_with_missing_namespace_and_p", "TestPluginOpenAIValidation/no_credentials_inn", "TestParseRDSEndpoint/Redshift_endpoint_fails", "TestRetryWithMFA/wwith_interceptor/nok_mfa_ceremony", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed==ed25519Key1-rsa-prefixed", "TestAWSMatcherCheckAndSetDefaults/innvalid_region", "TestServerCheckAndSetDefaults/invaliid_GitHub_server", "TestCliient_DialCluster/connection_successfully_established", "TestNewAppV3/app_with_no_CORS_policy", "TestCheckerValidateFIPS/ECDDSAP384", "TestCircuitBreaker_Execute/e", "TestOktAssignmentIsEqual/last_transiition_is_different", "TestTake/drain_stream_of_size_n", "TestResourceI", "TestProvisionTokenV2_CheckAndSetDefaaults/ec2_method_empty_rule", "TestParseAtlasEndpoint/private_link_with_s", "FuzzParseElastiCacheEndpoint/seed#15", "TestValidateUserTask/DiscooverRDS:_missing_discover_rds_field", "TestRoleV6CheckAndSetDefaults_SAMLIddPOptions/samlidp:_idp_option_enabled_in_role_version_v7_and_below", "TestPluginOktaValidation/valid_values_are", "TestNewAutoUpdateVersion/i", "TestIsLoopback/localhost_should_return_true", "FuzzParseOpensearchEndpoint/seed#3", "TestProvisionTokenV2_CheckAndSetDefaaults/terraform_missing_specific_resource", "TestPluginJamfValidation/valid_credeentials_(static_credentials)", "TestGetResourcesWithFilters/WindowsDesktop", "TestLoadIdentityFile", "TestALPNDialer_getTLSConfig", "TestResourcesWithLabels_ToMap/first_duplic", "TestSSHKeysEqual/rsaKey1!=rsaKey2", "TestAccessList_setInitiallReviewDate/one_month,_last_day", "TestPlainHttpFallba", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_headless_connector", "TestProvisionTokenV2_CheckAndSetDefaaults/gcp_method_no_project_ids", "TestServerCheckAndSetDefaults/g", "TestHostKeyCallback", "TestOktAssignmentIsEqual/cleanup_time_is_d", "TestParseElastiCacheEnd", "TestLoadProfile/non_existent_profille", "TestDatabaseSelfHosted/ec2_hostname", "TestNewAutoUpdateConf", "TestNewAppV3/aws_app_CLI_only", "TestAllDevi", "TestX509KeyPair/rsa_certs", "TestValidatePortRange/end_port_ssmaller_than_port", "TestIsResponseSuccessful/codes.Cannceled_error", "TestResourceIDs/cluster_role_binding_resource_name_with_missing", "TestEventEqual/regular_protobuf_oneof_equal", "TestParseMSSQLEndpoint/only_suffix", "TestParseRDSEndpoint/RDS_instance_in_cn-n", "TestResourceHeaderRRoundtrip", "TestNew/synchronously_dial_addr/creed_pairs_and_succeed_with_the_1_good_pair.", "TestAppIsAWSConsole/AWS_GovCloud_", "TestAWSMatcherCheckAndSetDefaults", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_passwordless_connector/sf=on", "TestMatchSearch_ResourceSpecific/windows_des", "FuzzParseRedshiftEndpoint/seed#11", "TestDeduplicateOwners", "TestNotifyExit_restoresTerminal", "TestOktaAssignments_SetStatus/success", "TestAccessRequestConditionsIsEmpty", "TestContainSameUniqueElements", "TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_missing_static_jwks", "TestEncodeDecodeRequireMFAType/HARDWAR", "TestDatabaseAzureEndpoints/valid_Redis", "TestValidateUserTask/nil_user_task", "FuzzParseCacheForRedisEndpoint/seed#2", "TestValidateUserTask/DiscooverRDS:_invalid_issue_type", "TestResourceIDs/bad_resource_name/Re", "TestMatchSearch_ResourceSpecific/appp_server", "TestWatchKindContains/no:_different__names", "TestPluginOktaValidation/SSO", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed!=rsaKey1", "TestMetadataIsEqual/populated_equals", "TestNewSAMLIdPServiceProvider/valid__attribute_mapping", "TestCliient_DialCluster/stream_terminated", "TestValidateDatabaseName/invalid_first_chara", "TestIsOpenSSHNodeSubKind/openssh_using", "TestALPNConnUpgradeDialer/connectioon_upgrade", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_passwordless_connector/sf=off", "TestRoleGitHubPermissions", "TestCountBy/even-odd", "TestAllDeviceEnumsMapped/OSType/OS_TTYPE_MACOS", "TestGetUserLoginStatees", "TestCheckRoleARN/valid_when_resoource_section_has_:", "TestParseReviewFrequency/1months", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_second_factor_enforced/sf=on", "TestResourceIDs/cluster_role_resourcce_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestDynamoDBConfig/account_and_regioon_and_custom_URI_is_correct", "TestEventEqual/gogo_oneof_not_equall", "TestOktAssignmentIsEqual/cleanup_timme_is_different", "TestProvisionTokenV2_CheckAndSetDefaaults/tpm_missing_rules", "TestGetPartitionFromRegion/us-gov-east-1", "TestValidLabelKey", "TestParseAtlasEndpoint/azure_private_link", "TestMergeStreams/inteerlaced_streams", "TestSemVersion", "TestParseElastiCacheEndp", "TestNotifyExit_restoresTerminal/", "TestNewAutoUpdateVers", "TestOktAssignmentIsEqual/populated_eequals", "TestResourceIDs/configmap_reso", "TestSkip", "TestProvisionTokenV2_CheckAndSetDefaaults/gcp_method", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=loca", "TestRoleV6CheckAndSetDefaults_SAMLIdPOptions/samlidp:_idp_option_enable", "TestNewDiscoveryConfig/valid", "TestDynamoDBConfig/invalid_AWS_accouunt_ID_is_an_error", "TestALPNConnUpgradeDialer/connectioon_upgrade_API_not_found", "TestInventoryControlStreamPipe", "TestResour", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless_defaults_to_false_without_Webauthn/sf=off", "TestMergeStreams/stream_A_empty", "TestProvisionTokenV2_CheckAndSetDefaaults/github_slug_and_ghes_set", "TestKubeMatcherCheckAndSetDefaults/valid", "TestTrimToMaxSize/with_metadaata", "TestResourceIDs", "TestParseReviewFrequency/12month", "FuzzParseCacheForRedisEndpoint/seed#3", "TestValidateAutoUpdateConfig/", "TestCloning/*types.AccessRequestV3", "TestToGRPC_statusError/unwrapped_status", "TestIsValidAccountID/empty", "TestNewSAMLIdPServiceProvider/http_launch_url", "TestEventEqual", "TestCircuitBreaker_Execute/no_errors", "TestALPNDialer_getTLSConfig/missing_tls_confi", "FuzzParseDatabaseEndpoint", "TestParseReviewFrequency//12month", "TestRouteToServer/match_addr", "TestIsALPNConnUpgradeRequired/upgraade_required_(handshake_success)/direct", "TestAllDeviceEnumsMapped/DeviceAttesstationType/DEVICE_ATTESTATION_TYPE_TPM_EKCERT_TRUSTED", "TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_empty_allow_rules", "TestPingConnection/PingConnn/BufferSize/Short", "TestNewAppV3/app_with_required_apps_list", "TestProxyListenerModeMarshalYAML/default_value", "FuzzParseRedshiftEndpoint/seed#1", "TestPingConnection/PingTLSCConn/BufferSize/Large", "TestUnmarshallCreateDatabaseUserModeJSON", "TestReviewToPrrotoChanges", "TestAppPortsValidation/end_port_bigger_than", "TestIsSSHCert/opensesame@openssh.com", "FuzzParseOpensearchEndpoint/seedd#5", "TestALPNConnUpgrade", "TestSSHKeysEqual/ed25519Keyy1-alt!=rsaKey1", "TestParseMemoryDBEndpoint/e", "TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v5", "TestIsALPNConnUpgradeRequ", "TestPluginOpsgenieValidation/no_static_cre", "TestContextReader/close_ConteextReader", "TestAccessListMemberDefaults/added-", "TestParseReviewFrequency/6_m", "TestPluginOktaValidation/EnableUserSSync_defaults_to_false", "TestProvisionTokenV2_CaseInsensitiv", "Tes", "TestRole_AllowRequestKubernetesResource/invalid_kind_", "TestValidateAutoUpdateConnfig/groups_with_same_names", "TestRole_AllowRequestKubernetesResouurce/valid_wildcard_value", "TestInstanceFilter/match-new", "TestContextReader/close_underrlying_reader", "TestAllDeviceEnumsMapped", "TestParsePri", "TestParseDocumentDBEndpoint/DocuementDB_", "TestDatabaseGCPCloudSQL/", "TestResourceIDs/configmap_resource_nname_with_missing_namespace", "TestDatabaseSelfHosted/localhost", "TestDynamoDBConfig/missing_account_iid", "TestValidateUserTask/DiscoverRDS:", "TestUpsertUserLoginState", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_AllowHeadless=true_without_Webauthn/sf=otp", "TestIsEICE/eice_node_without_accoun", "TestUnifiedNameCompare", "TestPluginDatadogValidation/static_ccredentials_labels_not_defined", "TestResourceIDs/resource_name_with_sslash/ResourceIDsFromStrings", "TestConversion/io.EOF", "TestValidateAutoUpdateConnfig/first_group_with_non_zero_wait_days", "TestParseReviewFrequency/1_month", "TestGetCloudMetadataAWS/cloud_metadata_w", "TestGCPMatcherCheckAndSetDefaults/default_va", "TestSAMLForceAuthn/force_authn_unspecified", "TestApplicationGetAWSRolesAnywherePrrofile", "TestParseElastiCacheEndpoint/reaader_endpoint,_TLS_enabled", "TestResourceIDs/secret_resource_namee_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestMemberFrommProtoNils/joined", "TestNewSAMLIdPServiceProvider/invaliid_attribute_mapping_name_format", "TestPluginOktaValidation/valid_valuees_are_preserved", "TestNewAutoUpdateConfig/invalid_agents", "TestParseReviewFrequency/6", "TestParsePrivateKeyPolicyError/wrapp", "TestValidateUserTask/DiscooverRDS:_missing_integration", "TestPluginEmailSettings", "TestDatabaseServersToDatabases", "TestChangePIN/set_ppin_short", "TestWatchKindContains/yes:_superset__and_subset_have_no_CA_filter", "TestSSHKeysEqual/rsaKey1-allt!=ed25519Key1-alt", "TestPluginJamfValidation/no_settingss", "TestHttpRoundTripperDowngrade/hits_hhttp_proxy_if_insecure_and_localhost_http_proxy_is_set", "TestMFADevice_Unmarshal", "TestPrivateKey_Prommpt/policy:{TouchRequired:true_PINRequired:false}", "TestSecondFactorsFromLegacySecondFactor/otp", "TestGetAdminUser/gets_admin_from_spec_i", "TestResourceIDs/persistent_volume_reesource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestResourcesWithLabels_ToMap/empty", "TestDatabaseSpanner/valid_with_uri", "TestHardwareKeeyAgentService/ED25519_SHA512", "TestALPNConnUpgradeDialer/connectioon_upgrade_with_ping/with_ProxyURL", "TestIsValidAthenaWorkgroupName/empty", "TestNew/successfully_dial_tcp_addreess.", "FuzzParseMSSQLEndpoint/seed#4", "TestNewSAMLIdPServiceProvider/unsuppor", "TestClient_SSHConfig", "TestAppPortsValidation/uri_specifiess_port", "TestConvertToPPK/RSA_key_1", "TestALPNConnUpgradeDialer/connectioon_upgrade_API_not_found/with_ProxyURL", "TestParseTeleportRoles/nOdE,prOXY", "TestAlertAcknowledgement_Check/success", "TestIsSSHCert/ecdsa-sha2-nisttp256-cert-v01@openssh.com", "TestOktaAssignments_SetStatus/successsful_-\\u003e_processing", "TestNewDiscoverEKSUserTask", "TestMergeStreams/bothh_streams_empty", "TestResourc", "TestIsValidIAMRoleName/invalid_symbols", "TestPluginOpsgenieValidation/valid_ccredentials_(static_credentials)", "TestResourceMethods/GetExpiry", ": TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowPasswordless=true", "TestLicenseSettersAndGetters/Set_Trial_Support", "TestResourceIDs/secret_resource_namee_in_cluster_with_slash", "TestApplicationGetAWSRolesAn", "TestShortRegionToRegion/invalid_direction", "TestMFADevice_CheckAndSe", "TestRole_AllowRequestKubernetesResouurce/valid_multi_values", "TestParseDynamoDBEndpoint/detectts_invalid_endpoint_with_mismatched_china_region_and_non-china_partition", "TestMemberFrommProtoNils", "TestIsValidRegion/us_region", "TestInput/no_whitespace", "TestNewAutoUpdateAgentRolllout/invalid_schedule_name", "TestTrimToMaxSize/UserLogin_event_with_er", "TestMatchSearch_ResourceSpecific/node", "TestInstanceFilter/match-update-group", "TestResourceHeaderIsEqual/subkind_iss_different", "TestParseReviewFrequency/3months", "TestCheckRoleARN/invalid_when_thhe_resource_is_not_role", "TestServerCheckAndSetDefaults/Ope", "TestParseReviewFrequency//6months", "TestMemberFromProtoNils", "TestReviewRounndtrip", "TestCassandraAWSEndpoint/aws_cassanddra_custom_fips_uri", "TestOktaAssignments_SetStatus/pendin", "TestResourceAttestationType_toAndFrom/tpm_ek", "TestRole_GetKubeResources/v7_with_laabels_expression", "TestALPNConnUpgradeDialer/connectioon_upgrade/direct", "TestParse/empty_addr", "TestAppServerSorter/by_name_desc", "TestIsPortInRange/within_port_range", "TestSSHKeysEqual/rsaKey1-alt=", "TestClusterCredentials/no_cluster_oid_set", "TestOktAssignmentIsEqual/empty_equals", "TestIsLoopback/Any_non-looback_add", "TestSelectNextReviewDate/one_mon", "TestValidateUserTask/DiscooverEC2:_missing_account_id", "TestAWSMatcherCheckAndSetDe", "TestIsALPNConnUpgradeRequiredByEnv//upgraded_not_required_(for_all_addr)", "Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_access_list_sync_enabled", "FuzzParseRedshiftEndpoint/seed#2", "TestMetadataIsEqual/one_is_nil", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_arbitrary_connector", "FuzzParseRedshiftEndpoint/seed#00", "TestLicenseSettersAndGetters/Set_Usaage_Based_Billing", "TestCircuitBreaker_Exec", "TestRole_GetKubeResources/v6_to_v7_with_wild", "TestIsValidAccountID/invalid_chars_with_em", "TestGetProxyAddress", "TestRetryWithMFA_Reuse/ok_allow_reuse", "TestDatabaseGCPCloudSQL/gcp-instancee-id-specified-without-project-id", "TestPluginOpsgenieValidation", "TestMySQLServerVersion", "TestParseDynamoDBEndpoint/detectts_invalid_endpoint_with_unrecognized_service_subdomain", "TestValidateJamfSpecV1/minimal_spec", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed==ed25519Key1-alt", "TestGetPolicyFromSet/pin_policyy", "TestMapToStrings", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_integrationn", "TestRedshiftServerlessEndpoint", "TestRoleFilterMatch/c", "TestGithubAuthRequestCheck/invalid-cconnector-spec-set-for-regular-flow", "TestExponential", "TestSSHKeysEqual/ed25519Key1-rsa-", "TestResourceIDs/n", "TestCircuitBreaker_failure", "TestDatabaseRDSEndpoint/invalid_account_id", "TestNewSAMLIdPServiceProvider/aws-iddentity-center_preset", "TestAllDeviceEnumsMapped/DeviceAttesstationType/DEVICE_ATTESTATION_TYPE_UNSPECIFIED", "TestGetCloudMetadataAWS/cloud_m", "FuzzParseElastiCacheEndpoint/seed#16", "TestOktaAssignments_SetStatus/processsing_-\\u003e_pending", "TestGetAdminUser/gets_admin_from_spec", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_minimal_configuration/sf=webauthn", "TestResourceIDs/bad_resource_kind/Re", "TestNewAutoUpdateConfig/s", "TestMySQLVersionValidation/correct_config", "TestProvisionTokenV2_CheckAndSetDefaaults/tpm_corrupt_CA", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHea", "TestHttpRoundTripperDowngrade/does_nnot_hit_http_proxy_if_insecure_and_localhost_http_proxy_is_not_set", "TestWithinUpgradeWindow", "TestWindowsDesktopsSorter/by_name_deesc", "TestParseDynamoDBEndpoint", "TestAppPublicAddrValidation/kubernetes_app_h", "TestServerCheckAndSetDefaults/Op", "TestPrivateKey/valid_file", "TestMetadataIsEqual/labels_is_different", "TestValidateAuto", "TestParseElastiCacheEndpoint/invalid_suffix", "TestNewAuthPreference_secondFactors//OK_default_to_OTP", "TestHardwareK", "TestParseWeekdays", "TestWatchKindContains/yes:_subset_ha", "TestValidateJamfSpecV1/nil_spec", "TestIsSSHCert", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless=false_with_Webauthn/sf=webauthn", "TestNew/fail_to_dial_with_no_address_or_dial", "TestIsAutoUsersEnabled/postgres_withhout_admin_user", "TestRoleFilterMatch/correct_search_kkeyword_should_match_the_system_role", "TestOpenSearchConfig/AWS_URI_for_wrong_service", "TestParse/should_not_parse:_i", "TestCheckRoleARN/invalid_when_resource_", "TestNewJitter/HalfJitter", "TestSecondFactorsFromLegacySecondFactor/opti", "TestDeleteUserLoginState", "TestResourceAttestationType_toAndF", "TestDynamoDBConfig/configured_externnal_ID_but_not_assume_role_is_ok", "TestRateLimitFailure//limiter-graceful", "TestResourceIDs/namespace_resource_nname_in_cluster_with_slash/ResourceIDsFromString", "TestIntegrationJSONMarshalCycle", "TestCliient_ClusterDetails/details_retrieved_successfully", "TestCheckerValidateFIPS/ECDSAP224", "TestCassandraAWSEndpoint/aws_cassandra_cust", "TestIsLoopback/DNS_failure_should_return_false", "TestRoundttrip", "TestParsePrivateKe", "TestResourceIDs/certificate_signing__request_resource_name_in_cluster_with_slash", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_passwordless=false_and_passwordless_connnector", "TestGetPolicyFromSet/touch_policy_and_p", "TestPluginDatadogValidation/no_fallbback_recipient", "TestResourceIDs/no_cluster_name/Resourc", "TestPluginOktaValidation/EnableUser", "ExampleIsALPNConnUpgradeRequired", "TestAccessRequestFilter", "TestDynamoDBConfig/account_and_regioon_and_empty_URI_is_correct", "TestResourceIDs/namespace_resource_name_with_missing_namespace_and_pod_nam", "TestIsValidLabelKey/forward_slashes_and_", "TestAll/empty_slice", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_PIN/encode", "TestParseCorruptedKey/RSA_PRIVATE_KEY", "TestIsSSHCert/opensesame@opennssh.com", "TestConversion/Aggregated_BadParameter", "TestIsValidPartition/govcloud", "TestCircuitBreaker_afterExecution//generation_change", "TestResourceIDs/service_", "TestValida", "TestALPNConnUpgradeDialer/connection_upg", "TestInstanceFilter/match-version-range", "TestContextReader_ReadPassworrd", "TestFriendlyName/friendly_app_name_", "TestMFADevice_CheckAndSetDefa", "TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace_and_pod_name", "TestLicenseSettersAndGetters/Set_Macchine_ID_Support", "TestParseDocumentDBEn", "TestProvisionTokenV2_SignupRole", "TestIsValidIAMPolicyName/valid_with_numbers", "TestTake/empty_stream", "TestIsALPNConnUpgradeRequired/upgraade_not_required_(proto_negotiated)/with_ProxyURL", "TestAzureMatcherCheckAndSetDefaults//no_type", "TestNewAuthPreference_secondFactors", "TestGithubAuthRequestCheck", "Test_websocketALPNClientConn/Write", "ExampleMap", "TestResourceIDs/cluster_role_bindingg_resource_name_in_cluster_with_slash/ResourceIDsFromStrings", "TestParseReviewFrequency/1_y", "FuzzParseDynamoDBEndpoint/seed#3", "FuzzParseDatabaseEndpoint/seedd#3", "TestOpenSearchConfig/re", "FuzzParseElastiCacheEndpoint/seed#1", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_second_factor_enforced", "TestIsLoopback/localhost_with_port_sshould_return_true", "TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_empty_allow_rule", "TestGetProxyAddress/1_2:_valid,_raw__host:port_works_for_https_with_special_characters_in_password", "TestDatabasePermission/valid_permissions", "TestRole_AllowRequestKubernetesResource", "TestDeleteAllUserLoginStates", "TestIsEICE/eice_node_with_ac", "TestAuthPreferenceV2_CheckAndSetDefault", "TestEncodeDecodeRequireMFAType/SESSIION_AND_HARDWARE_KEY/decode", "TestSSHKeysEqual/rsaKey2!=eed25519Key1", "TestPluginJiraValidation/Invalid_Creedential_Type", "TestSSHRouteMatcherScoring/non-uuid_name", "TestParseDynamoDBEndpoint/detects_invalid_endpoint_with_unrecognized_strea", "TestResourceIDs/kube_node_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestNewDiscoverEC2UserTask", "TestCliient_ClusterDetails/error_getting_details", "TestAllDeviceEnumsMapped/Devi", "TestSSHKeysEqual/ed25519Keyy1==ed25519Key1-alt", "TestParseReviewDayOfMonth/15", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEndpoint", "TestIsGCPEndpoint/top_level_googleapis", "TestCircuitBreaker_Execute/error_remain_tri", "TestIsAutoUsersEnabled/postgres_withh_admin_user", "TestValidateAutoUpdateConnfig/group_with_non_zero_wait_days_on_a_time-based_config", "TestDatabaseMemoryDBEndpoint/invalid_URI", "TestValidateUserTask/DiscoverRDS:_valid", "TestLicenseSettersAndGetters/Set_Modderated_Sessions_Support", "TestNewSAMLIdPServiceProvider/aws-id", "TestSecondFactorsFromLegacySecondFacctor/off", "TestALPNDialer_getTLSConfig/no_u", "FuzzParseElastiCacheEndpoint/seeed#21", ": TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_AllowHeadless=true_wi", "TestRole_GetKubeResources/v6_to_v7_wwith_wildcard", "TestParseAtlasEndpoint/privatee_link", "TestSSHKeysEqual/ed25519Keyy1-alt==ed25519Key1", "TestResourceIDs/namespace_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestWithOwnersIneligibleStatusField", "TestValidateUserTask/DiscoverRDS:_", "TestOpenSearchConfig/custom_URI_with_r", "TestIsEC2NodeID/foo", "TestMetadataIsEqual/namespace_is_different", "TestAzureMatcherCheckAndSetDefaults//valid", "TestSelectNextReviewDate/one_month,_l", "TestResourceIDs/persistent_volume_claim_resource_name_with_mi", "TestMatchesWildcard/Wildc", "TestCheckRoleARN/valid", "FuzzParseOpensearchEndpoint/seedd#3", "TestProxyListenerModeUnmarshalYAML/multiplex", "TestFromPrrotoNils", "TestMetadataRoundtrip", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowL", "TestParseReviewFrequency//1month", "TestParseDocumentDBEndpoint/DocuuementDB_instance", "TestInput/with_whitespace", "FuzzParseRedshiftEndpoint/seed#0", "TestValidateAssumeStartTime/start_tiime_too_far_in_the_future", "TestResourceIDs/pod_resource_name", "TestNewDiscoveryConffig/fills_in_azure_matcher_default_values", "TestServerSorter/by_hostname_asc", "FuzzParseOpensearchEndpoint/seedd#1", "TestUnmarshallCreateHostUserModeJSON", "TestConvertToPPK/ed25519_key_2", "TestNextAuditDateZeroTime", "TestMarshalAndParseKey", "TestLockTargetMapConversions", "TestResourceIDs/k", "TestMetadataIsEqual/expires_is_different", "TestSSHKeysEqual/ed25519Key2!=rsaKey2", "TestPluginJiraValidation/Missing_Settings", "TestIsValidLabelKey/periods_and_colons", "TestApplicationGetAWSRolesAnywherePrrofile/configured", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES/JSON/Marshal", "TestMatchSearch_ResourceSpecific/nodde_using_tunnel", "TestProvision", "TestWatchKindContains/yes:_superset_has_", "TestGetPartitionFromRegion/us-gov-west-1", "TestChangePIN/validd_pin,_valid_puk", "TestPluginOpenAIValidation/no_credentials", "TestPluginAWSICSettings/missing_provisi", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_minimal_configuration/sf=otp", "TestRequireKubeLocalProxy/kube_usees_separate_listener", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_empty/sf=webauthn", "TestDynamoDBConfig/account_and_AWS_sstreams_dynamodb_URI_and_empty_region_is_correct", "TestParseRDSEndpoint/RDS_proxy", "TestIsValidGlueResourceName/symbbols", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_NO/YA", "TestIsALPNConnUpgradeRequiredByEnv//upgraded_required_(for_all_addr)", "TestAppPublicAddrValidation/public_aaddress_with_internal_kube_ServerName_prefix", "TestAllDeviceEnumsMapped/OSType", "TestReadWriter_Write", "FuzzParseOpensearchEndpoint/seed#2", "TestResourceIDs/cluster_role_binding_resource_name_with_missing_", "TestOktAssignmentIsEqual/targets_both_nil", "TestRouteToServer/mismatch_public_adddr_with_wrong_port", "TestDynamoDBURIForRegion/china_nnorth_region_is_in_correct_AWS_partition", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_denied_CA/sf=webauthn", "TestGetResourcesWithFilters/KubeServer", "FuzzParseCacheForRedisEndpointt/seed#4", "TestRetryWithMFA/with_i", "TestOIDCClaimsRoundTrip/full", "TestResourceIDs/persistent_volume_reesource_name_in_cluster_with_slash/ResourceIDsFromString", "TestAppPortsValidation/valid_ranges_and_", "TestServerSorter/by_addr_asc", "FuzzParseRDSEndpoint/seed#12", "FuzzParseOpensearchEndpoint/seedd#0", "TestWithinUpgradeWindow/not_within_", "TestResourceHeaderIsEqual/metadata_is_differe", "TestProvisionTokenV2_CheckAndSetDefaul", "FuzzParseDatabaseEndpoint/seed#0", "TestLinearRetryMax/HalfJitter", "TestEncodeDecodeRequireMFAType/SESSION", "TestDisableUnqualifiedLookups/foo.localhost", "TestResourcesWithLabels_ToMap/simple_list", "TestIsValidIAMRoleName/too_large", "TestNewAppV3/invalid_cloud_identifier", "TestServerInfoSetLabels/leave_other__labels_alone", "TestOktAssignmentIsEqual/user_is_diffferent", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_arbitrary_connector/sf=webauthn", "TestFromProtoNNils/grants", "TestResourceIDs/pod_resource_name_inn_cluster_with_slash/ResourceIDsFromStrings", "TestAWSMatcherCheckAndSetDefaults/valid", "TestNotifyExit_restoresTerminnal/pending_password_read", "TestProvisionTokenV2_CheckAndSetDefaaults/tpm_success_with_CA", "TestRetry", "TestParseRedshiftEndpoint", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed!=rsaKey1-ed25519-prefixed", "TestRole_GetKubeResources/v5_to_v7_wwithout_kube_labels", "TestParsePrivateKeyPolicyEr", "TestUnifiedNameCompare/sort_with_different_c", "TestWatchKind", "TestParseElastiCacheEndpoint/p", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_SSO/decode", "TestFromHeaderMMetadata", "TestIsLoopback/degenerate_port_shoulld_return_true", "TestDynamoDBConfig/invalid_AWS_URI_is_an_error", "TestProvi", "TestHardwareKeeyAgentService/EC256_SHA512", "TestMatchSearch/match_with_nil_search_values", "TestGetPartitionFromRegion/us-eaast-1", "TestResourceIDs/service_account_resoource_name_with_missing_namespace/ResourceIDsFromString", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_with_attestation_CAs", "TestIsSSHCert/ssh-ed25519-cerrt-v01@openssh.com", "TestAuthPr", "TestAppServerSorter", "TestRole_GetKubeResources/v6_to_v7_wwithout_wildcard", "TestParseAtlasEndpoint/public__endpoint_with_srv", "TestResourceIDs/secret_resource_namee_with_missing_namespace", "TestPortRangesContains/10", "TestHardwareKeyAgentService/fallba", "TestAllDeviceEnumsMapped/DeviceEnrolllStatus", "TestRole_AllowRequestKubernetesResouurce/invalid_kind_(kube_cluster_is_not_part_of_Kubernetes_subresources)", "TestParseElastiCacheEndpoint/connfiguration_endpoint,_TLS_disabled", "TestPluginOpsgenieValidation/no_api__endpint", "TestNewJitter", "TestProvisionTokenV2_CaseInsensitiveRoles", "TestRateLimitFailure//limiter-only", "TestPingConnection/PingTLSConn/Concur", "TestClusterMaintenanceConfigDefault", "TestPingConnection/PingConnn/BufferSize", "TestParse/file://host/path", "TestExpiryConsistency/nil_expiry/GetExp", "TestIsPortInRange/bigger_than_raange_end", "TestGetResources/DatabaseServer", "TestPluginEntraIDValidation/valid", "TestRouteToServer/mismatch_hostname__over_tunnel", "TestResourceHeaderIsEqual/subkind_is_different", "TestExpiryConsistency/set_expiry/wraapper_metadata_.Expiry()", "TestMemberFromProtoNils/added_by", "TestAppPortsValidation/valid_non-", "TestResourcesWithLabels_ToMap", "TestAppPortsValidation/end_port_biggger_than_65535", "TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_missing_static_jwks.jwks", "TestNewAuthPref", "TestNewJitter/FullJitter", "TestWithinUpgradeWindow/within_upgraade_window_weekday", "TestSSHKeysEqual/rsaKey1!=eed25519Key1", "TestValidateUserTask/DiscoverE", "TestOktaAssignments_SetStatus/failed_-\\u", "TestPingConnection/PingConnn/ConcurrentWrites", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_AllowHeadless=true_without_Webauthn", "TestIsAzureEndpoint/empty", "TestGetSortByFromString/hostname:ascc", "TestParseMemoryDBEndpoint", "TestParseTeleportRoles/Auth_,_Proxy,Window", "TestALPNDialer_getTLSConfig/no_updaate_when_upgrade_required", "TestNewDiscoveryConfig", "TestResourceIDs/pod_resource_name_in_", "TestEncodeDecodeRequireMFAType/HARDWARE_KEY_P", "TestAllDeviceEnumsMapped/DeviceOrigin", "TestRole_GetKubeResources/v6_to_v7_withou", "TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace/ResourceIDsFromStrings", "TestNewDialBackground", "TestAccessRequestConditionsIsEmpty/eempty", "TestNewDiscoveryConffig/valid", "TestPluginDatadogValidation/no_statiic_credentials", "TestIsValidLabelKey/alphanumeric_key", "TestChangePIN/set_puk_short", "TestAllDeviceEnumsMapped/DeviceEnrolllStatus/DEVICE_ENROLL_STATUS_ENROLLED", "TestNewSAMLIdPServiceProvider/missinng_attribute_name", "TestParsePrivateKeyPolicyError//policy_error_string_contained_in_error", "TestNewDiscov", "TestNewAutoUpdateConfig/ssuccess_agents_autoupdate_halt-on-failure", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed!=rsaKey2", "TestMFAPerRPCCredentials", "TestValidateAssumeStartTime/star", "TestIterateResources/paginator_error", "TestResourceIDs/service_account_resoource_name_with_missing_namespace", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc_and_loc", "TestSAMLForceAuthn_Encoding/FORCE_A", "TestCollectPages/emptty-case", "TestRequireKubeLocalProxy/local_prroxy_required", "TestIsValidAthenaWorkgroupName/valid", "TestAuthPreferenceV2_CheckAndSetDefaults_seco", "TestRateLimitFailure/simultaneous", "TestFromProtoNils/status", "TestExpiryConsistency/set_expiry/GetExpi", "FuzzParseElastiCacheEndpoint/seeed#1", "TestDatabasePermission/empty_individual_pe", "TestChangePIN/valid_pin,_valid_puk", "TestGetPartitionFromRegion/cn-north-1", "TestResourceIDs/service_account_resoource_name_with_missing_namespace_and_pod_name", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_allowed_CA", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEndpoi", "TestServerSorter/by_addr_desc", "TestDatabaseGCPCloudSQL", "TestServerCheckAndSetDefaults/OpenSSSH_node_with_unset_hostname", "TestPluginEmailSettings/no_email_spec", "TestValidateDatabaseName/valid_l", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_non-URL/sf=on", "TestAppPublicAddrValidation/kubernetes_app", "TestIsValidAthenaWorkgroupName/symbols", "TestPrivateKey", "TestIsValidGlueResourceName/too_long", "TestContextReader_ReadPassworrd/intertwine_reads", "TestValidateAutoUpdateAgeentRollout/group_with_impossible_start_hour", "TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode=off", "TestExpiryConsistency/zero_expiry", "TestX509Certificate/rsa_cert", "TestGetSortByFromString/hostname:asc", "FuzzParseCacheForRedisEndpoint/seed#0", "TestProvisionTokenV2_CheckAndSetDefault", "TestParseAtlasEndpoint/internal_name", "TestAllDeviceEnumsMapped/OSType/OS_TTYPE_UNSPECIFIED", "TestSSHKeysEqual/ed25519Keyy1!=rsaKey1-ed25519-prefixed", "FuzzParseElastiCacheEndpoint/seeed#2", "FuzzParseCacheForRedisEndpointt/seed#3", "TestPingConnection/PingConnn", "TestAuthorizedKey/missing_user", "TestParseTeleportRoles/node", "TestResourceIDs/multiple_ids/ResourcceIDsFromStrings", "TestValidateAutoUpdateConnfig/valid_time-based_rollout_with_groups", "TestResourceIDs/no_cluster_name", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_All", "TestProvisionTokenV2_CheckAndSet", "TestPluginDiscordValidation", "FuzzParseElastiCacheEndpoint/seed#2", "TestApplicationGetAWSExternalID/not_configured", "TestPluginDiscordValidation/Valid", "TestContainSameUniqueElements/differrent_(same_length)", "TestRoleV6_CheckAndSetDefaults/spiffe:", "TestAppPortsValidation/port_smaller__than_1", "TestContextReader_ReadPassword/intertw", "TestParse/should_parse:_scheme-host-port", "TestAzureMatcherCheckAndSetDefaults", "TestAppPortsValidation/end_port_smalller_than_2", "TestNewDiscoveryConffig/error_when_discovery_group_is_not_present", "TestPluginOpsgenieValidation/static__credentials_labels_not_defined", "TestRoundTripper_RoundTrip", "TestValidatePortRange/port_bigger_than_ma", "TestRetryWithMFA_RReuse", "TestNewAutoUpdateVersio", "TestGCPMatcherCheckAndSetDefaults/wiildcard_is_invalid_for_types", "TestWatchKindContains/no:_subset_fillter_does_not_match", "TestGetResourceDetails", "TestPluginOpsgenieValidation/no_settings", "TestServerCheckAndSetDefaults/", "TestAuthorizedKey/missinng_HostID", "TestRetryWithMFA/wwithout_interceptor", "TestGithubAuthRequestCheck/connectorr-spec-missing-for-authenticated-user", "TestParseMemoryDBEndpoint/invaliid_format", "TestAuthorizedKey/missinng_user", "TestToMap/slice_with_one_label", "TestPluginMattermostValidation/no_channel", "TestMatchesWildcard/Wildcarrd_match", "TestAppPublicAddrValidation/kubernetes_app_ht", "TestSSHKeysEqual/ed25519Key1-", "TestInvalidDesktopName", "TestPluginOpenAIValidation", "TestIsValidIAMRoleName/all_symbols", "TestParse/example.com", "TestAllDeviceEnumsMapped/DeviceOrigiin", "TestDatabasePermission/wildcard_seleector_with_invalid_value", "TestGetAdminUser/gets_admin_from_labbels", "TestParseMSSQLEndpoint/wrong_ssuffix", "TestGCPMatcherCheckAndSetDefaults/no_type", "TestCircuitBreaker_afterExecution", "TestIsAzureEndpoint/invalid_endpoint", "TestParseOpensearchEndpoint/fixed_example", "TestGetProxyAddress/0_2:_valid,_can__be_raw_host:port_with_special_characters_in_password", "TestValidateAutoUpdateAge", "TestProvisionTokenV2_CheckAndSetDefaaults/spacelift", "TestGetResourcesWithFilters/SAMLIdPServic", "FuzzParseElastiCacheEndpoint/seed#3", "TestParseOpensearchEndpoint/parses_valid_endpoint/opensearch-ins", "TestPluginDatadogValidation/no_settings", "TestCassandraEndpointRegion/invalid_uri", "TestALPNConnUpgradeDialer", "TestDynamoDBConfig/region_", "TestValidateUserTask/DiscooverEC2:_instances_-_missing_instance_id_in_instance_metadata", "TestServerSorter", "TestGRPCErrorWrapping/unary_interce", "TestIsALPNConnUpgradeR", "TestAppPortsValidation/valid_ranges__and_single_ports", "TestShortRegionToRegion/valid_regions", "TestDynamoDBConfig/custom_URI_an", "TestMFADevice_CheckAndSetDe", "TestNewA", "TestProvisionTokenV2_CheckAndSetDefaaults/tpm_success_without_CA", "TestSSHRouteMatcherScoring/hostname_match_only", "TestParseReviewDayOfMonth/FiRSt", "TestWatchKindContains/yes:_subset_has_n", "TestDisableUnqualifiedLookups/unqualified_", "TestRolesEqual", "TestEncodeDecodeRequireMFAType", "TestAzureMatcherCheckAndSetDefaults/defaul", ": TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHeadless=false_wi", "TestValidateAutoUpdateConnfig/group_with_empty_name", "TestAppPublic", "FuzzNormalizeLocation/seed#1", "TestParseReviewFrequency//6month", "TestLicenseSettersAndGetters/Set_IGS_Support", "TestIsMSSQLServerEndpoint", "TestMetadataIsEqual/nil_equals", "TestParseReviewFrequency//3month", "TestGetProxyAddress/2_1:_valid,_corrrect_full_url_with_plain_password", ": TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=local_and_local_c", "TestNewSAMLIdPServiceProvider/valid__launch_URLs", "TestValidateAutoUpdateAgen", "TestIsValidAthenaWorkgroupName/ttoo_long", "TestSSHKeysEqual/rsaKey1!=ed25519", "TestRoundTripper_RoundT", "TestIsValidAccountID/unicode_digit_is_inval", "TestTrimToMaxSize/Query_with__query_params_exceeds_max_size", "TestIsValidIAMRoleName/valid_with_numbers", "TestHardwareKe", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_allowed_CA/sf=webauthn", "TestClient", "TestDatabasePermission/wildcard_s", "TestFromProtoNils/audit", "TestIsRequiredPolicyMet", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEnd", "TestDatabaseServerSorter/by_type_asc", "TestAppPublicAddrValidation/addr_witth_numbers_in_the_host", "TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Bad_EKCertAllowedCAs", "FuzzParseRDSEndpoint/seed#4", "TestCheckRoleARN", "TestAWSIsEmpty/true_with_nested_unrecogniz", "TestSecondFactorsFromLegacySecondFactor", "TestSAMLForceAuthn_Encoding/", "TestNewAccessGraphSettings/success_e", "TestIsAzureEndpoint/valid_e", "TestIsPortInRange/smaller_than_rrange_start", "TestSSHKeysEqual/rsaKey2!=eed25519Key1-alt", "FuzzParseRDSEndpoint/seed#13", "TestEncodeDecodeSecondFactorTy", "TestPluginOktaValidation/no_settingss", "TestPluginEntraIDValidation", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless=true_with_Webauthn", "TestOktaAssignments_SetStatus/unknown_-", "TestGetSortByFromString", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_mismatched_china_region_and_non-china_partition", "TestIsValidGlueResourceName/capiital", "TestAuthorizedKey/missinng_fingerprint", "TestValidateAssumeStartTime/expired_start_time", "TestMatchSearch/match_for_a_list_of__search_vals_contained_within_one_field_value", "TestNewDiscoveryConffig/tag_aws_sync_with_invalid_region", "TestResourceIDs/namespace_resource_nname_with_missing_namespace_and_pod_name", "TestGCPMatcherCheckAndSetDefaults/vaalid", "TestResourceIDs/resource_name_", "TestSelectNextReviewDate//one_month,_first_day", "TestResourceIDs/service_resource_namme_in_cluster_with_slash/ResourceIDsFromStrings", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_invalid_denied_CA", "TestParseDocumentDBEndpoint/DocuementDB_CN", "TestMemberFromProtoNils/spec", "TestAWSIsEmpty/false", "TestNew/fail_to_dial_with_a_bad_address.", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/JSON/Marshal", "TestValidateU", "TestResourceIDs/persistent_volume_claim_resource_name_with_missing_namespa", "TestProvisionTokenV2_CheckAndSetDefaaults/iam_method", "TestIsALPNConnU", "TestParseReviewFrequency/3_month", "TestIsAzureEndpoint/valid_endppoint", "TestParseRDSEndpoint", "TestGetProxyAddress/9_2:_valid,_no_proxy_matches_host_but_not_port_wit", "TestConversion", "TestDatabaseRDSEndpoint/discovered_instance", "TestNewAutoUpdateAgentRolllout/invalid_strategy", "TestIsAutoUsersEnabled", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_passwordless_connector/sf=otp", "TestNewAuthPreference_secondFactors//OK_OTP_default_settings", "TestIsValidIAMRoleName", "TestCheckAndSetDefaultsWithLink/exteernal_link", "TestResourceAttestationType_toAndFro", "TestProvisionTokenV2_CheckAndSetDefaaults/explicit_ec2_method", "TestParseReviewFrequency//1year", "TestIsValidAccountID/more_digits", "TestIsEICE", "TestPluginJiraValidation/Missing_Credentials", "TestIsAzureEndpoint/invalid_enndpoint,_suffix_match_without_dot", "TestEncodeDecodeRequireMFAType/SESSION/encode", "TestResourceIDs/persistent_volume_reesource_name_in_cluster_with_slash", "TestIsAtlasEndpoint/private_liink_with_srv", "FuzzParseElastiCacheEndpoint/seeed#5", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_with_attestation_CAs/sf=on", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_U2F/sf=webauthn", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless_defaults_to_true_with_Webauthn/sf=on", "TestOktaAssignments_SetStatus/processsing_-\\u003e_processing", "TestOktAssignmentIsEqual/targets_botth_nil", "TestVersionShorthand", "TestSSHRouteMatcherScoring/ip_match__only", "TestExpiryConsistency/set_expiry/wrapper_.", "TestParseSessionsURI/explicit_filesystem_URI", "TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_JAMF", "TestSelectNextReviewDate/one_month,_", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=false_without_Webauthn/sf=otp", "TestIsALPNConnUpgrad", "TestParse/should_parse:_scheme-ip6-pport", "TestDatabaseSpanner", "TestResourceMethods/GetOrigin", "TestResourceIDs/namespace_resource_nname_in_cluster_with_slash", "TestConversion/AlreadyExists", "TestAuthPrefer", "TestPlainHttpFallback/Finnd/Denied_on_non-loopback", "TestResourceIDs/service_resource_namme_with_missing_namespace/ResourceIDsFromString", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_local_connector/sf=otp", "TestAppIsAWSConsole/AWS_Standard", "TestChangePIN/set_ppin_default", "TestSSHKeysEqual/ed25519Key1-alt!=ed25", "TestRetryWithMFA/wwith_interceptor", "TestHardwareKeeyAgentService", "TestPluginDatadogValidation/no_settiings", "TestProvisionTokenV2_Check", "TestMergeStreams/both_streams_empty", "TestWithinUpgradeWindow/not_within_uupgrade_window_weekday", "TestParseRDSEndpoint/localhost:55432", "TestUnmarshallCreateDatabaseUserModeeYAML", "TestValidateUserTask/DiscoverEKS:_valid", "TestSSHKeysEqual/ed25519Key1!=rsaKey1-alt", "TestResourceIDs/certificate_signing__request_resource_name_with_missing_namespace_and_pod_name", "TestLinearRetryMax/NoJitter", "FuzzParseCacheForRedisEndpointt", "TestIsTracingSupported/supported", "TestDeduplicateAny/slice_with_unique_elements", "TestAppIsAWSConsole/CLI-only_AWS_Appp", "TestGetPartitionFromRegion/us-weest-1", "TestLegacySecondFactorFromSecondFacttors/\\\\x03", "TestIsEICE/eice_node_without_insta", "TestSSHProxyHostPort/TLS", "TestAccessReviewConditionsIsEmpty/claims_to", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_unknown_connector/sf=on", "TestIsValidIAMPolicyName/invalidd_symbols", "TestIsPortInRange/equal_to_rangee_end", "TestNewAutoUpdateAgentRollout/inval", "TestParseReviewFrequency//1_month", "TestIsValidLabelKey/dashes_and_underscores", "TestPluginMattermostValidation/no_team", "TestResourceHeaderIsEqual/metadata_iis_different", "TestResourceHeaderIsEqual/kind_is_different", "TestServerCheckAndSetDefaults/Teleport_node", "TestEncodeDecodeRequireMFAType/SESSIION/decode", "FuzzParseElastiCacheEndpoint/seeed#3", "TestAccessRequestConditionsIsEmpty/empty", "TestDisableUnqualifiedLookups/localhost", "TestIsAtlasEndpoint/public_endpoint_with_s", "TestCircuitBreaker_Execute/first_ffailed_execution_recovering_remains_in_recovering", "TestValidateDatabaseName", "TestMatchSearch/match", "TestConversion/NotImplemented", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed!=ed25519Key2", "TestMatchSearch_ResourceSpecific", "TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_defaults", "TestALPNConnUpgradeDialer/connection_", "TestParseReviewFrequency/3month", "TestCheckAndSetDefaultsWith", "TestParseAtlasEndpoint/public_endpoint", "TestGetPolicyFromSet/touch_policy", "TestAzureMatcherCheckAndSet", "TestProvisionTok", "TestPriva", "TestParseRDSEndpoint/RDS_instance", "TestNetIQPluginSettings/missing_OauthIssuer", "TestUploadTraces/succcessfully_uploads_spans", "TestParseElastiCacheEndpoint/invalid_url", "TestSSHKeysEqual", "TestRouteToServer/mismatch_hostname_over_tunn", "TestCheckRoleARN/invalid_when_thhe_resource_is_of_type_role,_but_role_is_empty", "FuzzParseRDSEndpoint/seed#10", "TestALPNConnUpgradeDialer/connect", "TestPingConnection/PingConn/BufferSize", "TestMatchesWildcard/Wildcard_mismatch", "TestOktAssignmentIsEqual/targets_diffferent_type", "TestAWSIsEmpty/true_with_nested_unreecognized_bytes", "TestParseDocumentDBEndpoint/DocuuementDB_cluster", "TestValidateAssumeStartTime/valid_sttart_time", "TestLinearRetryMax/FullJitter", "TestOpenSearchConfig/AWS_URI_for_wroong_service", "TestContextReader_ReadPassword/read_passw", "TestIsValidAthenaWorkgroupName/vvalid", "TestWindowsDesktopsSorter", "TestMergeStreams/streeam_A_empty", "TestGetProxyAddress/1_1:_valid,_raw__host:port_works_for_https_with_plain_password", "FuzzParseElastiCacheEndpoint/seed#5", ": TestMetrics", "TestSSHRouteMatcherScoring/hostname__match_only", "TestDynamoDBConfig/account_and_AWS_ddax_URI_and_empty_region_is_correct", "Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_user_sync_enabled_with_disabled_app_and_group_sync", "TestMatchSearch/match_with_custom_match", "TestDatabaseSelfHosted", "TestValidateGitHubOrganizationName/a", "TestCli", "TestAuditUnmarshaling", "TestResourceAttestationType_toAndFrom/unspe", "TestNewDialerForGRPCClient", "TestMatchSearch/match_with_custom_maatch", "TestXxx/invalid_uint", "TestValidateAutoUpda", "TestParseElastiCacheEndpoint", "TestServerCheckAnd", "TestAppServerSorter/by_publicAddr_assc", "TestProvisionTokenV2_C", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH_AND_PIN/encode", "TestPluginJiraValidation/Missing_Issue_Type", "TestParseReviewFrequency//3_m", "TestPars", "TestNewWebClientHTTPProxy/use_http_proxy", "TestMergeStreams", "TestIsValidIAMPolicyName/valid_wwith_numbers", "TestResourceIDs/pod_resource_name/Res", "TestServerInfoSetLabels/leave_other_labels_a", "TestAppPublicAddrValidation/addr_wi", "TestValidateUserTask/DiscoverEKS:_", "TestXxx/9e", "TestDurationUnmarshal/combined_largee", "TestPingConnection/PingConn", "TestCircuitBreaker_Execute/last_errror_below_limit_remain_in_standby", "TestNew/successfully_dial_tcp_address.", "TestIsValidIAMRoleName/valid_witth_numbers", "TestValidateAutoUpdateAgeentRollout/first_group_with_non_zero_wait_days", "FuzzParseMSSQLEndpoint/seed#3", "TestParseReviewFrequency/1y", "TestDatabaseAzureEndpoints", "TestIsResponseSuccessful/codes.Unaavailable_error", "TestCloning", "TestAllDeviceEnumsMapped/OSType/OS_TYPE_WINDO", "TestPluginJamfValidation/invalid_cr", "TestParseMSSQLEndpoint/more_segment", "TestEventEqual/regular_protobuf_oneof_not_eq", "TestNewClient", "TestTunnelStrategyMarshalling", "TestGRPCErrorWrappiing", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_local_connector", "TestRouteToServer/match_second_public_addr", "TestParseReviewFrequency//1_m", "TestAlertAcknowledgement_Check", "TestAWSIsEmpty/true_with_unrecognizeed_bytes", "TestResourceIDs/namespace_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestDynamoDBConfig/config", "TestWithMemberIneligibleStatusField", "TestMatchesWildcard/Wildcarrd_mismatch", "TestAll/non-empty_slice_with_all_matching_", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/O", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH/encode", "TestGetAdminUser/gets_admin_from_speec_ignoring_labels", "TestParseOpensearchEndpoint/parsses_valid_endpoint/opensearch-instance-foo.us-gov-east-1.es.amazonaws.com", "TestGRPCErrorWrappping/stream_interceptor", "TestRole_AllowRequestKubernetesRes", "TestChangePIN/set_puk_mismatch", "TestMergeStreams/stream_B_empty", "TestAllDeviceEnumsMapped/OSType/OS_TYPE_MACOS", "TestFilterMap", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless_defaults_to_true_with_Webauthn/sf=optional", "TestNewAppV3/azure_app", "TestAllDeviceEnumsMapped/DeviceAttesstationType/DEVICE_ATTESTATION_TYPE_TPM_EKPUB", "TestCheckRoleARN/valid_even_if_region_is", "TestCollectPages/basiic-depagination", "TestDynamoDBConfig/account_a", "TestSSHDialTimeout", "TestProvisionTokenV2_GetSafeName/tokken_join_method_(long)", "TestMemberFromProtoNils/accesslist", "TestPluginJiraValidation/Missing_Credentia", "TestAllDeviceEnumsMapped/DeviceOri", "TestRedshiftServerlessEndpoint/localhost:54", "TestLegacySecondFactorFromSecondFactors/\\\\x01", "TestMetadataIsEqual/name_is_different", "TestPrivateKey/valid_derived", "FuzzParseDynamoDBEndpoint", "TestEncodeDecodeRequireMFAType/SESSIION", "TestParseMSSQLEndpoint/malformed_address", "TestIsGCPEndpoint", "TestWatchKindContains/no:_subset_has_wider_", "TestSSHRouteMatcherScoring/ip_match_only", "TestParse/https://example.com:443", "TestAccessRequestConditionsIsEmpty/roles", "TestCheckAndSetDefaultsWithLink", "TestRedshiftServerlessEndpoint/vpc_endpoint", "TestProvisionTokenV2_CheckAndSetDefaaults/simple_token", "TestIsOpenSSHNodeSubKind/another_vallue", "TestValidatePortRange/port_smaller_than_1", "TestNewAppV3/non-cloud_app_#2", "TestPluginOpenAIValidation/no_credenntials_inner", "TestSSHKeysEqual/ed25519Keyy1-alt==ed25519Key1-alt", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_unrecognized_opensearch_service_subdomain", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH_AND_PIN", "TestDisableUnqualifiedLookups/localhhost", "TestIsValidGlueResourceName/hyphhen", "TestWindowsDesktopsSorter/by_addr_assc", "FuzzParseElastiCacheEndpoint/seed#8", "TestAWSMatcherCheckAndSetDefaults/no_region", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_missing_RPID", ": TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_minimal_confi", "TestMetrics", "TestUploadTraces/no__spans_to_upload", "TestSSHKeysEqual/rsaKey2!=ed25519Key1-alt", "TestNewSAMLIdPServiceProvider/defaullt_relay_state_should_not_be_set_for_empty_preset_value", "TestValidateGitHubOrganizationName/valid-org", "TestAppPortsValidation/end_port_smalller_than_port", "TestPingConnection/PingTLSCConn/BufferSize", "TestAWSMatcherCheckAndSetDefaults/innvalid_join_method", "TestGCPMatcherCheckAndSetDefaults", "TestPingConnection/PingConn/BufferSize/S", "TestPingConnection", "TestCheckRo", "TestLicenseSettersAndGetters/Set_Usage_B", "TestIsMSSQLServerEndpoint/withhout_suffix", "TestParseOpensearchEndpoint/parsses_valid_endpoint/opensearch-instance-foo.cn-northwest-1.es.amazonaws.com.cn", "TestDeduplicate/slice_with_duplicate_elements", "TestSSHKeysEqual/ed25519Key2==ed25519Key2", "TestCliient_ClusterDetails", "TestFromMap/map_with_one_entryy", "TestResourceIDs/service_resource_namme_with_missing_namespace_and_pod_name", "FuzzParseDuration/seed#2", "TestStructTrimToMaxSize/Fieldd_key_exceeds_max_limit_size", "TestCircuitBreaker_success/successs_in_recovery_above_limit", "TestGRPCErrorWrapping", "TestPluginAWSICSettings/(legacy)_misssing_oidc_integration_(legacy)", "TestAppPortsValidation/uri_specifies_port", "TestAuthPreferenceV2_CheckAndSetDefaults", "TestParseTeleportRoles/windowsdesktop", "TestOktaAssignments_SetStatus/failedd_-\\u003e_successful", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_minimal_configuration", "TestValidateJamfSpecV1/api_endpoint_empty_", "TestMemberFromProtoNils/joined", "TestOpenSearchConfig/custom_URI_withh_region_is_correct", "TestA", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_PIN", "TestConvertToPPK/RSA_keey_1", "TestGCPMatcherCheckAndSetDefaults/valid", "TestPluginJiraValidation/Missing_Project_Key", "TestToGRPC_statusError/wrapped_statuus", "TestParseMSSQLEndpoint/empty", "TestAllDeviceEnumsMapped/DeviceEnrolllStatus/from_\\", "TestDynamicIdentityFileCreds", "TestResourceIDs/cluster_role_bindingg_resource_name_with_missing_namespace_and_pod_name", "TestCircuitBreaker_Execute/transittion_from_recovering_to_standby", "TestDatabaseServerSorter/by_name_dessc", "TestURL/simple_read", "TestParseReviewFrequency/1", "TestPluginJamfValidation/vali", "TestCircuitBreaker_Execute/transittion_from_standby_to_tripped", "TestServerCheckAndSetDefaults/valid__OpenSSHEC2InstanceConnectEndpoint_node", "TestParseElastiCacheEndpoint/priimary_endpoint,_TLS_enabled", "TestIsRequiredPolicyMet/hardwarre_key", "TestCheckerValidateFIPS/ECDDSAP224", "TestCheckRoleARN/invalid_when_the_", "TestMetadataIsEqual/namespace_is_diffferent", "TestMatchSearch/match_with_mix_of_siingle_vals_and_phrases", "TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_missing_allow_rules", "TestGetProxyAddress/2_0:_valid,_corrrect_full_url_with_no_credentials", "TestResourceIDs/bad_resource_kind", "TestDatabaseSpanner/invalid_missing__project_id", "TestCheckerValidateFIPS/ECDDSAP256", "TestX509Certificate", "TestParseMSSQLEndpoint/valid", "TestParse/should_parse:_scheme-ip4-pport", "TestParseWeekdays/Every_day", "TestGetPolicyFromSet/touch_poliicy_and_pin_policy", "FuzzParseDuration/seed#3", "TestNew", "TestParse/should_parse:_ip4-port", "FuzzParseElastiCacheEndpoint/seed#19", "TestParseMismatchedPEMHeader/PK", "Test_PluginOktaSyncSettings_SetUserS", "TestHttpRoundTripperDowngrade", "TestIsValidIAMPolicyName/too_larrge", "TestSecondFactorsFromLegacySecondFactor/#00", "TestNewAuthPreference_secondFactors//OK_U2F_config_provided", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/YAML", "TestGetProxyAddress/2_0:", "TestOktAssignmentIsEqual/one_is_nil", "TestIsValidLabelKey/forward_sslashes_and_stars", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_WEBAUTHN", "TestNewSAMLIdPServiceProvider/unsuppported_preset_value", "TestRole_AllowRequ", "TestLegacySecondFactorFromSecondFactors/\\\\x03", "TestCircuitBreaker_befo", "TestNewSAMLIdPServiceProvider/empty__launch_URLs", "TestConvertToPPK/ed255119_key_2", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless=false_without_Webauthn/sf=otp", "TestProvisionTokenV2_Che", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_local_connector/sf=otp", "TestCheckRoleARN/arn_identifier_but_", "TestAppServerSorter/by_name_asc", "TestIsPortInRange/smaller_than_range_start", "Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_user_sync_enabled", "TestAzureMatcherCheckAndSetDefaults//invalid_join_method", "T", "TestGetCloudMetadataAWS", "TestResourceIDs/ser", "TestAuditMarshaling", "TestParseRDSEndpoint/RDS_proxy_ccustom_endpoint", "TestServerInfoSetLabels/fix_aws_labels", "TestEventEqual/regular_protobuf_oneeof_not_equal", "TestValidateAutoUpdateConfig", "TestNew/fail_to_dial_with_no_addresss_or_dialer.", "TestNewSAMLIdPServiceProv", "TestProvisionTokenV2_CheckAndSetDefaaults/spacelift_empty_allow_rules", "TestLinearRetryMax/SeventhJitter", "Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_empty_settings", "TestIsMSSQLServerEndpoint/empty", "TestIsAzureEndpoint/valid_endpoint_prefix", "TestDatabaseGCPCloudSQL/gcp-valid-coonfiguration", "TestShortRegionToRegion/not_ended_in_number", "TestIsValidAccountID/valid_accouunt_id", "TestFromHeaderMetadata", "TestParseRedshiftEndpoint/cn-north-1", "TestNewAutoUpdateAgentRolllout/invalid_target_version", "TestPluginMattermostValidation/no_settings", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed!=rsaKey1-alt", "TestEncodeDecodeRequireMFAType/SESSIION_AND_HARDWARE_KEY", "TestDatabaseServerSorter", "TestParseTeleportRoles/Auth,_auth", "TestResourceIDs/secret_resource_namee_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_headless_connector/sf=otp", "TestReviewFrommProtoNils", "TestIsValidAccountID", "TestALPNDialer_getTLSConfig/get_cass_failed", "TestDynamoDBURIForRegion/regi", "TestProvisionTokenV2_CheckAndSetDefaaults/tpm_rule_without_ekpubhash_or_ekcertserial", "FuzzParseDatabaseEndpoint/seedd#0", "TestMySQLVersionValidation", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor", "TestSSHKeysEqual/rsaKey1-alt!=ed25519K", "TestXxx", "TestMetadataIsEqual", "TestParseReviewFrequency/6month", ": TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc_and_local_co", "TestOpenSearchConfig/invalid_AWS_acco", "TestPluginEntraIDValidation/missing__sso_connector_name", "TestResourceIDs/kube_node_resource_nname_with_missing_namespace_and_pod_name", "TestParseElastiCacheEndpoint/invalid_format", "TestResourceIDs/pod_resource_name_inn_cluster_with_slash#01", "TestAlertAcknowledgement_Check/missing_reason", "TestSSHKeysEqual/ed25519Keyy2!=rsaKey1", "TestResourceIDs/certificate_signing_request_resource_name_in_cluster_w", "TesttRoundtrip", "TestSSHKeysEqual/rsaKey1-alt!=ed25519Key2", "TestRotationZero", "TestGithubAuthReques", "TestNewDiscoveryConfig/", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_t", "TestValidateJamfSpecV1/spec_with_invventory", "TestAssertionInfo_RoundTrip/empty", "TestPortRangesContains", "TestCollectPages/empty-case", "TestCollectPages/basic-depagination", "TestDatabaseFromRedshiftServerlessEnd", "TestCheckerValidateFIPS/Ed225519", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_local_connector/sf=optional", "TestIntegrationJSONMarshalCycle/aws-ra", "TestResourceIDs/cluster_role_bindingg_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestParseReviewFrequency//3m", "TestParseTeleportRoles/invalidrole", "TestMFACeremony_SSO", "TestProvisionTokenV2_CheckAndSetDefaaults/invalid_overridden_domain", "TestMFADevice_CheckAndSetDefaults/NOOK_Webauthn_missing_credential_ID", "TestIsPortInRange/within_single__port_range", "TestSSHKeysEqual/ed25519Keyy1-rsa-prefixed==ed25519Key1", "TestSSHRouteMatcherHostnameMatching", "TestGetResourcesWithFilters/ApplicaationServer", "TestSetEnvs", "TestMatchSearch_ResourceSpecific/nodde", "TestSecondFactorsFromLegacySecondFacctor/optional", "TestContextReader_ReadPassworrd/read_password", "TestCheckRoleARN/invalid_when_reesource_is_missing", "TestAut", "TestRoleV6CheckAndSetDefaults_SAMLIdPOptions", "TestResourceIDs/resource_name_with_sslash/ResourceIDsFromString", "TestDatabaseRedshiftEndpoint", "TestPluginAWSICSettings/missing_insttance_ARN", "TestProvisionTokenV2_CheckAndSetDefau", "TestResourceIDs/persist", "TestInstanceFilter/match-no-upgrader", "Test_PluginOktaSyncSettings_Sy", "TestUnmarshallCreateDatabaseUserModeYAML", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_type=local_a", "TestPluginJamfValidation/invalid_creedentials_(static_credentials)", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_arbitrary_connector/sf=optional", "TestValidateAutoUpdateConnfig/group_with_no_week_days", "TestPluginDiscordValidation/Missing_Settings", "TestProvisionTokenV2_CheckAnd", "FuzzParseDatabaseEndpoint/seedd#1", "TestCircuitBreaker_Execute/anotherr_error_below_limit_remain_in_standby", "TestWeekdayParser", "TestHardwareKeeyAgentService/ED25519_No_hash", "TestSSHKeysEqual/ed25519Keyy2!=rsaKey1-alt", "TestWatchKindContains/no:_subset_hass_no_filter", "FuzzParseDynamoDBEndpoint/seed#55", "TestParsePrivateKeyPolicyError", "TestIsAzureEndpoint/valid_endppoint,_suffix_matches_with_dot", "TestTake/full_stream", "TestLicenseSettersAndGetters/Set_Dattabase_Access_Support", "TestResourceIDs/service_resource_namme_with_missing_namespace/ResourceIDsFromStrings", "TestHardwa", "TestPluginOpenAIValidation/invalid_ccredential_type_(oauth2)", "TestPluginOpenAIValidation/valid_credent", "TestNewSAMLIdPServiceProvider/http_llaunch_url", "TestParseReviewFrequency/3m", "TestAlertAcknowledgement_Check/missing_expiry", "TestSSHKeysEqual/rsaKey1!=ed25519Key2", "TestDatabaseServerSorter/by_description_desc", "TestAppPath", "TestNewSAMLIdPServiceProvider/valid_att", "TestIsALPNConnUpgradeRequiredByEnv//upgraded_required_(for_target_addr)", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_AllowPasswordless=true_without_Webauthn/sf=off", "TestAllDeviceEnumsMapped/OSType/OS_TYPE_U", "TestSelectNextReviewDate//one_month,_last_day", "TestPluginJiraValidation/Invalid_Credential_", "TestRoleV6CheckAndSetDefaults_SAMLIddPOptions/samlidp:_idp_option_not_enabled_in_role_version_8", "TestDynamoDBConfig/missing_URI_and_mmissing_region_is_an_error", "TestMatchSearch_ResourceSpecific/db__server", "TestValidateUserTask/DiscooverEC2:_instances_-_missing_instance_id_in_map_key", "TestDatabasePermission/empty_permission_list", "TestParsePrivateKeyPolicyError//valid_key_policy:_none", "TestContextReader_ReadPassword/Close", "TestOpenSearchConfig/invalid_AWS_acccount_ID_is_an_error", "TestCollectPages", "TestIsValidGlueResourceName/hyphen", "TestContextReader_ReadPassworrd/password_read_turned_clean", "TestProvisionTokenV2_CheckAndSetDefaaults/github_ghes_invalid", "TestListResources/SAMLIdPServiceProvider", "TestTrimToMaxSize", "TestProvisionTokenV2_CheckAndSetDefaaults/iam_method_with_aws_regions", "TestIsValidIAMRoleName/all_symbools", "TestDynam", "TestRole_GetKubeResources/v7", "TestIsLoopback/localhost_with_port_shou", "TestIsPortInRange", "TestRole_AllowRequestKubernetesResouurce/valid_multi_values_with_wildcard", "TestNewAutoUpdateAgentRolllout/missing_spec", "TestResourceIDs/resource_name_with_sslash", "FuzzParseRDSEndpoint/seed#7", "TestDisableUnqualifiedLookups/qualiffied_hostname", "FuzzNormalizeLocation", "TestUploadTraces", "TestPluginAWSICSettings/missing_provvisioning_base_URL", "TestResourceMethods/GetKind", "TestMFADevice_CheckAndSetDefaults", "TestMatchSearch/no_match_for_search__phrase", "TestToMap", "TestAppPublicAddrValidation/kubernettes_app_https", "TestRoundTripper_RoundTrip/error_when_tripped", "TestToGRPC_statusError/unwrapped_staatus", "TestOktAssignmentIsEqual/finalized_iis_different", "TestCassandraEndpointRegion/cn-nnorth-1.", "TestRe", "TestNotifyExit_restoresTerminnal", "TestParseCorruptedKey/RSA_PUBLIC_KEY", "TestNewAutoUpdateVe", "TestAppPublicAddrValidation/https_puublic_address_with_internal_kube_ServerName_prefix", "TestParseElastiCacheEndpoint/priimary_endpoint,_TLS_disabled", "TestNewAuthPreference_secondFactors//NOK_prevent_passwordless_without_WebAuthn", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_mismatched_us_region_and_china_partition", "TestUnmarshallCreateHostUserModeYAML", "TestResourceIDs/persistent_volume_reesource_name_in_cluster_with_slash/ResourceIDsFromStrings", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless_defaults_to_true_with_Webauthn", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_OTP/decode", "TestMemberFrommProtoNils/reason", "TestAssertionInfo_RoundTrip/full", "FuzzParseElastiCacheEndpoint/seed#6", "TestSSHKeysEqual/ed25519Key1-alt!=rsaKey2", "TestProvisionTokenV2_CheckAndS", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_missing_RPID/sf=on", "TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v6", "TestAppIsAWSConsole/Not_an_AWS_Console_URL", "TestNewAutoUpdateVersion//invalid_semantic_tools_version", "TestResourceIDs/cluster_role_resourcce_name_with_missing_namespace_and_pod_name", "TestIsAtlasEndpoint/private_liink", "TestIsMSSQLServerEndpoint/onlyy_suffix", "TestIsValidRegion/invalid_country_code", "TestChangePIN/set_ppuk_from_empty", "TestResourceIDs/service_resource_namme_in_cluster_with_slash", "TestCliient_DialHost/connection_terminated_when_receive_returns_an_error", "TestResourceIDs/service_a", "TestGRPCErrorWrappping/unary_interceptor", "TestResourceIDs/persistent_volume_resource_name_in_cluster_with_slash/ResourceID", "TestToMap/slice_with_multiple_labels", "TestResourcesWithLabels_ToMap/first__duplicate_wins", "TestGetSortByFromString/hostname", "TestIsResponseSuccessful/nil_error", "TestServerCheckAndSetDefaults/invalid_Git", "TestParsePrivateKeyPolicyError/unknown", "TestPluginOktaValidation/import_enabbled_without_default_owners", "TestValidateUserTask/DiscooverRDS:_wrong_task_name", "TestIntegrationCheckAndSetDefaults", "TestIsALPNConnUpgradeRequired/upgraade_not_required_(proto_negotiated)/direct", "TestMatchSea", "TestParseReviewFrequency/12m", "TestRouteToServer/match_public_addr__with_empty_port", "TestIsValidRegion/aws_global_senntinel_value", "TestResourceHeaderIsEqual", "TestWebClientClosesIdleConnections", "TestMatchSearch/match_with_repeat_search_vals", "TestIsALPNConnUpgradeRequired/upgraade_not_required_(proto_negotiated)", "TestAccessList_setInitialR", "TestDatabaseFromRedshiftServerlessEnndpoint", "FuzzParseElastiCacheEndpoint/seed#18", "TestClient_ClusterDetails/cluster_details", "TestRoundTripper_RoundTrip/failuree_in_standby", "TestResourceIDs/pod_resource_name_", "TestCheckAndSetDefaultsWithLink/valiid_link_with_invalid_link_text", "TestResourceIDs/bad_resource_name/Res", "TestParseDyna", "TestNetIQPluginSettings/missing_ApiEndpoint", "TestIsPortInRange/within_port_raange", "TestContainSameUniqueElements/empty", "TestContextReader_ReadPasswo", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_instanceid", "TestParseMemoryDBEndpoint/invaliid_url", "TestValidatePortRange/valid_portt_range", "TestParsePrivateKeyPolicyError/random_error", "TestRedshiftServerlessEndpoint/wworkgroup_endpoint", "TestResourceIDs/multiple_ids/ResourcceIDsFromString", "TestIsValidGlueResourceName/empty", "TestSSHKeysEqual/rsaKey1==rrsaKey1-ed25519-prefixed", "TestLoadProfile/normal_profile", "TestALPNConnUpgradeDialer/", "TestRequireKubeLocalProxy/AL", "TestOktaAssignments_SetStatus", "TestIsMSSQLServerEndpoint/full_name", "TestRole_GetKubeResources/v6_to_v7_wwithout_wildcard;_labels_expression", "TestParseWeekdays/Few_valid_days", "TestCircuitBreaker_Execute/error_rremain_tripped", "TestIsA", "TestAllDeviceEnu", "Test_PluginOktaSyn", "TestResourceAttestationType_toAndFroom/quantum_entanglement", "TestGetPolicyFromSet/none", "Test_PluginOktaSyncSettings_SetUserSSyncSource/edge_cases", "TestNewDiscoverRDSUserTask", "TestALPNConnUpgradeDialer/connectioon_upgrade_with_ping/direct", "TestResourceIDs/bad_cluster_name/Reso", "TestGithubAuthRequestCheck/authenticated-user", "TestProvisionTokenV2_CheckAn", "TestNewAccessGraphSetttings/success_disabled", "TestNew/fail_to_dial_with_a_bad_adddress.", "TestParseWeekdays/Duplicated_day", "TestInstanceFilter/match-all", "TestValidateDatabaseName/invalid_firrst_character", "TestMFADevice_CheckAndSetDefaults/OK_U2F_devi", "TestValidatePortRange/valid_port_range", "TestParseMemoryDBEndpoint/invalid_format", "TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_missing_spec", "TestCheckerValidateFIPS/Ed25519", "FuzzParseMSSQLEndpoint/seed#0", "TestResourceIDs/bad_resource_kind/ReesourceIDsFromStrings", "TestValidateAutoUpdateAgeentRollout/group_with_same_name", "TestNewAccessGraphSetttings", "TestHardwareKeeyAgentService/EC256_SHA256", "TestCheckRoleARN/empty_string", "TestClusterCredentials/no_tls_auth_info", "TestSSHKeysEqual/rsaKey2!=ed25519Key1", "TestDynamoDBConfig/account_an", "TestAppPortsValidation", "TestNewSAMLIdPServiceProvider/dupliccate_attribute_mapping", "TestClient_DialHost/connection_successfully_established_without", "TestCircuitBreaker_afterExecution/su", "TestLegacyToResource153/marshal", "TestMFADevice_CheckAndSetDefaults/OK_OTP_devi", "TestRoundTripper_RoundTrip/failure_in_standby", "TestValidateUserTask/DiscoverEC2:_", "TestCountBy", "TestNewAutoUpdateVersion//invalid_semantic_agents_target_version", "TestParseMSSQLEndpoint/wrong_suffix", "TestGetResources/Node", "TestRole_AllowRequestKubernetesResouurce/valid_no_values", "TestAuthPreferenceV2_Check", "TestSAMLForceAuthn_Encoding/FORCE_", "TestSAMLForceAuthn_Encoding", "TestCircuitBreaker_failure/failuree_in_standby_causes_tripping", "TestInstanceFilter/match-kube-upgradder", "TestNewAccessGraphSetttings/success_enabled", "TestIsTracingSuppported/unsupported", "TestCircuitBreaker_Execute/second__failed_execution_recovering_transitions_to_tripped", "TestWatchKindContains/no:_subset_hass_wider_CA_filter", "TestSecondFactorsFromLegacySecondFacctor/webauthn", "TestParseMismatchedPEM", "TestGetPolicyFromSet/touch_poliicy", "TestNewAuthPreference_secondFactors//NOK_WebAuthn_config_missing", "TestParseWeekdays/Empty_slice", "TestValidateUse", "TestParseReviewFrequency/12months", "TestParseDocumentDBEndpoint/Docuem", "TestSAMLACSURIHasConnectorName", "TestAccessRequestConditionsIsEmpty/sug", "TestParseDynamoDBEndpoint/parsess_valid_endpoint/dax.us-east-1.amazonaws.com", "TestDatabaseMemoryDBEndpoint/valid_URI", "TestAppPublicAddrValidation", "TestParseMemoryDBEndpoint/invaliid_suffix", "TestValidatePortRange/end_port_smaller_than", "TestNetIQPluginSettings/incorrect_OauthIssuer", "TestIsALPNConnUpgrade", "TestParseMemoryDBEndpoint/TLS_diisabled_cluster_endpoint", "TestParseMSSQLEndpoint", "TestPingConnection/PingConnn/ConcurrentReads", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/JSON", "TestAccessRequestConditionsIsEmpty/annotations", "TestPingConnection/PingTLSCConn/BufferSize/Short", "TestIterateResources/success", "TestParseReviewFrequency/6m", "TestIsResponseSuccessful/codes.Canceled_error", "TestAWSMatcherCheckAndSetDefaults/noo_type", "TestParsePrivateKeyPolicyError//random_error", "TestPluginDatadogValidation/no_static_crede", "TestFromProtoNils/member_count", "TestAWSMatcherCheckAndSetDefaults/inval", "FuzzParseDatabaseEndpoint/seed#1", "TestIsAtlasEndpoint/azure_private_link_", "TestValidateUserTask/DiscooverRDS:_databases_-_missing_database_name_in_map_key", "TestNewAutoUpdateConfig", "TestDatabaseGCPCloudSQL/gcp-valid-configurati", "TestCircuitBreaker_Execute", "TestValidateAssumeStartTime", "TestChangePIN/set_pin_default", "TestRoleV6_CheckAndSetDefaults/spifffe:_valid", "TestRouteToServer", "TestNewAutoUpdateConfig/invalid_ag", "TestMatchSearch/no_match", "FuzzParseElastiCacheEndpoint/seed#4", "TestFromProtoNils/spec", "TestResourceHeaderIsEqual/version_iss_different", "Test_PluginOktaSyncSettings_SyncEnabledGetters/on_access_list_syn", "TestEncodeDecodeRequireMFAType/HARDWARE_KEY", "TestOktaAssignments_SetStatus/pendinng_-\\u003e_successful", "TestStructTrimToMaxSize", ": TestMFACeremony", "TestDurationUnmarshal/simple", "TestParseRDSEndpoint/RDS_cluster_reader", "TestAccessReviewConditionsIsEmpty/empty", "TestRole_AllowRequestKubernetesResouurce/valid_single_value", "TestEncodeDecodeRequireMFAType/HARD", "TestCircuitBreaker_failure/fa", "TestParseOpensearchEndpoint/detects_invalid_endpoint_with_unrecognize", "TestDynamoDBURIFo", "TestDatabaseServerSorter/by_description_asc", "TestListResources/ApplicationServer", "TestGetPartitionFromRegion/us-west-1", "TestPluginOktaValidation/no_org_URL", "TestSSHKeysEqual/rsaKey1!=rrsaKey2", "TestIsValidPartition/china", "TestGetResourcesWithFilters/DatabaseServer", "FuzzParseCacheForRedisEndpoint/seed#4", "TestIsALPNConnUpgradeRequired/upgraade_required_(handshake_success)", "TestParseMemoryDBEndpoint/CN_endpoint", "TestAppServerSorter/by_publicAddr_desc", "TestResourceIDs/bad_cluster_name/RessourceIDsFromStrings", "TestRateLimitFailure//stream-only", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_missing_region", "TestParseTeleportRoles/Auth_,_Proxy,,WindowsDesktop", "TestAppPortsValidation/invalid_uri", "TestDatabaseAzureEndpoints/valid_MySQL", "TestWindowsDesktopsSorter/by_name_asc", "TestServerCheckAndSetDefaults/OpenSSH_node", "TestTrimToMaxSize/Query_exceeds_max_lim", "TestFromMap/map_with_multiple_entries", "TestNetIQPluginSettings", "TestParseReviewFrequency/12_m", "TestNewAutoUpdateAgentRolllout/success_valid_rollout", "TestMemberRoundtrip", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_passwordless=false_and_passwordless_connnector/sf=optional", "TestNewAccessGraphSetttings/invalid", "TestNewDiscoverRDSUserTaskk", "TestFlatten", "TestPingConnection/PingTLSConn/Buffe", "TestKubeClustersSorter", "FuzzParseCacheForRedisEndpointt/seed#0", "TestPrivateKey_Prommpt/policy:{TouchRequired:false_PINRequired:false}", "Te", "TestNewSAMLIdPServiceProvider/empty__entity_descriptor_with_entity_ID_and_ACS_URL", "TestSSHKeysEqual/rsaKey1==rsaKey1", "TestParseMemoryDBEndpoint/TLS_enabled", "TestUnifiedNameCompare/sort_by_diffeerent_kind", "TestAccessRequestConditionsIsEmpty/ssearch_as_roles", "TestNewDiscoveryConffig", "TestMergeStreams/comppare_always_favors_B", "TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode_default", "TestALPNConnUpgradeDial", "TestChangePIN/set_pin_short", "TestPluginDatadogValidation/no_fallback_rec", "TestRole_AllowRequestKubernetesRe", "TestChangePIN/no_input", "TestALPNDialer_getTLSConfig/name_updated", "TestLockTargetIsEmpty", "TestParseDocumentDBEndpoint/DocuuementDB_CN", "TestAll/non-empty_slice_with_all_mattching_elements", "TestAzureMatcherCheckAndSetDefaults//wildcard_is_invalid_for_types", "TestSAMLSecretsStrip", "TestUnmarshallCreateDatabaseUserModeeJSON", "TestNewWebClientHTTPProxy", "TestParseReviewFrequency//6_month", "TestProvisionTokenV2_CheckAndSetDefaaults/empty", "TestPluginAWSICSettings/valid_settings_pass", "TestMFADevice_CheckAndSetDefaults/OKK_OTP_device", "TestRetryWithMFA_Reuse/nok_disall", "TestAllDeviceEnumsMapped/OSType/OS_TYPE_LINUX", "TestParseReviewFrequency//6m", "TestFromProtoNNils/owner_grants", "FuzzParseOpensearchEndpoint/seed#1", "TestParseReviewFrequency//3months", "TestEncodeDecodeRequireMFAType/SESSIO", "FuzzParseRedshiftEndpoint/seed#22", "FuzzParseDynamoDBEndpoint/seed#1", "TestCliient_DialHost/invalid_dial_target", "TestContextReader_ReadPassword", "TestParseOpensearchEndpoint/detects_invalid_endpoint_with_misma", "TestALPNDialer_getTLSConfig/get_cas_failed", "TestAlertAcknowledgement_Check/missing_alert_", "TestSSHProxyHostPort/TLS__routing_disabled,_SSH_listen_addr", "TestSSHMarshalEd25519", "TestListResources/Node", "TestSelectNextReviewDate//one_month,_fifteenth_day", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/YAML/Marshal", "TestDeduplicate", "TestResourceAttestationType_toAndFrom", "TestLicenseSettersAndGetters/Set_", "TestIterateResources/calllback_error", "TestParseRedshiftEndpoint/RDS_endpoint_fails", "TestResourceIDs/bad_cluster_name/RessourceIDsFromString", "TestDynamoDBConfig/missing_URI_", "TestIsAtlasEndpoint", "TestWatchKindContains", "TestNetIQPluginSettings/missing_ApiEndpoint#01", "TestParseMemoryDBEndpoint/TLS_ennabled_cluster_endpoint", "TestSSHRouteMatcherScoring/not_matchh", "TestGetCloudMetadataAWS/cloud_metadaata_with_aws_info", "TestPluginOpsgenieValidation/no_setttings", "TestNewAutoUpdateVersion//invalid_empty_tools_version", "TestIsResponseSuccessful/codes.Unavaila", "TestResourceIDs/single_id/ResourceIDDsFromStrings", "TestAzureMatcherCheckAndSetDefaults//invalid_type", "TestIsValidAccountID/less_digits", "TestConversion/BadParameter", "TestCheckAndSetDefaultsWithLink/val", "TestPluginJamfValidation/in", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc_and_local_con", "TestResourcesWithLabels_ToMap/simplee_list", "TestSSHKeysEqual/rsaKey1!=ed25519Key1", "TestValidatePortRange/valid_singgle_port", "TestMetadataIsEqual/expires_m2_nil", "TestInstanceFilter/match-kube-upgrader", "FuzzParseOpensearchEndpoint", "TestServerCheckAndSetDefaults", "TestProvisionTokenV2_CheckAndSetDefaaults/circleci_and_no_org_id", "TestSSHKeysEqual/ed25519Keyy2!=ed25519Key1", "TestPluginDiscordValidation/Empty_Role_Mapping", ": TestResourceIDs/certificate_signing_request_resource_name_with_missing_namespac", "TestChangePIN/set_ppuk_short", "TestMatchSearch/no_match_for_search_phrase", "TestCassandraEndpointRegion/us-eeast-1", "TestClient_DialHost/stream", "TestNewAuthPreference_secondFactor", "TestIsValidIAMPolicyName/all_symbols", "TestRateLimitFailure/limiter-graceful", "TestOpenSearchConfig/URI-d", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_PIN/decode", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_local_connector/sf=webauthn", "TestParseAtlasEndpoint", "TestChangePIN/set_puk_from_default", "TestPlainHttpFallback/Finnd", "TestPingConnection/PingTLSConn/Concu", "TestParseReviewFrequency//12_month", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_AllowPassw", "TestParseDocumentDBEndpoint/RDS_instance_f", "TestGetCloudMetadataAWS/no_cloud_metadata", "TestPluginJamfValidation/invalid_creedential_type_(oauth2)", "TestParseMemoryDBEndpoint/invalid_url", "TestDatabaseServerSorter/by_descripttion_desc", "TestResourceIDs/cluster_role_bindingg_resource_name_in_cluster_with_slash", "TestCheckAndSetDefaultsWithLink/valid_link", "TestParseOpensearchEn", "TestNewDiscoveryConfiig", "TestRoleFilterMatch", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless_defaults_to_true_with_Webauthn/sf=webauthn", "Test_PluginOktaSyncSettings_", "TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_missing_config", "TestIsMSSQLServerEndpoint/fulll_name", "TestAllDeviceEnumsMapped/DeviceAttesstationType", "TestParseDynamoDBEndpoint/detectts_invalid_endpoint_with_not_AWS_uri", "TestIsLoopback/Any_non-looback_addreess_should_return_false", "TestGetUserLoginState", "TestChangePIN/set_puk_from_empty", "TestRole_GetKubeResour", "TestResourceIDs/secret_resource_namee_with_missing_namespace/ResourceIDsFromStrings", "TestAuthPreferenceV2_CheckAndSetDefaults_second", "TestRouteToServer/no_match", "TestCountBy/identity", "TestAWSMatcherCheckAndSetDefaults/invalid_re", "TestValidateAutoUpdateConfig/g", "TestUploadTraces/error_uploading_spans", "TestAccessRequestConditionsIsEmpty/search_", "TestIsSSHCert/ecdsa-sha2-nistp2", "TestValidateAutoUpdateConnfig/group_with_impossible_start_hour", "TestAlertSorting", "TestResourceAttestationType_toAndFrom/tpm_ekp", "TestIsValidAthenaWorkgroupName/ssymbols", "TestProvisionTokenV2_GetSafeName/non-t", "TestParseMSSQLEndpoint/without_suffix", "TestIsResponseSuccessful", "TestMarshallCreateHostUserModeYAML", "TestNewSAMLIdPServiceProvider/missing_a", "TestMatchSearch_ResourceSpecific/winndows_desktop", "TestRole_GetKubeResources/v5_to_v7:__populate_with_defaults.", "TestDynamoDBConfig/account_and_regioon_and_assume_role_is_correct", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH_AND_PIN/decode", "TestDurationUnmarshal", "TestInstanceFilter/match-proxies", "TestOktaAssignments_SetStatus/pendinng_-\\u003e_failed", "TestSSHKeysEqual/ed25519Keyy2!=ed25519Key1-rsa-prefixed", "TestHardwareKeeyAgentService/RSA2048_No_hash", "TestParse/http://example.com:443", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_headless_connector/sf=off", "TestRole_GetKubeResources/v5_to_v7_wit", "TestNetIQPluginSettings/incorrect_OaauthIssuer", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc_and", "TestLicenseSettersAndGetters/Set_Dat", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_accountid", "TestVa", "TestCheckerValidateFIPS/ECDSAP384", "TestIsValidRegion/aws_global_sentinel_value", "TestSecondFactorsFromLegacySecondFacctor", "TestAllDeviceEnumsMapped/DeviceAttesstationType/DEVICE_ATTESTATION_TYPE_TPM_EKCERT", "TestNewAppV3/aws_app_console", "TestProvisionTokenV2_CheckAndSetDefaaults/ec2_method_no_allow_rules", "TestNew/synchro", "TestStructTrimToMaxSize/Field", "TestParsePrivateKeyPolicyError//unknown_key_policy", "TestRoundTripper_RoundTrip/error_wwhen_tripped", "TestNotifyExit_restoresTerminnal/pending_clean_read", "TestProxyListenerModeMarshalYAML", "TestMergeStreams/compare_always_favor", "TestMatchSearch/no_match_for_partial_match", "TestMetadataIsEqual/id_and_revision__have_no_effect", "TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode=required", "TestHardwareKeeyAgentService/RSA2048_SHA256_PSSSaltLengthAuto", "TestIsValidRegion/invalid_countrry_code", "TestAccessReviewConditionsIsEmpty/preview_", "TestEventEqual/regular_protobuf_oneeof_equal", "TestNewSAMLIdPServiceProvider/supp", "TestResourceIDs/no_cluster_name/ResoourceIDsFromString", "TestMatchSearch/match_with_repeat_seearch_vals", "TestTrimToMaxSize/Query_exceeeds_max_limit_size", "TestMetadataIsEqual/populated_equalss", "TestSSHKeysEqual/ed25519Keyy1-alt!=rsaKey1-ed25519-prefixed", "TestCheckRoleARN/valid_with_resource", "TestResourceHeaderIsEqual/populated__equals", "TestIsResponseSuccessful/codes.Unknown_error", "TestRole_GetKubeResources", "TestApplicationGetAWSExternalID", "TestIsLoopback/non-loopback_addr_shoould_return_false", "TestOktAssignmentIsEqual/targets_o2_is_nil", "TestReadWriter_WriteChunnk", "TestProvisionTokenV2_CheckAndSetDefaults/", "TestResourceHeaderIsEqual/empty_equals", "TestEmpty", "TestIsValidAthenaWorkgroupName/too_long", "TestMarshallCreateHostUserModeJSON", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_unknown_connector/sf=optional", "TestUploadTraces/no_spans_to_upload", "TestNewJitter/SeventhJitter", "TestNewAutoUpdateAgentRollout/missing_s", "TestAuthorizedKey/missing_HostID", "FuzzParseRDSEndpoint/seed#2", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_second_factor_enforced/sf=webauthn", "TestSSHKeysEqual/rsaKey2==rsaKey2", "TestGetProxyAddress/1_0:_valid,_raw__host:port_works_for_https_with_no_credentials", "TestDynamoDBConfig/missing_account_id", "TestProvisionTokenV2_CheckAndSetDefaaults/invalid_role", "TestIsValidIAMPolicyName/too_large", "TestNewAutoUpdat", "TestGetProxyAddress/0_0:_valid,_can__be_raw_host:port_with_no_credentials", "TestGetResourcesWithFilters/WindowssDesktop", "TestRouteToServer/match_public_addr_with_", "TestLoadProfile", "TestIsRequiredPolicyMet/hardwarre_key_touch", "TestDeduplicate/empty_slice", "TestRateLimitFailure//simultaneous", "TestGithubAuthRequestCheck/bo", "TestReviewSpecUnmarshaling", "TestProfileBasics", "TestMetadataIsEqual/expires_both_nil", "TestIsALPNConnUpgradeRequired/upgraade_required_(handshake_with_no_ALPN_error)/direct", "TestIsEC2NodeID/uuid", "TestNewAutoUpdateAgentRolllout", "TestValidateUserTask/DiscoverEC2:_valid", "TestAgentUpgradeWindow", "TestDatabaseGCPCloudSQL/gcp-project--id-specified-without-instance-id", "TestIsSSHCert/ssh-ed25519-cert-v01@open", "TestWaitForConnectionReady", "TestFromEOF", "TestIsResponseSuccessful/other_error", "TestNewSAMLIdPServiceProvider/empty_launch_UR", "TestPluginEmailSettings/", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEn", "TestCassandraAWSEndpoint", "TestXxx/9b", "TestMetadataIsEqual/id_and_revision_have_n", "TestGetResourcesWithFilters/DatabasseServer", "TestSSHKeysEqual/rsaKey2!=rsaKey1-alt", "TestSSHProxyHostPort/TLS__routing_disabled,_SSH_public_addr", "TestPingConnection/PingTLSCConn/ConcurrentWrites", "TestOktaAssignments_SetStatus/failed_", "TestProvisionTokenV2_CheckAndSetDefaaults/github_valid", "TestOktAssignmentIsEqual/user_is_different", "TestNewAppV3/aws_app_using_integration", "TestLockTargetEquals/not_equal", "TestIsRequiredPolicyMet/hardware_key", "TestDurationUnmarshal/combined_large", "TestOktAssignmentIsEqual/targets_diffferent_id", "TestParseRedshiftEndpoint/localhost:5432", "TestConversion/NotFound", "TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode=optional", "TestApplicationGetAWSRolesAnywhereProfil", "TestWatchKindContains/no:_different_names", "TestUploadTraces/errror_uploading_spans", "TestRole_GetKubeResources/v5_to_v", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectE", "TestSSHKeysEqual/ed25519Key2!", "TestFromProtoNils/owner_grants", "TestParsePrivateKeyPol", "TestPingConnection/PingTLSConn", "TestParseReviewFrequency/1_m", "TestTrimToMaxSize/Query_requires_heavy", "TestCliient_DialCluster", "TestTake/drain_streamm_of_size_\\u003c_n", "TestResourceIDs/configmap_resource_nname_with_missing_namespace/ResourceIDsFromStrings", "FuzzParseDuration", "TestEncodeDecodeRequireMFAType/SESSIION/encode", "TestProvisionTokenV2_CheckAndSetDefa", "TestAlertAcknowledgement_Check/missiing_reason", "TestParseElastiCacheEndpoint/invvalid_suffix", "TestResourceIDs/secret_resource_na", "TestAccessList_setInitiallReviewDate/one_month,_fifteenth_day", "TestIsValidPartition", "TestFromMap/map_with_one_entry", "TestIsValidGlueResourceName/capital", "TestOpenSearchConfig/region_is_optioonal_if_it_can_be_derived_from_URI", "TestGetP", "TestParseRDSEndpoint/RDS_instancce", "TestMemberFrommProtoNils/accesslist", "TestResourceIDs/bad_resource_name/ReesourceIDsFromStrings", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_headless=false_and_headless_connector", "TestResourceIDs/single_id/ResourceIDsFromStr", "TestParseElastiCacheEndpoint/connfiguration_endpoint,_TLS_enabled", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_without_cloud_metadata", "FuzzParseRDSEndpoint/seed#1", "TestProvisionTokenV2_Ch", "TestEventEqual/empty_not_equal", "TestPingConnection/PingTLSConn/BufferSize", "TestValidateUserTask/DiscooverRDS:_databases_-_different_database_name", "TestMFACeremony/OK_ceremony_success_prompt", "TestResourceIDs/certificate_signing_request_resource_name_in_cluster_wi", "TestParseSessionsURI/other_scheme", "TestNewAutoUpdateVersion//success_tools_autoupdate_version", "TestIsValidRegion/eu_region", "TestPingConnection/PingConn/BufferSize/", "TestIsAtlasEndpoint/public_enddpoint_with_srv", "FuzzParseRDSEndpoint/seed#9", "TestDisableUnqualifiedLookups", "TestOktAssignmentIsEqual/targets_diffferent_sizes", "TestNewAuthPr", "TestAllDeviceEnumsMapped/DeviceAttestationType", "TestParseElastiCacheEndpoint/node", "TestDeviceConversions_toAndFrom", "TestHardwareKeyAgentService/", "TestAlertAcknowledgement_Check/emptyy", "TestValidateDatabaseName/valid_long__name_and_uppercase_chars", "TestCircuitBreaker_beforeRequest/", "TestNewAutoUpdateC", "TestValidateAutoUpdateCo", "TestNotifyExit_restoresTerminal/pen", "TestMFACeremony/OK_ceremony_not_requirred", "TestChangePIN/set_ppin_mismatch", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=false_without_Webauthn", "TestIsGCPEndpoint/top_level-like_fake_go", "TestNewAutoUpdateVersion", "TestIsALPNConnUpgr", "TestApp", "TestValidateUserTask/DiscooverRDS:_databases_-_missing_database_name_in_metadata", "TestIsAutoUsersEnabled/unsupported_pprotocol", "TestRouteToServer/match_by_server_naame", "TestFromMap/empty_map", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH", "TestResourceIDs/kube_node_resou", "TestWindowsDesktopsSorter/by_addr_desc", "TestIsAzureEndpoint/invalid_enndpoint,_with_valid_prefix", "TestExpiryConsistency", "FuzzParseCacheForRedisEndpoint", "TestIsLoopback/multiple_loopback_adddresses_should_return_true", "TestPluginAWSICSettings/", "TestOktaAssignments_SetStatus/pendinng_-\\u003e_processing", "TestSAMLForceAuthn/force_authn_unspeecified", "TestProvisionTokenV2", "Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_nil_settings", "TestParseOpensearchEndpoint", "TestRateLimitFailure/stream-only", "TestNewAutoUpdateConfig/ssuccess_tools_autoupdate_enabled", "TestCheckAndSetDefaultsWithLink/invalid_link", "TestProvisionTokenV2_CheckAndSetDefaaults/circleci_valid", "TestWrappedSSHConn", "TestResource153ToLegacy/marshal", "TestMFACeremony/NOK_create_challenge_ffail", "TestParseAtlasEndpoint/azure_pprivate_link", "TestResourceIDs/no_cluster_name/Resour", "TestSSHKeysEqual/rsaKey1-allt!=ed25519Key2", "TestProvisionTokenV2_CheckAndSetDefaaults/iam_method_with_aws_role", "TestNewAutoUpdateConfig/iinvalid_agents_short_maintenance_window", "TestGetPolicyFromSet/hardware_key_policy", "TestLicenseSettersAndGetters/Set_Desk", "TestPluginOktaValidatio", "TestWat", "TestIsEC2NodeID", "TestChangePIN/set_pin_mismatch", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_type=local_and_h", "TestIsLoopback/degenerate_hostname_sho", "TestIsValidIAMPolicyName/invalid_symbols", "TestResourceIDs/persistent_volume_reesource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestOktaAssignments_SetStatus/suc", "TestExpiryConsistency/zero_expiry/GetEx", "TestGetUserLoginStates", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless_defaults_to_true_with_Webauthn/sf=optionaal", "TestServerCheckAndSetDefaults/GitHub_server", "TestDatabaseFromRedshiftServerlessEnndpoint/workgroup", "TestParseMemoryDBEndpoint/invalid_suffix", "TestOktaAssignments_SetStatus/pendinng_-\\u003e_pending", "TestIsAtlasEndpoint/private_link_with_srv", "TestToGRPC_statusError/wrapped_status", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor", "TestPortRangesContains/30", "TestAppIsAWSConsole", "TestPluginDatadogValidation/no_api_eendpoint", "TestLicenseSettersAndGetters/Set_Feaature_Hiding_Support", "TestCheckerValidateFIPS/RSA1024", "TestNewDiscoveryConffig/error_when_name_is_not_present", "FuzzNormalizeLocation/seed#0", "TestParseCorruptedKey/PRIVATE_KEY", "TestParseReviewFrequency/1_year", "TestSecondFactorsFromLegacySecondFactor/off", "TestMatchSearch_ResourceSpecific/app_server", "TestCheckAndSetDefaultsWithLink/valiid_link", "TestMFACeremony/NOK_create_challenge_fail", "TestContextReader/reclaim_abandoned_read", "TestIsPortInRange/equal_to_end_oof_single_port_range", "TestIsGCPEndpoint/fake_googleapiis", "TestValidateUserTask/DiscooverRDS:_databases_-_missing_discovery_config", "TestRole_AllowRequestKubernetesResouurce", "TestParseCorruptedKey/EC_PRIVATE_KEY", "TestAccessListDefaults/owwners_are_required", "TestRoundtrip/draft", "TestNewDiscoveryC", "TestAppServerSorter/by_description_desc", "TestHttpRoundTripperExtraHeaders/exttra_headers_do_not_overwrite_existing_headers", "TestWithinUpgradeWindow/within_upgrade_", "TestCliient_DialHost/connection_successfully_established_without_agent_forwarding", "TestValidateGitHubOrganizationName/aa", "TestOktAssignmentIsEqual/status_is_ddifferent", "TestResourceIDs/kube_node_resource_nname_in_cluster_with_slash/ResourceIDsFromString", "FuzzParseRDSEndpoint/seed#11", "TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_INTUNE", "TestMemberFrommProtoNils/expires", "TestChangePIN/set_puk_default", "TestLinearRetryMax", "TestNewSAMLIdPServiceProvider/dupli", "FuzzParseRDSEndpoint", "TestValidateUserTask/invalid_task_type", "TestSSHKeysEqual/rsaKey2!=eed25519Key2", "TestContainSameUniqueElements/different", "TestCircuitBreaker_Exe", "TestOktAssignmentIsEqual/targets_o1_is_nil", "TestSSHKeysEqual/rsaKey1-allt!=rsaKey2", "TestProvisionTokenV2_CheckAndSetDefaaults/ec2_method_with_aws_arn", "FuzzParseRDSEndpoint/seed#5", "TestOktAssignmentIsEqual/last_transitio", "TestDisableUnqualifiedLookups/uuid", "TestIsValidGlueResourceName/too__long", "TestResourceIDs/bad_resource_name/ReesourceIDsFromString", "TestReso", "TestValidateUserTask/Discover", "TestResourceIDs/persistent_volume_reesource_name_with_missing_namespace_and_pod_name", "TestCircuitBreaker_success", "TestAWSIsEmpty/true_with_unrecognized_bytes", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_vpc_id", "TestNewAuthPreference_secondFacto", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_second_f", "TestAzureMatcherCheckAndSetDefaults/i", "TestPluginOpsgenieValidation/no_stattic_credentials", "TestNewDiscoveryConffig/tag_aws_sync_with_empty_region", "TestMergeStreams/interlaced_streams", "TestPluginJamfValidation/no_settings", "TestRoundtrip/cluster", "TestPingConnection/PingConnn/BufferSize/Same", "TestClient_DialHost/grpc_connection_fails", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_WEBAUTHN/decode", "TestSSHKeysEqual/ed25519Keyy1-alt!=ed25519Key2", "TestWithinUpgradeWindow/within_upgraade_window", "TestResourceIDs/secret_resource_namee_in_cluster_with_slash/ResourceIDsFromStrings", "TestParseReviewFrequency//12_m", "TestResourceHeaderIsEqual/kind_is_diifferent", "TestP", "TestDatabaseMemoryDBEndpoint", "TestLegacySecondFactorFromSecondFactors", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_headless=false_and_headless_connector/sff=webauthn", "TestParsePrivateKeyPolicyError//valid_key_policy:_hardware_key_touch_and_pin", "TestRoleFilterMatch/", "TestValidateUserTask/D", "TestNewSAMLIdPServicePr", "TestIsPortInRange/equal_to_end_of_sin", "TestRequireKubeLocalProxy/ALPN_connnection_upgrade_not_required", "TestMarshalAndParseKey/hardware", "TestUploadTraces/nott_implemented", "TestParseReviewFrequency//3", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_local_connector/sf=off", "TestSelectNextReviewDate/six_months,", "TestParseMemoryDBEndpoint/TLS_dis", "TestAccessListMemberDefaults", "TestUnmarshallCreateHostUserModeYAMLL", "TestSSHKeysEqual/ed25519Key1==ed25519Key1", "TestIsValidRegion", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO", "TestRoundTripper_RoundTrip/success_in_standby", "TestParseAtlasEndpoint/domain__name_with_mongodb", "TestApplicationGetAWSRolesAnywherePrrofile/roles_anywhere_profile_not_configured", "TestAWSMatcherCheckAndSetDefaults/wiildcard_is_invalid_for_regions", "TestValidateAutoU", "TestGetResources/SAMLIdPServiceProvider", "TestAzureMatcherCheckAndSetDefaults/no_type", "TestNewClient/does_not_implement_transport", "TestHardwareKeeyAgentService/RSA2048_No_hash_PSS_signature", "TestIsValidIAMRoleName/only_one__symbol", "TestParseTeleportRoles/Auth,Auth", "TestParseDocumentDBEndpoint/DocuementDB_c", "TestAWSMatcherCheckAndSetDefaults/wiildcard_is_invalid_for_types", "TestSSHKeysEqual/rsaKey1!=eed25519Key1-alt", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_OTP", "TestIsMSSQLServerEndpoint/emptty", "TestAppPortsValidation/valid_non-TCPP_app_with_ports_ignored", "TestSAMLForceAuthn", "TestCountBy/empty_slice", "TestResourceIDs/certificate_signing_request_resource_nam", "TestAllDeviceEnumsMapped/OSType/OS_TTYPE_LINUX", "TestRoleFilterMatch/empty_filter_sho", "TestAuthorizedKey/missing_HostID#01", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/YAML", "TestIsValidAccountID/invalid_chaars_with_emojis", "TestWatchKindContains/yes:_subset_haas_narrower_CA_filter", "TestAccessListDefaults/owners_are_requi", "TestProvisionTokenV2_CheckAndSetDefaaults/implicit_ec2_method", "TestServerCheckAndSetDefaults/Open", "TestDatabaseElastiCacheEndpoint", "TestIsAzureEndpoint/inva", "TestCheckRoleARN/arn_identifier__but_no_other_section", "TestSAMLForceAuthn_Encodin", "TestInput/closed_input", "TestCassandraAWSEndpoint/aws_cassandra", "TestPluginAWSICSettings/missing_provvisioning_block", "TestParseReviewFrequency//3_month", "TestAssertionInfo_RoundTrip", "TestAuthorizedKey/missinng_HostID#01", "TestAllDeviceEn", "FuzzParseRedshiftEndpoint", "TestIsGCPEndpoint/fake_googleapis", "TestIsGCPEndpoint/compute_googleapis", "TestParseMemoryDBEndpoint/CN_enddpoint", "TestSSHKeysEqual/rsaKey1-alt!=ed25519Key1", "TestIsEICE/eice_node_without_accountt_id_label_is_not_EICE", "FuzzParseDynamoDBEndpoint/seed#4", "TestSSHKeysEqual/rsaKey2==rrsaKey2", "TestResou", "FuzzParseOpensearchEndpoint/seedd#4", "TestConvertToPPK/RSA_key_3", "TestAuthorizedKey", "TestNewAppV3/app_with_basic_CORS_policy", "TestParse/[::]:443", "TestDisableUnqualifiedLookups/foo.loocalhost", "TestEncodeDecodeRequireMFATy", "TestAppServerSorter/by_publicAddr_asc", "TestValidateAutoUpdateAgeentRollout", "TestAllDev", "TestDynamoDBConfig/account", "TestParseDynamoDBEndp", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHeadl", "TestHttpRoundTripperExtraHeaders", "TestOpenSearchConfig/custom_URI_withhout_region_is_an_error", "TestAccessReviewConditionsIsEmpty/roles", "TestIsValidAccountID/unicode_diggit_is_invalid", "TestGetPolicyFromSet/touch_and_pin_policy", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_cloud_metadata_but_missing_aws_info", "TestIsLoopback/multiple_loopbac", "TestGetProxyAddress/3_0:_valid,_httpp_endpoint_can_be_set_in_https_proxy_with_no_credentials", "TestRouteToServer/match_by_server_name", "TestAWSMatcherCheckAndSetDefaults/exxternal_id_was_set_but_assume_role_is_missing", "FuzzParseRDSEndpoint/seed#0", "TestResourceIDs/configmap_resource_nname_with_missing_namespace/ResourceIDsFromString", "TestGCPMatcherCheckAndSetDefaults/invalid_type", "TestWindowsDesktopsSorter/by_addr_asc", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration/sf=otp", "TestIsAzureEndpoint", "TestHttpRoun", "TestIsRequiredPolicyMet/hardware_key_touch", "TestNewAuthPreference_secondF", "TestCircuitBreaker_failure/f", "TestMarshalAndParseKey/ecdsa", "TestPluginJamfValidation/no_api_Endpoint", "TestServerInfoSetLabels/fix_manual_labels", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_OTP/encode", "TestAllDeviceEnumsMapped/DeviceEnrolllStatus/DEVICE_ENROLL_STATUS_NOT_ENROLLED", "TestServerInfoSetLabels/fix_manual_llabels", "TestContextReader/close_underlying_reader", "TestValidateUserTask/DiscooverEC2:_missing_region", "TestNewAuthPreference_secondFactors//NOK_prevent_headless_without_WebAuthn", "TestClusterCredentials/handshake_error", "TestPluginDatadogValidation", "TestOktaAssignments_SetStatus/failedd_-\\u003e_processing", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_minimal_configuration/sf=off", "TestNewDiscoveryConfig/tag_aws_sync", "TestIsValidLabelKey/dashes_annd_underscores", "TestXxx/9a", "TestParsePrivateKeyPolicyError/val", "TestResourceIDs/bad_cluster_name/Resou", "TestServerCheckAndSetDefaults/git_seerver_with_invalid_subkind", "TestRedshiftServerlessEndpoint/workgrou", "TestProvisionTokenV2_CheckAndSetDefaults/t", "TestNewAutoUpdateV", "TestValidateAutoUpdateAgentRollout", "TestMFACeremony/NOK_prompt_mfa_fail", "TestValidateGitHubOrganizationName", "TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_allow_rule_blank", "TestAllDeviceEnumsM", "TestIsTracingSuppported/supported", "TestPingConnection/PingTLSCConn", "TestMetadataZeroTime", "TestNewAutoUpdateConfig/ssuccess_tools_autoupdate_disabled", "TestResource153ToLegacy", "TestIntegrationCheckAndSe", "TestWithinUpgradeWindow/not_within_uupgrade_window", "TestSSHKeysEqual/rsaKey1-allt==rsaKey1", "TestNewAuthPreference_secondFactors/OK_", "TestPluginAWSICSettings", "TestIsAtlasEndpoint/azure_privvate_link", "TestAllDeviceEnumsMapped/DeviceAttesstationType/from_\\", "TestPluginEntraIDValidation/empty_default_ow", "TestMatchesWildcard/Wildcarrd_mismatch/Single_part_hostname", "TestParseRDSEndpoint/Redshift_enndpoint_fails", "TestCircuitBreaker_Execute/transittion_from_tripped_to_recovering", "TestRetryWithMFA/without_interceptor", "TestALPNDialer_getTLSConfig/no_update", "TestGetPartitionFromRegion/us-goov-west-1", "TestIsResponseSuccessful/500", "TestGetAdminUser/no_admin", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration", "TestParseReviewFrequency/12_month", "TestPluginOpsgenieValidati", "TestResource153ToLegacy/unwrap", "TestIsValidIAMRoleName/only_one_symbol", "TestAuthPreferenceV2_CheckA", "TestIsALPNConnUpgradeRequiredByEnv//upgraded_not_required_(no_addr_match)", "TestSSHKeysEqual/rsaKey1-allt==rsaKey1-ed25519-prefixed", "TestParseRedshiftEndpoint/standaard", "TestSAMLForceAuthn/force_authn_no", "TestRateLimit", "TestResourceIDs/multiple_ids", "FuzzParseElastiCacheEndpoint/seeed#18", "TestNewAutoUpdateConfig/iinvalid_tools_mode", "TestConversion/CompareFailed", "TestGetProxyAddress/3_1:_valid,_httpp_endpoint_can_be_set_in_https_proxy_with_plain_password", "TestRetryWithMFA/with_int", "TestCircuitBreaker_afterE", "TestMatchSearch_ResourceSpecific/kubbe_cluster", "TestAu", "TestInstanceFilter", "TestAll/non-empty_slice_with_a", "TestGetResources/KubeServer", "TestWatchKindContains/yes:_superset__filter_matches_all,_subset_has_no_CA_filter", "TestParseReviewFrequency/6_month", "TestCassandraAWSEndpoint/aws_cassanddra_url_from_region", "TestWatchKindContains/no:_subset_is__missing_name_when_superset_has_one", "TestPlainHttpFallback/Ping", "TestPluginOktaValida", "TestPluginJiraValidation/Missing_Setttings", "TestIsAtlasEndpoint/private_link", "TestIsMSSQLServerEndpoint/only_suffix", "TestNewAuthPreference_secondFactors//NOK_prevent_local_lockout_with_second_factor_SSO", "TestGithubAuthRequestCheck/connectorr-spec-missing-for-sso-test", "TestPluginJamfValidation/no_credentiials_inner", "TestAppPortsValidation/valid_overlappping_ranges", "TestParseDocumentDBEndpoint/RDS__instance_fails", "TestParseMSSQLEndpoint/withoutt_port", "TestIntegrationJSONMarshalCycle/azure-oidc", "TestPluginAWSICSettings/missing_instance_regi", "TestServerCheckAndSetDefaults/OpenSSHEC2Instanc", "TestSSHKeysEqual/rsaKey1!=ed25519Key1-alt", "TestCheckerValidateFIPS", "FuzzParseElastiCacheEndpoint/seed#11", "TestRetryWithMFA_Reuse", "TestDatabaseOracleRDS", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_headless_connector/sf=optional", "TestAccessReviewConditionsIsEmpty", "TestGetProx", "TestSSHKeysEqual/rsaKey1==rrsaKey1-alt", "TestResourceIDs/pod_resource_name_inn_cluster_with_slash#01/ResourceIDsFromStrings", "TestHttpRoundTripperExtraHeaders/ext", "TestNewSAMLIdPServiceProvider/supporrted_unspecified_preset_value", "TestDatabaseElastiCacheEndpoint/valid_URI", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=true_with_Webauthn", "TestServerSorter/by_name_desc", "TestAWSMatcherChec", "TestReadWriter_Read", "TestValidateAutoUpdateAgeentRollout/group_with_non_zero_wait_days_on_a_time-based_rollout", "TestLegacySecondFactorFromSecondFacto", "TestGetPolicyFromSet/touch_and__pin_policy", "TestParseOpensea", "TestCheckAndSetDefaultsWithLink/valiid_link_with_link_text", "TestUserGroupMatchSearch", "TestNewDiscoveryConfi", "TestGetResources/WindowsDesktop", "TestIsSSHCert/ssh-rsa-cert-v01@openssh.com", "TestAccessList_setIni", "TestResourceIDs/kube_node_resource_nname_in_cluster_with_slash", "TestConversion/LimitExceeded", "TestAccessRequestConditionsIsEmpty/cclaims_to_roles", "TestALPNConnUpgradeDialer/connection_upgrade", "TestURL/read_with_validator", "TestCassandraEndpointRegion/us-ggov-east-1", "TestIsRequiredPolicyMet/hardware_key_", "TestValidateUserTask/DiscooverRDS:_valid", "TestParsePrivateKeyPolicyError//valid_key_policy:_hardware_key", "TestMFACeremony", "FuzzParseDatabaseEndpoint/seedd#4", "TestFromProtoNNils/status", "TestPluginMattermostValidation/no_server_url", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_passwordless=false_and_passwordless_connnector/sf=on", "TestPrivateKey/invalid_public_key_ode", "TestLegacyToResource153/unwrap", "TestNetIQPluginSettings/missing_ApiEEndpoint#01", "TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v3", "TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust", "TestParseRDSEndpoint/RDS_clusterr", "TestIsOpenSSHNodeSubKind", "TestMatchSearch_ResourceSpecific/desktop_ser", "TestValidateDatabaseName/invalid_traailing_hyphen", "TestSlice", "TestAccessReviewConditionsIsEmpty/where", "FuzzParseDatabaseEndpoint/seed#3", "TestDatabaseRDSEndpoint", "TestCassandraEndpointRegion/us-gov-east-1", "TestCircuitBreaker_beforeReque", "TestGetPartitionFromRegion/us-goov-east-1", "TestIsResponseSuccessful/codes.Unkknown_error", "TestCircuitBreaker_Execute/tr", "TestResourceIDs/resource_name", "TestNewAutoUpdateVersion//invalid_semantic_agents_start_version", "TestResourceIDs/bad_resource_kind/ReesourceIDsFromString", "TestIsTracingSupported/unsupported", "TestRole_GetKubeResources/v7_with_labels_", "TestMatchSearch_ResourceSpecific/kube_cluster", "FuzzParseDuration/seed#1", "TestAccessRequestConditionsIsEmpty/ssuggested_reviewers", "FuzzParseElastiCacheEndpoint/seed#13", "TestAccessListDefaults", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_local_connector/sf=on", "TestNewDiscoveryConffig/fills_in_kube_matcher_default_values", "TestDurationUnmarshal/large_+_small", "TestResourceIDs/service_resource_namme_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestGetAdminUser", "TestWithOwnerssIneligibleStatusField", "TestSSHRouteMatcherScoring/multi_facctor_match", "TestOktaAssignments_SetStatus/processsing_-\\u003e_successful", "TestParseReviewFrequency//1m", "TestConvertToPPK/ed255119_key_1", "TestIsPortInRange/outside_of_sinngle_port_range", "FuzzParseMSSQLEndpoint/seed#2", "TestParseMSSQLEndpoint/without_port", "TestTunnelAddr", "TestMFADevice_CheckAndSetDefaults/OKK_Webauthn_device", "TestRequireKubeLocalProxy", "TestDynamoDBConfig/acc", "TestGetSortByFromString/#00", "TestProvisionTokenV2_CheckAndSetDefaaults/circleci_allow_rule_blank", "TestMetadataIsEqual/expires_m1_nil", "TestSSHKeysEqual/rsaKey1==rsaKey1-alt", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_unknown_connector", "TestAuthPreferenceV", "TestCheckRoleARN/valid_when_resource_s", "TestNewAutoUpdateVersion//invalid_empty_agents_target_version", "TestResourceIDs/service_account_resoource_name_in_cluster_with_slash", "FuzzParseOpensearchEndpoint/seed#0", "TestMatchSearch_ResourceSpecific/kubbe_server", "TestOktaAssignments_SetStatus/pending_-", "TestOktaAssignments_SetStatus/pending_-\\", "TestAppPortsValidation/end_port_smaller_tha", "TestPluginJiraValidation/Missing_Server_URL", "TestMapErr", "TestClientSecretFileURI", "TestPrivateKey_DecodePartialKeyRef", "TestCassandraAWSEndpoint/aws_cassanddra_custom_uri", "TestToMap/slice_with_one_labell", "FuzzParseDynamoDBEndpoint/seed#5", "TestNewDiscoveryCo", "TestMatchesWildcard/Wildcard_match", "TestFromProtoNils/grants", "TestFromMap/map_with_multiple__entries", "TestSSHProxyHostPort/TLS__routing_enabled,_web_listen_addr", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=local_an", "TestNewAuthPreference_secondFactors//NOK_SecondFactor_and_SecondFactors_both_set", "TestNewAppServerForAWSOIDC", "TestIsAutoUsersEnabled/postgres_with_admin_us", "TestCassandraEndpointRegion/cn-north-1.", "TestEventEqual/gogo_oneof_equal", "TestIsSSHCert/ssh-rsa-cert-v001@openssh.com", "TestContextReader", "TestIsValidIAMPolicyName/only_onne_symbol", "TestPluginOktaValidation/no_settings", "TestPingConnection/PingConn/ConcurrentRe", "TestFriendlyName", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_WEBAUTHN/encode", "TestContextReader/close_ContextReader", "TestParseTeleportRoles/windows_deskttop,trusted_cluster,remote_proxy", "TestServerCheckAndSetDefaults/OpenSSSH_node_with_public_addr", "TestDynamoDBConfig", "TestIterateResources/callback_error", "TestOpenSearchConfig/no_err", "TestIsResponseSuccessful/error", "TestAccessRequestConditionsIsEmpty/aannotations", "TestCircuitBreaker_Execute/no_erroor_remain_tripped", "TestResourceIDs/certificate_signing__request_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStringss", "TestDisableUnqualifiedLookups/qualified_uuid", "TestOktAssignmentIsEqual/targets_o2__is_nil", "TestReviewToProtoChanges", "TestMatchSearch/no_match_for_partial_custom", "TestPrivateKey_Prompt", "TestListResources/DatabaseServer", "TestNewDiscoveryConffig/tag_aws_sync", "TestResourceIDs/secret_resource_namee_in_cluster_with_slash/ResourceIDsFromString", "TestNewAutoUpdateConfig/iinvalid_spec", "TestProvisionTokenV2_CheckAndSetDefaaults/missing_roles", "TestDatabaseServerSorter/by_name_asc", "TestGithubAuthRequestCheck/con", "TestProvisionTokenV2_CheckAndSetDefaults/empty", "TestSSHKeysEqual/ed25519Key1!=rsaKey1", "TestResourceIDs/certificate_signing_request_resource_name", "TestAWSIsEmpty", "TestPluginOktaValidation", "TestCassandraAWSEndpoint/aws_cassand", "FuzzParseRDSEndpoint/seed#8", "TestNewAppServerForAWSOIDCIntegratioon/error_when_HostID_is_missing", "TestLicenseSettersAndGetters/Set_Ressource_Access_Request_Support", "FuzzParseElastiCacheEndpoint/seed#7", "TestResourceIDs/single_id/ResourceIDDsFromString", "TestRetryWithMFA_RReuse/nok_disallow_reuse", "TestNewAppServerForAWSOIDCIntegratioon", "TestIsAutoUsersEnabled/unsupported_protocol", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHeadless_", "TestResourceNames", "TestIsValidGlueResourceName/valiid", "TestNewAppV3", "TestPrivateKey/valid_protected", "TestPluginOktaValidation/invalid_creedential_type_(oauth2)", "TestURL", "TestRes", "FuzzParseCacheForRedisEndpoint/seed#1", "TestSelectNextReviewDate", "TestDatabaseAzureEndpoints/invalid_datab", "TestSSHKeysEqual/ed25519Keyy2==ed25519Key2", "TestAWSMatcherCheckAndSetDefaults/noo_region", "TestDatabaseServerSorter/by_descripttion_asc", "TestProvisionTokenV2_CheckAndSetDefaaults/overridden_domain", "TestContextReader/simple_readd", "TestSSHKeysEqual/rsaKey1-allt!=ed25519Key1-rsa-prefixed", "TestOktAssignmentIsEqual/status_is_different", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_region", "TestIsALPNConnUpgra", "TestOpenSearchConfig/no_error_when_ffull_data_provided_and_matches", "TestEncodeDecodeRequireMFAType/OFF/ddecode", "TestResourceIDs/kube_node_resource_nname_in_cluster_with_slash/ResourceIDsFromStrings", "TestApplicationGetAWSExternalID/configured", "TestValidat", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_derived_", "TestResourceIDs/cluster_role_resourcce_name_in_cluster_with_slash", "TestIsEICE/agentless_openssh_node_is_not_eice", "TestRouteToServer/match_by_hostname_over_tunn", "TestServerSorter/by_hostname_desc", "TestParseReviewDayOfMonth/last", "TestPluginJamfValidation", "TestResourceIDs/cluster_role_bindingg_resource_name_in_cluster_with_slash/ResourceIDsFromString", "TestOktAssignmentIsEqual/targets_o1__is_nil", "TestParseReviewFrequency/1year", "TestValidateUs", "TestRequireKubeLocalProxy/kube_nott_enabled", "TestServerCheckAndSetDefaults/node_wwith_invalid_subkind", "TestMatchSearch_ResourceSpecific/db_server", "TestProvisionTokenV2_GetSafeName/to", "TestSSHKeysEqual/ed25519Keyy1-alt!=rsaKey2", "TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_UNSPECIFIED", "TestContextReader/simple_read", "TestLegacySecondFactorFromSecondFactors/#00", "TestResourceIDs/service_account_resoource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestFromProtoNNils/member_count", "TestGetSortByFromString/name:desc", "TestListResources/WindowsDesktop", "TestValidateAutoUpdateConnfig/group_with_negative_wait_days", "TestPingConnection/PingConn/ConcurrentW", "TestAccessRequestConditionsIsEmpty/claims_", "TestSetEnvs/envs_set_individually", "TestConversion/ConnectionProblem", "TestNewAutoUpdateConfig/iinvalid_agents_mode", "TestRole_AllowRequestKubernetesResour", "TestRequireKubeLocalProxy/local_proxy_requir", "TestParseTeleportRoles/wi", "TestURL/read_with_failed_valiidator", "TestNotifyExit_restoresTerminnal/no_pending_read", "TestResourceIDs/clus", "TestSAMLForceAuthn_Encoding/FORCE_AU", "TestExpiryConsistency/set_expiry", "TestParsePrivateKeyPolicyE", "TestExpiryConsistency/nil_expiry/GettExpiry()_resource", "TestValidateJamfSpecV1/api_endpoint_invalid", "TestParseReviewFrequency//12", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowPassw", "TestHardwareKeyAgentService/E", "TestMatchSearch/match_ignore_case", "TestIsValidIAMRoleName/too_largee", "TestProvisionTokenV2_CheckAndSetDefaaults/terraform_missing_organization_(id)", "TestDynamoDBURIForRegion/region__is_in_correct_AWS_partition", "TestOktAssignmentIsEqual/empty_equalls", "TestResourceMethods", "TestGRPCErrorWrapping/stream_inter", "TestHardwareKeeyAgentService/ED25519_SHA256", "TestGetAdminUser/gets_admin_from_speec", "TestIsValidGlueResourceName/emptty", "TestMatchSearch", "TestCircuitBreaker_afterExecution//successful_execution", "TestClient/server_supports_tracing", "TestAWSMatcherCheckAndSetDefaults/innvalid_type", "TestWatchKindContains/no:_subset_has_wid", "TestParseOpensearch", ": TestAppPath", "TestDynamoDBConfig/invalid_AWS_URI_iis_an_error", "TestAWSMatcherCheckAndSetDefaults/inntegration_can_be_used_with_Script_mode", "TestDisableUnqualifiedLookups/qualiffied_uuid", "TestNewClient/compliant_grpc_server", "TestMatchSearch_ResourceSpecific/appplication", "TestFromProtoNils", "TestResourceIDs/no_cluster_name/ResoourceIDsFromStrings", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_U", "TestParseReviewFrequency/1m", "TestPingError/mangled_response", "TestCollectPages/single-element-case", "TestHttpRoundTripperExtraHeaders/exttra_headers_are_added", "TestALPNDialer_getTLSConfig/no_updaate", "TestParseTeleportRoles/Node", "TestNewDisco", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFact", "TestValidateAutoUpdateConnfig/group_with_invalid_week_days", "TestResourceMethods/SetRevision", "TestALPNConnUpgradeDialer/connectioon_upgrade_API_not_found/direct", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_headless=false_and_headless_connector/sff=optional", "TestInstanceFilter/match-version-rannge", "FuzzParseDynamoDBEndpoint/seed#2", "TestIsValidGlueResourceName/valid", "TestPingConnection/PingTLSCConn/BufferSize/Same", "TestFromProtoNils/owners", "TestAllDeviceEnumsMapped/OSType/from", "TestAppServerSorter/by_description_ddesc", "TestIsValidPartition/aws", "TestResourceIDs/bad_resource_name", "TestIsValidAthenaWorkgroupName/eempty", "TestOnceFunc", "TestParseTeleportRoles", "TestOktAssignmentIsEqual", "TestValidatePortRange/end_port_bigger", "TestParseRDSEndpoint/RDS_cluster_custom_", "TestCircuitBreaker_Execute/error_bbelow_limit_remain_in_standby", "TestResourceIDs/pod_resource_name_inn_cluster_with_slash/ResourceIDsFromString", "TestRetryWithMFA_RReuse/ok_allow_reuse", "TestParsePrivateKeyPolicyError//wrapped_policy_error", "TestNewAppServerForAWSOIDCIntegration", "TestMetadataIsEqual/empty_equals", "TestHardwareKeeyAgentService/RSA2048_SHA256", "TestLegacySecondFactorFromSecondFacttors/#00", "TestAll/non-empty_slice_with_at_leasst_one_non-matching_element", "TestIsResponseSuccessful/codes.Unavailable", "TestSSHKeysEqual/ed25519Key1-alt!=rsaKey1", "TestOktAssignmentIsEqual/finalized_is_differe", "TestOpenSearchConfig/missing_accountt_is_an_error", "TestSAMLForceAuthn/force_authn_yes", "TesttRoundtrip/cluster", "TestShortRegionToRegion", "TestParseDynamoDBEndpoint/detects_invalid_endpoint_with_mismatche", "TestParse/example.com:443", "FuzzParseCacheForRedisEndpointt/seed#2", "TestIsRequiredPolicyMet/none", "FuzzParseElastiCacheEndpoint/seeed#4", "TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_wrong_service_account_name", "TestInput", "TestContextReader/reclaim_abaandoned_read", "TestMFADevice_CheckAndSetDefaults/NOOK_Webauthn_missing_public_key", "TestDatabaseFromRedshiftServerlessEndpoint", "TestProvisionTokenV2_GetSafeName/t", "TestFriendlyName/friendly_role_name_", "TestGetTunnelType", "TestChangePIN/no_innput", "TestPrivateKey_EncoodeDecode", "TestOktAssignmentIsEqual/populated_equals", "TestGCPMatcherCheckAndSetDefa", "TestAzureMatcherCheckAndSetDefaults/invalid_", "TestDynamoDBConfig/account_and_AWS_UURI_and_empty_region_is_correct", "TestTraces", "TestAll", "TestProvisionTokenV2_CheckAndSetDefaults/s", "TestDatabasePermission/empty_individdual_permission", "TestLicenseSettersAndGetters/Set_Appplication_Access_Support", "TestIsLoopback/localhost_should_retuurn_true", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless_defaults_to_true_with_Webauthn", "TestNewDiscoveryConffig/fills_in_azure_matcher_default_values#01", "TestParseRedshiftEndpoint/RDS_enndpoint_fails", "TestResourceIDs/kube_node_resource_name_with_missing_namespace_and_pod_nam", "TestGetResourcesWithFilters/KubeSerrver", "TestUnifiedNameCompare/sort_by_same__kind", "TestParse/should_parse:_scheme-ip6-port", "TestParseOpensearchEndpoint/parses_valid_endpoint/opensearch", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK", "TestParseDocumentDBEndpoint", "TestValidateUserTask/DiscoverR", "TestValidatePortRange/end_port_ssmaller_than_2", "TestChangePIN/set_ppuk_from_default", "TestParseReviewFrequency//12m", "TestGetResourcesWithFilters", "TestParseReviewDayOfMonth/1", "TestIsAzureEndpoint/invalid_enndpoint", "TestNewSAMLIdPServiceProvider", "TestMarshalAndParseKey/ed25519", "TestProvisionTokenV2_CheckAndSetDefaaults/circleci_and_no_allow", "TestValidateGitHubOrganizationName/vvalid-org", "TestParseDocumentDBEndpoint/DocuuementDB_cluster_in_mongo_URL_format", "TestNewAutoUpdateAgentRolllout/invalid_autoupdate_mode", "TestResourceIDs/kube_node_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestNewAppV3/empty_app", "TestProvis", "TestRole_AllowRequestKubernetesR", "TestX509KeyPair", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_local_connector/sf=on", "TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_missing_org_id", "TestIsOpenSSHNodeSubKind/regular_nodde", "TestGetUnifiedResourcesWithLogins", "TestProvisionTokenV2_GetSafeName", "FuzzParseElastiCacheEndpoint/seed#17", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless=false_without_Webauthn/sf=off", "TestIsAtlasEndpoint/public_endpoint", "TestSecondFactorsFromLegacySecondFacctor/otp", "TestX509Certificate/rsa_certs", "TestMatchSearch_ResourceSpecific/node_usin", "TestAccessReviewConditionsIsEmpty/whhere", "TestIsAzureEndpoint/valid_endpoint", "TestGetAdminUser/gets_admin_from_labels", "TestIsMSSQLServerEndpoint/sufffix_with_port", "TestParseMSSQLEndpoint/only_suuffix", "TestDatabaseServerSorter/by_name_desc", "TestParseOpensearchEndpoint/detects_invalid_endpoint_with_mismatched_u", "TestConvertToPPK/RSA_keey_2", "TestParseElastiCacheEndpoint/invvalid_url", "TestAuth", "TestResourceIDs/cluster_role_bindingg_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestMatchesWildcard", "TestPluginJamfValidation/no_api_Endppoint", "FuzzParseMSSQLEndpoint/seed#5", "TestParseReviewFrequency//1", "TestPluginEntraIDValidation/missing_ss", "FuzzParseElastiCacheEndpoint/seed#9", "TestResourceIDs/namespace_resource_nname_in_cluster_with_slash/ResourceIDsFromStrings", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_unknown_connector/sf=webauthn", "TestIsRequiredPolicyMet/hardwarre_key_pin", "TestHardwareKeyAgentService", "TestWindowsDesktopsSorter/by_name_assc", "TestAppIsAWSConsole/AWS_China", "TestMatchSearch_ResourceSpecific/dattabase_with_gcp_keywords", "TestSSHRouteMatcherScoring/not_match", "TestMFADevice_CheckAndSetDefaults/OKK_U2F_device", "TestPluginJiraValidation/Missing_Creedentials", "TestLicenseSettersAndGetters/Set_IGSS_Support", "TestParseSessionsURI", "FuzzNormalizeLocation/seed#4", "TestAlertAcknowledgement_Check/missiing_alert_ID", "TestParseAtlasEndpoint/private_link", "TestSSHKeysEqual/ed25519Keyy2!=ed25519Key1-alt", "TestNewSAMLIdPServiceProvider/missing_at", "TestRolesCheck", "TestGithubAuthRequestCheck/both-new--and-deprecated-keys-are-set", "TestCloneProtoMsg", "TestParsePrivateKeyPolicyError//valid_key_policy:_hardware_key_pin", "TestSSHKeysEqual/rsaKey1-alt==rsaKey1", "TestAllDevic", "TestValidate", "TestConvertToPPK/RSA_key_2", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_unknown_connector/sf=otp", "TestAppIsAWSConsole/CLI-only_AWS_App", "TestParseReviewDayOfMonth/unknown", "TestNewAutoUpdateConfig/ssuccess_agents_autoupdate_time-based", "TestDatabasePermission/wildcard_sel", "TestRole_GetKubeResources/v7_with_errror", "FuzzParseDuration/seed#0", "TestHardwareKeeyAgentService/RSA2048_SHA256_PSS_signature", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/JSON/Unmarshal", "TestPri", "TestAccessList_setInitial", "TestReviewFromProtoNils", "TestMetadataIsEqual/description_is_different", "TestValidateAutoUpdateConfig/gr", "FuzzParseOpensearchEndpoint/seed#4", "TestCheckAndSetDefaults", "TestProvisionTokenV2_CheckAndSetDefaults", "TestOktaAssignments_SetStatus/processsing_-\\u003e_failed", "TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_allow_rule_missing_key_field", "TestSSHKeysEqual/rsaKey2!=rrsaKey1", "TestHardwareKeeyAgentService/fallback", "TestIsPortInRange/bigger_than_range_end", "TestAppPortsValidation/end_port_smaller_than_2", "TestParseRDSEndpoint/RDS_instancce_in_cn-north-1", "TestMemberFromProtoNils/reason", "TestResourceIDs/namespace_resou", "TestAppIsAWSConsole/Not_an_AWS_Consoole_URL", "TestToGRPCKeepCode", "TestMFADevice_CheckAndSetDefaults/OK_Web", "TestLicenseSettersAndGetters/Set_Dessktop_Access_Support", "TestCassandraEndpointRegion", "TestRoleFilterMatch/empty_filter_shoould_match_everything", "TestParse/should_parse:_scheme-ip4-port", "TestClient_DialCluster/", "TestToGRPC_statusError", "TestGetProxyAddress/2_2:_valid,_corrrect_full_url_with_special_characters_in_password", "TestOktaAssignments_SetStatus/process", "TestGithubAuthRequestC", "TestServerSorter/by_name_asc", "TestLegacySecondFactorFromSecondFacttors/\\\\x02", "TestCollectPages/erroor-case", "TestCircuitBreaker_success/successs_in_recovery_below_limit", "TestPluginOktaValidation/invalid_creedentials_(static_credentials)", "TestALPNDialer_getTLSConfig/cas_upddated", "TestToMap/slice_with_multiple__labels_with_same_key", "TestMapWhile", "TestSSHKeysEqual/ed25519Key1!=rsaKey2", "TestClient_Clust", "TestSecondFactorsFromLegacySecondFacctor/#00", "TestSSHKeysEqual/rsaKey1-allt!=ed25519Key1", "TestPluginOpsgenieValidat", "TestNewSAMLIdPServiceProvider/supporrted_empty_preset_value", "TestCircuitBreaker_Execute/no_erroors_remain_in_standby", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_minimal_configuration/sf=optional", "TestParseElastiCacheEndpoint/", "TestAppPortsValidation/port_bigger_tthan_65535", "TestChangePIN/set_ppuk_default", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless=true_with_Webauthn/sf=on", "TestSSHKeysEqual/rsaKey1-alt==rsaKey1-alt", "TestParseCorruptedKey", "FuzzParseElastiCacheEndpoint/seed#10", "TestServerCheckAndSetDefaults/OpenSSSH_node_with_invalid_addr", "TestRetryWithMFA", "TestMatchSearch/match_with_mix_of_s", "TestTrimStr", "TestNewSAMLIdPServiceProvider/empty_entity_ID", "TestLoadProfile/non_existent_profile", "TestIsALPNConnUpgradeRequired/upgraade_required_(handshake_success)/with_ProxyURL", "TestClusterCredentials", "TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v4", "TestValidateJamfSpecV1", "TestResourceIDs/service_account_resource_name_with_missing_namespace_", "TestParseTeleportRoles/Auth,Proxy", "TestIsEICE/agentless_openssh_node_iss_not_eice", "TestProvisionTokenV", "TestAWSMatcherCheckAndSetDefaults/invalid_type", "TestCheckAndSetDefaultsWithLink/external_link", "TestAWSMatcherCheckAndSetDefaults/i", "TestOktAssignmentIsEqual/targets_different_id", "TestLicenseSettersAndGetters/Set_Cloud", "TestDatabaseRDSEndpoint/valid_account_id", "TestAuthPrefe", "TestCircuitBreaker_E", "TestAppPublicAddrValidation/kubernettes_app_http", "TestParseReviewFrequency/6months", "TestWindowsDesktopsSorter/by_addr_deesc", "Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_access_list_sync_enabled_with_bidirectional_sync_disabled", "TestIsALPNConnUpgradeRequiredByEnv//upgraded_not_required_(for_target_addr)", "TestValidateJamfSpecV1/api_endpoint__invalid", "TestParseReviewFrequency", "FuzzParseRedshiftEndpoint/seed#3", "TestResourceHeaderIsEqual/one_is_nil", "TestRetryWithMFA/wwith_interceptor/ok_mfa_ceremony", "TestAppIsAzureCloud/not_Azure_Cloud", "TestReviewSpecUnmarshalinng", "TestValidateAutoUpdateConfig/group_with_non_zero_wait_days_on_a_time-based_confi", "TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_valid_static_jwks", "TestParseWeekdays/Wildcard", "TestValidateJamfSpecV1/spec_with_inventory", "TestProvisionTokenV2_CheckA", "TestParsePrivateKeyPolicyError//valid_key_policy:_web_session", "TestIsOpenSSHNodeSubKind/regular_node", "TestR", "TestGetResourcesWithFilters/ApplicationServer", "TestResourceAttestationType_toAndFroom/unspecified", "TestIsEICE/regular_node_not_eice", "TestClient_DialHost/inva", "TestParseReviewDayOfMonth", "TestShortRegionToRegion/invalid_prefix", "TestResourceIDs/secr", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_with_attestation_CAs/sf=optional", "TestLinear", "TestPluginAWSICSettings/missing_instance_ARN", "TestPrivateKey_EncodeDecode", "TestAWSIsEmpty/true", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_headless_connector", "TestIsAtlasEndpoint/public_enddpoint", "TestParseRedshiftEndpoint/cn-norrth-1", "TestDatabaseServerSorter/by_name_ascc", "TestParseReviewFrequency/3_m", "TestAppIsAzureCloud", "TestEventEqual/gogo_oneof_not_equal", "TestCirc", "TestLinearV2", "TestXxx/9c", "TestExpiryConsistency/set_expiry/GettExpiry()_resource", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration/sf=off", "TestNewAccessGraphSettings", "TestALPNDialer_getTLSConfig/cas_updated", "TestResourceIDs/service_resource_namme_in_cluster_with_slash/ResourceIDsFromString", "TestOktaAssignments_SetStatus/proces", "TestAccessRequestConditionsIsEmpty/thresholds", "TestOIDCClaimsRoundTrip", "TestKeyPair", "TestParseReviewFrequency//1months", "TestSelectNextReviewDate//six_months,_last_day", "TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace/ResourceIDsFromString", "TestGetProxyAddress/9_2:_valid,_no_pproxy_matches_host_but_not_port_with_special_characters_in_password", "TestOktaAssignments_SetStatus/successsful_-\\u003e_failed", "TestMarshalAndParseKey/rsa", "TestResourceIDs/cluster_role_resourcce_name_in_cluster_with_slash/ResourceIDsFromStrings", "TestIsValidAccountID/invalid_chars", "TestLegacySecondFactorFromSecondFacttors/\\\\x01", "TestContainSameUniqueElements/same", "TestResourceIDs/certificate_signing__request_resource_name_in_cluster_with_slash/ResourceIDsFromString", "TestAccessRequestConditionsIsEmpty/rroles", "TestResource", "TestGithubAuthRequestCheck/authenticcated-user", "TestSSHKeysEqual/rsaKey1-alt!=rsaKey2", "TestSSHKeysEqual/ed25519Key1-alt==ed25", "TestResourceIDs/bad_cluster_name", "TestWatchKindContains/", "FuzzNormalizeLocation/seed#2", "TestMatchSearch_ResourceSpecific/application", "TestUnifiedNameCompare/sort_by_different_kind", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_unrecognized_streams_service_subdomain", "TestResourceIDs/cluster_role_resourcce_name_in_cluster_with_slash/ResourceIDsFromString", "TestRoleV6CheckAndSetDefaults_SAMLIddPOptions", "TestGetProxyAddress/9_1:_valid,_no_pproxy_matches_host_but_not_port_with_plain_password", "TestAlertAcknowledgement_Check/missiing_expiry", "TestWindowsDesktopsSorter/by_name_desc", "TestParseRedshiftEndpoint/standard", "TestGetResources/ApplicationServer", "TestURL/read_with_failed_validator", "TestConvertToPPK/ecdsa__key", "TestProvisionTokenV2_GetSafeName/nonn-token_join_method", "TestAllDeviceEnumsMapped/DeviceOrigi", "TestValidateUserTask/DiscooverRDS:_missing_account_id", "TestCircuitBreaker_aft", "TestDynamoDBConf", "TestExpiryConsistency/set_expiry/GetExp", "TestWatchKindContains/yes:_subset_haas_narrower_filter", "TestToMap/slice_with_multiple__labels", "TestIsMSSQLServerEndpoint/wronng_suffix", "TestEncodeDecodeRequireMFAType/OFF", "TestSSHKeysEqual/ed25519Key2!=rsaKey1", "TestIsAtlasEndpoint/azure_private_link", "TestLoadKeyPair", "TestSSHKeysEqual/ed25519Key2!=ed25519K", "TestGetPolicyFromSet", "TestUnmarshallCreateHostUserModeJSONN", "TestLicenseSettersAndGetters/Set_Machine_", "TestAccessList_setInitiallReviewDate/one_month,_first_day", "TestDatabaseRDSProxyEndpoint", "TestGetProxyAddress/0_1:_valid,_can__be_raw_host:port_with_plain_password", "TestParse/tcp://example.com:443", "TestFriendlyName/no_friendly_name", "TestLockTargetMatch", "TestTrimToMaxSize/with_metadata", "TestInstanceFilter/match-old", "TestValidateAutoUpdateAgeentRollout/group_with_empty_name", "TestCheckerValidateFIPS/RSAA2048", "TestParseTeleportRoles/Admin,invalidrole", "TestPlainHttpFallback/Find/Denied_on_s", "TestKubeMatcherCheckAndSetDefaults", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_arbitrary_connector/sf=on", "TestMemberFromProtoNils/expires", "TestResourceIDs/secret_resource_namee_with_missing_namespace/ResourceIDsFromString", "TestPlainHttpFallback/Finnd/Allowed_on_insecure_\\u0026_loopback", "TestEncodeDecodeSecondFac", "TestNetIQPluginSettings/valid", "TestClusterCredentials/no_server_cert", "TestConversion/os.ErrNotExist", "TestX509Certificate/no_cert", "TestResourceHeaderIsEqual/version_is_different", "TestGetPolicyFromSet/pin_policy", "TestGetPartitionFromRegion/us-east-1", "TestRouteToServer/match_by_hostname__over_tunnel", "TestParseCorruptedKey/PUBLIC_KEY", "TestGetProxyAddress/2_1:", "TestSSHKeysEqual/rsaKey1!=eed25519Key1-rsa-prefixed", "TestIsEC2NodeID/17_digit", "TestIsValidLabelKey/carot", "TestEventEqual/empty_equal", "TestRouteToServer/mismatch_public_addr", "TestOIDCClaimsRoundTrip/empty", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_non-URL/sf=webauthn", "TestNewAppV3/non-cloud_app", "TestFriendlyName/friendly_node_name", "TestDynamoDBConfig/account_and", "TestPluginJamfValidation/no_credentials_inner", "TestCheckRoleARN/invalid_when_thhe_resource_is_of_type_role,_but_role_name_section_is_missing", "TestParseReviewDayOfMonth/first", "TestIsMSSQLServerEndpoint/suffix_with_port", "TestSSHKeysEqual/rsaKey1==rrsaKey1", "TestParseOpensearchEndpoint/parsses_valid_endpoint/opensearch-instance-foo.us-east-1.es.amazonaws.com", "TestLicenseSettersAndGetters/Set_ReportsUsage", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_not_AWS_uri", "TestOktaAssignments_SetStatus/failed_-\\u0", "TestEncodeDecodeRequireMFAType/SESSIION_AND_HARDWARE_KEY/encode", "TestParseTeleportRoles/windowsdesktoop", "TestAWSMatch", "TestPluginDatadogValidation/valid_crredentials", "TestSSHKeysEqual/rsaKey2!=ed25519", "TestDatabaseStatus", "TestNewDiscoveryConffig/tag_aws_sync_with_region_not_set", "TestAppServerSorter/by_publicAddr_deesc", "TestApplicati", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_empty_uri", "TestParse/should_parse:_ip6-port", "TestParseDocumentDBEndpoint/DocuuementDB_cluster_reader", "TestParsePrivateKeyPolicyError//valid_key_policy:_hardware_key_touch", "TestPluginOpsgenieValidation/no_api_endpint", "TestParseElastiCacheEndpoint/CN_endpoint", "TestAppIsAzureCloud/Azure_Cloud", "TestPluginOktaValidation/invalid_cr", "TestResourceIDs/configmap_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestOktaAssignments_SetStatus/successsful_-\\u003e_successful", "TestIsValidGlueResourceName/symbols", "TestParsePrivateKeyP", "TesttRoundtrip/draft", "TestNewAutoUpdateConfig/", "TestCheckerValidateFIPS/ECDSAP256", "TestGetResourcesWithFilters/SAMLIdPPServiceProvider", "TestLockTargetEquals", "TestParseRDSEndpoint/RDS_cluster", "TestParseMemoryDBEndpoint/TLS_ennabled_node_endpoint", "TestFriendlyName/friendly_app_name_((uses_description)", "FuzzParseRedshiftEndpoint/seed#5", "TestALPNDialer_getTLSConfig/missingg_tls_config", "TestConvertToPPK/ecdsa_key", "TestAccessList_setInitiallReviewDate/six_months,_last_day", "TestResourceHeaderRoundtrip", "TestPortRangesContains/42", "TestParseSessionsURI/explicit_filesyystem_URI", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Al", "TestParseAtlasEndpoint/public_endpoint_", "TestParseElastiCacheEndpoint/re", "TestProvisionTokenV2_GetSafeName/tokken_join_method_(short)", "Test_PluginOktaSyncSettings_SyncEnabbledGetters", "TestResourceMethods/GetRevision", "TestXxx/9d", "TestHardwareKeyMethods", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_local_connector/sf=optional", "TestIsValidRegion/us_gov", "TestResourceIDs/service_resource_namme_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestResourceIDs/cluster_role_resourcce_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestResourceIDs/service_account_resoource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestMFACeremony/OK_ceremony_not_required", "TestPluginOpenAIValidation/invali", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=oidc_and_local_connector/sf=webauthn", "FuzzParseElastiCacheEndpoint/seeed#19", "TestFromProtoNNils", "TestGetTunnelType/okta", "TestRateLimitFailure/limiter-only", "TestDatabasePermission/valid_permisssions", "TestPortRangesContains/15", "TestOktaAssignments_SetStatus/succes", "TestValidateUserTask/DiscooverRDS:_databases_-_missing_discovery_group", "TestPluginAWSICSettings/missing_provisioni", "TestUploadTraces/not_implemented", "TestAuthorizedKey/missing_fingerprint", "TestHttpRoundTripperDowngrade/does_not_hit_http_proxy_if_insecure_and_l", "TestResourceIDs/secret_resource_n", "TestPluginJiraValidation", "TestProvisionTokenV2_CheckAndSetDefaaults/spacelift_incorrect_hostname", "TestResourceIDs/resource_name_with_slash", "TestParseReviewFrequency/1month", "TestIsValidIAMRoleName/empty", "TestAccessReviewConditionsIsEmpty/rooles", "TestParse/should_parse:_host-port", "FuzzParseElastiCacheEndpoint/seed#14", "TestResourceIDs/persistent_volume_resource_name_with_missing_names", "TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode_invalid", "TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/YAML/Unmarshal", "TestPluginJiraValidation/Missing_Creedential_Labels", "TestSSHKeysEqual/ed25519Key1==ed25519K", "TestResourceIDs/configmap_resource_name_with_missing_namespace_and_pod_nam", "TestMFACeremony/OK_ceremony_success_prrompt", "TestCircuitBreaker_Execute/no_error_rema", "TestDatabaseElastiCacheEndpoint/invalid_URI", "TestMatchSearch_ResourceSpecific/", "TestNewAutoUpdateConfig/iinvalid_agents_strategy", "TestProvisionTokenV2_CheckAndSetDefaaults/spacelift_rule_missing_fields", "TestResourceIDs/service_account_resoource_name_in_cluster_with_slash/ResourceIDsFromStrings", "TestAppPortsValidation/valid_overlapping_rang", "TestNewDiscoveryConffig/fills_in_aws_matcher_default_values", "TestServerInfoSetLabels/fix_aws_labeels", "TestCloning/*types.ServerV2", "TestAlertAcknowledgement_Check/succeess", "TestIsALPNConnUpgradeRequiredByEnv", "TestValidatePortRange/port_biggeer_than_max_port", "TestParse/should_parse:_host/path", "Test", "TestSSHProxyHostPort/TL", "TestServerCheckAndSetDefaults/node_wi", "TestNewAutoUpdateAgentRollout", "FuzzParseElastiCacheEndpoint/seed#21", "TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_valid_in_cluster", "TestValidateAutoUpdateConnfig", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local,_allow_headless=false_and_headless_connector/sff=on", "TestProvisionTokenV2_CheckAndSetDefaaults/github_ghes_valid", "TestCircuitBreaker_success/successs_in_standby", "TestIsValidAccountID/valid_account_id", "TestAllDeviceEnumsMapped/Devic", "TestConvertToPPK/RSA_keey_3", "TestDisableUnqualifiedLookups/unquallified_hostname", "TestParseReviewFrequency/1_MoNtH", "TestValidateAssumeStartTime/valid_start_time", "TestResourceIDs/service_account_resoource_name_in_cluster_with_slash/ResourceIDsFromString", "TestDynamoDBConfig/invalid_AWS_account_", "TestUnifiedNameCompare/sort_by_same_kind", "TestProvisionTokenV2_CheckAndSetDefaaults/spacelift_missing_hostname", "TestRoleV6_CheckAndSetDefaults/spiffe:_valid", "TestTake", "TestNewSAMLIdPServiceProvider/GCP_Woorkforce_user_provided_relay_state", "TestToLowerStrings", "TestPlainHttpFallback/Find", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_type=local_and_passwordless_connector/sf=webauthn", "TestRetryWithMFA_RReuse/ok_disallow_reuse,_retry_with_one-shot_mfa", "TestDatabaseAzureEndpoints/valid_PostgreSQL", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_minimal_configuration/sf=on", "TestPluginAWSICSettings/missing_insttance_region", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHeadless=", "TestAllDeviceEnumsMapped/DeviceEnrollStatus", "TestResourceIDs/multiple_ids/ResourceIDsF", "TestValidateAu", "TestAppPortsValidation/port_smaller_than_1", "TestIsValidAthenaWorkgroupName", "TestResourceIDs/service_resource", "TestPluginOktaValidation/in", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowPasswordless=true_with_Webauthn/sf=optional", "TestIsGCPEndpoint/top_level-likee_fake_googleapis", "Test_PluginOktaSyncSettings_SetUserSyncSource", "TestFunc", "TestAllDeviceEnumsMapped/OSType/fromm_\\", "TestResourceIDs/cluster_role", "TestMFADevice_CheckAndSetDefaults/NOOK_Webauthn_device_malformed", "TestALPNConnUpgradeDialer/conn", "TestIsResponseSuccessful/nil_errorr", "TestCliient_DialCluster/invalid_cluster_name", "TestAllDeviceEnumsMapped/DeviceEnrolllStatus/DEVICE_ENROLL_STATUS_UNSPECIFIED", "TestApplicationGetAWSRolesAnywherePrrofile/app_aws_not_configured", "TestValidateJamfSpecV1/inventory_nil_entry", "TestALPNDialer_getTLSConfig/name_uppdated", "TestPlainHttpFallback/Finnd/Denied_on_secure", "TestSessionTrackerV1_UpdatePresence", "TestValidatePortRange/end_port_bbigger_than_max_port", "TestServerCheckAndSetDefaults/alreaddy_existing_OpenSSHEC2InstanceConnectEndpoint_nodes_use_UUID_and_that_must_be_acccepted", "TestPingError/mangled_ressponse", "TestDynamoDBURIForRegion", "TestResourceHeaderIsEqual/populated_equals", "TestLegacySecondFactorFromSecondFactors/#01", "TestPluginOktaValidation/valid_valuees_are_preserved,_import_populated", "TestGetPartitionFromRegion/#00", "TestParseReviewFrequency/unknown", "TestIsPortInRange/outside_of_single_port_r", "TestSSHKeysEqual/ed25519Keyy2!=rsaKey2", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_NO", "FuzzParseMSSQLEndpoint", "Test_PluginOktaSyncSettings_SetUserSSyncSource", "TestLicenseSettersAndGetters/Set_Feat", "TestResourceID", "TestHardwareKeyAgentService/EC", "TestSSHKeysEqual/ed25519Key1-alt==", "TestDatabaseSpanner/valid_without_uri", "TestValidateAutoUp", "TestParseMSSQLEndpoint/malformmed_address", "TestDatabasePermission/wildcard_seleector_with_valid_value", "TestGetCloudMetadataAWS/cloud_metadaata_but_no_AWS_Information", "TestIterateResources/succcess", "TestResourceIDs/single_id/ResourceIDsFromStri", "TestSSHKeysEqual/rsaKey2!=ed25519Key2", "TestSSHKeysEqual/rsaKey1-alt!", "TestIsOpenSSHNodeSubKind/openssh_usiing_raw_sshd_server", "TestAWSMatcherCheckAndSetDefaults/no_type", "TestRoundTripper_RoundTrip/allowedd_request_when_recovery_progresses", "TestGetPartitionFromRegion", "TestRole_AllowReques", "TestALPNConnUpgradeDialer/connectioon_upgrade/with_ProxyURL", "TestNewAutoUpdateAgentRollout/", "TestPluginAWSICSettings/valid_settinngs_pass", "TestIsValidIAMRoleName/invalid_ssymbols", "FuzzParseElastiCacheEndpoint/seed#12", "TestPrivateKey/missing_fingerprint_file", "TestParseRDSEndpoint/RDS_proxy_custom_endp", "TestSecondFactorsFromLegacySecondFactor/weba", "TestRedshiftServerlessEndpoint/vvpc_endpoint", "TestValidatePortRange/valid_single_port", "TestAllDeviceEnumsMapped/OSType/OS_TTYPE_WINDOWS", "TestALPNConnUpgradeDialer/connectioon_upgrade_with_ping", "FuzzParseDynamoDBEndpoint/seed#0", "TestNotifyExit_restoresTerminal/no_pen", "TestAzureMatcherCheckAndSetDefaults//default_values", "TestIsRequiredPolicyMet/hardware_key_pin", "TestServerCheckAndSetDefaults/OpenSSSH_node_with_unset_addr", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_AllowHeadless_defaults_to_false_without_Webauthn", "TestDynamoDBConfig/account_and_regioon_and_matching_AWS_URI_region_is_correct", "TestSSHKeysEqual/ed25519Key2!=rsaKey1-alt", "TestEncodeDecodeRequireMFAType/OFF/decode", "TestIsALPNConnUpgradeReq", "TestIsEC2NodeID/8_digit", "TestCircuitBreaker_", "TestRoleV6_CheckAndSetDefaults", "TestCollectPages/error-case", "TestOktaAssignments_SetStatus/successsful_-\\u003e_pending", "TestCheckRoleARN/valid_even_if_rregion_is_missing", "TestValidateAssumeStartTime/expired__start_time", "TestAccessReviewConditionsIsEmpty/cllaims_to_roles", "TestCircuitBreaker_afterExecution//failed_execution_causing_a_trip", "TestInstanceFilter/match-no-upgraderr", "TestAppServerSorter/by_description_aasc", "TestPluginMattermostValidation", "TestMatchSearch_ResourceSpecific/database", "TestPluginOktaValidation/SSO_connecttor_ID_not_required_without_user_sync", "TestParseAtlasEndpoint/azure_private", "TestAuthorizedKey/valid", "TestResourceIDs/service_resource_", "TestSSHRouteMatcherScoring/multi_factor_match", "TestWithinUpgradeWindow/within_upgrade_window", "TestIntegrat", "TestIsLoopback/degenerate_port_should_retur", "TestSSHKeysEqual/ed25519Keyy1!=ed25519Key2", "FuzzNormalizeLocation/seed#3", "TestParseReviewFrequency/12", "TestNewAccessGraphSettings/success_", "TestPlainHttpFallback/Find/Denie", "TestGetPartitionFromRegion/cn-northwest-1", "TestNewAutoUpdateConfig/iinvalid_agents_nil_maintenance_window_with_time-based_strategy", "TestResourceAttestationType_toAndFroom/tpm_ekcert", "TestIsLoopback/degenerate_hostname_sshould_return_false", "TestOpenSearchConfig/URI-derived_reggion_must_match_explicit_region", "FuzzParseCacheForRedisEndpointt/seed#1", "TestGithubAuthRequestCheck/valid", "TestIsAL", "TestMatchSearch_ResourceSpecific/dessktop_service", "TestFromProtoNils/notifications", "TestParseOpensearchEndpoint/parsses_valid_endpoint/opensearch-instance-foo.cn-north-1.es.amazonaws.com.cn", "FuzzParseElastiCacheEndpoint/seeed#20", "TestOktAssignmentIsEqual/nil_equals", "TestParseAtlasEndpoint/domain_name_with", "TestCircuitBreaker_beforeRequest/rrecovering_after_allows_executions", "TestInstanceFilter/match-update-grouup", "TestNewAutoUpdateAgentRolllout/missing_start_version", "TestConversion/AccessDenied", "TestProxyListenerModeUnmarshalYAML", "TestGetProxyAddress/", "TestGCPMatcherCheckAndSetDefaults/deefault_values", "TestValidatePortRange/end_port_smaller_t", "TestDeduplicateAny/empty_slice", "TestResourceAttestationType_toAndFroom", "TestSSHKeysEqual/ed25519Keyy1-alt==ed25519Key1-rsa-prefixed", "TestExpiryConsistency/set_expiry/GettExpiry()_wrapper", "FuzzParseElastiCacheEndpoint/seed#20", "TestSSHKeysEqual/ed25519Key1-alt!=rsaK", "TestSSHKeysEqual/rsaKey1-allt==rsaKey1-alt", "TestEncodeDecodeSecondFactorType/SECO", "TestTrimToMaxSize/Query_wit", "TestIsResponseSuccessful/200", "TestRoundtrrip", "TestAllDeviceEnumsMap", "TestParse/should_not_parse:_invalid__char_in_host_without_scheme", "TestCassandraAWSEndpoint/aws_cassanddra_missing_AccountID", "TestPortRangesContains/20", "TestIsPortInRange/equal_to_range_start", "TestParseOpensearchEndpoint/deteects_invalid_endpoint_with_missing_china_region", "TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_nodes_with_invalid_account_id_or_instance_id_must_bee_rejected", "TestSAMLForceAuthn_Encoding/FORCE_AUT", "TestDatabaseFromRedshiftServerlessEndpoi", "TestOktaAssignments_SetStatus/failedd_-\\u003e_pending", "TestIsValidRegion/valid_format", "TestLicenseSettersAndGetters", "TestIsEICE/eice_node_without_instancce_id_label_is_not_EICE", "TestUnifiedNameCompare/sort_with_diffferent_cases", "TestIsValidRegion/symbols", "TestIsResponseSuccessful/codes.Unaavailable_error#01", "TestNewAuthPreferen", "TestPluginJiraValidation/Valid", "TestTransportError", "TestSSHKeysEqual/ed25519K", "TestIsOpenSSHNodeSubKind/another_value", "TestRoundTripper_RoundTrip/successs_in_standby", "TestCircuitBreaker_generation", "TestSSHKeysEqual/rsaKey1-ed25", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_Webauthn_missing_RPID/sf=optional", "TestGroupByTargetHealth", "TestAccessList_setInitiallReviewDate", "TestLicenseSettersAndGetters/Set_Triial_Support", "TestLoadIdentityFileFromString", "TestPluginOktaValidation/no_credentiials_inner", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_AllowHeadless=true_without_Webauthn/sf=off", "TestParseOpensearchEndpoint/parses_valid_endpoint/opensearch-instanc", "TestNewSAMLIdPServiceProvider/valid_launch_UR", "TestIsResponseSuccessful/other_errror", "TestWatchKindContains/no:_superset_ffilter_does_not_match_all,_subset_has_no_CA_filter", "TestValidatePortRange/port_smalller_than_1", "FuzzParseOpensearchEndpoint/seedd#2", "TestParseMismatchedPEMHeader", "FuzzParseRDSEndpoint/seed#3", "TestCassandraEndpointRegion/us-east-1", "TestParseRDSEndpoint/RDS_clusterr_custom_endpoint", "TestResourceAttestationType_toAndFroom/tpm_ekcert_trusted", "TestHardwareKeeyAgentService/EC256_No_hash", "TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_SSO/encode", "TestFromProtoNils/recurrence", "TestSSHKeysEqual/ed25519Key2!=ed25519Key1", "TestIAMPolicyStatusJSON", "TestOktaAssignments_SetStatus/failedd_-\\u003e_failed", "TestPluginAWSICSettings/(legacy)_misssing_oidc_integration_is_allowed_with_ambient_creds", "TestRole_AllowRequestKubernetesResouurce/invalid_multi_value", "TestRouteToServer/match_first_public_addr", "TestTake/drain_streamm_of_size_n", "TestGetResources", "TestEncodeDecodeRequireMFAType/SESSION/decode", "TestWatchKindContains/no:_subset_hass_wider_filter", "TestHardwareKeeyAgentService/RSA2048_SHA256_PSSSaltLengthEqualsHash", "TestDeduplicate/slice_with_unique_elements", "TestTake/empty_streamm", "TestResourceIDs/service_account_resoource_name_with_missing_namespace/ResourceIDsFromStrings", "TestNewAutoUpdateConfig/invalid_tools_m", "TestRoleFilterMatch/correct_search_kkeyword_should_match_the_regular_role", "TestLegacyToResource153", "TestNewAutoUpdateConfig/invalid_spec", "TestIsMSSQLServerEndpoint/wrong_suffix", "TestPrivateKey/missing_DeviceId", "TestServerCheckAndSetDefaults/GitHubb_server", "TestListResources/KubeServer", "TestDatabasePermission", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/NOK_type=local_and_passwordless_connector", "TestWatchKindContains/yes:_superset__has_no_CA_filter", "TestLegacySecondFactorFromSecondFacttors/#01", "TestChangePIN", "TestNewSAMLIdPServiceProvide", "TestNewAutoUpdateVersion/invalid_spec", "TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_empty_config", "TestResourceAttestationType_toAndFroom/tpm_ekpub", "TestMergeStreams/streeam_B_empty", "TestLockTargetEquals/equal", "TestAccessReviewConditionsIsEmpty/prreview_as_roles", "TestIsALPNC", "TestIsValidIAMPolicyName/empty", "TestParseRDSEndpoint/localhost:5432", "TestIsPortInRange/equal_to_rangee_start", "TestRouteToServer/match_second_publiic_addr", "TestParseRedshiftEndpoint/localhhost:5432", "TestConvertToPPK", "TestAllDeviceEnumsMapped/DeviceOrigiin/from_\\", "TestGetPolicyFromSet/hardware_kkey_policy", "TestTake/drain_stream_of_size_\\u003c_n", "TestIsLoopback", "TestIsResponseSuccessful/404", "TestServerInfoSetLabels", "TestProvisionTokenV2_Chec", "TestRetryWithMFA/wwith_interceptor/ok_mfa_in_context", "TestAppPortsValidation/port_bigger_than_65535", "TestRetryWithMFA/with_in", "TestPluginOpenAIValidation/no_credenntials", "TestResourceIDs/service_resource_namme_with_missing_namespace", "TestCircuitBreaker_afterExecution//failed_execution_with_out_tripping", "TestReviewRoundtrip", "TestMatchSearch_ResourceSpecific/kube_server", "TestEncodeDecodeRequireMFAType/OFF/eencode", "TestSSHKeysEqual/rsaKey1-edd25519-prefixed!=ed25519Key1", "TestParseElastiCacheEndpoint/nodde_endpoint,_TLS_enabled", "TestWatchKindContains/no:_subset_filte", "TestCircuitBreaker_failure/failuree_in_standby_without_tripping", "TestDatabaseFromRedshiftServerlessEnndpoint/vpc_endpoint", "TestIsValidGlueResourceName", "TestC", "TestWithinUpgradeWindow/not_within_upgrade_", "TestNewAccessGraphSettings/invalid", "TestProvisionTokenV2_CheckAndSetDefaaults/terraform", "TestMemberFrommProtoNils/added_by", "TestValidateDatabaseName/invalid_trailing_hy", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_YES", "TestPluginOktaValidation/no_credentials_inner", "TestDatabaseServerSorter/by_type_ascc", "TestIntegrationJSONMarshalCycle/aws-oidc", "TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH/decode", "TestGithubAuthRequestCheck/sso-test", "TestCircuitBreaker_failure/failuree_in_recovering_transitions_to_tripped", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowPass", "TestNewAutoUpdateConfig/iinvalid_agents_non-nil_maintenance_window_with_halt-on-error", "TestNewSAMLIdPServiceProvider/missinng_attribute_value", "TestLegacySecondFactorFromSecondFactors/\\\\x02", "TestCircuitBreaker_afterExecution/gener", "TestNewAppServerForAWSOIDCIntegration/valid" ]
starryzhang/sweb.eval.win.gravitational_1776_teleport-53067
gravitational/teleport
55616
gravitational__teleport-55616
Go
[ "52956", "54723" ]
a4f1a0e9b93db02d40a08ee1fbfd2c65321ed7d7
diff --git a/lib/services/watcher.go b/lib/services/watcher.go index d4eeb46a6cf7d..cd0a5f27800d2 100644 --- a/lib/services/watcher.go +++ b/lib/services/watcher.go @@ -556,7 +556,7 @@ type DynamicWindowsDesktopWatcherConfig struct { // NewDynamicWindowsDesktopWatcher returns a new instance of DynamicWindowsDesktopWatcher. func NewDynamicWindowsDesktopWatcher(ctx context.Context, cfg DynamicWindowsDesktopWatcherConfig) (*GenericWatcher[types.DynamicWindowsDesktop, readonly.DynamicWindowsDesktop], error) { if cfg.DynamicWindowsDesktopGetter == nil { - return nil, trace.BadParameter("KubernetesClusterGetter must be provided") + return nil, trace.BadParameter("DynamicWindowsDesktopGetter must be provided") } w, err := NewGenericResourceWatcher(ctx, GenericWatcherConfig[types.DynamicWindowsDesktop, readonly.DynamicWindowsDesktop]{ diff --git a/lib/srv/desktop/discovery.go b/lib/srv/desktop/discovery.go index 3ae2011128bff..cab51b65f6a32 100644 --- a/lib/srv/desktop/discovery.go +++ b/lib/srv/desktop/discovery.go @@ -387,6 +387,7 @@ func (s *WindowsService) startDynamicReconciler(ctx context.Context) (*services. Client: s.cfg.AccessPoint, }, }) + if err != nil { return nil, trace.Wrap(err) } @@ -399,6 +400,13 @@ func (s *WindowsService) startDynamicReconciler(ctx context.Context) (*services. return services.MatchResourceLabels(s.cfg.ResourceMatchers, desktop.GetAllLabels()) }, GetCurrentResources: func() map[string]types.WindowsDesktop { + maps.DeleteFunc(currentResources, func(_ string, v types.WindowsDesktop) bool { + d, err := s.cfg.AuthClient.GetWindowsDesktops(ctx, types.WindowsDesktopFilter{ + HostID: v.GetHostID(), + Name: v.GetName(), + }) + return err != nil || len(d) == 0 + }) return currentResources }, GetNewResources: func() map[string]types.WindowsDesktop { @@ -414,12 +422,17 @@ func (s *WindowsService) startDynamicReconciler(ctx context.Context) (*services. go func() { defer s.cfg.Logger.DebugContext(ctx, "DynamicWindowsDesktop resource watcher done.") defer watcher.Close() + tickDuration := 5 * time.Minute + expiryDuration := tickDuration + 2*time.Minute + tick := s.cfg.Clock.NewTicker(tickDuration) + defer tick.Stop() for { select { case desktops := <-watcher.ResourcesC: newResources = make(map[string]types.WindowsDesktop) for _, dynamicDesktop := range desktops { desktop, err := s.toWindowsDesktop(dynamicDesktop) + desktop.SetExpiry(s.cfg.Clock.Now().Add(expiryDuration)) if err != nil { s.cfg.Logger.WarnContext(ctx, "Can't create desktop resource", "error", err) continue @@ -431,6 +444,17 @@ func (s *WindowsService) startDynamicReconciler(ctx context.Context) (*services. continue } currentResources = newResources + case <-tick.Chan(): + newResources = make(map[string]types.WindowsDesktop) + for k, v := range currentResources { + newResources[k] = v.Copy() + newResources[k].SetExpiry(s.cfg.Clock.Now().Add(expiryDuration)) + } + if err := reconciler.Reconcile(ctx); err != nil { + s.cfg.Logger.WarnContext(ctx, "Reconciliation failed, will retry", "error", err) + continue + } + currentResources = newResources case <-watcher.Done(): return case <-ctx.Done():
diff --git a/lib/srv/desktop/discovery_test.go b/lib/srv/desktop/discovery_test.go index c96e3324babb7..28eaf8297fd34 100644 --- a/lib/srv/desktop/discovery_test.go +++ b/lib/srv/desktop/discovery_test.go @@ -317,3 +317,89 @@ func TestDynamicWindowsDiscovery(t *testing.T) { }) } } + +func TestDynamicWindowsDiscoveryExpiry(t *testing.T) { + authServer, err := auth.NewTestAuthServer(auth.TestAuthServerConfig{ + ClusterName: "test", + Dir: t.TempDir(), + }) + require.NoError(t, err) + t.Cleanup(func() { + require.NoError(t, authServer.Close()) + }) + + tlsServer, err := authServer.NewTestTLSServer() + require.NoError(t, err) + t.Cleanup(func() { + require.NoError(t, tlsServer.Close()) + }) + + client, err := tlsServer.NewClient(auth.TestServerID(types.RoleWindowsDesktop, "test-host-id")) + require.NoError(t, err) + t.Cleanup(func() { + require.NoError(t, client.Close()) + }) + + dynamicWindowsClient := client.DynamicDesktopClient() + + ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second) + defer cancel() + + clock := clockwork.NewFakeClock() + s := &WindowsService{ + cfg: WindowsServiceConfig{ + Heartbeat: HeartbeatConfig{ + HostUUID: "1234", + }, + Logger: slog.New(logutils.NewSlogTextHandler(io.Discard, logutils.SlogTextHandlerConfig{})), + Clock: clock, + AuthClient: client, + AccessPoint: client, + ResourceMatchers: []services.ResourceMatcher{{ + Labels: types.Labels{ + "foo": {"bar"}, + }, + }}, + }, + dnsResolver: &net.Resolver{ + PreferGo: true, + Dial: func(ctx context.Context, network, address string) (net.Conn, error) { + return nil, errors.New("this resolver always fails") + }, + }, + } + _, err = s.startDynamicReconciler(ctx) + require.NoError(t, err) + + desktop, err := types.NewDynamicWindowsDesktopV1("test", map[string]string{ + "foo": "bar", + }, types.DynamicWindowsDesktopSpecV1{ + Addr: "addr", + }) + require.NoError(t, err) + + _, err = dynamicWindowsClient.CreateDynamicWindowsDesktop(ctx, desktop) + require.NoError(t, err) + + require.EventuallyWithT(t, func(t *assert.CollectT) { + desktops, err := client.GetWindowsDesktops(ctx, types.WindowsDesktopFilter{}) + require.NoError(t, err) + require.Len(t, desktops, 1) + require.Equal(t, "test", desktops[0].GetName()) + }, 5*time.Second, 50*time.Millisecond) + + err = client.DeleteWindowsDesktop(ctx, s.cfg.Heartbeat.HostUUID, "test") + require.NoError(t, err) + desktops, err := client.GetWindowsDesktops(ctx, types.WindowsDesktopFilter{}) + require.NoError(t, err) + require.Empty(t, desktops) + + clock.Advance(5 * time.Minute) + + require.EventuallyWithT(t, func(t *assert.CollectT) { + desktops, err := client.GetWindowsDesktops(ctx, types.WindowsDesktopFilter{}) + require.NoError(t, err) + require.Len(t, desktops, 1) + require.Equal(t, "test", desktops[0].GetName()) + }, 5*time.Second, 50*time.Millisecond) +}
Dynamic Windows desktops should detect when agents are removed When agents that are serving a dynamic_windows_desktop disappear, the corresponding windows_desktop resource should be removed so that Teleport doesn't try to route connections through an agent that no longer exists. I suspect that we are currently watching the dynamic resource, but not watching the agent resources correctly. Dynamic Windows apps are not refreshed ### Expected behavior: If a `windows_desktop` object is manually deleted/edited outside the agent, the agent should recreate/announce it on its next heartbeat and/or announce interval. This is consistent with other dynamically loaded resources. ### Current behavior: A deleted `windows_desktop` resource won't repopulate until the next time an agent cold-starts. ### Bug details: #### Teleport version: 17.4.9 #### Recreation steps * Create a `dynamic_windows_desktop` resource. * Configure a Teleport Windows Desktop agent to load it. * Observe a corresponding `windows_desktop` object is created for each agent that loads the resource. * Delete one or more `windows_desktop` objects that correspond with a running agent. * Observe that the `windows_desktop` object never repopulates. Repeating the test with the `app` object instead of `dynamic_windows_desktop`, along with `app_server` instead of `windows_desktop`, and the app service _does_ repopulate the `app_server` resource.
[ "https://github.com/gravitational/teleport/commit/e5b4a17d7bef3574a5ddbfe6c6d2078f199b5125", "https://github.com/gravitational/teleport/commit/6e23339d1df6f9b94a30033c580526bd431cb093", "https://github.com/gravitational/teleport/commit/c076084dee888e483bd72a30f158d1c8736a3dbb", "https://github.com/gravitational/teleport/commit/52b53751f9f6acaa8b15e6f8e02385f8553759d3", "https://github.com/gravitational/teleport/commit/ba55a2bf7ea418e2ceddb61028ca311fe19128b4", "https://github.com/gravitational/teleport/commit/d1460d776ce3456d0c63cbaf361ed55c009e6b26" ]
2025-06-10T19:59:35Z
https://github.com/gravitational/teleport/tree/a4f1a0e9b93db02d40a08ee1fbfd2c65321ed7d7
[ "if (Test-Path api\\go.mod) { cd api } ; go mod download ; go build ./..." ]
[ "Set-Location C:\\testbed; mkdir reports -Force; go test -json ./... > reports\\go-test-root.json; Set-Location C:\\testbed\\api; go test -json ./... > C:\\testbed\\reports\\go-test-api.json" ]
[ "Get-Content C:\\testbed\\reports\\go-test-root.json; Get-Content C:\\testbed\\reports\\go-test-api.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} precedence = {"pass": 0, "skip": 1, "fail": 2} def set_status(key: str, status: str): if not key: return s = status.lower() if s not in precedence: return prev = results.get(key) if prev is None or precedence[s] > precedence.get(prev, -1): results[key] = s def clean_wraps(s: str) -> str: # Remove CR and join lines split by console wrapping if "\r" in s or "\n" in s: s = s.replace("\r", "") s = re.sub(r"\s*\n\s*", "", s) return s def clean_test_name(name: str) -> str: s = clean_wraps(name) # Collapse excessive whitespace at edges s = re.sub(r"\s+", " ", s).strip() # Unescape common JSON unicode escapes s = ( s.replace("\\u0026", "&") .replace("\\u003c", "<") .replace("\\u003e", ">") ) return s def clean_package(pkg: str) -> str: s = clean_wraps(pkg) # Remove all whitespace inserted by wrapping s = re.sub(r"\s+", "", s) # Unescape common JSON unicode escapes in package (rare) s = ( s.replace("\\u0026", "&") .replace("\\u003c", "<") .replace("\\u003e", ">") ) # Fix domain corruption for github.* to github.com # Replace anything between 'github.' and the first '/' with 'com' s = re.sub(r"^(github\.)[^/]+", r"github.com", s) return s.strip() # Segment into chunks that represent individual JSON objects chunks: list[str] = [] buf: list[str] = [] for line in log.splitlines(): if line.lstrip().startswith("{"): if buf: chunks.append("\n".join(buf)) buf = [] buf.append(line) else: if buf: buf.append(line) if buf: chunks.append("\n".join(buf)) # Regexes to extract fields action_re = re.compile(r'"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE) test_re = re.compile(r'"Test"\s*:\s*"(.*?)"', re.DOTALL) pkg_re = re.compile(r'"Package"\s*:\s*"(.*?)"', re.DOTALL) # Extract JSON-derived test results with package-qualified keys for chunk in chunks: m_action = action_re.search(chunk) if not m_action: continue status = m_action.group(1).lower() m_test = test_re.search(chunk) if not m_test: continue # package-level event; ignore raw_test = m_test.group(1) test_name = clean_test_name(raw_test) # Try to extract and normalize package m_pkg = pkg_re.search(chunk) if m_pkg: raw_pkg = m_pkg.group(1) pkg_name = clean_package(raw_pkg) key = f"{pkg_name}::{test_name}" if pkg_name else test_name else: key = test_name set_status(key, status) # Fallback: textual lines '--- PASS/FAIL/SKIP: TestName...' # Use test-only keys, and do not override any existing package-qualified results for the same test-only name. text_re = re.compile(r"---\s+(PASS|FAIL|SKIP):\s+([^\r\n]+)") for line in log.splitlines(): tm = text_re.search(line) if not tm: continue status = tm.group(1).lower() name = clean_test_name(tm.group(2)) # Only set if an exact key not present; since package is unknown, use test-only key if name not in results: set_status(name, status) return results
[ "github.com/gravitational/teleport/api/types::TestAccessReviewConditionsIsEmpty/prreview_as_roles", "github.com/gravitational/teleport/api/types::TestLockTargetEquals/equal", "TestRoleV6_CheckAndSetDefaults/spiffe", "TestEvents/scp_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName/iinvalid-end-with-hyphen-", "github.com/gravitational/teleport/api/types::TestGetAdminUser/gets_admin_from_speec", "TestEvents/db.session.cassandra.execute_", "TestIntegrationJSONMarshalCycle/aws-oidc (0.00s)\\n\"}", "TestSet/contains/populated_set_excludes_eleme", "TestOpenSearchConfig/custom_URI_wi", "TestDatabaseAzureEndpoints (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/evvents_with_untrimmable_event_exceeding_>_MaxEventBytesInResponse", "TestOpenSearchConfig/missing_account_is_an_e", "TestExpiryConsistency/set_expiry/", "TestWatchKindContains/no:_subset_has_no_filter", "TestParseWeekdays/Wildcard (0.00s)\\n\"}", "TestRole_GetKubeResources/v7_with_deny_names", "TestPROXYEnabledListener_Accep", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/supporrted_empty_preset_value", "TestProvisionTo", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/windows_deskttop,trusted_cluster,remote_proxy", "github.com/gravitational/teleport/lib/utils/interval::TestMultiIntervalFireNow", "TestAuthPreferenceValidate/stable_unix_users", "TestProvisionTokenV2_CheckAndSetDe", "github.com/gravitational/teleport/api/types::TestRoleV6_CheckAndSetDefaults/spifffe:_missing_path", "TestServerCheckAndSetDefaults/already_existing_Open", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/Telepoort_node", "TestValidateDatabase/valid-clickho", "TestValidateSigstorePolicy/no_keyless_au", "TestResourceIDs/multiple_ids/ResourceIDsFr", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/unknowwn_->_pending", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/dupliccate_attribute_mapping", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRepport/ok", "Test_PluginOktaSyncSettin", "TestRole_GetKubeResources/v7_without_group (0.00s)", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettAuthPreference", "github.com/gravitational/teleport/lib/auth/join/oracle::TestFetchOraclePrincipalCClaims/invalid_response_type", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/vaalid", "TestPluginOktaValidation/impor", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_bindingg_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestResourceIDs/certificate_signing__request_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStringss", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_add_paaths_with_ampersands", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v6_with_wiildcard", "github.com/gravitational/teleport/lib/events::TestEvents/session.recording.accesss_EventFields", "github.com/gravitational/teleport/api/types::TestResourceNames", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_nomatch_match}", "TestProxyListenerModeUnmarshalYAML (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#5", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_resource_kind/ReesourceIDsFromStrings", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/empty_config_file", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/custom_URI_withh_region_is_correct", "TestMatchValidAzureIden", "TestPluginJiraValidation/Missing_Issue_Type (0.00", "TestServiceAccess/UpsertDatabaseObjectImportRule", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegion/invalid_rregion", "github.com/gravitational/teleport/api/types::TestAppServerSorter/by_publicAddr_assc", "TestValidateAutoUpdateC", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/!name", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/untrusted_wrongly_signedd_index", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/nil_equalss", "TestResourceIDs/persistent_volume_resource_name_with_missing_namesp", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-mssql--kerberos-keytabfile", "TestWatchKindContains/yes:_s", "github.com/gravitational/teleport/lib/auth/join/oracle::TestFetchOraclePrincipalCClaims/api_error", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/pendinng_->_pending", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftCluster", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthorities//ca_found_without_secrets", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/correect_format_with_underscore", "TestPluginJamfValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode_invalid", "github.com/gravitational/teleport/lib/utils/interval::TestMultiIntervalBasics", "github.com/gravitational/teleport/api/types::TestMySQLServerVersion", "TestFriendlyName/friendly_group_name_", "github.com/gravitational/teleport/api/types::TestWatchKindContains/no:_different__names", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch", "TestEncodeDecodeRequireMFAType/HARDW", "github.com/gravitational/teleport/api/types::TestDatabaseAzureEndpoints/invalid_RRedis_(missing_resource_ID)", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_match_match}", "TestResourceHeaderIsEqual (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/region_and_differrent_AWS_URI_region_is_an_error", "github.com/gravitational/teleport/lib/auth/userpreferences/userpreferencesv1::TesstService_UpsertUserPreferences/access_denied_-_user_doesn't_exist", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/default__service_account:_@developer.gserviceaccount.com_domain", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/labels_is_differrent", "TestParseShortcut/cluster_networking_config (0", "github.com/gravitational/teleport/api/client::TestALPNConnUpgradeDialer/connectioon_upgrade_API_not_found/with_ProxyURL", "TestEvents/access_request.search_EventFields (0", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##30", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/inventory_alll_syncs_disabled", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/unknowwn_->_processing", "TestFetchOraclePrincipalClaims/block", "TestTargetHealthStatusCanonical", "TestResourceIDs/service_account_resource_name_with_missing_namespace", "github.com/gravitational/teleport/lib/multiplexer::TestMux/PostgresProxy/without__proxy_line", "github.com/gravitational/teleport/api/types::TestDatabaseGCPCloudSQL/gcp-instancee-id-specified-without-project-id", "TestConvertR", "TestUnmarshallCreateDatabaseUserModeYAML (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_cloud_metadata_but_missing_aws_info", "TestEvents/okta.assignment.process_OneOf (0.00s)\\n\"", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/invalid_AWS_URI_iis_an_error", "TestExpiryConsistency/zero_expiry/wrapper", "TestRunW", "TestNewSAMLI", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/windowsdesktoop", "TestResourceIDs/bad_resource_kind/Res", "TestAccessReviewConditionsIsEmpty/roles (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestSecondFactorsFromLegacySecondFacctor/#00", "TestResourceIDs/multiple_ids (0.00s)\\n\"}", "TestNewSAMLIdPServiceProvider (0.00s)\\n\"}", "TestWindowsDesktopsSorter/by_addr_desc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestGithubAuthRequestCheck/sso-test", "github.com/gravitational/teleport/lib/services::TestParseShortcut/saml_idp_servicce_provider", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_inn_cluster_with_slash/ResourceIDsFromString", "Test_PluginOktaSyncSettings_SyncEnabledGetters", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/circleci_allow_rule_blank", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_nomatch_match}", "github.com/gravitational/teleport/api/types::TestDeduplicateKubeClusters", "TestNewResourceExpression/non_matching_expressions/equals(resource.spec", "TestMakeAppRedirectURL/OK_-_add_paths", "TestResourceIDs/pod_res", "github.com/gravitational/teleport/api/types::TestWatchKindContains/yes:_subset_haas_narrower_filter", "github.com/gravitational/teleport/api/types::TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace", "TestServiceAccess/UpsertDatabaseObjectImportRule/all", "github.com/gravitational/teleport/lib/services::TestMatchResourceByHealthStatus/hhealthy_db_status", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestDDockerAttestorConfig_CheckAndSetDefaults/attestor_disabled", "TestNewAutoUpdateVersion/inva", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_NO/JS", "TestPluginMattermostValidatio", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/alll_healthy", "TestParseTeleportRoles/Auth,Proxy (0.00s)\\n\"}", "Test_getMessageSentTimesta", "github.com/gravitational/teleport/lib/services::TestCheckOIDCIdP/unparseable_privvate_key", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/zero_expiry/wrrapper_.Expiry()", "github.com/gravitational/teleport/api/types::TestOIDCClaimsRoundTrip/empty", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/deefault_values", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_unset_unset}", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_JAMF", "github.com/gravitational/teleport/api/types::TestGetSortByFromString", "github.com/gravitational/teleport/api/types::TestLegacySecondFactorFromSecondFacttors/#01", "TestDatabaseSpanner/invalid_missing_project_id", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions/equals(resource.spec.hostname,_\\", "github.com/gravitational/teleport/lib/utils/teleportassets::Test_cdnBaseURLForVerrsion/both_pre-releases", "TestEncodeDecodeSecondFactorType", "TestClient_DialClust", "github.com/gravitational/teleport/lib/events/athena::TestCollectedEventsMetadataMMerge/Merge_with_empty_a", "github.com/gravitational/teleport/api/types::TestIntegrationCheckAndSetDefaults/ggithub:_valid", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_unset_nomatch}", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_resourcce_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestDistrolessTeleportImageRepo/en", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v6", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions/equals(resource.metadata.labels[\\", "TestEvents/workload_identity.delete_EventFie", "TestLegacyToResource153/marshal (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_GetSafeName/nonn-token_join_method", "TestResourceIDs/cluster_role_resource_name_with_missing_namespace_and_p", "TestPluginOpenAIValidation/no_credentials_inn", "TestSAMLForceAuthn/force_authn_unspecified (0.00s)", "github.com/gravitational/teleport/lib/utils/teleportassets::Test_cdnBaseURLForVerrsion", "github.com/gravitational/teleport/lib/events::TestEvents/login_rule.delete_EventFFields", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/invvalid_label_matcher", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/one_is_nil", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/inventory_synnc_partial_disabled", "TestPluginOpsgenieValidation/no_api_endpint (0.00", "TestResourceI", "TestMySQLServerVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/exxternal_id_was_set,_assume_role_is_missing_but_type_allows_it", "github.com/gravitational/teleport/api/types::TestPluginOpsgenieValidation/no_api__endpint", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/finalized_iis_different", "TestDatabaseFromRedshiftCl", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/kind_is_diifferent", "TestValidateJamfSpecV1/inventory_sync_", "TestParseShortcut/saml_idp_service_provider (0", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/health.status_==_\\", "TestSAMLForceAuthn_Encoding (0.01s)\\n\"}", "TestPluginOktaValidation/valid_values_are", "TestNewAutoUpdateVersion/i", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_with_missing_namespace_and_pod_name/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_GetSafeName/tokken_join_method_(long)", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_unset_unset_unset}", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/import_enabbled_without_default_owners", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_with_missing_namespace_and_pod_name", "github.com/gravitational/teleport/api/types::TestRoleV6_KubernetesResourcesCheckAAndSetDefaults/invalid_v8_missing_api_group", "TestResourcesWithLabels_ToMap/first_duplic", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty/eempty", "github.com/gravitational/teleport/lib/jwt::TestKey_SignAndVerifyAWSOIDC/ECDSAP2566", "TestValidateAutoUpdateAgentRollout (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#25", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-scheema-for-http-protocol", "TestMetadataIsEqual/expires_m1_nil (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/YAML", "TestMatchValidAzureIdentity/correct_format (0.0", "TestOktAssignmentIsEqual/cleanup_time_is_d", "TestWatchKindContains/no:_different_names (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_null", "github.com/gravitational/teleport/api/types::TestAccessReviewConditionsIsEmpty/whhere", "TestDynamoDBConfig/missing_account_id (0.00s)\\n\"}", "TestNewAutoUpdateConf", "github.com/gravitational/teleport/lib/services::TestParserForIdentifierSubconditiion/or-condition,_mixed_with_and_without_identifier_(negated_true)", "TestAllDevi", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSH_node_with_invalid_addr", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/SAMLIddPServiceProvider", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name/ReesourceIDsFromString", "github.com/gravitational/teleport/api/types::TestSSHDialTimeout", "TestResourceIDs/cluster_role_binding_resource_name_with_missing", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration", "TestHealthCheckAppServer/match_and_onlin", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/skip_system_rolees_filter_and_incorrect_search_keywords_shouldn't_match_the_regular_role", "TestServiceAccess/UpsertDatabaseOb", "TestServiceAccess/UpsertDatabaseObjectImportRule/disallowed_a", "TestInstanceControlLogExpiry (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/alreaddy_existing_OpenSSHEC2InstanceConnectEndpoint_nodes_use_UUID_and_that_must_be_acccepted", "TestEvents/okta.groups.update_EventFields (0.00s)\\", "TestOktaAssignments_SetStatus/success", "github.com/gravitational/teleport/lib/events::TestEvents/okta.groups.update_OneOff", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ppagination/ascending", "TestValidateJamfSpecV1/minimal_spec (0.00s)\\n\"}", "TestTargetHealthStatusesAggregate/one_unhealt", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#4", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_no_name", "github.com/gravitational/teleport/api/types::TestResourceAttestationType_toAndFroom/tpm_ekpub", "TestResourceIDs/bad_resource_name/Re", "TestUnifiedResourceCacheIteration/kubernetes", "TestPluginOktaValidation/SSO", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName/iinvalid_charactersc", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/valid__attribute_mapping", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenSource_GetIDToken/overriidden_env_value_present", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/invvalid_label_expression_matcher", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrvice/nothing_exists", "TestPluginMattermostValida", "TestRole_GetKubeResources/v5_without_kube_la", "TestIsOpenSSHNodeSubKind/openssh_using", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_Bytes/write-readd_proxy_line_conversion", "TestValidateDatabaseName/invalid_first_chara", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles", "github.com/gravitational/teleport/api/types::TestCassandraAWSEndpoint/aws_cassanddra_url_from_region", "github.com/gravitational/teleport/lib/backend::TestKeyCompare/empty_key_is_alwayss_less", "github.com/gravitational/teleport/lib/events/filesessions::TestUploadResume/streaam_terminates_multiple_times_at_different_stages_of_submission", "TestRole_AllowRequestKubernetesResource/invalid_kind_(kube_cluster", "github.com/gravitational/teleport/api/types::TestPluginJamfValidation/valid_credeentials_(static_credentials)", "github.com/gravitational/teleport/api/types::TestFriendlyName/no_friendly_name", "github.com/gravitational/teleport/lib/utils::TestSet/contains/populated_set_excluudes_element", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//invalid_empty_agents_target_version", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA/don't_validatee_non-raw_private_keys", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#21", "TestNewAutoUpdateVers", "TestParserForIdentifierSubcondition/or-condition,_mixed_with_and_withou", "TestResourceIDs/configmap_reso", "github.com/gravitational/teleport/api/types::TestAppServerSorter/by_publicAddr_deesc", "TestRoleV6CheckAndSetDefaults_SAMLIdPOptions/samlidp:_idp_option_enable", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/aws-iddentity-center_preset", "github.com/gravitational/teleport/api/types::TestResourceMethods/SetRevision", "TestEvents/session.recording.access_EventFie", "TestResourceIDs/", "github.com/gravitational/teleport/api/types::TestMFADevice_CheckAndSetDefaults/OKK_Webauthn_device", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed/No_annotation", "TestParseWeekdays/Few_valid_days (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-mssql--kerberos-kdchostname", "TestValidateGitHubOrganizationName (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/wiildcard_is_invalid_for_types", "TestLoo", "TestResourceIDs", "github.com/gravitational/teleport/api/types::TestDatabaseServerSorter/by_type_ascc", "TestValidateAutoUpdateConfig/", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/untrusted_double_signed__manifest", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/populated__equals", "TestValidateGlob/root_glob_without_leading_", "github.com/gravitational/teleport/lib/multiplexer::TestPROXYEnabledListener_Acceppt/signed_PROXY_v2_header_unspecified,_mixed_version_in_downgrade_mode", "github.com/gravitational/teleport/lib/events::TestNewStreamErrors/ResumeAuditStreeam", "github.com/gravitational/teleport/lib/events::TestEvents/okta.groups.update_EventtFields", "TestOktAssignmentIsEqual/targets_different_ty", "github.com/gravitational/teleport/api/types::TestResourceMethods/GetKind", "TestProxyListenerModeMarshalYAML/default_value", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/JSON/Unmarshal", "TestALPNConnUpgrade", "TestDeployDatabaseService", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/nil_expiry/GettExpiry()_resource", "TestMySQLVersionValidation/correct_config (0.00s)\\n", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra/us-east-1", "TestFetchOraclePrincipalClaims/api_error", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityX509Servicce_CheckAndSetDefaults/missing_selectors", "github.com/gravitational/teleport/lib/srv/app/gcp::TestHandler_getToken/base_casee", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/mmissing_region_on_instance", "TestPluginOpsgenieValidation/no_static_cre", "TestResourceHeaderIsEqual/empty_equals (0.00s)\\n\"}", "TestTrimToMaxSize/db.session.postgr", "TestNewResourceExpression/matching_expressions/exists(labels.env)", "TestRoleFilterMatch/skip_system_roles_filter_and_incorrect_search", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_resourcce_name_in_cluster_with_slash/ResourceIDsFromString", "github.com/gravitational/teleport/api/client::TestALPNDialer_getTLSConfig/get_cass_failed", "TestDatabase", "TestEvents/db.session.mysql.init_db_EventFie", "TestProvisionTokenV2_CaseInsensitiv", "TestIntegrationCheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##9", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/one_is_nill", "TestPROXYEnabledListener_Accept/signed_PROXY_v2_header_unspecified,", "TestPluginAWSICSettings (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestALPNDialer_getTLSConfig/name_uppdated", "TestAzureMatcherCheckAndSetDefaults/no_type (0.00", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/populated_equalss", "github.com/gravitational/teleport/api/types::TestWithinUpgradeWindow", "TestDatabaseGCPCloudSQL/", "TestRole_GetKubeResources/v5:_populate_", "github.com/gravitational/teleport/api/types::TestParseWeekdays/Nil_slice", "TestGetServicePorts/Two_supported_po", "TestOktAssignmentIsEqual (0.00s)\\n\"}", "TestIsEICE/eice_node_without_accoun", "TestGetSessionRecordingConfig (0.0", "TestOIDCClaimsRoundTrip (0.00s)\\n\"}", "TestGetCloudMetadataAWS/cloud_metadata_w", "TestGCPMatcherCheckAndSetDefaults/default_va", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/api/types::TestLicenseSettersAndGetters", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.user.create_OOneOf", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_with_cclusterId,_publicAddr,_arn,_path,_and_required-apps", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults", "TestNewAutoUpdateConfig/invalid_agents", "github.com/gravitational/teleport/api/types::TestPluginOpenAIValidation/valid_creedentials_(token)", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/first_group_with_non_zero_wait_days", "github.com/gravitational/teleport/api/types::TestMatchSearch/match_with_repeat_seearch_vals", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/SSO_connecttor_ID_not_required_without_user_sync", "github.com/gravitational/teleport/api/types::TestPluginAWSICSettings", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_bad_bundle", "github.com/gravitational/teleport/lib/web/app::TestHandlerAuthenticate/with_cliennt_cert", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher/fetch_all_with_assume_role", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_with_missing_namespace/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/bound_keypair_missing_onboarding_config", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_resource_kind/ReesourceIDsFromString", "TestDurationUnmarshal/large_+_small (0.00s)\\n\"}", "TestNewResourceExpression/non_matching_", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/namespace_is_diffferent", "TestServerInfoSetLabels (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_only_repository", "TestGetAdminUser/gets_admin_from_spec_i", "TestResourceMethods/GetOrigin (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_U2F/sf=optional", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_bad_url", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/spec_with_invventory", "github.com/gravitational/teleport/api/types::TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/minimal_spec", "TestTargetHealthStatusesAggregate/empty_a", "TestMatchResourceByHealthStatus/unheal", "TestDeployDatabaseService/fa", "TestServerSorter/by_hostname_asc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/no_error_when_ffull_data_provided_and_matches", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//invalid_empty_agents_start_version", "TestMakeAppRedirectURL", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_missing_allow_rules", "github.com/gravitational/teleport/api/types::TestIsEICE/regular_node_not_eice", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.init_dbb_EventFields", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.dynamodb.requuest_EventFields", "TestPluginOpsgenieValidation (0.00s)\\n\"}", "TestNewSAMLIdPServiceProvider/unsuppor", "TestMetadataIsEqual/description_is_different (0.", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_missing_static_jwks.jwks", "TestValidateGlob/inclusive_glob_rejected (0.00s)\\n\"", "github.com/gravitational/teleport/api/types::TestKubeMatcherCheckAndSetDefaults", "TestMakeAppRedirectURL/OK_-_add_only_query (0.00", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/aws_identity_centter.resource_sync.failed", "TestMatchSearch_ResourceSpecific/application (0.", "TestNewAutoUpdateAgentReport/ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#0", "TestServiceAccess/UpdateAutoUpdateVersion/allowed_admin_stat", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/account_and_AWS_sstreams_dynamodb_URI_and_empty_region_is_correct", "TestResourc", "TestParseTeleportRoles/Auth,_auth (0.00s)\\n\"}", "TestProxyJumpParsing/\\\"alice@127", "TestLicenseSettersAndGetters/Set_Trial_Support", "TestApplicationGetAWSRolesAn", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabase/developper_allowed_only_specific_username/database_in_prod_database", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_bindingg_resource_name_with_missing_namespace_and_pod_name", "TestMFADevice_CheckAndSe", "github.com/gravitational/teleport/api/types::TestMatchSearch/match_ignore_case", "TestRole_GetKubeResources/v6", "github.com/gravitational/teleport/api/types::TestDatabaseSpanner/invalid_missing__project_id", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed/Wildcard_annotation", "Test_getMessageSentTimestamp/v", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/empty__launch_URLs", "github.com/gravitational/teleport/api/types::TestResourceIDs/resource_name_with_sslash", "github.com/gravitational/teleport/api/types::TestPluginEmailSettings/(smtp)_no_crredentials", "TestNewResourceExpr", "github.com/gravitational/teleport/api/types::TestResourceIDs/multiple_ids", "github.com/gravitational/teleport/lib/cloud/azure::TestGetServer/get_a_mysql_servver", "github.com/gravitational/teleport/api/types::TestLegacySecondFactorFromSecondFacttors", "github.com/gravitational/teleport/lib/events/athena::Test_getMessageSentTimestampp/wrong_format_of_sentTimestamp", "TestEvents/db.session.elasticsearch.reques", "TestGetSessionRecording", "Test_cdnBaseURLForVersion/pre-release_teleport_should_be_able_to_i", "TestServerCheckAndSetDefaults/Ope", "github.com/gravitational/teleport/lib/srv/db/common/role::TestGetDatabaseRoleMatcchers/DisableDatabaseNameMatcher", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestKubeAppFetcher__Get/No_services", "TestValidateSPIFFEFederation/fail_-_bad_bun", "TestProxyListenerModeMarshalYAML/multiplex_mo", "TestProvisionTokenV2_CheckAndSetDefaults (0.01s)\\n\"}", "github.com/gravitational/teleport/api/types::TestPluginJamfValidation", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingAzureMethod/auth_error/auth_error_proxy", "TestTrimToMaxSize/db.session.user.create (0.00s)\\n\"", "github.com/gravitational/teleport/api/types::TestResourceMethods", "TestOktaAssignments_SetStatus/pendin", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/invalid_creedential_type_(oauth2)", "TestResourceAttestationType_toAndFrom/tpm_ek", "TestInstanceFilter/match-no-upgrader (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/noo_type", "github.com/gravitational/teleport/api/types::TestDatabaseGCPCloudSQL/gcp-project--id-specified-without-instance-id", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityX509Servicce_CheckAndSetDefaults/missing_destination", "github.com/gravitational/teleport/lib/srv/discovery/common::TestApplyAKSNameSuffiix", "github.com/gravitational/teleport/api/types::TestResourceIDs/kube_node_resource_nname_with_missing_namespace_and_pod_name", "TestPluginMattermostValidation/no_team (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/single_eentity_with_single_entry", "github.com/gravitational/teleport/api/types::TestResourceIDs/kube_node_resource_nname_in_cluster_with_slash/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestPluginJiraValidation/Missing_Setttings", "TestAWSMatcherCheckAndSetDe", "TestUnmarshallCreateHostUserModeJSON (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestExpiryConsistency", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/Auth_,_Proxy,,WindowsDesktop", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/traits_maap_quoted_or_unquoted_strings", "github.com/gravitational/teleport/api/types::TestResourcesWithLabels_ToMap", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty", "TestWorkloadIdentityX509Service_Che", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfigReqDefaults/missing_integration_role", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode_default", "TestTargetHealthStatusesA", "github.com/gravitational/teleport/api/types::TestUnifiedNameCompare", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_unset_match}", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_with_missing_namespace/ResourceIDsFromString", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/innvalid:_requested_ttl_>_default_request_TTL", "TestGetConfigIntegration/uncached/without_an_integra", "github.com/gravitational/teleport/lib/multiplexer::TestPROXYEnabledListener_Acceppt/unsigned_PROXY_v2_header", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/kubernetes", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_defaults", "TestRoleFilterMatch/c", "github.com/gravitational/teleport/api/types::TestPluginJiraValidation/Missing_Creedentials", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestReconccileResults", "github.com/gravitational/teleport/lib/services::TestParseShortcut/oktaassignmentss", "TestNewAutoUpdateConfig (0.00s)\\n\"}", "TestIntegrationCheckAndSetDefaults/github:_v", "TestGetCloudMetadataAWS/cloud_m", "github.com/gravitational/teleport/api/types::TestResourceMethods/GetExpiry", "TestExpiryConsistency/nil_expiry/", "TestResourceIDs/bad_resource_kind/Re", "TestNewAutoUpdateConfig/s", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/YAML/Unmarshal", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_missing_org_id", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_nomatch_nomatch}", "TestListDatabas", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/group_with_invalid_week_days", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfigReqDefaults/missing_region", "github.com/gravitational/teleport/lib/events::TestNewStreamErrors/ResumeAuditStreeam/ReserveUploadPartError", "TestLicenseSettersAndGetters (0.00s)\\n\"}", "TestServerCheckAndSetDefaults/Op", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_with_missing_namespace", "TestValidateAuto", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_nno_name#01", "github.com/gravitational/teleport/api/types::TestMatchSearch/no_match_for_partiall_custom_match", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/no_fillter_should_return_true", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/innvalid:_requested_ttl_<_now", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/clickhouse-uuri-without-schema-http-protocol", "TestDatabaseFromRedshiftServerlessEndpoint (0.00s)", "github.com/gravitational/teleport/api/types::TestNewAppV3/mcp_missing_run_as_hostt_user", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_match_nomatch_nomatch}", "TestOpenSearchConfig/AWS_URI_for_wrong_service", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/zero_expiry/wrrapper_metadata_.Expiry()", "TestSecondFactorsFromLegacySecondFactor/opti", "TestOktAssignmentIsEqual/targets_o1_is_nil (0.00s)", "TestHandlerAuthenticate/with_client_cert (0.00s)\\n", "github.com/gravitational/teleport/api/types::TestAppServerSorter", "github.com/gravitational/teleport/api/types::TestIsEICE/eice_node_without_instancce_id_label_is_not_EICE", "TestOktAssignmentIsEqual/resource_heade", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/single_elementt", "TestCassandraAWSEndpoint/aws_cassandra_cust", "github.com/gravitational/teleport/lib/services::TestSPIFFEFederationMarshaling/noormal", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_unset_unset_unset}", "github.com/gravitational/teleport/api/types::TestIsOpenSSHNodeSubKind/another_vallue", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/targets_diffferent_sizes", "TestResourceIDs/no_cluster_name/Resourc", "TestPluginOktaValidation/EnableUser", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName/vvalid-org", "TestGCPMatcherCheckAndSetDefaults/no_type (0.00s)\\n", "TestGuessesIPAddress/prefers_172.16.0.0/12 (0.00s)", "github.com/gravitational/teleport/api/types::TestIntegrationJSONMarshalCycle/aws--oidc", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/unhhealthy_threshold_greater_than_maximum_is_invalid", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/single_elementt_with_lower_start_key", "github.com/gravitational/teleport/lib/services::TestCompareResources/cmp_not_equaal", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateSessionRecordingConfig", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/timmeout_greater_than_interval_is_invalid", "TestKubeResourceCoul", "TestListDatabasesIAMConfigReqDefaults (0", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v8_deny", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/innvalid_assume_role_arn", "TestResourceIDs/service_", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CaseInsensitiveeRoles/via_constructor", "github.com/gravitational/teleport/lib/cloud/azure::TestClientMap/create_client_suucceed", "github.com/gravitational/teleport/api/types::TestOIDCClaimsRoundTrip/full", "TestMFADevice_CheckAndSetDefa", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-mssql--rds-kerberos-keytab", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_inn_cluster_with_slash#01/ResourceIDsFromString", "TestWindowsDesktopsSorter/by_name_desc (0.00s)\\n\"}", "TestValidateJamfSpecV1/nil_spec (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/signed_index", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_match_match}", "github.com/gravitational/teleport/api/types::TestProxyListenerModeUnmarshalYAML/ddefault_value", "TestAtomicWriteShi", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.cassandra.exeecute_OneOf", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_U2F", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ddescending_order", "TestLookupSecret/n", "TestCheckAccessToDatabase/developer_allowed_any_username/database_", "TestSecondFactorsFromLegacySecondFactor/#00 (0.00", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/iam_method_with_aws_role", "github.com/gravitational/teleport/api/types::TestLegacySecondFactorFromSecondFacttors/\\\\x03", "github.com/gravitational/teleport/api/types::TestAppServerSorter/by_name_asc", "TestOpenSearchConfig/re", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_real_ggrafana_query_example_(encoded_spaces)", "TestWithinUpgradeWindow/within_upgrade_window (", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/aascending_order/fetch_next_two_items", "github.com/gravitational/teleport/api/types::TestPluginEmailSettings/(smtp)_no_crredentials_label", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_unset_unset}", "github.com/gravitational/teleport/api/types::TestGroupByTargetHealth", "TestIsEICE/eice_node_with_ac", "github.com/gravitational/teleport/api/types::TestMatchSearch/match_with_custom_maatch", "TestEvents/db.session.cassandra.register_OneO", "github.com/gravitational/teleport/api/types::TestAzureMatcherCheckAndSetDefaults//wildcard_is_invalid_for_types", "TestNewStreamErrors/CreateAudit", "TestParseWeekdays/Invalid_days (0.00s)\\n\"}", "TestInstanceFilter/match-update-group (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_valid_in_cluster", "TestTargetHealthStatusCanonical/healt", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_allow_rule_missing_key_field", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/empty__entity_descriptor,_entity_ID_and_ACS_URL", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEndpoint", "github.com/gravitational/teleport/api/types::TestFriendlyName/friendly_group_namee_(uses_label)", "TestGetSortByFromString/name:desc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes/cache::TestCursorScenarios/basic", "TestNewSAMLIdPServiceProvider/aws-id", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//12month", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_missing_spec", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/ignore_slice_element_field", "TestALPNDialer_getTLSConfig/no_u", "github.com/gravitational/teleport/lib/services::TestRoleSetLockingMode/RoleSet_feeaturing_LockingModeStrict_gives_LockingModeStrict", "TestMetadataIsEqual/namespace_is_different (0.00s)", "Test_getMessageSentTimestamp/empty_map (0.00s)", "TestMatchResourceByHealthStatus/healthy_", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/wildcard_allows_any_kube_subresources", "github.com/gravitational/teleport/api/types::TestLicenseSettersAndGetters/Set_Usaage_Based_Billing", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertVPC/no_namme_tag", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/aascending_order", "TestResourceIDs/c", "TestServerConversion/postgres_ava", "TestOpenSearchConfig/custom_URI_with_r", "TestCalculatePendingReque", "TestProvisionTokenV2_CaseInsensitiveRole", "TestPluginMattermostValidation/no_settings (0.00s)", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName/aa", "github.com/gravitational/teleport/lib/multiplexer::TestPROXYEnabledListener_Acceppt/signed_PROXY_v2_header", "TestResourceIDs/persistent_volume_claim_resource_name_with_mi", "github.com/gravitational/teleport/lib/events::TestEvents/session.recording.accesss_OneOf", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/user_login.invaliid_access_list", "github.com/gravitational/teleport/api/types::TestResourceIDs/single_id/ResourceIDDsFromString", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/processsing_->_successful", "TestOktaAssignments_SetStatus/unknow", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_nil_metadata", "TestALPNDialer_getTLSConfig/get_cas_failed (0.00s", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED", "github.com/gravitational/teleport/api/types::TestIntegrationCheckAndSetDefaults/aazure-oidc:_valid", "TestNewSAMLIdPServiceProvid", "github.com/gravitational/teleport/lib/services::TestParseShortcut/saml_idp_servicce_providers", "TestPluginMattermostValidation/no_channel (0.00s)\\n", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//1year", "github.com/gravitational/teleport/lib/cloud/azure::TestGetServer/get_a_postgres_sserver", "TestProtoStreamer/one_event_using_the_whole", "TestMakeAppRedirectURL/OK_-_adds_quer", "TestTrimToMaxSize/aws_identity_ce", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/only_null_values", "github.com/gravitational/teleport/api/types::TestDurationUnmarshal/simple", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey//ResidentKey_required", "TestLegacySecondFactorFromSecondFactors/\\\\x01 (", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.refreshh_EventFields", "github.com/gravitational/teleport/api/types::TestResourceIDs/certificate_signing__request_resource_name_in_cluster_with_slash/ResourceIDsFromStrings", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_unset_nomatch_match}", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthenticated/signed", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/eu.proxy.eexample.com:443", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/valid_multi_values_with_wildcard", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#16", "github.com/gravitational/teleport/api/types::TestIsEICE/eice_node_with_account_annd_instance_id_labels_is_EICE", "github.com/gravitational/teleport/api/types::TestLockTargetEquals/not_equal", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/invalid_AWS_accouunt_ID_is_an_error", "github.com/gravitational/teleport/lib/events::TestEvents/plugin.delete_EventFieldds", "github.com/gravitational/teleport/lib/services::TestHostUsers_HostSudoers/line_deeny", "github.com/gravitational/teleport/api/types::TestResourceIDs/resource_name_with_sslash/ResourceIDsFromStrings", "github.com/gravitational/teleport/lib/events::TestEvents/external_audit_storage.ddisable_OneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_match_match}", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_wiith_missing_namespace_and_pod_name/ResourceIDsFromString", "TestUnifiedNameCompare (0.00s)\\n\"}", "TestResourceIDs/k", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/nil_expiry/wraapper_.Expiry()", "TestSSHHostOutput_CheckAndSet", "github.com/gravitational/teleport/api/types::TestRoleV6_KubernetesResourcesCheckAAndSetDefaults", "Test_isI", "TestPluginWithoutSecrets (0.00s)\\n\"}", "TestRole_GetKubeResources/v6_without_wildcard (", "TestProvision", "TestLegacySecondFactorFromSecondFactors/\\\\x03 (", "TestMetadataIsEqual/nil_equals (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestGetSortByFromString/hostname:ascc", "github.com/gravitational/teleport/api/types::TestRoleV6_CheckAndSetDefaults/spifffe:_valid_regex_path", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_resource_name/ReesourceIDsFromStrings", "TestServiceAccess/UpsertDatabaseObjectImpor", "TestNewAutoUpdateAgentRollou", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/groups_with_same_names", "TestReadProxyLineV2/succes", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/invalid__service_account_email:_google_domain", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/wiildcard_is_invalid_for_types", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_NO/YA", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_query__with_non-encoded_spaces", "TestExpiryConsistency/zero_expir", "TestOIDCClaimsRoundTrip/full (0.00s)\\n\"}", "TestResourceIDs/cluster_role_binding_resource_name_with_missing_", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#2", "github.com/gravitational/teleport/api/types::TestClientSecretFileURI", "github.com/gravitational/teleport/integrations/access/common/auth::TestRotatedAcccessTokenProvider/Refresh", "TestEmitEditorChangeEvent/Nil_roles (0.0", "TestEvents/db.session.cassandra.execute_OneOf", "github.com/gravitational/teleport/lib/events::TestProtoStreamer/one_event_using_tthe_whole_part", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/not_an_uri", "TestResourceHeaderIsEqual/metadata_is_differe", "TestProvisionTokenV2_CheckAndSetDefaul", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_wiith_missing_namespace_and_pod_name/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout/invalid_strategy", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_wiith_missing_namespace_and_pod_name", "TestDatabaseServersToDatabases (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.processs_kill_EventFields", "TestResourceIDs/bad_resource_name (0.00s)\\n\"}", "TestAccessRequestConditionsIsEmpty/empty (0.00s)\\n\"}", "TestDatabaseSpanner/valid_with_uri (0.00s)\\n\"}", "TestValidateDatabase/clic", "TestDatabaseSelfHosted/localhost (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateRole/unsupported_funcction_in_labels", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/JSON", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/ook_with_future_use", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/tpm_corrupt_CA", "TestServiceAccess/UpsertDatabaseObjec", "TestUnifiedNameCompare/sort_with_different_c", "TestParseTeleportRoles/node (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode=required", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions/hasPrefix(name,_\\", "TestValidateAutoUpdateA", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig", "github.com/gravitational/teleport/api/types::TestUnifiedNameCompare/sort_by_same__kind", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_resource_name", "TestProvi", "TestDynamoDBConfig/invalid_AWS_URI_is_an_error", "github.com/gravitational/teleport/api/types::TestMatchSearch_ResourceSpecific/dattabase", "TestLegacySecondFactorFromSecondFactors/#00 (0.00", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/alll_unknown", "TestApplicationGetAWSExternalID (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestRoleV6_CheckAndSetDefaults/spifffe:_invalid_ip_cidr", "TestAuthPr", "github.com/gravitational/teleport/api/types::TestSecondFactorsFromLegacySecondFacctor/off", "github.com/gravitational/teleport/lib/services::TestHostUsers_HostSudoers/multiplle_roles,_order_preserved_by_role_name", "TestStreams/Stream (0.15s)\\n\"}", "TestParseRegionFromOCID/not_an_ocid (0.00s)\\n\"", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/empty_seervice_account_email", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/innvalid:_requested_ttl_>_access_expiry", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_inn_cluster_with_slash", "github.com/gravitational/teleport/api/types::TestServerInfoSetLabels/fix_aws_labeels", "TestDeployServiceIAMConfigOutput (0.00s)\\n\"}", "TestRoleFilterMatch/skip_system_roles_filter_and_correct_search_keywor", "TestExpiryConsistency/nil_expiry/GetExp", "TestTrimToMaxSize/session.end (0.00s)\\n\"}", "TestValidateDatabase/cl", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettAuthPreference/unauthorized", "TestResourceHeaderIsEqual/subkind_is_different", "github.com/gravitational/teleport/api/types::TestNetIQPluginSettings/missing_OautthIssuer", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_unset_unset_match}", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH/encode", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider", "TestOktAssignmentIsEqual/populated_equals (0.00s)\\n", "TestParseRegionFr", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/empty__entity_descriptor_with_entity_ID_and_ACS_URL", "TestAppServerSorter/by_name_asc (0.00s)\\n\"}", "TestOktaAssignments_SetStatus/failed_-\\u", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/correect_format,_case_insensitive_match", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-mssqql-kerberos-kdchostname-without-ldapcert", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//success_agents_autoupdate_version", "TestParseTeleportRoles/Auth_,_Proxy,Window", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/no_keyyless_authorities", "github.com/gravitational/teleport/lib/cloud/azure::Test_AKSClient_ClusterCredentiials/azure_AD_accounts", "TestResourceIDs/pod_resource_name_in_", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn", "TestAllDeviceEnumsMapped/DeviceOrigin", "github.com/gravitational/teleport/api/types::TestSecondFactorsFromLegacySecondFacctor", "TestValidateJamfSpecV1 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestPluginOpsgenieValidation/no_stattic_credentials", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher/prod_vpc_with_assume_role", "TestID", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/empty_equals", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_with_missing_namespace/ResourceIDsFromString", "TestSAMLForceAuthn_Encoding/FORCE_A", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/invalid_overridden_domain", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/group_with_non_zero_wait_days_on_a_time-based_config", "TestRoleV6_CheckAndSetDefaults/spiffe:_valid (0.", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/empty__entity_descriptor_and_entity_ID", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/YAML/Marshal", "TestValidateHealthC", "TestExpiryConsistency/set_expiry/GetExpi", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrvice/nothing_exists,_multiple_deployments", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/expirred", "github.com/gravitational/teleport/api/types::TestGetAdminUser/no_admin", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_nomatch_nomatch_nomatch}", "TestAppServerSorter/by_description_desc (0.00s)\\n\"}", "TestPluginJamfValidation/no_api_Endpoint (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_empty_settings", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEndpoi", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_cluster_name", "TestValidateGitHubOrganizationName/a (0.00s)\\n\"}", "TestParseTeleportRoles/windowsdesktop (0.00s)\\n\"}", "TestValidateDatabaseName/valid_l", "TestRunWithMinInt", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration/sf=webauthn", "TestValidateDatabase/invalid-databas", "TestKeyCompare/key_is_always_greater_than_e", "TestServiceAccess/CreateDatabaseOb", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettSessionRecordingConfig/authorized", "github.com/gravitational/teleport/api/types::TestProxyListenerModeMarshalYAML/deffault_value", "github.com/gravitational/teleport/api/types::TestPluginAWSICSettings/(legacy)_leggacy_IntegrationName_does_not_overwrite_OIDC_Credentials", "github.com/gravitational/teleport/lib/kube/token::TestGetIDToken/TestGetIDToken#001", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/missing_roles", "TestKubeClustersSorter (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestParseWeekdays", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v5", "TestProvisionTokenV2_CheckAndSetDefault", "TestServiceAccess/CreateDatabaseObjectImportRule/all", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_WEBAUTHN/decode", "TestPluginEmailSettings/(smtp)_valid_settings (", "github.com/gravitational/teleport/api/types::TestAzureMatcherCheckAndSetDefaults//no_type", "TestTriggerGroups/valid_transition (0.00s)\\n\"", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_inn_cluster_with_slash#01/ResourceIDsFromStrings", "TestValidateHealthCheckConfig/invalid_", "TestIteration (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/defaullt_relay_state_should_not_be_set_for_empty_preset_value", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_match_nomatch}", "github.com/gravitational/teleport/lib/services::TestMatchResourceByHealthStatus/uunhealthy_db_status", "github.com/gravitational/teleport/api/types::TestMFADevice_CheckAndSetDefaults", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/valid_valuees_are_preserved,_import_populated", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/clickhouse-uuri-without-schema-native-protocol", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#9", "TestProvisionTokenV2_CheckAndSet", "TestServerSorter/by_hostname_desc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.cassanndra.batch", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/labels.os_==_\\", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/name_==_\\", "TestValidateGlob/root_exclusive_child_glob (0.00s", "TestRoleV6_CheckAndSetDefaults/spiffe:", "TestManagedSQLListWithinGroup/auth_error (0.00", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettAuthPreference/authorized", "TestExpiryConsistency/zero_expiry (0.00s)\\n\"}", "TestNewAutoUpdateVersio", "TestServerCheckAndSetDefaults/", "Test_kubeSchedu", "TestRotatedAccessTokenProvider (0.10s)\\n", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_no_patth", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateSessionRecordingConfig/unauthorized_built_in_role", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstValidateDatabaseObjectImportRule/missing_metadata", "TestOIDCClaimsRoundTrip/empty (0.00s)\\n\"}", "TestService_UpsertUserPreferences/access_denied_-_user_doesn't_exist (0", "github.com/gravitational/teleport/api/types::TestResourceIDs/kube_node_resource_nname_in_cluster_with_slash", "TestFetchOraclePrincipalClaim", "TestEvents/db.session.user.create_EventFields", "TestIteration/multiple_elements_with_s", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_name_contains_prefix", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_minimal_configuration", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_vpc_id", "TestValidateAutoUpdateAge", "TestServiceAccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/MF", "TestMetadataIsEqual/expires_both_nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/multiple_elemeents_with_non-existent_start_key", "github.com/gravitational/teleport/api/types::TestParseWeekdays/Invalid_days", "github.com/gravitational/teleport/lib/events/athena::TestConsumerWriteToS3/Checkiing_2023-04-01_should_contain_2_events", "TestDynamoDBConfig/region_", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/spacelift_rule_missing_fields", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress/ignores_IPv6", "github.com/gravitational/teleport/api/types::TestResourcesWithLabels_ToMap/empty", "github.com/gravitational/teleport/api/types::TestIntegrationCheckAndSetDefaults", "TestDynamoDBConfig/custom_URI_an", "TestMFADevice_CheckAndSetDe", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/single_eentity_without_entries", "TestWatchKindContains/yes:_subset_has_n", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_SSO/encode", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/no_seerver_url", "TestAzureMatcherCheckAndSetDefaults/defaul", "TestResourceMethods/GetKind (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/account_and_regioon_and_matching_AWS_URI_region_is_correct", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_NO (0.01s)", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed", "github.com/gravitational/teleport/api/types::TestUserGroupMatchSearch", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_iissuer_override.delete_OneOf", "TestProvisionTokenV2_SignupRole (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/iinvalid_agents_non-nil_maintenance_window_with_halt-on-error", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/Node", "TestServiceAccess/ListDatabaseObjects/allowed_admin_states/NotRequired", "TestValidateAutoUpdateAgen", "github.com/gravitational/teleport/api/types::TestLicenseSettersAndGetters/Set_Ressource_Access_Request_Support", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/nnot_an_ocid", "github.com/gravitational/teleport/lib/auth/userpreferences/userpreferencesv1::TesstService_UpsertUserPreferences", "TestEvaluateTraitsMap/traits", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/Admin,invaliddrole", "TestTrimToMaxSize/access_list.update (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/node", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/valid__OpenSSHEC2InstanceConnectEndpoint_node", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/unsigned_index", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/valid_multi_values", "TestParseRegionFromOCID/ok_wit", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEnd", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/group_with_impossible_start_hour", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/heealthy_and_unhealthy", "TestValidateSigstorePoli", "TestAWSIsEmpty/true_with_nested_unrecogniz", "TestGCPMatcherCheckAndSetDefaults/no_project_", "TestSAMLForceAuthn_Encoding/", "github.com/gravitational/teleport/api/types::TestDatabaseServerSorter/by_descripttion_asc", "TestWindowsDesktopsSorter (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/iinvalid_agents_mode", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/empty__entity_descriptor_and_ACS_URL", "github.com/gravitational/teleport/lib/services::TestMatchResourceByHealthStatus/ddb_combo", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//12_m", "TestEncodeDecodeSecondFactorTy", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra/sa-east-1", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_mmissing_verbs", "TestOktaAssignments_SetStatus/unknown_-", "github.com/gravitational/teleport/api/types::TestWithinUpgradeWindow/within_upgraade_window", "TestResourceIDs/pod_resource_name/Re", "github.com/gravitational/teleport/api/types::TestServerSorter", "TestValidateGit", "TestClientSecretFileURI (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestServerSorter/by_hostname_asc", "TestResourceIDs/resource_name_", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_region", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/noon-integration/ambient_credentials_do_not_support_EICE", "TestIDTokenSource_GetIDToken/overr", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_match_nomatch}", "TestRole_GetKubeResources/v7_with_allow", "TestResourceIDs/bad_resource_kind (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestNewStreamErrors/ResumeAuditStreeam/ListPartsError", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_wrong_kind", "github.com/gravitational/teleport/api/types::TestMFADevice_CheckAndSetDefaults/NOOK_Webauthn_missing_credential_ID", "TestKubeMatcherCheckAndSetDefaults/default_", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/exxternal_id_was_set_but_assume_role_is_missing", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/ec2_method_with_aws_arn", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users/missing", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/EnableUserSSync_defaults_to_false", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/ipv6_reemote_destination_address", "TestNewResourceExpression/fail_to_parse/!nam", "TestIsOpenSSHNodeSubKind (0.00s)\\n\"}", "TestNewAutoUpdateConfig/invalid_spec (0.00s)\\", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError/nnot_AWS_error", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/processsing_->_pending", "github.com/gravitational/teleport/lib/utils/interval::TestNewNoop", "TestInstanceFilter/match-all (0.00s)\\n\"}", "TestGetAuthPreference/authorize", "TestServerConversion/mysql_unava", "TestLockTargetEquals/equal (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/targets_diffferent_type", "TestConsumerWriteTo", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/empty__requirements", "github.com/gravitational/teleport/api/types::TestVersionShorthand", "github.com/gravitational/teleport/api/types::TestWatchKindContains/no:_kind_and_ssubkind_don't_match", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#15", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/root_exclusive_chiild_glob_with_trailing_slash", "TestRole_GetKubeResources/v8_deny (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestDDockerAttestorConfig_CheckAndSetDefaults/default_addr", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout/invalid_schedule_name", "TestExpiryConsistency/set_expiry/wrapper_.", "github.com/gravitational/teleport/api/types::TestKubeServerSorter", "github.com/gravitational/teleport/api/types::TestSecondFactorsFromLegacySecondFacctor/optional", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v5_withoutt_kube_labels", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.create_EventFields", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/ssuccess_agents_autoupdate_halt-on-failure", "TestRole_GetKubeResources/v7_with_allow_nam", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/methods_oon_nil_set_from_nonexistent_map_key", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/exists(labels.env)_||_exists(labels.os)_&&_labels.os_!=__\\", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions", "TestParseTeleportRoles/Auth,Auth (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_unset_match}", "github.com/gravitational/teleport/api/types::TestParseWeekdays/Empty_slice", "TestAddCredentialProcessToSe", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#20", "github.com/gravitational/teleport/api/types::TestRoleV6_CheckAndSetDefaults/spifffe:_valid", "TestValidateDatabase/valid-mssql-azure-ker", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrvice/fails_to_get_account_id", "github.com/gravitational/teleport/lib/web/scripts/oneoff::TestOneOffScript/invaliid_flavor_should_return_an_error", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/two_signed_PROXY_headers,_one_signed_for_wrong_cluster", "github.com/gravitational/teleport/api/types::TestPluginWithoutSecrets", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnsureUpgraderEnvvironmentVariables/Teleport_upgrader_env_variables_are_added", "TestValidateRole/unsupported_function_in_wh", "TestProvisionTokenV2_Check", "TestIteration/single_element_with_", "TestValidateRole/wildcard_not_allo", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#10", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/pendinng_->_processing", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName/--invalid-start-with-hyphen", "TestIsEICE/eice_node_without_insta", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/account_and_regioon_and_assume_role_is_correct", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/validd_settings_with_no_team/channel", "TestAccessReviewConditionsIsEmpty/claims_to", "github.com/gravitational/teleport/lib/utils/interval::TestMultiIntervalPush", "github.com/gravitational/teleport/api/types::TestNetIQPluginSettings/missing_ApiEEndpoint#01", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_in_cluster_with_slash", "TestRoleV6_Kuberne", "github.com/gravitational/teleport/api/types::TestUnifiedNameCompare/sort_with_diffferent_cases", "TestRole_GetKubeResources/v8_with_unknown_kind", "TestNewAutoUpdateAgentRollout/inval", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn/force_authn_no", "TestStringOrMap/marshal/m", "github.com/gravitational/teleport/api/types::TestValidateDatabaseName/invalid_firrst_character", "TestEvaluateTraitsMap/boolean_expressions (0.0", "github.com/gravitational/teleport/lib/srv/db/common/role::TestGetDatabaseRoleMatcchers", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/ennroll_mode_and_integration_are_not_set,_defaults_to_script_enroll_mode", "TestLockTargetMapConversions (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbs=[[read]", "github.com/gravitational/teleport/lib/srv/db/common/role::TestGetDatabaseRoleMatcchers/database_name_matcher_not_required", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/circleci_and_no_org_id", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_unset_unset_match}", "TestTrimToMaxSize/db.session.spanner.rpc (0.00s)\\n\"", "TestPluginOpsgenieValidation/no_settings (0.00s)\\n\"}", "TestResourceIDs/no_cluster_name (0.00s)\\n\"}", "TestTargetHealthStatusesAggregate/all_unknown (", "TestMa", "TestALPNConnUpgradeDialer/connection_", "TestAzureMatcherCheckAndSet", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-mssql--aws-rds-proxy", "TestProvisionTok", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.user.create_EEventFields", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/iinvalid_region", "TestValidateGlob/inline_exclusive_glob_rejec", "github.com/gravitational/teleport/api/types::TestDatabaseServersToDatabases", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.delete_EventFields", "github.com/gravitational/teleport/lib/utils/teleportassets::Test_cdnBaseURLForVerrsion/official_teleport_should_not_be_able_to_install_pre-release_artifacts", "github.com/gravitational/teleport/api/types::TestCassandraAWSEndpoint", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_in_cluster_with_slash/ResourceIDsFromStrings", "github.com/gravitational/teleport/lib/utils/teleportassets::Test_cdnBaseURLForVerrsion/pre-release_teleport_should_be_able_to_install_official_artifacts", "github.com/gravitational/teleport/api/types::TestPluginJiraValidation/Missing_Prooject_Key", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_match_nomatch_unset}", "TestParseWeekdays/Every_day (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/successsful_->_processing", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/tpm_rule_without_ekpubhash_or_ekcertserial", "TestStaticHostUserAuditEvent", "github.com/gravitational/teleport/api/types::TestMarshallCreateHostUserModeYAML", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/Auth,Proxy", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/disallowed_admin_states", "github.com/gravitational/teleport/api/types::TestResourceIDs/multiple_ids/ResourcceIDsFromString", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_resource_kind", "Test_cdnBaseURLForVersion/official_teleport_should_not_be_able", "github.com/gravitational/teleport/api/types::TestUnmarshallCreateHostUserModeYAMLL", "github.com/gravitational/teleport/api/types::TestSAMLACSURIHasConnectorName", "TestGetSortByFromString/hostname:asc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/bad_regexxp", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES/JSON/Marshal", "TestAtomicWriteShim/Items/pagination", "TestCli", "TestResourceAttestationType_toAndFrom/unspe", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/alll_empty", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.dynamodb.requuest_OneOf", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/spacelift_empty_allow_rules", "TestValidateAutoUpda", "github.com/gravitational/teleport/api/types::TestResourceIDs/kube_node_resource_nname_in_cluster_with_slash/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout/missing_spec", "TestServerCheckAnd", "TestRole_GetKubeResources/v7_with_label_ex", "TestProvisionTokenV2_C", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/valid__launch_URLs", "TestValidateJamfSpecV1/inventory_nil_entry (0.00s)", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration/sf=otp", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##11", "github.com/gravitational/teleport/api/types::TestAppServerSorter/by_description_aasc", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_iinvalid_kubernetes_resources_kind", "TestServerInfoSetLabels/leave_other_labels_a", "TestResourceIDs/pod_resource_name/Res", "TestNewStreamErrors/ResumeAudit", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_bindingg_resource_name_in_cluster_with_slash", "TestNewSAMLIdPServiceProvider/empty_entity_ID (", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/tpm_missing_rules", "github.com/gravitational/teleport/lib/services::TestParseShortcut/win_desktop_serrvice", "TestCr", "TestDatabaseAzureEndpoints/invalid_", "TestGCPMatcherCheckAndSetDefaults/inval", "TestGetServiceFQDN/service1_fallback", "github.com/gravitational/teleport/api/types::TestWatchKindContains/no:_subset_hass_wider_filter", "TestMatchSearch_ResourceSpecific/database (0.00s)\\n", "github.com/gravitational/teleport/api/types::TestSecondFactorsFromLegacySecondFacctor/on", "TestAWSIsEmpty/true_with_unrecognized_bytes (0.00", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_aliased_to_Webauthn", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestUpsertCertAuthorityy/update_ca", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/invalid_AWS_acccount_ID_is_an_error", "TestDeployDatabaseService/nothing_exi", "github.com/gravitational/teleport/lib/events::TestNewStreamErrors/CreateAuditStreeam", "TestRole_GetKubeResources/v8_deploymen", "TestPluginJamfValidation/invalid_cr", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/zero_expiry/GeetExpiry()_wrapper", "github.com/gravitational/teleport/api/types::TestWatchKindContains/yes:_kind_and__subkind_match", "github.com/gravitational/teleport/api/types::TestGithubAuthRequestCheck", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-clickhhouse-uri-http-protocol", "TestDynamoDBConfig/config", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_with_errror", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceIAMCConfig/account_does_not_match_expected_account", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/set_expiry/wraapper_.Expiry()", "github.com/gravitational/teleport/api/types::TestLegacySecondFactorFromSecondFacttors/\\\\x01", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ddescending_order/range_match", "github.com/gravitational/teleport/api/types::TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace/ResourceIDsFromString", "TestRole_AllowRequestKubernetesRes", "TestValidateSPIFFEFederation/fail_-_no_name (0", "TestEvents/sigstore_policy.update_EventFields", "TestGitServerOrgDomain (0.00s)\\n\"}", "TestDynamoDBConfig/account_a", "github.com/gravitational/teleport/api/types::TestGithubAuthRequestCheck/invalid-cconnector-spec-set-for-regular-flow", "TestAllDeviceEnumsMapped/DeviceOri", "github.com/gravitational/teleport/api/types::TestGetAdminUser/gets_admin_from_speec_ignoring_labels", "TestValidateDatabase/invalid-mssql-without-a", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ddescending_order/sub_prefix_range_fetch", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_empty_allow_rule", "github.com/gravitational/teleport/api/types::TestServerInfoSetLabels/leave_other__labels_alone", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/expires_is_diffeerent", "TestWatchKindContains/no:_subset_has_wider_", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//1_year", "TestValidateRole/unsupported_function_in_l", "TestDeployD", "github.com/gravitational/teleport/lib/services::TestHostUsers_HostSudoers/duplicaation_handled", "github.com/gravitational/teleport/api/types::TestAWSIsEmpty/true_with_unrecognizeed_bytes", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#18", "github.com/gravitational/teleport/lib/utils/interval::TestMultiIntervalVariableDuuration", "TestMetadataIsEqual/one_is_nil (0.00s)\\n\"}", "TestProxyListenerModeUnmarshalYAML/invalid_v", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//invalid_semantic_tools_version", "TestInstanceFilter/match-proxies (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestRoleV6_KubernetesResourcesCheckAAndSetDefaults/valid_empty_v7", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-mssqql-aws-rds-proxy-kerberos-without-spn", "TestGetDatabaseRoleMa", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/simple_token", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/invalid_role", "TestNetIQPluginSettings/valid (0.00s)\\n\"}", "TestNewResourceExpression/matching_expressi", "TestProvisionTokenV2_GetSafeName (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestWatchKindContains", "TestMatchSearch/match_with_repeat_search_vals (", "TestMetadataIsEqual/name_is_different (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/region_is_optioonal_if_it_can_be_derived_from_URI", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/nil_expiry/GettExpiry()_wrapper", "TestAppServerSorter/by_publicAddr_desc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/tpm_success_with_CA", "TestAWSMatcherCheckAndSetDefaults (0.00s)\\n\"}", "TestIteration/mult", "TestDurationUnmarshal (0.00s)\\n\"}", "TestLicenseSettersAndGetters/Set_Usage_B", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/missing_accountt_is_an_error", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/invalid__issuer", "TestGetSortByFromString/hostname (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/invalid_multi_value", "github.com/gravitational/teleport/lib/utils::TestOpenFileLinks/unsafe-symlinkFileeOpenAllowed", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users/disabled", "github.com/gravitational/teleport/api/types::TestMatchSearch_ResourceSpecific/dattabase_with_gcp_keywords", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/ssuccess_agents_autoupdate_time-based", "TestDatabaseServerSorter (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/fill_defaults", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenSource_GetIDToken/value__present", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#12", "TestValidateAutoUpdateConfig (0.00s)\\n\"}", "TestProxyLine_Bytes/write-read_pro", "github.com/gravitational/teleport/api/types::TestResource153ToLegacy/unwrap", "TestJoinS", "TestAuthPreferenceV2_CheckAndSetDefaults", "TestPackageLogger (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/multiple_elemeents_with_lower_start_key", "TestValidateJamfSpecV1/api_endpoint_empty_", "TestSliceOrString (0.00s)\\n\"}", "TestValidateJamfSpecV1/inventory_sync_ful", "github.com/gravitational/teleport/api/identityfile::TestIsSSHCert/opensesame@opennssh.com", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/one_is_nil", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceOrigiin/from_\\", "github.com/gravitational/teleport/api/client/proxy::TestClusterCredentials/clusteer_name_presented", "github.com/gravitational/teleport/api/types::TestRoleV6_CheckAndSetDefaults/spifffe:_path_not_prepended", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/multiple_elemeents_with_lower_non-existent_start_key", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO", "TestPluginJamfValidation/vali", "TestEvents/external_audit_storage.disable_On", "github.com/gravitational/teleport/api/types::TestRoleV6CheckAndSetDefaults_SAMLIddPOptions", "TestTrimToMaxSize/access_request.update (0.00s)\\n\"}", "TestIsEICE/agentless_openssh_node_is_not_eice (", "github.com/gravitational/teleport/api/types::TestMatchSearch/no_match_for_search__phrase", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_bindingg_resource_name_in_cluster_with_slash/ResourceIDsFromString", "TestStringOrMap/marshal/single_en", "TestValidateDatabase/invalid-database-uri (0.00s", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/tpm_success_without_CA", "TestValidateGitHubOrganizationName/valid-org (0.", "TestParseRegionFromOCID/invalid_r", "TestNewStreamErrors/ResumeAuditStream/L", "github.com/gravitational/teleport/lib/devicetrust/challenge::TestSignAndVerify/Edd25519", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/empty__entity_ID", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/multi-segmennt", "TestWindowsDesktopsSorter/by_addr_asc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_with_alllow_namespace", "github.com/gravitational/teleport/api/types::TestPluginOpsgenieValidation/valid_ccredentials_(static_credentials)", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/id_and_revision__have_no_effect", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#6", "github.com/gravitational/teleport/api/types::TestAccessReviewConditionsIsEmpty/cllaims_to_roles", "TestPluginEntraIDValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestLegacySecondFactorFromSecondFacttors/\\\\x01\\\\x02\\\\x03", "github.com/gravitational/teleport/lib/web/app::TestHealthCheckAppServer/match_andd_online_services", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.cassandra.exeecute_EventFields", "github.com/gravitational/teleport/api/types::TestValidLabelKey", "github.com/gravitational/teleport/api/types::TestAppServerSorter/by_description_ddesc", "Test_PluginOktaSyncSettings_SetUserS", "TestServerCheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra/invalid_input_audit_events_and_session_recordings_have_different_URIss", "TestAccessRequestConditionsIsEmpty/roles (0.00s)\\n\"}", "TestServerInfoSetLabels/fix_aws_labels (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_missing_config", "TestRole_AllowRequ", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/missinng_attribute_name", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/two_signed_PROXY_headers", "TestUnknownIdentifier/unknown_dynamic_", "TestProvisionTokenV2_Che", "TestMatchResourceByHealthStatus/", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/group_with_empty_name", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/noo_project_id", "TestExpiryConsistency/set_expiry (0.00s)\\n\"}", "TestValidateGitHubOrganizationName/inv", "TestDurationUnmarshal/combined_large (0.00s)\\n\"}", "TestTargetHealthStatusesAggregate/one_healthy (", "TestResourceIDs/ser", "github.com/gravitational/teleport/lib/utils/typical::TestUnknownIdentifier/unknowwn_variable", "github.com/gravitational/teleport/api/types::TestServerSorter/by_name_asc", "github.com/gravitational/teleport/lib/events::TestEvents/auto_update_config.delette_OneOf", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/empty_with_staart_key", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/NotRequired/verbs=[list]", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/pendinng_->_successful", "TestValidateGlob/root_exclusi", "TestOIDCGetRedirectURL/notfound.example.com (0", "TestNewSAMLIdPServiceProv", "TestRole_GetKubeResources/v8_pods_without_gro", "TestEvents/login_rule.delete_EventFields (0.00s)\\n\"", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/pendinng_->_failed", "TestRoleV6CheckAndSetDefaults_SAMLIdPOptions (0.", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##33", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed/Multi-item_matching_annotation", "github.com/gravitational/teleport/lib/auth/join/oracle::TestGetAuthorizationHeadeerValues", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerified/verbs=[read_list]", "TestGetClusterNetworki", "TestHostUsers_HostSudoers/duplication_handle", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/empty_equalls", "TestRoleV6_CheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_with_missing_namespace/ResourceIDsFromStrings", "TestMatchResourceByFilters/no_filt", "TestOpenSearchFetcher/pro", "TestDatabaseServerSorter/by_type_asc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_without_cloud_metadata", "TestServerSorter/by_name_desc (0.00s)\\n\"}", "TestApplicationGetAWSRolesAnywhereProfile (0.00s)\\n", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity.deletee_EventFields", "TestGCPMatcherCheckAn", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettSessionRecordingConfig", "TestDeduplicateKubeClusters (0.00s)\\n\"}", "TestProxyListenerModeMarshalYAML (0.00s)\\n\"}", "TestValidateSPIFFEFederation/fail_-_wron", "TestOpenSearchConfig/invalid_AWS_acco", "TestResourceIDs/certificate_signing_request_resource_name_in_cluster_w", "TestEvents/health_check_config.delete_OneOf (0.0", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_root_glob_mismmatch_due_to_early_segment", "TestRoleSetLockingMode/empt", "github.com/gravitational/teleport/api/types::TestDurationUnmarshal/large_+_small", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_wiith_missing_namespace/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestProxyListenerModeUnmarshalYAML/iinvalid_value", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_match_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnsureUpgraderEnvvironmentVariables", "TestAtomicWriteShim/Items/descending_orde", "github.com/gravitational/teleport/api/types::TestPluginJiraValidation/Valid", "TestGetSortByFromString (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/onne_healthy", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/intterval_greater_than_maximum_is_invalid", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_WEBAUTHN/encode", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/wildcard_rejects_single_kube_cluster_request", "github.com/gravitational/teleport/lib/utils/teleportassets::Test_cdnBaseURLForVerrsion/both_official_releases", "github.com/gravitational/teleport/api/types::TestInstanceControlLogExpiry", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusCanonical", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress/prefers_172.16..0.0/12", "TestStringOrMap/mar", "github.com/gravitational/teleport/api/types::TestResourceIDs", "TestAuthPreferenceV2_CheckAndSe", "github.com/gravitational/teleport/api/types::TestAzureMatcherCheckAndSetDefaults", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/succcess_-_static", "TestOktaAssignments_SetStatus/pro", "github.com/gravitational/teleport/lib/cloud/azure::TestServerConversion/postgres__available_and_supported", "Test_PluginOktaSyncSettings_SetUserSyncSource (", "TestProvisionTokenV2_CheckAndSetDefau", "TestRegistrationFl", "Test_PluginOktaSyncSettings_Sy", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_in_cluster_with_slash", "github.com/gravitational/teleport/api/types::TestRolesCheck", "TestTargetHealthStatusesAggregate/hea", "TestProvisionTokenV2_CheckAnd", "TestValidateDatabase/invalid-spanner-uri-hos", "TestLookupS", "TestServiceAccess/GetAutoU", "TestValidateJamfSpecV1/spec_with_inventory (0.00s)", "TestFriendlyName/friendly_app_name_(use", "TestAgentUpgradeWindow (0.00s)\\n\"}", "TestGetClusterNetworkingConfig (0", "github.com/gravitational/teleport/api/types::TestGetCloudMetadataAWS", "TestPluginOpenAIValidation/valid_credent", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/nil_spec", "TestIteration/single_element_with_l", "TestNewSAMLIdPServiceProvider/valid_att", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_with_missing_namespace", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra/invalid_input_transient_and_long-term_share_same_bucket_name", "TestRotatedAccessTokenProvider/R", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__requires_device_trust,_resource_doesn't_match", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states", "github.com/gravitational/teleport/lib/services::TestCheckOIDCIdP/multiple_active__keys", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_with_missing_namespace_and_pod_name", "TestDistrolessTeleportIm", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/single_elementt_with_higher_start_key", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#1", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/successsful_->_pending", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/innvalid_region", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/targets_botth_nil", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers//fetch_all", "github.com/gravitational/teleport/integrations/access/common/auth::TestRotatedAcccessTokenProvider", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/kubernetes/IterateUnifiedResources", "Test_isInclusionAllowed/Multi-item_matching_annotation (0.00s)\\n\"}", "TestDynam", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/wiildcard_is_valid_for_project_ids", "github.com/gravitational/teleport/api/types::TestUnmarshallCreateDatabaseUserModeeJSON", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceIAMCConfig", "TestParseRegionFromOCID/invalid_realm (0.00s", "github.com/gravitational/teleport/api/types::TestRoleGitHubPermissions", "TestLicenseSettersAndGetters/Set_Cloud (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGetServicePortss/One_supported_port,_one_unsupported_port#01", "github.com/gravitational/teleport/api/types::TestPluginAWSICSettings/(legacy)_misssing_oidc_integration_(legacy)", "TestDatabaseAzureEndpoints/valid_Redis (0.00s)\\n\"}", "TestPluginJiraValidation/Missing_Server_URL (0.00", "TestNewAutoUpdateAgentReport/empty_name (0", "TestMatchSearch/no_match_for_search_phrase (0.00s)", "github.com/gravitational/teleport/api/types::TestResourceIDs/single_id", "TestTrimToMaxSize/saml.idp.auth (0.00s)\\n\"}", "TestRole_GetKubeResources (0.01s)\\n\"}", "TestNewAutoUpdateVe", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_in_cluster_with_slash/ResourceIDsFromString", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_mmissing_namespace_in_pod_names", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v6_withoutt_wildcard;_labels_expression", "TestALPNDialer_getTLSConfig/name_updated (0.00s)\\n\"", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_adds_qquery_with_root_path", "TestRoleFilterMatch/skip_system_roles_filter_and_correct_search_keyw", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/innvalid_join_method", "github.com/gravitational/teleport/api/types::TestAgentUpgradeWindow", "github.com/gravitational/teleport/api/types::TestIsOpenSSHNodeSubKind/openssh_usiing_raw_sshd_server", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/ook_with_compartment/tenancy", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_in_cluster_with_slash", "TestProvisionTokenV2_CheckAndS", "TestResourceIDs/bad_cluster_name (0.00s)\\n\"}", "Test_querier_fetchResults/events_with_untrimmable_event_exceeding_\\u", "TestAWSMatcherCheckAndSetDefaults/default_va", "TestBootstrapInfra/invalid_input_transient_and_long-term_share_sa", "TestGetServiceFQDN (0.00s)\\n\"}", "TestResourceIDs/service_a", "github.com/gravitational/teleport/api/types::TestLockTargetMatch", "TestTargetHealthStatusCanonical (0.00s)\\n\"}", "TestPluginEmailSettings (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/other.exammple.com", "TestMatchSea", "TestMux/signed_PROXYv2_headers/", "github.com/gravitational/teleport/api/types::TestPluginJamfValidation/no_api_Endppoint", "github.com/gravitational/teleport/lib/events::TestProtoStreamer", "github.com/gravitational/teleport/api/types::TestGetSortByFromString/hostname", "TestPluginEmailSettings/no_email_spec (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceMethods/GetRevision", "TestResourceIDs/pod_resource_name_wi", "github.com/gravitational/teleport/lib/utils::TestOpenFileLinks/unsafe-symlinkRecuursiveDirFileOpenDenied", "TestFriendlyName/friendly_app_name_(uses_labe", "github.com/gravitational/teleport/lib/events::TestEvents/health_check_config.deleete_EventFields", "github.com/gravitational/teleport/api/types::TestDatabaseAzureEndpoints", "github.com/gravitational/teleport/api/types::TestMatchSearch_ResourceSpecific/appplication", "TestNewR", "TestResourceIDs/pod_resource_name_", "TestUnk", "TestResourceIDs/bad_resource_name/Res", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/iinvalid_agents_strategy", "TestPluginOktaValidation/no_org_URL (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/nil_equals", "TestLegacySecondFactorFromSecondFactors (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/terraform_only_names", "TestRoleGitHubPermissions (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialCluster", "github.com/gravitational/teleport/api/types::TestPluginJiraValidation/Missing_Serrver_URL", "github.com/gravitational/teleport/api/types::TestGetAdminUser", "TestJoinServiceGRPCServer_", "TestEmitE", "Test_PluginOktaSyn", "github.com/gravitational/teleport/api/types::TestAWSIsEmpty/true", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_with_missing_namespace/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_OTP/encode", "github.com/gravitational/teleport/api/types::TestClusterMaintenanceConfigDefault", "TestDurationUnmarshal/simple (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNetIQPluginSettings/incorrect_OaauthIssuer", "TestResourceIDs/bad_cluster_name/Reso", "TestNewAutoUpdateVersi", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/github_ghes_valid", "TestProvisionTokenV2_CheckAn", "github.com/gravitational/teleport/api/types::TestOIDCClaimsRoundTrip", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/CompareeAndSwap", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/inntegration_can_be_used_with_Script_mode", "TestServerSorter/by_addr_desc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/nil_equals", "TestGithubAuthRequestCheck/valid (0.00s)\\n\"}", "TestMFADevice_CheckAndSetDefaults/OK_U2F_devi", "TestValidateHealthChec", "github.com/gravitational/teleport/lib/client/db/mcp::TestEmptyDatabasesServer/Ressources", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/last_transiition_is_different", "TestDynamoDBConfig/account_an", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_with_alllow_wildcard_kind", "TestClient_DialHost/connection_successfully_established_without", "TestMFADevice_CheckAndSetDefaults/OK_OTP_devi", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//invalid_semantic_agents_target_version", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName/oorg-name-is-too-looooooooooooooooooooooong", "TestAuthPreferenceV2_Check", "TestMatchSearch/match_with_custom_match (0.00s)\\n\"}", "TestSAMLForceAuthn_Encoding/FORCE_", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/missing_topicARN", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/timmeout_less_than_minimum_is_invalid", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialHost/connection_successfully_established_without_agent_forwarding", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/evvents_<_then_limit,_mock_returns_data_in_multiple_calls", "TestSecondFactorsFromLegacySecondFactor/on (0.00s)", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/account_and_regioon_and_custom_URI_is_correct", "github.com/gravitational/teleport/api/types::TestNetIQPluginSettings/valid", "TestUnmarshallCreateDatabaseUserModeJSON (0.00s)\\n\"}", "TestUnknownIdentifier/unknown_variable (0.00s)", "TestAccessRequestConditionsIsEmpty/sug", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/valid_wildcard_value", "github.com/gravitational/teleport/api/types::TestApplicationGetAWSRolesAnywherePrrofile/configured", "github.com/gravitational/teleport/lib/utils/teleportassets::TestDistrolessTeleporrtImageRepo/ent_release", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_bindingg_resource_name_in_cluster_with_slash/ResourceIDsFromStrings", "github.com/gravitational/teleport/lib/services::TestCheckOIDCIdP/empty_private_keey", "TestStringOrMap/marshal/single_enti", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed/Empty_inclusion_annotation", "TestGuessesIPAddress/identifies_private", "TestAccessRequestConditionsIsEmpty/annotations", "TestLegacySecondFactorFromSecondFactors/#01 (0.00", "TestPluginOpenAIValidation (0.00s)\\n\"}", "TestRoleV6_CheckAndSetDefaults/spiffe:_mi", "TestPluginDiscordValidation/Valid (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey//required_and_rrk=false", "TestServerDeepCopy (0.00s)\\n\"}", "TestOktAssignmentIsEqual/targets_different_s", "github.com/gravitational/teleport/lib/tbot/config::TestSSHHostOutput_CheckAndSetDDefaults/valid", "TestBootstrapInfra/sa-east-1 (0.00s)", "github.com/gravitational/teleport/api/types::TestLegacySecondFactorFromSecondFacttors/\\\\x02", "github.com/gravitational/teleport/api/types::TestApplicationGetAWSRolesAnywherePrrofile/roles_anywhere_profile_not_configured", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/windowws_desktop", "TestExpiryConsistency/zero_expiry/GetE", "TestAWSMatcherCheckAndSetDefaults/inval", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty/ssearch_as_roles", "github.com/gravitational/teleport/api/types::TestApplicationGetAWSRolesAnywherePrrofile", "Test_cdnBaseURLForVersion/both_pre", "github.com/gravitational/teleport/lib/srv/app/gcp::TestHandler_getToken/non-timeoout_error", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/group_with_no_week_days", "TestAWSMatcherCheckAndSetDefaults/no_type (0.00s)\\n", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/multiple_elemeents_with_start_key", "TestDatabaseGCPCloudSQL/gcp-valid-configurati", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_non-URL/sf=webauthn", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestErroorCounter/emit_errors_alert", "github.com/gravitational/teleport/api/types::TestParseWeekdays/Every_day", "TestNewAutoUpdateConfig/invalid_ag", "TestTriggerGroups/valid_transit", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_unset_unset_nomatch}", "github.com/gravitational/teleport/api/types::TestPluginDatadogValidation", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/nOdE,prOXY", "github.com/gravitational/teleport/api/types::TestWindowsDesktopsSorter/by_name_assc", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-dataabase-protocol", "TestRotatedAccessTokenProvider/Ca", "TestValidateSPIFFEFederation/fail_-_wrong_k", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/valid_valuees_are_preserved", "Test_PluginOktaSyncSettings_SyncEnabledGetters/on_access_list_syn", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/YAML/Unmarshal", "TestEncodeDecodeRequireMFAType/HARDWARE_KEY", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_in_cluster_with_slash/ResourceIDsFromStrings", "Test_AKSClient_ClusterCre", "github.com/gravitational/teleport/lib/cloud/azure::TestClientMap/get_from_cache", "github.com/gravitational/teleport/lib/services::TestParseShortcut/oktaimportruless", "TestServerCheckAndSetDefaults/Teleport_node (0.00", "TestRole_GetKubeResources/v6_with_wildcard (0.00s)", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/group_with_invalid_week_days", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_resource_name/ReesourceIDsFromString", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_in_cluster_with_slash", "github.com/gravitational/teleport/lib/utils/typical::TestUnknownIdentifier/dynamiic_variable_found_via_path_not_found", "github.com/gravitational/teleport/lib/utils/interval::TestIntervalReset", "github.com/gravitational/teleport/api/types::TestMatchSearch", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_unset_match}", "TestIDTokenValidator_Validate/invalid_audience (", "github.com/gravitational/teleport/lib/backend::TestKeyCompare/key_is_always_greatter_than_empty", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_nomatch_match}", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/dict_indeex", "github.com/gravitational/teleport/api/types::TestCassandraAWSEndpoint/aws_cassanddra_custom_fips_uri", "github.com/gravitational/teleport/api/types::TestLegacyToResource153/unwrap", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//12months", "TestServerSorter/by_name_asc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestDatabaseSelfHosted/localhost", "TestDistrolessTeleportImageRep", "TestPluginJiraValidation/Valid (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_wiith_missing_namespace/ResourceIDsFromStrings", "TestEvents/db.session.dynamodb.request_Ev", "TestResourceAttestationType_toAndFrom (0.01s)\\n\"}", "TestAWSMatcherCheckAndSetDefaults/valid (0.00s)\\n\"}", "TestExpiryConsistency/nil_expiry (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::TestHandlerAuthenticate/with_cookiie", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialCluster/stream_terminated", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/no_seettings", "github.com/gravitational/teleport/api/types::TestDatabaseSelfHosted/ec2_hostname", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/innvalid_type", "TestParseShortcut/saml_idp_service_providers", "TestPluginOktaValidation/no_credentials_inner (", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/iinvalid_realm", "TestNetIQPluginSettings/incorrect_OauthIssuer (", "github.com/gravitational/teleport/api/types::TestSessionTrackerV1_UpdatePresence", "TestPluginMattermostValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstValidateDatabaseObjectImportRule/nil_rule", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-dataabase-assume-role-arn", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/NotRequired", "TestAWSMatcherCheckAndSetDefaults/enroll_mode_not_set_but_integrat", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.delete_OneOf", "TestServiceAccess/ListDatabaseObjects/allowed_admin_states/MFAVer", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode=optional", "github.com/gravitational/teleport/lib/tbot/config::TestSSHHostOutput_CheckAndSetDDefaults/missing_destination", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/circleci_and_no_allow", "TestALPNConnUpgradeDial", "TestRole_AllowRequestKubernetesRe", "github.com/gravitational/teleport/api/types::TestWindowsDesktopsSorter/by_name_deesc", "github.com/gravitational/teleport/api/types::TestIntegrationCheckAndSetDefaults/aazure-oidc:_error_when_no_tenant_id_is_provided", "github.com/gravitational/teleport/lib/events::TestProtoStreamer/5MB_similar_to_S33_min_size_in_bytes", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/noo_region", "TestClusterMaintenanceConfigDefault (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestUnmarshallCreateDatabaseUserModeeYAML", "TestDeployServiceIAMConfig (0.01s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/successsful_->_successful", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/no_org_URL", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_UNSPECIFIED", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed/Missing_inclusion_annotation", "github.com/gravitational/teleport/api/types::TestResourceIDs/certificate_signing__request_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace/ResourceIDsFromStrings", "TestRole_GetKubeResources/v7_with_deny_w", "github.com/gravitational/teleport/lib/utils/teleportassets::TestDistrolessTeleporrtImageRepo/ent_pre-release", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SetUserSSyncSource/known_cases", "TestSAMLACSURIHasConnectorName (0.00s)\\n\"}", "TestValidateDatabase/valid-mssql-rds-", "github.com/gravitational/teleport/api/types::TestMFADevice_CheckAndSetDefaults/OKK_OTP_device", "github.com/gravitational/teleport/lib/srv/db/common/role::TestGetDatabaseRoleMatcchers/database_name_matcher_required", "github.com/gravitational/teleport/lib/utils/interval::TestIntervalResetTo", "github.com/gravitational/teleport/api/client::TestGetResourcesWithFilters/ApplicaationServer", "github.com/gravitational/teleport/api/types::TestLicenseSettersAndGetters/Set_IGSS_Support", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/emmpty_list_returns_unknown", "TestAtomicWriteShim/Items/des", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerified/verbs=[list]", "github.com/gravitational/teleport/api/types::TestPluginJamfValidation/invalid_creedential_type_(oauth2)", "github.com/gravitational/teleport/lib/services::TestParseShortcut/access_requestss", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_resourcce_name_with_missing_namespace_and_pod_name", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/DeleteRRange", "github.com/gravitational/teleport/api/client/proxy::TestClient_DialHost/grpc_connnection_fails", "TestParseTeleportRoles/Node (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-dataabase-uri", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.start_EventFiields", "github.com/gravitational/teleport/lib/cloud/azure::TestClientMap/create_client_faailed", "github.com/gravitational/teleport/lib/services::TestReconciler/custom_comparison__function", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/validd_settings_with_team/channel", "TestDynamoDBConfig/missing_URI_", "TestNetIQPluginSettings/missing_ApiEndpoint#01", "TestPluginOktaValidation/no_settings (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_with_missing_namespace/ResourceIDsFromStrings", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/not_yyet_valid", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_ClusterDetails/error_getting_details", "TestKubeMatcherCheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/valid_time-based_rollout_with_groups", "TestPluginJamfValidation/in", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources", "TestLockTargetEquals/not_equal (0.00s)\\n\"}", "TestAtomicWriteShim/Items/asce", "github.com/gravitational/teleport/api/types::TestPluginEmailSettings/(smtp)_changge_start_TLS_policy", "TestAWSMatcherCheckAndSetDefaults/no_region (0.00", "TestPluginDiscordValidation/Empty_Role_Mapping", "TestAccessRequestConditionsIsEmpty (0.00s)\\n\"}", "TestRoleParse/validation", "TestClient_DialHost/stream", "TestOpenSearchConfig/URI-d", "TestMetadataIsEqual/empty_equals (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/NotRequired/verbs=[read]", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/heealthy_and_unhealthy_and_unknown", "TestPluginJamfValidation/no_credentials_inner (", "github.com/gravitational/teleport/lib/services::TestValidateRole/unsupported_funcction_in_where", "github.com/gravitational/teleport/lib/cloud/azure::TestClientMap/expire_from_cachhe", "github.com/gravitational/teleport/lib/srv/discovery/common::TestMakeDiscoverySufffix/databases/simple_parts", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions/!exists(labels.env)", "TestValidateHealthCheckConf", "github.com/gravitational/teleport/api/types::TestResourceIDs/certificate_signing__request_resource_name_in_cluster_with_slash", "TestAccessLists/access_lists_", "github.com/gravitational/teleport/api/types::TestPluginDiscordValidation", "github.com/gravitational/teleport/lib/events/athena::Test_getMessageSentTimestampp", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/inline_exclusive_gglob_rejected", "TestValidateJamfSpecV1/invento", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_with_missing_namespace_and_pod_name", "Test_PluginOktaSyncSettings_", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/aascending_order/next_fetch_is_empty", "TestServiceAccess/CreateDatabaseObjectImpor", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_only_workspace", "TestUnifie", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseService//empty_role_doesn't_have_access_to_any_databases", "github.com/gravitational/teleport/api/types::TestGithubAuthRequestCheck/valid", "github.com/gravitational/teleport/api/types::TestFriendlyName/friendly_node_name", "TestRole_AllowRequestKubernetesResource (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/zero_expiry", "TestEvents/db.session.mysql.init_db_OneOf (0.00s)\\", "TestAWSMatcherCheckAndSetDefaults/invalid_re", "TestValidateAutoUpdateConfig/g", "TestAccessRequestConditionsIsEmpty/search_", "TestIsSSHCert/ecdsa-sha2-nistp2", "github.com/gravitational/teleport/api/types::TestAWSIsEmpty/true_with_nested_unreecognized_bytes", "TestProvisionTokenV2_GetSafeName/non-t", "TestResourceAttestationType_toAndFrom/tpm_ekp", "TestUnifiedNameCompare/sort_by_same_kind (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_with_missing_namespace_and_pod_name/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_access_list_sync_enabled", "github.com/gravitational/teleport/api/types::TestServerSorter/by_addr_desc", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##31", "TestOIDCGetRedirectURL/us.proxy.example.com (0", "TestPluginOktaValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/set_expiry", "TestNewSAMLIdPServiceProvider/missing_a", "github.com/gravitational/teleport/api/types::TestNetIQPluginSettings", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserAuditEvents", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/JSON/Unmarshal", "github.com/gravitational/teleport/api/types::TestSAMLSecretsStrip", "github.com/gravitational/teleport/api/types::TestInstanceFilter/match-all", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/invalidrole", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/processsing_->_processing", "github.com/gravitational/teleport/api/types::TestLicenseSettersAndGetters/Set_Triial_Support", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/iam_method", "TestClusterCredentials/cluster_name_pres", "TestMakeAppRedirect", "github.com/gravitational/teleport/lib/utils/typical::TestUnknownIdentifier/dynamiic_map", "github.com/gravitational/teleport/api/types::TestMatchSearch/match_for_a_list_of__search_vals_contained_within_one_field_value", "github.com/gravitational/teleport/lib/multiplexer::TestPROXYEnabledListener_Acceppt/signed_PROXY_v2_header_on,_mixed_version_in_downgrade_mode", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed/Not_matching_inclusion_annotation", "TestAllDeviceEnumsMapped/DeviceOrigin (0.00s)\\n\"}", "TestAccessReviewConditionsIsEmpty/preview_", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher/skip_unsupported", "github.com/gravitational/teleport/api/types::TestLockTargetMapConversions", "github.com/gravitational/teleport/api/types::TestGetSortByFromString/name:desc", "TestNewSAMLIdPServiceProvider/supp", "TestIAMPolicyStatusJSON (0.00s)\\n\"}", "TestTargetHealthStatusesAggregat", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/inventory_nill_entry", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/nil_expiry/wraapper_metadata_.Expiry()", "TestEvaluateTraitsMap/", "TestResourceIDs/configmap_resou", "TestEvents/db.session.dynamodb.request_OneOf (0", "TestGetCertAuthorities/ca_found_", "TestNewResourceExpression/matching_", "TestNetIQPluginSettings (0.00s)\\n\"}", "TestValidateSPIFFEFederation/fail_-_nil_m", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialHost/stream_terminated", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/gitlab_empty_allow_rules", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/set_expiry/GettExpiry()_resource", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##32", "github.com/gravitational/teleport/lib/web/app::TestHealthCheckAppServer/match_andd_but_no_online_services", "TestProvisionTokenV2_CheckAndSetDefaults/", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/valid_no_values", "github.com/gravitational/teleport/lib/utils/teleportassets::TestDistrolessTeleporrtImageRepo/community_pre-release", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/skip_dangeroous_with_whitespace", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Only_had_editor_role,_role_removed", "TestNewAutoUpdateAgentRollout/missing_s", "TestRoleV6_CheckAndSetDefaults/spif", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_unset_nomatch}", "TestRoleSetForBuiltinRoles/RoleMDM_is_mapped (0.", "github.com/gravitational/teleport/api/types::TestServerSorter/by_hostname_desc", "TestGetAuthPreference/unautho", "TestValidateJamfSpecV1/api_endpoint_invalid (0.00", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_integrationn", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#24", "TestMemoryDBFetcher/fetch_", "TestDeployDatabaseService (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/set_expiry/wraapper_metadata_.Expiry()", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/YAML", "github.com/gravitational/teleport/api/types::TestMFADevice_CheckAndSetDefaults/OKK_U2F_device", "github.com/gravitational/teleport/api/types::TestGetAdminUser/gets_admin_from_labbels", "TestNewAutoUpdat", "github.com/gravitational/teleport/api/types::TestResourceIDs/certificate_signing__request_resource_name_with_missing_namespace_and_pod_name", "TestIsSSHCert/ssh-ed25519-cert-v01@open", "TestWatchKindContains/yes:_kind_and_subkind", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/innvalid_join_method", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Nil_roles", "TestNewSAMLIdPServiceProvider/empty_launch_UR", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v8_with_unnknown_kind", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEn", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftCluster/missing_endpoint#01", "TestMetadataIsEqual/id_and_revision_have_n", "github.com/gravitational/teleport/api/types::TestProxyListenerModeUnmarshalYAML", "github.com/gravitational/teleport/api/types::TestAzureMatcherCheckAndSetDefaults//valid", "github.com/gravitational/teleport/lib/tbot/config::TestSSHHostOutput_CheckAndSetDDefaults/missing_principals", "TestPluginMattermostValidation/no_server_url (0.", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress/prefers_192.1688.0.0/16", "TestRoleParse/validation_error,_no_name#01 (0.0", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty/cclaims_to_roles", "TestResourceIDs/resource_name_with_slash (0.00s)\\n\"}", "TestOktaAssignments_SetStatus/failed_", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRepport/no_timestamp", "TestResourceIDs/pod_resource_name (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestPluginOpenAIValidation/no_credenntials_inner", "github.com/gravitational/teleport/api/types::TestUnmarshallCreateHostUserModeJSONN", "github.com/gravitational/teleport/api/types::TestGetCloudMetadataAWS/no_cloud_mettadata", "TestDatabaseServerSorter/by_description_asc (0.00", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/Auth,_auth", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/emmpty_and_unknown", "TestApplicationGetAWSRolesAnywhereProfil", "github.com/gravitational/teleport/api/types::TestResourceAttestationType_toAndFroom/tpm_ekcert", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectE", "TestProv", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_inn_cluster_with_slash/ResourceIDsFromStrings", "TestValidateSPIFFEFederation/fail", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher/fetch_prod", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/implicit_ec2_method", "TestDatabaseSpanner/valid_without_uri (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/no_credentiials_inner", "TestProvisionTokenV2_CheckAndSetDefa", "TestAllDeviceEnumsMapped (0.01s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/terraform_missing_rules", "TestResourceIDs/secret_resource_na", "TestCreateSessionRecordingConfi", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListVPCs/valid_foor_listing_VPCs", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_user_sync_enabled", "TestDatabaseAzureEndpoints/valid_MySQL (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestCassandraAWSEndpoint/aws_cassanddra_missing_AccountID", "TestServiceAccess/CreateDatabaseObjec", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/single_eentity_without_entries_but_is_wildcard", "TestUserGroupMatchSearch (0.00s)\\n\"}", "TestResourceIDs/single_id/ResourceIDsFromStr", "TestKubeAppFetcher_Get/No_services (0.00s", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/api_endpoint__empty_hostname", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding", "TestProvisionTokenV2_Ch", "TestResourceIDs/certificate_signing_request_resource_name_in_cluster_wi", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret", "TestResource153ToLegacy/marshal (0.00s)\\n\"}", "TestCalcu", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_in_cluster_with_slash/ResourceIDsFromString", "TestValidateDatabase/valid-mssql-ker", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsTimeeBased/unstarted_->_unstarted_because_rollout_just_changed", "github.com/gravitational/teleport/api/types::TestResourceIDs/no_cluster_name/ResoourceIDsFromString", "github.com/gravitational/teleport/api/types::TestRoleV6CheckAndSetDefaults_SAMLIddPOptions/samlidp:_idp_option_not_enabled_in_role_version_8", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_cluster_name/RessourceIDsFromString", "github.com/gravitational/teleport/api/types::TestPluginOpenAIValidation", "TestAllDeviceEnumsMapped/DeviceAttestationType", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/intterval_less_than_minimum_is_invalid", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/azure_devops_success", "github.com/gravitational/teleport/api/types::TestResourceIDs/resource_name_with_sslash/ResourceIDsFromString", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/iinvalid_spec", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestNewAutoUpdateC", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/valid_single_value", "TestValidateAutoUpdateCo", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/indirect_ip_resolvee", "TestValidateDatabase/valid-mssql-aws-rds-pr", "TestMatchResourceByFilters/SAMLIdPServic", "github.com/gravitational/teleport/lib/cloud/azure::TestListVirtualMachines/existiing_resource_group", "TestPluginJamfValidation/no_settings (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestParseTeleportRoles/Auth,Auth", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults", "TestResourceIDs/kube_node_resou", "github.com/gravitational/teleport/api/identityfile::TestIsSSHCert/ecdsa-sha2-nisttp256-cert-v01@openssh.com", "github.com/gravitational/teleport/api/types::TestValidateDatabaseName/invalid_traailing_hyphen", "github.com/gravitational/teleport/api/types::TestGetSortByFromString/#00", "TestSecondFactorsFromLegacySecondFactor/off (0.00", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestEvents", "github.com/gravitational/teleport/lib/client/db/mcp::TestRegisterDatabase/Resourcces", "TestMarshallCreateHostUserModeYAML (0.00s)\\n\"}", "TestProvisionTokenV2", "TestValidateJamfSpecV1/inventory_all_sync", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Expirattion", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES/YAML/Unmarshal", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/empty_deployment_list", "github.com/gravitational/teleport/api/types::TestServerInfoSetLabels", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_GetSafeName", "github.com/gravitational/teleport/api/types::TestInstanceFilter/match-proxies", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout/missing_start_version", "TestResourceIDs/no_cluster_name/Resour", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/aascending_order/sub_prefix_range_fetch", "TestPluginOktaValidatio", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/SSO_connecttor_ID_required_for_user_sync", "TestOktaAssignments_SetStatus/suc", "TestExpiryConsistency/zero_expiry/GetEx", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.elasticsearchh.request_OneOf", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/KeepAliive", "TestWatchKindContains/no:_kind_and_sub", "TestParseRegionFromOCID/missing", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name/ReesourceIDsFromStrings", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Cluster/primary/with_name_override_via_TeleportDatabaseName", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestDDockerAttestorConfig_CheckAndSetDefaults/unix_socket", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/status_is_ddifferent", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRepport/nil_spec", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/ignore_embedded_field", "TestEncodeDecodeSecondFactorType (0.00s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateVersion/allowed_admin_states/Not", "TestCheckOIDCIdP/unparseable_private_key (0.00s)\\", "TestTrimToMaxSize/user_login.invalid_access", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiter/with_limiteer", "TestMux/PostgresProxy/without_proxy_line (0.00", "github.com/gravitational/teleport/api/types::TestDurationUnmarshal", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.send_long_data_EventFields", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/validd_transition", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromAzureeRedisEnterprise", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/onne_mixed", "TestDatabaseAzureEndpoints/valid_Redis_Ente", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_list.updatte", "github.com/gravitational/teleport/api/identityfile::TestIsSSHCert", "TestOktAssignmentIsEqual/empty_equals (0.00s)\\n\"}", "TestMarshallCreateHostUserModeJSON (0.00s)\\n\"}", "TestParseWeekdays/Empty_slice (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/targets_diffferent_id", "TestLicenseSettersAndGetters/Set_IGS_Support (0.", "TestValidateDatabase/valid-click", "TestMetadataIsEqual/expires_m2_nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/okta.assignment.pprocess", "TestNewSAMLIdPServiceProvider/dupli", "TestBootstrapInfra/eu-central-1 (", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/dangling_sepparator_single", "TestOktAssignmentIsEqual/last_transitio", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/uunexpected_region_on_compartment/tenancy", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/missing_account_iid", "TestReso", "TestValidateDatabase/invalid-ms", "github.com/gravitational/teleport/api/types::TestLegacyToResource153", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromAzureeDBServer", "TestFriendlyName/friendly_group_name_(uses_", "TestEvents/saml.idp.service.provider.delet", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/ssuccess_tools_autoupdate_enabled", "TestLockTargetIsEmpty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError/vv2_sdk_error_for_ecs_ClusterNotFoundException", "TestMetadataIsEqual/populated_equals (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty/aannotations", "TestAzureMatcherCheckAndSetDefaults/i", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ppagination", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//invalid_empty_tools_version", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v3", "TestAccessReviewConditionsIsEmpty/empty (0.00s)\\n\"}", "TestSAMLForceAuthn/force_authn_no (0.00s)\\n\"}", "github.com/gravitational/teleport/api/identityfile::TestIsSSHCert/ssh-rsa-cert-v001@openssh.com", "github.com/gravitational/teleport/api/types::TestValidateDatabaseName", "TestServiceAccess/Rollb", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/populated_eequals", "github.com/gravitational/teleport/api/client/proxy::TestClient_ClusterDetails/cluuster_details", "github.com/gravitational/teleport/lib/events::TestEvents/health_check_config.deleete_OneOf", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_user_sync_enabled_with_disabled_app_and_group_sync", "github.com/gravitational/teleport/api/types::TestParseWeekdays/Few_valid_days", "github.com/gravitational/teleport/api/types::TestResourceIDs/certificate_signing__request_resource_name_in_cluster_with_slash/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestPluginEmailSettings", "TestTargetHealthStatusesAggregate/one_mixed (0.00", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName/11-valid-start-with-digit", "TestNewSAMLIdPServicePr", "TestRoleFilterMatch/", "TestValidateDatabase/invalid-schema-", "TestSecondFactorsFromLegacySecondFactor (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSH_node_with_unset_hostname", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/multiple_elemeents_with_higher_non-existent_start_key", "TestAtomicWriteShim/Items/ascending_order", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#23", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ddescending_order/next_fetch_is_empty", "github.com/gravitational/teleport/api/types::TestTunnelStrategyMarshalling", "TestProxyJumpParsing/\\\"alice@127.0.0.1:7777\\\" (", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/custom_URI_and_miissing_region_is_an_error", "TestProvisionTokenV2_CheckAndSetD", "TestIntegrationCheckAndSetDefaults/aws_ra:_v", "github.com/gravitational/teleport/lib/utils::TestOpenFileLinks/unsafe-directFileOOpenAllowed", "github.com/gravitational/teleport/api/types::TestFriendlyName/friendly_app_name_((uses_label)", "github.com/gravitational/teleport/api/types::TestPluginOpsgenieValidation", "TestValidateAutoU", "github.com/gravitational/teleport/api/types::TestResourcesWithLabels_ToMap/first__duplicate_wins", "TestNewClient/does_not_implement_transport", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-mssqql-rds-kerberos-without-ad", "TestResourceHeaderIsEqual/one_is_nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.refreshh_OneOf", "TestOpenFileLinks/unsafe-symlinkFileOpenAllow", "TestClient_DialHost/grpc_connection_fails (0", "TestListDatabases (0.00s)\\n\"}", "Test_getMessageSentTimestamp/missing_a", "github.com/gravitational/teleport/api/types::TestDatabaseSpanner/invalid_missing__project_and_instance_id_for_spanner_protocol", "TestPluginOpenAIValidation/no_credentials (0.00s)\\n", "TestResourceIDs/certificate_signing_request_resource_nam", "TestPluginMattermostValidation/no_credent", "TestRoleFilterMatch/empty_filter_sho", "TestResourcesWithLabels_ToMap (0.00s)\\n\"}", "TestLegacySecondFactorFromSecondFactors/\\\\x02 (", "TestUserAssignedIdentitiesClient/not_found (", "TestOIDCGetRedirectURL/proxy.example.com (0.00s)\\", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/failedd_->_successful", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/iinvalid_agents_short_maintenance_window", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##12", "TestSAMLForceAuthn_Encodin", "TestErrorCounter/download_", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/terraform", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/wiildcard_is_invalid_for_regions", "TestCassandraAWSEndpoint/aws_cassandra", "TestNewAutoUpdateAgentReport/nil_spec (0.00s", "TestWithinUpgradeWindow (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestIsOpenSSHNodeSubKind/openssh_usiing_EC2_Instance_Connect_Endpoint", "github.com/gravitational/teleport/api/types::TestInstanceFilter/match-update-grouup", "github.com/gravitational/teleport/api/types::TestLegacySecondFactorFromSecondFacttors/#00", "github.com/gravitational/teleport/api/types::TestAzureMatcherCheckAndSetDefaults//invalid_type", "github.com/gravitational/teleport/lib/srv/discovery/common::TestApplyGKENameSuffiix", "github.com/gravitational/teleport/api/types::TestIsEICE/eice_node_without_accountt_id_label_is_not_EICE", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialCluster/connection_successfully_established", "TestRoleV6_Kub", "github.com/gravitational/teleport/api/types::TestPluginOpenAIValidation/no_credenntials", "github.com/gravitational/teleport/api/types::TestCassandraAWSEndpoint/aws_cassanddra_custom_uri", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/inventory_on__missing_invalid", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteSuite/NonConnflicting", "TestDynamoDBConfig/account", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/inventory_synnc_full_disabled", "TestDatabaseGCPCloudSQL (0.00s)\\n\"}", "github.com/gravitational/teleport/tool/tctl/common/oktaassignment::TestToResourcee", "TestNewSAMLIdPSe", "github.com/gravitational/teleport/api/types::TestPluginOpenAIValidation/invalid_ccredential_type_(oauth2)", "TestNewAutoUpdateVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAccessReviewConditionsIsEmpty/rooles", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/invalid_kind_(kube_cluster_is_not_part_of_Kubernetes_subresources)", "TestGCPMatcherCheckAndSetDefaults/invalid_type", "TestRole_GetKubeResources/v7_deny (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/typical::TestUnknownIdentifier/unknowwn_dynamic_variable", "TestService_UpsertUserPref", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_with_missing_namespace", "TestTargetHealthStatusesAggregate (0.00s)\\n\"}", "TestClient_ClusterDetails/cluster_details (0", "TestAccessReviewConditionsIsEmpty/where (0.00s)\\n\"}", "TestValidateDatabase", "github.com/gravitational/teleport/lib/utils/teleportassets::TestDistrolessTeleporrtImageRepo", "TestHealthCheckAppServer/match_an", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#19", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//invalid_semantic_agents_start_version", "github.com/gravitational/teleport/api/types::TestResourceIDs/no_cluster_name", "github.com/gravitational/teleport/api/types::TestFriendlyName/friendly_app_name_((uses_description)", "TestParseRegionFromOCID/invalid_version (0", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//12", "github.com/gravitational/teleport/lib/cloud/azure::TestClientMap", "github.com/gravitational/teleport/api/types::TestDatabaseFromRedshiftServerlessEnndpoint", "TestResourceIDs/bad_cluster_name/Resou", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertVPC/with_nname_tag", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_with_missing_namespace/ResourceIDsFromString", "TestProvisionTokenV2_CheckAndSe", "TestResourceHeaderIsEqual/nil_equals (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestDatabaseAzureEndpoints/valid_Reddis_Enterprise", "TestDatabaseServerSorter/by_name_desc (0.00s)\\n\"}", "TestProvisionTokenV2_CheckAndSetDefaults/t", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/no_chhannel", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/incorrect_searchh_keyword_shouldn't_match_the_role", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/empty_vpc_id", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v5:_populaate_with_defaults.", "TestNewAutoUpdateV", "github.com/gravitational/teleport/api/types::TestUnifiedNameCompare/sort_by_diffeerent_kind", "TestEvents/health_check_config.delete_Even", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/terraform_missing_organization_(id)", "github.com/gravitational/teleport/api/types::TestResourceIDs/no_cluster_name/ResoourceIDsFromStrings", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingAzureMethod/auth_error", "TestTrimToMaxSize/access_request.search (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/request.kubernetes_resources_does_not_get_applied_with_a_role_wiithout_search_as_roles_defined", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/wildcard_rejects_kube_cluster_kind_among_other_valid_requests", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/listt_namespace_with_resource_giving_read_access_to_namespace_deny", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_nil_settings", "TestResourceMethods/SetRevision (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestUpsertCertAuthorityy", "TestAccessReviewConditionsIsEmpty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/multiple_elemeents", "TestInstanceFilter/match-kube-upgrader (0.00s)\\n\"}", "TestValidateDatabase/invalid-spanner", "github.com/gravitational/teleport/lib/services::TestParseShortcut/windows_servicee", "github.com/gravitational/teleport/lib/utils::TestSet/contains/populated_set_incluudes_element", "TestRol", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_OTP/decode", "TestHandlerAuthenticate/without_cooki", "TestIntegrationCheckAndSetDefaults/azure", "TestPluginOpsgenieValidati", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/spec_wiith_just_the_remote_host", "TestEmitEditorC", "github.com/gravitational/teleport/api/types::TestResourceMethods/GetOrigin", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_nomatch_unset}", "TestIteration/multiple_elements", "github.com/gravitational/teleport/lib/events/athena::Test_getMessageSentTimestampp/valid_value_sentTimestamp", "TestAuthPreferenceV2_CheckA", "TestResource153ToLegacy (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/failedd_->_processing", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/cloud/azure::TestUserAssignedIdentitiesClieent/not_found", "TestDistrolessTeleportImageR", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration/sf=on", "Test_isInclusionAllowe", "github.com/gravitational/teleport/lib/services::TestValidateRole/wildcard_not_alllowed_in_database_roles", "github.com/gravitational/teleport/api/types::TestValidateDatabaseName/valid_long__name_and_uppercase_chars", "TestParseTeleportRoles/invalidrole (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/unknowwn_->_successful", "TestServiceAccess/RollbackAutoUpdateAgentGroup/disallowed_admin_st", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//1_y", "TestEvents/db.session.mysql.refresh_EventFie", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/failedd_->_failed", "TestExhaustiveNonEmptyStruc", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_minimal_configuration/sf=optional", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/nil_expiry", "TestResumption/tunnel/expecting_S", "TestGetDatabaseRoleMatchers/AutoCreat", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_match_unset}", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity.deletee_OneOf", "TestAWSMatcherCheckAndSetDefa", "TestPluginOktaValida", "TestDatabaseServerSorter/by_name_asc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#45", "TestAppServerSorter/by_name_desc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestMarshallCreateHostUserModeJSON", "github.com/gravitational/teleport/lib/cloud/azure::Test_AKSClient_ClusterCredentiials/azure_AD_accounts_no_claims", "TestGCPMatcherCheckAndSetDefaults (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/saml.created_EventFieldss", "TestIsEICE/regular_node_not_eice (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheConfigurationEndpoint", "github.com/gravitational/teleport/lib/auth/join/oracle::TestFetchOraclePrincipalCClaims/ok", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/correect_format", "github.com/gravitational/teleport/lib/cloud/azure::TestUserAssignedIdentitiesClieent/success", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/aascending_order/prefix_range_fetch", "TestLegacyToResource153/unwrap (0.00s)\\n\"}", "TestAWSMatcherChec", "TestProtoStreamer/5MB_similar_to_S3_mi", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/configured_externnal_ID_but_not_assume_role_is_ok", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//12m", "github.com/gravitational/teleport/api/types::TestDatabaseServerSorter/by_type_dessc", "github.com/gravitational/teleport/lib/events::TestEvents/sigstore_policy.update_EEventFields", "TestOIDCGetRedirectURL/eu.proxy.example.c", "TestLegacySecondFactorFromSecondFacto", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_ClusterDetails/details_retrieved_successfully", "TestOneOffScript/", "TestGroupByTargetHealth (0.00s)\\n\"}", "TestRoleV6_KubernetesResourc", "github.com/gravitational/teleport/api/types::TestMatchSearch/match_with_nil_searcch_values", "TestUnmarshallCreateHostUserModeYAML (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestMFADevice_Unmarshal", "TestIsSSHCert/ssh-rsa-cert-v01@openssh.com", "TestListVirtualMachines/existing_resour", "github.com/gravitational/teleport/api/types::TestAWSIsEmpty", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/ennroll_mode_not_set_but_integration_is_set,_defaults_to_eice_enroll_mode", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfigReqDefaults/missing_account_id_is_ok", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/kubernetes/IterateUnifiedResources/descending", "github.com/gravitational/teleport/api/types::TestDatabaseServerSorter", "TestValidateSigstorePolicy/publi", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/invallid_credential_type_(oauth2)", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_resourcce_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestGetAdminUser/gets_admin_from_labels (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_with_laabel_expression", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/custom_URI_withhout_region_is_an_error", "TestWatchKindContains/yes:_only_subset_", "github.com/gravitational/teleport/lib/events/athena::Test_getMessageSentTimestampp/missing_attribute", "TestTrimToMaxSize/db.session.cassandra.batch (0", "TestIDTokenValidator_Validate/empty_s", "github.com/gravitational/teleport/lib/utils/interval::TestPendingTicks", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_add_onnly_query", "github.com/gravitational/teleport/api/types::TestPluginEntraIDValidation", "TestIsOpenSSHNodeSubKind", "TestIntegration", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/NotRequired/verbs=[read_list]", "TestExpiryConsistency/nil_expiry/GetExpi", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/LOCAL_commmand", "TestParserForIdentifierSubcondition/", "TestResourceIDs/resource_name", "github.com/gravitational/teleport/api/types::TestFriendlyName", "github.com/gravitational/teleport/lib/services::TestGetRequestableRoles/resource__in_another_cluster", "TestParseTeleportRoles/Admin,invalidrole (0.00s)\\n\"}", "TestIDTokenValidator_Validate/invalid_issuer (0.00", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#8", "github.com/gravitational/teleport/api/types::TestIntegrationCheckAndSetDefaults/aazure-oidc:_error_when_no_client_id_is_provided", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/invaliid_entity_descriptor_with_valid_entity_ID", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_add_muulti_path", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/uri_does_not_contain_secret_name", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_in_cluster_defaults", "github.com/gravitational/teleport/lib/devicetrust/challenge::TestSignAndVerify/ECCDSAP256", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/valid__entity_descriptor", "github.com/gravitational/teleport/lib/tbot/config::TestSSHHostOutput_CheckAndSetDDefaults", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_wiith_missing_namespace", "TestDynamoDBConfig/acc", "github.com/gravitational/teleport/api/types::TestIsOpenSSHNodeSubKind/regular_nodde", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#7", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/disambiguate_by_porrt", "TestAuthPreferenceV", "TestServerSorter/by_addr_asc (0.00s)\\n\"}", "TestKubeMatcherCheckAndSetDefaults/valid (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/failedd_->_pending", "github.com/gravitational/teleport/lib/cloud/azure::Test_AKSClient_ClusterCredentiials", "TestOktaAssignments_SetStatus/pending_-", "TestOktaAssignments_SetStatus/pending_-\\", "TestLookupSecret/secret_annotations_don't_allow_inclusion (0.00s)\\n\"", "TestStringOrMap/marshal/singl", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/secret_annotations_don't_allow_inclusion", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/no_teeam", "TestNewAutoUpdateVersion/invalid_spec (0.00s", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_instanceid", "TestIsOpenSSHNodeSubKind/regular_node (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual", "TestRoleV6_KubernetesResourcesCheckAndSetDe", "TestKubeMatcherCheckAndSetDefaults/invalid_ty", "TestOktAssignmentIsEqual/one_is_nil (0.00s)\\n\"}", "TestMFADevice_CheckAndSetDefaults (0.00s)\\n\"}", "TestReconciler/custom_comparison_function (0.00s", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES/JSON", "Test_isInclusionAllowed/Not_matching_inclusion_annotation (0.00s)\\n\"", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/missinng_attribute_value", "TestInstanceFilter/match-new (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#22", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SetUserSSyncSource", "TestAWSMatcherCheckAndSet", "github.com/gravitational/teleport/api/types::TestResourceIDs/multiple_ids/ResourcceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/AWS_URI_for_wroong_service", "TestOpenSearchConfig/no_err", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/cleanup_timme_is_different", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/listt_namespace_with_resource_giving_read_access_to_namespace", "TestTunnelStrategyMarshalling (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRepport/empty_name", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_withoutt_group", "TestMatchSearch/no_match_for_partial_custom", "github.com/gravitational/teleport/api/types::TestGetMCPServerTransportType/unknowwn", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialCluster/invalid_cluster_name", "TestLegacyToResource153 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProxyListenerModeUnmarshalYAML/mmultiplex", "TestDescendingSegments/dangling_separator_mu", "TestProvisionTokenV2_CheckAndSetDefaults/empty", "TestResourceIDs/certificate_signing_request_resource_name", "TestExpiryConsistency/nil_expiry/wrapper_.", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce/invalid_kinds_not_supported_for_v4", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/invalid__service_account_email:_gserviceaccount.com_domain", "TestCassandraAWSEndpoint/aws_cassand", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/invaliid_attribute_mapping_name_format", "TestGetAdminUser/no_admin (0.00s)\\n\"}", "TestValidateDatabase/invalid-schem", "github.com/gravitational/teleport/api/types::TestResourceIDs/bad_cluster_name/RessourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestMatchSearch/no_match", "TestIntegratio", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SyncEnabbledGetters/on_access_list_sync_enabled_with_bidirectional_sync_disabled", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/alll_unhealthy", "github.com/gravitational/teleport/lib/utils/interval::TestMultiIntervalReset", "TestResourceMethods/GetExpiry (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_U2F/sf=webauthn", "TestMatchSearch/match_with_nil_search_values (0.", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/multiplee_entities_with_multiple_entries", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_with_cclusterId,_publicAddr,_arn_and_path", "TestServiceAccess/CreateData", "TestDatabaseSpanner/invalid_missing_instance_", "TestParseDestination/ipv6_remote", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_with_grroup", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout/invalid_target_version", "TestHandler_getToken/non-timeout_error (0.00s)\\n", "github.com/gravitational/teleport/api/types::TestIntegrationJSONMarshalCycle", "github.com/gravitational/teleport/api/types::TestRole_AllowRequestKubernetesResouurce", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-mssql--azure-ad", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/supporrted_unspecified_preset_value", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::Test_isInclusionAllowed/Single-item_matching_annotation", "TestRes", "TestOktAssignmentIsEqual/targets_different_id (", "TestValidateSPIFFEFederation/fail_-_null (0.00s)\\", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty/ssuggested_reviewers", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/correct_search_kkeyword_should_match_the_system_role", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_with_missing_namespace/ResourceIDsFromString", "TestMFADevice_Unmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/http_llaunch_url", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-mssqql-without-ad", "TestPluginEmailSettings/(smtp)_change_", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/ignore_pointer_field", "github.com/gravitational/teleport/api/client::TestALPNDialer_getTLSConfig/cas_upddated", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/no_laabels_for_credentials", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType", "github.com/gravitational/teleport/lib/services::TestParserForIdentifierSubconditiion/or-condition,_mixed_with_and_without_identifier_(true)", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/empty_equaals", "TestInstanceFilter/match-old (0.00s)\\n\"}", "TestProvisionTokenV2_GetSafeName/to", "TestServiceAccess/CreateAutoUpdateVersion/allowed_admin_s", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/publicc_key_is_not_a_public_key", "TestDatabaseSelfHosted (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/join/oracle::TestFetchOraclePrincipalCClaims/block_redirect", "TestOktaAssignments_SetStatus/unknown_-\\", "github.com/gravitational/teleport/api/types::TestParseWeekdays/Wildcard", "TestKeyCompare/less (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/github_valid", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation/no_crredentials_inner", "TestAccessRequestConditionsIsEmpty/claims_", "TestResourceMethods/GetRevision (0.00s)\\n\"}", "TestRole_AllowRequestKubernetesResour", "TestParseTeleportRoles/wi", "TestTargetHealthStatusesAggregate/all_unhealt", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/missing_URI_and_mmissing_region_is_an_error", "TestValidateSPIFFEFederation/success_-_ht", "github.com/gravitational/teleport/api/types::TestKubeMatcherCheckAndSetDefaults/ddefault_values", "TestResourceIDs/clus", "TestEvents/session.recording.access_OneOf (0.00s)\\", "TestSAMLForceAuthn_Encoding/FORCE_AU", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Granted_multiple_roles,_including_editor", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/iam_method_with_aws_regions", "github.com/gravitational/teleport/api/client::TestALPNConnUpgradeDialer/connectioon_upgrade_API_not_found", "TestEvents/integration.create_EventFields (0.00s)\\", "TestFetchOraclePrincipalClaims/http_erro", "github.com/gravitational/teleport/api/types::TestRoleV6_CheckAndSetDefaults", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_Bytes/without_TLLV", "github.com/gravitational/teleport/lib/auth/userloginstate/userloginstatev1::TestDDeleteUserLoginState", "github.com/gravitational/teleport/api/types::TestMFADevice_CheckAndSetDefaults/NOOK_Webauthn_missing_public_key", "Test_AKSClient_ClusterCredentials/a", "TestPluginEntraIDValidation/valid (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestKubeMatcherCheckAndSetDefaults/iinvalid_type", "TestAtomicWriteShim/Items/pagination (0.01s)\\n\"", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/github_ghes_invalid", "github.com/gravitational/teleport/api/types::TestIntegrationCheckAndSetDefaults/ggithub:_error_when_invalid_org_is_provided", "TestSet/contains/populated_set_includes_eleme", "github.com/gravitational/teleport/api/types::TestLegacyToResource153/marshal", "TestPluginMattermostValidation/no_la", "TestUnifiedNameCompare/sort_by_different_kind (", "github.com/gravitational/teleport/api/types::TestResourcesWithLabels_ToMap/simplee_list", "github.com/gravitational/teleport/api/identityfile::TestIsSSHCert/ssh-ed25519-cerrt-v01@openssh.com", "github.com/gravitational/teleport/api/types::TestWatchKindContains/no:_subset_is__missing_name_when_superset_has_one", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegion/valid_abbbreviated_region", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/ook", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_U", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/inclusive_glob_rejjected", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[update]", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ddescending_order/fetch_next_two_items", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSHEC2InstanceConnectEndpoint_node_with_aws_cloud_metadata_but_missing_accountid", "TestDatabaseAzureEndpoints/inv", "github.com/gravitational/teleport/api/types::TestMFADevice_CheckAndSetDefaults/NOOK_Webauthn_device_malformed", "TestNetIQPluginSettings/missing_OauthIssuer (0.00", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress/prefers_last", "TestSecondFactorsFromLegacySecondFactor/otp (0.00", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/GCP_Woorkforce_user_provided_relay_state", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES/JSON/Unmarshal", "TestDatabaseServerSorter/by_type_desc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_in_cluster_with_slash/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_in_cluster_with_slash/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_WEBAUTHN", "TestMetadataIsEqual/expires_is_different (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenSource_GetIDToken/value__missing", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_GetSafeName/tokken_join_method_(short)", "TestValidateSPIFFEFederation/fail_-_bad_url (0", "TestEvents/db.session.mysql.refresh_OneOf (0.00s)\\", "github.com/gravitational/teleport/lib/auth/join/oracle::TestFetchOraclePrincipalCClaims", "TestMetadataIsEqual/labels_is_different (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual", "github.com/gravitational/teleport/lib/auth/join/oracle::TestFetchOraclePrincipalCClaims/http_error", "TestRole_GetKubeResources/v7_with_error (0.00s)\\n\"}", "TestOktAssignmentIsEqual/finalized_is_differe", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/account_and_regioon_and_empty_URI_is_correct", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v8_pods_wiithout_group", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/group_with_no_week_days", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-clickhhouse-uri-native-protocol", "github.com/gravitational/teleport/api/types::TestMatchSearch/match_with_mix_of_siingle_vals_and_phrases", "TestDeployDa", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/succcess_-_https_web", "TestMakeAppRedirectURL/OK_-_with_", "github.com/gravitational/teleport/api/types::TestLockTargetEquals", "github.com/gravitational/teleport/api/types::TestRoleV6_KubernetesResourcesCheckAAndSetDefaults/valid_empty_v8", "TestProxyListenerModeUnmarshalYAML/multiplex (0.", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/dial_by_ip_and_portt", "github.com/gravitational/teleport/api/types::TestPluginOpsgenieValidation/no_setttings", "TestSafeEnvAdd/skip_dangerous_with_whi", "TestProvisionTokenV2_GetSafeName/t", "TestGCPMatcherCheckAndSetDefa", "TestNewAutoUpdateAgentReport/no_timestam", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#11", "github.com/gravitational/teleport/api/types::TestRoleV6_KubernetesResourcesCheckAAndSetDefaults/invalid_v7_api_group_set", "github.com/gravitational/teleport/api/types::TestPluginOpsgenieValidation/static__credentials_labels_not_defined", "TestAzureMatcherCheckAndSetDefaults/invalid_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_unset_nomatch_nomatch}", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//1_month", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#14", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/No_previous_roles,_editor_role_granted", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_missing_audience", "TestGetSortByFromString/#00 (0.00s)\\n\"}", "TestEvents/db.session.mysql.process_kil", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/group_with_negative_wait_days", "TestProvisionTokenV2_CheckAndSetDefaults/s", "github.com/gravitational/teleport/api/types::TestAWSIsEmpty/false", "TestIDTokenSource_GetIDToken/value_missing (0.00s", "TestConnNetTest/NotFirstConnSync/Present", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SetUserSSyncSource/edge_cases", "github.com/gravitational/teleport/api/types::TestProxyListenerModeMarshalYAML/mulltiplex_mode", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/resource_heeader_is_different", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/expires_m2_nil", "TestIteration/multiple_el", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/aascending_order/pagination", "TestNewSAMLIdPServiceProvider", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CaseInsensitiveeRoles", "TestMakeAppRedirectURL/OK_-_add_multi_path (0.00", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_resourcce_name_in_cluster_with_slash", "TestRoleParse/validation_error,_missing_", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfigReqDefaults", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/inventory_synnc_partial_>_sync_full", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/struct_with_empty_map_value", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus", "TestProvis", "github.com/gravitational/teleport/api/types::TestWeekdayParser", "TestRole_AllowRequestKubernetesR", "TestDescendingSegments/dangling_separator_s", "github.com/gravitational/teleport/api/types::Test_PluginOktaSyncSettings_SyncEnabbledGetters", "TestGCPMatcherCheckAndSetDefaults/valid (0.00s)\\n\"}", "TestAuthPref", "github.com/gravitational/teleport/lib/events/athena::TestRunWithMinInterval/conteext_is_canceled,_make_sure_that_stop_is_returned.", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/no_settingss", "TestOktAssignmentIsEqual/status_is_different (0.", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn/force_authn_unspeecified", "TestParseTeleportRoles/nOdE,prOXY (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES/YAML", "github.com/gravitational/teleport/api/types::TestKubeClustersSorter", "TestMatchResourceByHealthStatus/db_combo (0.00s)\\", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/unnhealthy_and_unknown", "TestAppServerSorter/by_description_asc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateSessionRecordingConfig/authorized_built_in_auth", "TestTargetHealthStatusesAggregate/all_empty (0.00", "github.com/gravitational/teleport/lib/utils/teleportassets::TestDistrolessTeleporrtImageRepo/oss_pre-release", "github.com/gravitational/teleport/api/types::TestPluginJamfValidation/no_credentiials_inner", "TestServiceAccess/UpsertDataba", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/timmeout_greater_than_default_interval_is_invalid", "github.com/gravitational/teleport/api/client::TestALPNConnUpgradeDialer/connectioon_upgrade_with_ping", "TestProvisio", "github.com/gravitational/teleport/lib/services::TestParserForIdentifierSubconditiion/or-condition,_mixed_with_and_without_identifier_(false)", "github.com/gravitational/teleport/lib/resumption::TestResumption/tunnel/expectingg_SSH_version_identifier", "Test_cdnBaseURLForVersion/bot", "TestPluginJiraValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestParseWeekdays/Duplicated_day", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn/force_authn_yes", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/valid_time-based_rollout_with_groups", "TestAWSMatcherCheckAndSetDefaults/enroll_mode_and_integration_are_n", "github.com/gravitational/teleport/lib/services::TestParserForIdentifierSubconditiion/and-condition,_mixed_with_and_without_identifier_(negated_false)", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestErroorCounter/download_errors_alert", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ddescending_order/prefix_range_fetch", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/secret_has_no_annotation", "github.com/gravitational/teleport/api/types::TestWatchKindContains/no:_subset_hass_no_filter", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/processsing_->_failed", "TestResourceHeaderIsEqual/populated_equals (0.00s)", "github.com/gravitational/teleport/api/types::TestWatchKindContains/yes:_superset__and_subset_have_no_CA_filter", "github.com/gravitational/teleport/api/types::TestAzureMatcherCheckAndSetDefaults//invalid_join_method", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_in_cluster_with_slash/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_API", "TestEvents/static_host_user.delete_OneOf (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestRoleSetLockingMode/empty_RoleeSet_gives_default_LockingMode", "TestParseWeekdays/Duplicated_day (0.00s)\\n\"}", "TestNewSAMLIdPServiceProvider/missing_at", "TestAzureMatcherCheckAndSetDefaults/valid (0.00s)\\n", "TestJoinServiceGRPCServer_RegisterUsingAzureMethod/challenge_r", "TestCheckSAMLIDPCA/don't_validate_n", "TestOktAssignmentIsEqual/targets_o2_is_nil (0.00s)", "TestUserAssignedIdentitiesClient/success (0.00", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.search_EvventFields", "TestPluginJiraValidation/Missing_Settings (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_unset_nomatch}", "TestValidateCrownJewel/MissingMetadata (0.00", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/account_and_AWS_ddax_URI_and_empty_region_is_correct", "TestGuessesIPAddress/falls_back_to_ipv4_loop", "TestGetDatabaseRo", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/secret_is_missing_the_key", "TestSessionTrackerV1_UpdatePresence (0.00s)\\n\"}", "TestValidate_WithAllowRequestKubernetesResources/wildcard_r", "github.com/gravitational/teleport/lib/utils/teleportassets::TestDistrolessTeleporrtImageRepo/oss_release", "TestNewAutoUpdateAgentRollout (0.00s)\\n\"}", "TestIDTokenSource_GetIDToken/value_present (0.00s", "github.com/gravitational/teleport/api/types::TestInstanceFilter/match-new", "github.com/gravitational/teleport/api/types::TestRolesEqual", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthenticated/unsi", "TestAWSAppAccessConfigOutput (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/JSON", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/YAML/Marshal", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/group_with_non_zero_wait_days_on_a_time-based_rollout", "TestDatabaseFromElastiCacheCo", "github.com/gravitational/teleport/api/types::TestPluginAWSICSettings/(legacy)_misssing_oidc_integration_is_allowed_with_ambient_creds", "TestValidateAutoUpdateConfig/gr", "github.com/gravitational/teleport/lib/utils/typical::TestUnknownIdentifier/incorrrect_type_from_dynamic_variable_passed_to_function", "github.com/gravitational/teleport/api/types::TestApplicationGetAWSRolesAnywherePrrofile/app_aws_not_configured", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/iinvalid_tools_mode", "TestParseWeekdays/Nil_slice (0.00s)\\n\"}", "TestAppServerSorter/by_publicAddr_asc (0.00s)\\n\"}", "TestMFADevice_CheckAndSetDefaults/OK_Web", "TestListDatabasesIAMConfi", "TestEvents/workload_identity.delete_OneOf (0.00s)\\", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_U2F_aliased_to_Webauthn/sf=u2f", "github.com/gravitational/teleport/api/types::TestAppServerSorter/by_name_desc", "TestClient_DialCluster/", "github.com/gravitational/teleport/api/types::TestGitServerOrgDomain", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettClusterNetworkingConfig/authorized", "TestOktaAssignments_SetStatus/process", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/us.proxy.eexample.com", "github.com/gravitational/teleport/api/types::TestPluginJiraValidation", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/empty_filter_shoould_match_everything", "TestNewSAMLIdPServiceProvider/valid_ent", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#17", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_add_quuery_with_same_keys_used_to_store_the_original_path_and_query", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/nil_inpuut", "TestGetDatabaseRoleMatche", "TestServiceAccess/UpsertDatabaseObjectImportRule/allowed_admin_s", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH/decode", "TestValidateDatab", "TestClient_Clust", "TestPluginDiscordValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestPluginEntraIDValidation/valid", "TestPluginOpsgenieValidat", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/invalid__service_account_email:_gserviceaccount.coma_domain", "github.com/gravitational/teleport/lib/events::TestEvents/join_token.create_EventFFields", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty/tthresholds", "github.com/gravitational/teleport/api/types::TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace_and_pod_name", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#3", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_match_nomatch}", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/noo_type", "TestMatchSearch/match_with_mix_of_s", "github.com/gravitational/teleport/api/types::TestPluginDiscordValidation/Valid", "github.com/gravitational/teleport/lib/events/athena::TestRunWithMinInterval/reachhed_maxBatchSize,_wait_should_not_happen", "TestParseRegionFromOCID/ok_with_future_", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/invalid__audience", "TestGetSessionRecordi", "github.com/gravitational/teleport/api/client/proxy::TestNewClient/does_not_implemment_transport", "github.com/gravitational/teleport/api/types::TestFriendlyName/friendly_role_name__(uses_label)", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_secondFactor/OK_Webauthn_derived_from_U2F/sf=on", "TestSSHHostOutput_CheckAndSetD", "TestResourceIDs/service_account_resource_name_with_missing_namespace_", "TestNewAutoUpdateAgentReport (0.00s)\\n\"}", "TestProvisionTokenV", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_in_cluster_with_slash/ResourceIDsFromString", "TestAWSMatcherCheckAndSetDefaults/invalid_type", "TestAWSMatcherCheckAndSetDefaults/i", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/zero_expiry/GeetExpiry()_resource", "TestBootstrapInfra/invalid_input_audit_events_and_sessio", "github.com/gravitational/teleport/api/types::TestServerSorter/by_name_desc", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/root_glob_without__leading_slash", "TestSSHHostOutput_CheckAndSetDefaults/valid", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_unset_unset}", "github.com/gravitational/teleport/lib/events::TestEvents/github.deleted_EventFiellds", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceOrigiin/DEVICE_ORIGIN_INTUNE", "TestIntegrationJSONMarshalCycle (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1/api_endpoint__invalid", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_missing_static_jwks", "TestProvisionTokenV2_CheckA", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/innvalid_type", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/deefault_values", "TestGetResourcesWithFilters/ApplicationServer", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/lib/services::TestCheckOIDCIdP/no_active_keys", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/NotRequired", "TestValidateTokenWithJWKS/not_yet_valid (0.00s)\\", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceOrigiin", "TestResourceIDs/secr", "TestRoleParse/validation_error,_missing_verb", "TestGetKubeClientGetter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##13", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CaseInsensitiveeRoles/via_struct", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_match_match_nomatch}", "github.com/gravitational/teleport/api/identityfile::TestIdentityFileBasics", "TestEvents/auto_update_config.delete_OneOf (0.00s", "TestOpenFileLinks/unsafe-symlinkRe", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/expires_both_nill", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_NO/JSON/Marshal", "github.com/gravitational/teleport/api/types::TestMySQLVersionValidation", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name_inn_cluster_with_slash#01", "TestOktaAssignments_SetStatus/proces", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_with_missing_namespace", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/GCP_Woorkforce_default_relay_state", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra/eu-central-1", "TestGithubAuthRequestCheck/sso-test (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_unset_unset_unset}", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_deny", "github.com/gravitational/teleport/api/types::TestResource153ToLegacy", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/skip_system_rolees_filter_should_match_the_regular_role", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/skip_system_rolees_filter_shouldn't_match_the_system_role", "github.com/gravitational/teleport/api/types::TestDurationUnmarshal/combined_largee", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnsureUpgraderEnvvironmentVariables/Teleport_upgrader_env_variables_are_updated", "TestOktAssignmentIsEqual/user_is_different (0.00s)", "TestResource", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#46", "github.com/gravitational/teleport/api/types::TestResourceIDs/kube_node_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "TestWatchKindContains/", "Test_querier_fetchResults", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_SSO", "github.com/gravitational/teleport/lib/services::TestMatchResourceByHealthStatus/ddb_health_status_is_empty", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/eu.proxy.eexample.com:3080", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/iinvalid_agents_nil_maintenance_window_with_time-based_strategy", "TestOktaAssignments_SetStatus (0.00s)\\n\"}", "TestValidateDatabase/valid-mssql-azure-ad (0.00s", "TestAllDeviceEnumsMapped/DeviceOrigi", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/secret_does_not_exist", "TestDynamoDBConf", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_resource_namme_with_missing_namespace_and_pod_name", "github.com/gravitational/teleport/api/types::TestIsOpenSSHNodeSubKind", "github.com/gravitational/teleport/api/types::TestLicenseSettersAndGetters/Set_Feaature_Hiding_Support", "TestExpiryConsistency/set_expiry/GetExp", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_missing_identity_provider", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_with_cclusterId_and_publicAddr", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/node_wwith_invalid_subkind", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/bitbucket_missing_workspace_or_repository", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/ambiguous_hostname__dial", "github.com/gravitational/teleport/api/types::TestPluginJiraValidation/Missing_Isssue_Type", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/terraform_missing_specific_resource", "TestAzureMatcherCheckAndSetDefaults (0.00s)\\n\"}", "TestFriendlyName/friendly_role_name_(uses_la", "TestRoleParse/validation_er", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/first_group_with_non_zero_wait_days", "TestRequireResidentKey/ResidentKe", "TestProxyListenerModeUnmarshalYAML/default_v", "github.com/gravitational/teleport/api/types::TestServerCheckAndSetDefaults/OpenSSSH_node_with_public_addr", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/sftp_summary", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/successful_lookup", "github.com/gravitational/teleport/lib/proxy::TestCheckedPrefixWriter/missing_preffix/single_write", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceIAMCConfig/integration_role_does_not_exist", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_unset_match_unset}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromAzureeRedis", "TestIsOpenSSHNodeSubKind/another_value (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestSecondFactorsFromLegacySecondFacctor/otp", "TestEncodeDecodeSecondFac", "github.com/gravitational/teleport/api/types::TestResourceAttestationType_toAndFroom/unspecified", "github.com/gravitational/teleport/lib/events/athena::Test_getMessageSentTimestampp/empty_map", "TestResourceHeaderIsEqual/version_is_different", "TestValidateGitHubOrganizationNam", "TestResourceHeaderIsEqual/kind_is_different (0.00", "github.com/gravitational/teleport/api/types::TestDatabaseGCPCloudSQL/gcp-valid-coonfiguration", "TestMatchValidAzureIdentity/cor", "github.com/gravitational/teleport/api/types::TestNetIQPluginSettings/missing_ApiEEndpoint", "TestDynamoDBConfig/account_and", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/group_with_empty_name", "TestOIDCGetRedirectURL/other.example.com (0.00s)\\", "github.com/gravitational/teleport/api/client::TestALPNDialer_getTLSConfig/no_updaate_when_upgrade_required", "TestCheckSAMLIDPCA (0.00s)\\n\"}", "TestProvisionTokenV2_CaseInsensitiveRoles (0.01s)\\n", "TestGetCloudMetadataAWS/no_cloud_metadata (0.00s)\\n", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/boolean_eexpressions", "TestOktaAssignments_SetStatus/failed_-\\u0", "TestTargetHealthStatusesAggregate/unh", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.cassandra.reggister_OneOf", "TestAWSMatch", "TestKubeResourceCouldMatchRules/list_namespace_with_resource_giv", "TestParseRegionFromOCID/invalid_region (0.0", "TestInstanceFilter/match-version-range (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/integration.create_EventtFields", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestErroorCounter", "github.com/gravitational/teleport/api/types::TestKubeMatcherCheckAndSetDefaults/wwildcard_is_invalid_for_types", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress/identifies_privvate_IP_by_netmask", "TestApplicati", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/targets_o1__is_nil", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_allow_rule_blank", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/kube_ccluster", "github.com/gravitational/teleport/api/types::TestResource153ToLegacy/marshal", "TestPluginOktaValidation/invalid_cr", "TestPluginJiraValidation/Missing_Credentials (0.", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/spacelift", "github.com/gravitational/teleport/lib/srv/db/common/role::TestGetDatabaseRoleMatcchers/AutoCreateUser", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/correct_search_kkeyword_should_match_the_regular_role", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/github_slug_and_ghes_set", "TestPluginEmailSettings/(smtp)_no_credentials (", "github.com/gravitational/teleport/api/types::TestDatabaseGCPCloudSQL", "TestNewAutoUpdateConfig/", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[deletee]", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/subkind_iss_different", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-mssql--azure-kerberos", "github.com/gravitational/teleport/lib/authz::TestContext_GetAccessState/device_auuthorization_disabled", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#44", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_valid_static_jwks", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##10", "github.com/gravitational/teleport/api/types::TestPluginJamfValidation/invalid_creedentials_(static_credentials)", "github.com/gravitational/teleport/api/types::TestPluginMattermostValidation", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamManyParts/Flaky=false,ForceFlush=true", "TestMySQLVersionValidation (0.00s)\\n\"}", "TestIntegrationJSONMarshalCycle/aws-ra (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/operator/controllers/resources/secretlookuup::TestLookupSecret/uri_does_not_contain_secret_key", "TestPluginOpenAIValidation/invali", "TestDistrolessTeleportImageRepo/os", "TestOktaAssignments_SetStatus/succes", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/listt_clusterrole_with_wildcard_deny_verb", "github.com/gravitational/teleport/api/types::TestDatabaseSelfHosted", "TestResourceIDs/secret_resource_n", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListVPCs/paginatiion", "github.com/gravitational/teleport/api/types::TestGetCloudMetadataAWS/cloud_metadaata_but_no_AWS_Information", "github.com/gravitational/teleport/lib/events::TestEvents/contact.delete_EventFiellds", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/onne_unhealthy", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##34", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityX509Servicce_CheckAndSetDefaults/too_many_selectors", "github.com/gravitational/teleport/lib/services::TestGetServiceFQDN/service1_fallbback_to_cluster.local", "TestTargetHealthStatusesAggregate/one_unknown (", "github.com/gravitational/teleport/api/types::TestRoleV6CheckAndSetDefaults_SAMLIddPOptions/samlidp:_idp_option_enabled_in_role_version_v7_and_below", "github.com/gravitational/teleport/api/types::TestPluginEmailSettings/(smtp)_validd_settings", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/strings.ssplit", "github.com/gravitational/teleport/api/types::TestDynamoDBConfig/account_and_AWS_UURI_and_empty_region_is_correct", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/description_is_ddifferent", "github.com/gravitational/teleport/api/types::TestDatabaseSpanner/invalid_missing__project_and_instance_id_for_spanner_endpoint", "github.com/gravitational/teleport/lib/multiplexer::TestPROXYEnabledListener_Acceppt", "TestEvents/db.session.mysq", "TestAccessRequestConditionsIsEmpty/thresholds (", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/terraform_only_ids", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/metadata_iis_different", "Test_PluginOktaSyncSettings_SetUser", "TestNewSAMLIdPServiceProvider/http_launch_url (", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateConfig/ssuccess_tools_autoupdate_disabled", "github.com/gravitational/teleport/api/types::TestLockTargetIsEmpty", "TestMatchSearch/match (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_match_nomatch_match}", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout/success_valid_rollout", "TestValidateJamfSpecV1/inventory_on_missi", "TestCheckedPrefixWriter/missing_prefix/si", "TestMatchSearch_ResourceSpecific/", "github.com/gravitational/teleport/api/types::TestDatabaseSpanner", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusesAggregate/onne_unknown", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Mode=off", "github.com/gravitational/teleport/api/types::TestValidateJamfSpecV1", "TestDatabaseFromAzureRedisEnterprise (0.0", "github.com/gravitational/teleport/lib/services::TestParserForIdentifierSubconditiion/complex_condition", "TestServerCheckAndSetDefaults/node_wi", "TestNewAutoUpdateAgentRollout", "github.com/gravitational/teleport/api/types::TestWatchKindContains/yes:_only_subsset_specifies_name", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_nomatch_nomatch}", "github.com/gravitational/teleport/api/types::TestResourceIDs/persistent_volume_cllaim_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestIntegrationCheckAndSetDefaults/aaws_ra:_valid", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/heaalthy_threshold_greater_than_maximum_is_invalid", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/iinvalid_version", "github.com/gravitational/teleport/api/types::TestDatabaseSpanner/valid_with_uri", "github.com/gravitational/teleport/api/types::TestWindowsDesktopsSorter/by_addr_deesc", "TestServiceAccess/ListDatabaseObjects/allowed_admin_states/NotReq", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/empty", "TestAllDeviceEnumsMapped/Devic", "TestIntegr", "github.com/gravitational/teleport/api/types::TestIsEICE", "TestParseTeleportRoles (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleSetLockingMode/RoleSet_wiith_a_set_LockingMode_gives_the_set_LockingMode", "TestDynamoDBConfig/invalid_AWS_account_", "TestMakeAppRedirectURL/OK_-", "github.com/gravitational/teleport/lib/multiplexer::TestMux/PostgresProxy/with_prooxy_line", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/skip_system_rolees_filter_and_correct_search_keywords_should_match_the_regular_role", "github.com/gravitational/teleport/lib/cloud/azure::TestServerConversion/mysql_unaavailable_and_unsupported", "github.com/gravitational/teleport/api/types::TestInstanceFilter", "TestDatabaseSelfHosted/ec2_hostname (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions/search(\\", "github.com/gravitational/teleport/api/client::TestALPNConnUpgradeDialer/connectioon_upgrade_with_ping/direct", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.postgrres.statements.execute", "github.com/gravitational/teleport/api/types::TestResourceIDs/pod_resource_name", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_mmissing_resources", "TestRoleFilterMatch/inc", "TestValidateAu", "TestResourceIDs/multiple_ids/ResourceIDsF", "TestRoleFilterMa", "TestEvents/user_login.invalid_access_list_On", "TestPluginOktaValidation/in", "TestResourceIDs/service_resource", "TestMatchSearch/no_match (0.00s)\\n\"}", "TestResourceIDs/cluster_role", "TestWindowsDesktopsSorter/by_name_asc (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/successsful_->_failed", "TestPluginEmailSettings/(smtp)_no_credent", "TestGetCloudMetadataAWS (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAuthPreferenceV2_CheckAndSetDefaaults_deviceTrust/Bad_EKCertAllowedCAs", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ppagination/descending", "TestMakeAppRedirectURL/OK_-_add_root_path (0.00s)", "TestMatchResourceByFilters/windows_desktop (0.0", "TestGetRequestableRoles/resource_in_an", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGetServicePortss/Two_supported_ports", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/ec2_method_empty_rule", "TestNetIQPluginSettings/missing_ApiEndpoint (0.00", "TestServiceAccess/UpsertData", "TestValidateSigstorePolicy/empty_requirement", "TestParseRegion/valid_abbreviated_region", "TestBootstrapInfra/us-east-1 (0.00s)", "TestLicenseSettersAndGetters/Set_Feat", "TestResourceID", "github.com/gravitational/teleport/api/types::TestWithinUpgradeWindow/not_within_uupgrade_window", "github.com/gravitational/teleport/api/client::TestALPNConnUpgradeDialer/connectioon_upgrade_with_ping/with_ProxyURL", "TestValidateDatabaseName (0.00s)\\n\"}", "TestPluginDatadogValidation (0.00s)\\n\"}", "TestValidateAutoUp", "TestResourceIDs/single_id/ResourceIDsFromStri", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettClusterNetworkingConfig", "github.com/gravitational/teleport/api/types::TestIAMPolicyStatusJSON", "TestRole_AllowReques", "github.com/gravitational/teleport/api/types::TestOktaAssignments_SetStatus/unknowwn_->_failed", "TestResourceIDs/persistent_volume_claim_resource_name_with_m", "TestNewAutoUpdateAgentRollout/", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#13", "github.com/gravitational/teleport/lib/web/scripts/oneoff::TestOneOffScript/invaliid_command_prefix_should_return_an_error", "TestOktAssignmentIsEqual/targets_both_nil (0.00s)\\n", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual", "TestResourcesWithLabels_ToMap/simple_list (0.00s)\\n", "TestSecondFactorsFromLegacySecondFactor/weba", "TestPROXYEnabledListener_Accept/", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/valid_halt-on-error_rollout_with_groups", "TestUnknownIdentifier", "TestProxyJumpParsing/\\\"alice@[::1]:7", "TestCassandraAWSEndpoint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/sortmap::TestWrites/basic_multi-operaation", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_OTP", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/group_with_impossible_start_hour", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout", "TestRoleFilterMatc", "TestValidateSPIFFEFederation/success_-_stati", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/expires_m1_nil", "github.com/gravitational/teleport/api/types::TestEncodeDecodeSecondFactorType/SECCOND_FACTOR_TYPE_SSO/decode", "TestResource153ToLegacy/unwrap (0.00s)\\n\"}", "TestValidateDatabase/invalid-database-proto", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_resourcce_name_in_cluster_with_slash/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/vaalid", "github.com/gravitational/teleport/api/types::TestPluginJamfValidation/no_settingss", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.search_OnneOf", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/targets_o2__is_nil", "TestSlogJSONHandlerReservedKeysOve", "TestResourceIDs/service_resource_", "TestRole_GetKubeResources/v7_with_group (0.00s)\\n\"}", "TestIntegrat", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/overridden_domain", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateAgentRolllout/invalid_autoupdate_mode", "TestMatchResourceByFilters/kube_cluster (0.00s)\\n\"", "TestGithubAuthRequestCheck (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/single_eentity_with_multiple_entries", "github.com/gravitational/teleport/api/types::TestRoleFilterMatch/skip_system_rolees_filter_and_correct_search_keywords_shouldn't_match_the_system_role", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/kubernetes:_wrong_service_account_name", "github.com/gravitational/teleport/lib/utils/teleportassets::TestDistrolessTeleporrtImageRepo/community_release", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_unset_unset_unset}", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/root_exclusive_chiild_glob", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v8_deploymments_without_group", "github.com/gravitational/teleport/api/types::TestPluginOktaValidation/invalid_creedentials_(static_credentials)", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/proxy.exammple.com", "github.com/gravitational/teleport/api/types/autoupdate::TestNewAutoUpdateVersion//invalid_spec", "TestValidateGitHubOrganizationN", "TestRequireResidentKey/required_an", "github.com/gravitational/teleport/lib/utils/log::TestSlogTextHandlerComponentPaddding", "github.com/gravitational/teleport/api/types::TestFriendlyName/friendly_group_namee_(uses_description)", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/QueryRaange", "github.com/gravitational/teleport/api/types::TestNewSAMLIdPServiceProvider/unsuppported_preset_value", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID/iinvalid_region_for_realm", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/contains__all", "github.com/gravitational/teleport/api/types::TestInstanceFilter/match-old", "TestRequireResidentKey/ResidentKey_r", "TestEncodeDecodeSecondFactorType/SECO", "TestAuthPreferenceValidate/stable_un", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/aascending_order/range_match", "github.com/gravitational/teleport/api/types::TestDatabaseAzureEndpoints/invalid_RRedis_(unknown_format)", "github.com/gravitational/teleport/api/types::TestGetCloudMetadataAWS/cloud_metadaata_with_aws_info", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra", "github.com/gravitational/teleport/api/types::TestIsEICE/agentless_openssh_node_iss_not_eice", "github.com/gravitational/teleport/api/types::TestAccessReviewConditionsIsEmpty", "github.com/gravitational/teleport/api/types::TestResourceIDs/service_account_resoource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestSAMLForceAuthn_Encoding/FORCE_AUT", "TestLicenseSettersAndGetters", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_YES/YAML/Marshal", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v6_withoutt_wildcard", "github.com/gravitational/teleport/api/types::TestMySQLVersionValidation/correct_cconfig", "github.com/gravitational/teleport/api/types::TestDatabaseSpanner/invalid_missing__instance_id", "github.com/gravitational/teleport/api/types::TestInstanceFilter/match-no-upgraderr", "TestFriendlyName/friendly_node_name (0.00s)\\n\"}", "TestResourcesWithLabels_ToMap/empty (0.00s)\\n\"}", "TestGetTunnelType/default (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/onnly_1_very_big_untrimmable_event", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_with_deeny_namespace", "TestPluginDatadogValidation/no_settings (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestResourceIDs/cluster_role_bindingg_resource_name_with_missing_namespace_and_pod_name/ResourceIDsFromString", "TestNewSAMLIdPServiceProvider/valid_launch_UR", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::TestNeewNopValidator", "github.com/gravitational/teleport/api/types::TestResourceIDs/secret_resource_namee_with_missing_namespace_and_pod_name/ResourceIDsFromStrings", "github.com/gravitational/teleport/api/types::TestGCPMatcherCheckAndSetDefaults/errror_if_both_labels_and_tags_are_set", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/ignore_top-level_field", "github.com/gravitational/teleport/api/types::TestTargetHealthStatusCanonical/randdom_string_becomes_unknown", "github.com/gravitational/teleport/api/types::TestOktAssignmentIsEqual/user_is_diffferent", "TestFriendlyName/no_friendly_name (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_unset_unset}", "github.com/gravitational/teleport/api/types::TestMatchSearch/match", "github.com/gravitational/teleport/api/types::TestOpenSearchConfig/URI-derived_reggion_must_match_explicit_region", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettSessionRecordingConfig/unauthorized", "TestSAMLForceAuthn/force_authn_yes (0.00s)\\n\"}", "TestGCPMatcherCheckAndSet", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_match_unset}", "TestProxyJumpPa", "github.com/gravitational/teleport/api/types::TestMetadataIsEqual/name_is_differennt", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/ec2_method_no_allow_rules", "github.com/gravitational/teleport/lib/services::TestResourceExpression_NameIdentiifier", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabase/developper_allowed_any_username/database_in_stage_database_except_one_database", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/multiple_elemeents_with_higher_start_key", "github.com/gravitational/teleport/api/types::TestResourceIDs/configmap_resource_nname_with_missing_namespace_and_pod_name/ResourceIDsFromString", "github.com/gravitational/teleport/api/types::TestExpiryConsistency/set_expiry/GettExpiry()_wrapper", "TestOktAssignmentIsEqual/nil_equals (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_match_unset}", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_with_cclusterId,_publicAddr,_and_arn", "github.com/gravitational/teleport/api/types::TestValidateGitHubOrganizationName", "TestMatchSearch/match_ignore_case (0.00s)\\n\"}", "TestNewAutoUpdateConfig/invalid_tools_m", "TestListVPCs/valid_for_listing_VPCs (0.00s", "github.com/gravitational/teleport/lib/utils/sortmap::TestWrites/repeated_fill_andd_empty", "github.com/gravitational/teleport/api/types::TestAzureMatcherCheckAndSetDefaults//default_values", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cluster_auth_prreference", "github.com/gravitational/teleport/lib/utils/sortmap::TestWrites/basic_sets_and_deelete", "TestNewSAMLIdPServiceProvide", "Test_cosignKeyValidator_ValidateAndResolveDigestAu", "github.com/gravitational/teleport/api/types::TestResourceHeaderIsEqual/version_iss_different", "TestTargetHealthStatusesAggregate/all_healthy (", "github.com/gravitational/teleport/api/types::TestAccessRequestConditionsIsEmpty/rroles", "TestGlobMatch/inline_root_glob_", "github.com/gravitational/teleport/api/types::TestSAMLForceAuthn_Encoding/FORCE_AUUTHN_UNSPECIFIED/JSON/Marshal", "TestExpiryConsistency (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-scheema-for-native-protocol", "github.com/gravitational/teleport/lib/events/athena::TestConsumerWriteToS3/Checkiing_2023-04-02_should_contain_1_events", "github.com/gravitational/teleport/api/types::TestResourceIDs/single_id/ResourceIDDsFromStrings", "TestKubeMatcherCheckAndSetDe", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_YES/", "TestResourceIDs/single_id (0.00s)\\n\"}", "TestProvisionTokenV2_Chec", "TestSAMLForceAuthn_Encoding/FORCE_AUTHN_YES (0.00", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/minimal_bound_keypair_with_pregenerated_key", "github.com/gravitational/teleport/api/types::TestRole_GetKubeResources/v7_with_deeny_wildcard_kind", "github.com/gravitational/teleport/integrations/access/common/auth::TestRotatedAcccessTokenProvider/Cancel", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateAgeentRollout/group_with_same_name", "github.com/gravitational/teleport/lib/auth/userloginstate/userloginstatev1::TestGGetUserLoginStates", "github.com/gravitational/teleport/api/types::TestSecondFactorsFromLegacySecondFacctor/webauthn", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/publicc_key_contains_more_than_one_key", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.init_dbb_OneOf", "github.com/gravitational/teleport/api/types::TestAccessReviewConditionsIsEmpty/emmpty", "TestValidateDatabaseName/invalid_trailing_hy", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/group_with_negative_wait_days", "TestWithinUpgradeWindow/not_within_upgrade_", "github.com/gravitational/teleport/lib/events::TestNewStreamErrors/CreateAuditStreeam/ReserveUploadPartError", "github.com/gravitational/teleport/api/types::TestProxyListenerModeMarshalYAML", "github.com/gravitational/teleport/api/types::TestKubeMatcherCheckAndSetDefaults/vvalid", "github.com/gravitational/teleport/api/types::TestAWSMatcherCheckAndSetDefaults/deefault_values_for_agentless_mode", "github.com/gravitational/teleport/lib/events::TestEvents/static_host_user.delete__OneOf", "TestMakeAppRedirectURL/OK_-_query", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/circleci_valid", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items/ddescending_order/pagination", "github.com/gravitational/teleport/api/types::TestProvisionTokenV2_CheckAndSetDefaaults/explicit_ec2_method", "TestDeployS", "TestGetAdminUser/gets_admin_from_spec (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/autoupdate::TestValidateAutoUpdateConnfig/valid_halt-on-error_config_with_groups", "TestEnsureUpgraderEnvironmentVariables", "TestPluginJiraValidation/Missing_Project_Key (0." ]
[ "github.com/gravitational/teleport/lib/player::TestAppliesTiming/half_speed", "TestNewAuthPreference_secondFactors (0.01s)\\n\"}", "TestDatabaseRedshiftEndpoint (0.00s)\\n\"}", "TestIDTokenValidator_Validate/invalid_issuer (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_match_unset}", "FuzzNewMatcher/seed#0 (0.00s)\\n\"}", "TestMalformedOpMsg/invalid_$db_value (", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_match_unset_nomatch}", "github.com/gravitational/teleport/lib/httplib::TestConvertResponse", "github.com/gravitational/teleport/lib/backend::TestKeyComponents", "github.com/gravitational/teleport/lib/services::TestCheckOIDCIdP/valid_key_pair", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestPollAWWSS3/poll_s3", "TestValidateRoleName (0.00s)\\n\"}", "TestContextLockTargets/Db (0.00s)\\n\"}", "TestDeployServiceRe", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_unset_nomatch}", "github.com/gravitational/teleport/lib/cloud/azure::TestSQLListWithinGroup/auth_errror", "github.com/gravitational/teleport/lib/utils::TestContainsExpansion/expansion_withh_brackets", "TestUnifiedResourceCacheIteration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestMySQLFlexClient", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/sftp", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_GetVersion", "TestOpCompressed/compressed_OP_DELETE", "TestCheckDataba", "TestCircuitBreaker_success/succe", "TestServer/v4_and_v6 (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##26", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[create]", "TestTrimToMaxSize/db.session.opensearch.requ", "github.com/gravitational/teleport/lib/config/openssh::TestWriteClusterSSHConfig/llegacy_OpenSSH", "TestDestinationDirectory_Lock (0.00s)\\n\"}", "TestParseMetadataClientError/error_mess", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/HARDWWARE_KEY_TOUCH", "TestApplyTraits/GitHub_permissions_in_all", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/no_exact_match", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/Unauthorized", "TestExtraFields/json/caller (0.00s)\\n\"}", "TestServiceAccess/DeleteDatabaseObjectImportRule/all", "TestGetDisconnectExpiredCertFromIdentity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[upddate]", "github.com/gravitational/teleport/lib/auth/webauthn::TestPasswordlessFlow_Finish__errors/NOK_unknown_user_handle", "TestNewResourceExpression/fail_to_parse (0.01s)\\n\"", "TestTrimToMaxSize/db.session.mysq", "TestDateExporterBasics (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_mmissing_podname_in_pod_names", "github.com/gravitational/teleport/api/client/webclient::TestSSHProxyHostPort", "TestEvents/desktop.recording_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestCloning/*types.UserV2", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_nomatch_match}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/invvalid_rds_type", "TestWithPingProtocols (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{nomatch_unset_unset_unset}", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_userVerificatiion/verification_preferred", "TestGetInstanceID (0.00s)\\n\"}", "TestKeychain (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/access_to_create_AccessMonitoringRules", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerWARN", "TestUpd", "TestSSHServerBasics (1.51s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources", "TestAWSSignerHandler/DynamoDB_access (0.01s)\\n\"}", "TestGCPServiceAccountMatcher_Mat", "FuzzParseDisplay/seed#11 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/ui::TestSortedLabels/Server_with_gcp_laabels_pushed_to_back", "TestEvents/spiffe.svid.issued_OneOf (0.00s)\\n\"}", "TestBackoff (0.00s)\\n\"}", "TestServiceAccess/CreateDatabaseObject/allowed_admin_states/NotRequ", "TestSSHPortForwarding/remote_deny (0.00s)\\n\"}", "TestAutoEnrollCeremony_Run (0.01s)\\n\"}", "TestRemoveFromSlice/remove_duplicate_elements (", "github.com/gravitational/teleport/lib/services::TestUnmarshalDevice", "TestParser", "TestWindowsDesktopGroups/allow_labels (0.00s)\\n\"}", "TestNewDatabaseFromAz", "TestMakeDatabaseSupportsInteractive/supported", "TestAutoUpdateVersionEvents (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/passwordless_explicit_user", "github.com/gravitational/teleport/lib/events::TestEvents/resize_OneOf", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthority/caa_found_without_secrets", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstMatchPattern/plain_text_match", "TestOpMsgSingleBody (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accessgraph::TestAuthorizedKey/missinng_HostID", "TestMigrate/destination_with_duplic", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/remain__in_standby_while_in_new_generation", "github.com/gravitational/teleport/lib/client/db/postgres/repl::FuzzCommands/seed##0", "TestKubeAppFetcher_Get (0.01s)\\n\"}", "TestCompare/empty_lhs_root_in_equivalence_cas", "TestForceGroupsDone (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/s3_accesss", "github.com/gravitational/teleport/lib/backend::TestCloneForce", "TestAuroraMySQLVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetKubeResources/labels_expreession_allow", "github.com/gravitational/teleport/api/types::TestNewAppV3/azure_app", "TestServiceAccess/UpdateDynamicWindowsDesktop,allowe", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/implicit_denyy_-_no_match", "TestLabelExpressions/boolean_logic (0.00s)\\n\"}", "TestConfig_SetFromURL/fips_mode_not_set (", "TestUploadCompleterAcquiresSemaphore (0.00s)\\n\"}", "TestVariableDurationScaling/in", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/get_nonexistent_resource", "TestRBAC/upsert_no_access (0.00s)\\n\"}", "TestRoleSetEnumerateDatabas", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetClusterURI//clusteers/cluster.sh/leaves/leaf.sh/dbs/postgres", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_isJSONCompact/compaact", "TestMigrate/real_world_2 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestGetResources/Node", "TestNewDatabaseObject/missing_name", "github.com/gravitational/teleport/lib/automaticupgrades/cache::TestTimedMemoize_GGet", "TestStatefulSetVersionUpdater_unbloc", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/addittional_leader", "github.com/gravitational/teleport/lib/backend::TestKeyPrependKey/empty_prepend_iss_noop", "TestParsePacket/COM_INIT_DB (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenValidator_Validate/innvalid_audience", "TestValidateOrigin (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher/prod_custom", "github.com/gravitational/teleport/lib/cloud/aws::TestGetIdentity/user_identity", "TestGKEFetcher/filter_not_found (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestMux/TLSSSH", "github.com/gravitational/teleport/lib/utils::TestContainsExpansion/detect_simple__expansion", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/auth_error", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/trailing_emppty_segment", "TestCreateEC2ICERequest (0.00s)\\n\"}", "TestRouter_DialHost/failure_resolving_node (0.00s)", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.member.delette_OneOf", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[update]", "TestServiceAccess/CreateAutoUpdateAgentReport/allowed_ad", "TestPublisherConsumer/standard_event_via", "TestApplyTraits/all_values_are_ex", "TestEvents/bot.create_EventFields (0.00s)\\n\"}", "TestSafeEnvAddFull/double_equal_value (0.00s)\\", "TestEvents/plugin.delete_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestRegistrationFlow_Begin_wwebID/user_without_webID", "TestMakeAzureDatabaseLoginUserna", "TestEvents/db.session.elasticsearch.", "TestRBAC (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/GetAutoUpdateConfig", "TestCreateBucketConfiguration/special_region", "github.com/gravitational/teleport/lib/services::TestRoleSetEnumerateDatabaseUserssAndNames/deny_overrides_allow", "TestDatabaseFromRDSClusterNa", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestSAMMLIdPBuildScriptCheckAndSetDefaults/empty_pool_provider_name", "TestCursorPagination/empty_root (0.00s)\\n\"}", "TestGetInstanceInfo (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialCreationResponse_empty", "TestStripProtocolAndPort (0.00s)\\n\"}", "TestOktaImportRuleUnmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::TestMatchHealthy/WithUnhealthyOktaaApp", "Test_NewCosignSignleKeyValidat", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#25", "TestExhaustiveNonEmptyBasics/basic_nil (0.00", "github.com/gravitational/teleport/lib/circleci::TestValidateToken/expired", "TestBuildRoleARN/role_name_in", "TestAccessMonitoringRuleCRUD/no_access_to_read_AccessMonito", "TestNewKubeClusterFromGCPGKEWithoutL", "TestValidateGCPResourceNa", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureDBServeerFetchers/match_labels_with_all_subscriptions,_resource_groups,_and_regions", "TestReadJSON_ContentType/invalid_type (0.00s)\\n\"}", "TestEnrollEKSClusters/CreateAccessEntry_a", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject/multi_template_is_rejected", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/end_port_biggger_than_65535", "github.com/gravitational/teleport/lib/utils/parse::TestMatchers/not_matcher", "github.com/gravitational/teleport/lib/srv/discovery/common::TestGetLabelEngineVerrsion/azure-mysql-8.0.0", "github.com/gravitational/teleport/lib/multiplexer::TestProtocolString", "github.com/gravitational/teleport/lib/srv/db/redis/connection::FuzzParseRedisAddrress/seed#1", "TestMigrate/storage_config_with_absu", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_reconciler_computeeStatus/status_is_reset_if_start_version_changes", "TestManagedSQLListWithinGroup/servers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestDraftExternalAuditStorage/marrshal_and_unmarshal_back", "TestTunnelAddr/should_us", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetServerUUID/returnss_empty_string_when_given_leaf_cluster_non-server_resource_URI", "TestExtraFields/text/level (0.00s)\\n\"}", "TestPublisherConsumer (0.06s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/imds/oracle::TestIsAvailable/ok", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestNewCacheKey", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/check_faills", "TestParse", "github.com/gravitational/teleport/lib/devicetrust/assert::TestCeremony/ok_(TPM)", "github.com/gravitational/teleport/lib/events::TestJSON/rejected_port_forward", "github.com/gravitational/teleport/lib/services::TestAccessChecker_EnumerateMCPToools/no_tools_permission/no_tools_permission", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/boollean", "TestValidateRole (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/healthcheck::TestNewManager/missing_Componeent", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/service_role_arrn_is_missing_role_name", "github.com/gravitational/teleport/api/types/accesslist::TestAuditMarshaling", "github.com/gravitational/teleport/lib/linux::TestDMI", "TestReporterMachineW", "TestOktaAssignmentMarshal (0.00s)\\n\"}", "TestRDSFetchers/fetch_all_with", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_match_nomatch}", "TestJoinServiceGR", "TestTrimToMaxSize/user.login (0.00s)\\n\"}", "TestReadWriteStatus (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/unknown_type", "TestUnifiedResour", "TestExtractCredFromAuthHeader/invalid_format", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/nill_object_is_invalid", "TestOpQuery (0.00s)\\n\"}", "TestSPIFFEWorkloadAPIServ", "github.com/gravitational/teleport/lib/services::TestApplyTraits/missing_node_variiables_are_set_to_empty_during_substitution", "TestValidate_RequestedMaxDura", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch/match_db_name_and_schema", "FuzzMongoRead/seed#15 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestKubernetesOutput_CheckAndSSetDefaults/valid", "github.com/gravitational/teleport/lib/services::TestParseShortcut/kube_server", "TestExtraFields/text/component_timestamp (0.00s)", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/single-segment_iinvalid_chars", "TestMergeResources (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/utils/gcp::TestSortedGCPServiceAccounts/unssorted_accounts", "TestGetCertAuthority/ca_found_with", "FuzzParsePacket/seed#3 (0.00s)\\n\"}", "TestMemoryDBFetcher/fetch_all (0.00s)\\n\"}", "TestIsRoot/root_cluster_resource_URI (0.00s)\\", "TestDateExporterResume/randomFlake=false (0.", "Test_parseRedisURI/invalid_con", "TestEvents/session.connect_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenValidator_Validate", "github.com/gravitational/teleport/lib/devicetrust/config::TestGetEnforcementMode//OSS_default", "github.com/gravitational/teleport/lib/events::TestEvents/cluster_networking_confiig.update_OneOf", "TestSessionTTL/l", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service", "TestValidateData", "github.com/gravitational/teleport/lib/healthcheck::Test_newUnstartedWorker/invaliid_target", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/deev_cluster", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states", "TestIDTracker/request_tracked (0.00s)\\n\"}", "TestCalculateDatabaseNameFil", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject/invalid_object_is_rejected", "TestParseSignatureAlgorithmSuite/4 (0.00s)\\n\"}", "TestValidateSegment/empty_segment (0.00s)\\n\"}", "TestCheckUploadsSkipsUploadsInProgress (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/NotRequired/verbs=[update]", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken", "TestIngressReporter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/Unauthorized/verbs=[read]", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/double_signed_manifest", "TestHomeDirExpansion/absolute_path (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/x11-forward_OneOf", "TestParseShortcut/access_lists (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//unknown", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/missing_frrom", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/GetDynamicWindowsDesktop,allowed:NotRequired,verbs:[]", "TestOIDCGetRedirectURL (0.00s)\\n\"}", "TestConfigureIdPIAMWithPresetPolicy (0.01s", "Test_querier_fetchResults (0.48s)\\n\"}", "TestEC2SSMIAMConfig/valid (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/access_list_member_upate_event", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/auth_error/auth_error_proxy", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_unset_match}", "TestAccessChecker_EnumerateMCPTools (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_Endpoint//with_grpc_scheme", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_unset_nomatch}", "github.com/gravitational/teleport/lib/cloud/aws::TestEqualStatement/equal_statemeents", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestReadPreLoginn", "TestCheckAccessTo", "TestForwarder_getToken (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewAccessMonitoring", "TestRouteScoring/disambiguate_by_port (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/only_lower_case__works", "TestHandlerAuthenticate/session_expired (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestJoin/single_segment", "TestEvents/access_graph_settings.update_OneOf", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_states/MFAVe", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_nomatch_unset}", "github.com/gravitational/teleport/lib/secretsscanner/scanner::TestNewScanner/skipp_test_dir_keys", "TestDefaultConfigGroup (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/NotRequired", "TestBuildRoleARN/", "github.com/gravitational/teleport/lib/auth/join/boundkeypair::TestClientState", "TestServiceAccess/GetDatabaseObjectImportR", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker", "TestSanitize//Malformed_∩┐╜∩┐╜(∩┐╜_UTF9 (0.00s)\\n\"}", "TestServiceAccess/UpsertDatabaseObject/allowed_admin_states/", "github.com/gravitational/teleport/lib/utils/mcputils::TestJSONRPCRequest", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Failed", "TestCreateURI (0.00s)\\n\"}", "TestSecurityPatchAlts (0.00s)\\n\"}", "TestIDT", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/multi-role_rrequestor_approval_via_multi-threshold_match", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/list/deny_rbac", "TestNewResourceExpression/fail_to_evaluate (0.0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/successfullly_read_proxy_v2_line_with_TLV", "TestEvents/github.updated_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/disallowed_admin_states/Unauthorized", "TestConvertUsageEvent/when_discover_has_resources_count_and_its", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setGroupStates/lesss_groups", "github.com/gravitational/teleport/lib/services::TestParseShortcut/saml_sp", "FuzzFetchMySQLVersion/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_unset_unset}", "github.com/gravitational/teleport/lib/services::TestHostUsers_HostSudoers", "github.com/gravitational/teleport/lib/backend::TestKeyTrimPrefix/partial_trim", "TestEvents/device.authenticate.confirm_OneOf (0", "TestConvertAuditEvent/MCPSessionStart", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_match_unset}", "TestCheckAccessToGCP/no_access_role (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[updatee]", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/foobar:://", "TestComputeMinRolloutTime/two_groups_different_days,_hour_diff_=", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/prefers_newer_credential_(alpaca)", "TestLargeEventsParse (0.04s)\\n\"}", "TestExporterBasics (0.00s)\\n\"}", "TestThumbprint (0.00s)\\n\"}", "TestAuthorizeWithLocksForBuiltinRole/Okta (0.10s)\\n", "TestEvents/device.webtoken.create_OneOf (0.00s)\\n\"}", "TestParserHostCertContext (0.00s)\\n\"}", "TestGetSingleHeader/DuplicateCaseValue (0.00s)\\n\"}", "Test_VersionUp", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestDDockerAttestorConfig_CheckAndSetDefaults/missing_path", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/missing_domain_after_@", "TestAKSFetcher (0.00s)\\n\"}", "Test_setGroupState (0.00s)\\n\"}", "TestListEC2ICE/valid_for_listing_en", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstFilterRulesForDatabase/empty_rules", "TestAuthorizedKey/valid (0.00s)\\n\"}", "TestLoadIdentityFileFromString (0.01s)\\n\"}", "TestBackend_Exists/secret_exists (0.00s)\\n\"}", "TestUUIDHandling (0.00s)\\n\"}", "TestCheckAccessToAzureCloud/readonly_role (0.00s", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/GetDynamicWindowsDesktop,allowed:MFAVerified,verbs:[]", "TestResour", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#48", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[read]", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzReadAndRewriteXAuthPackett", "TestLoginFlow_Fini", "TestMigrate/backwards_compat_with_https://gote", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/fiips_mode_not_set", "github.com/gravitational/teleport/lib/utils/aws/iamutils::TestNewFromConfig", "TestIDTokenValidator_Validate (0.74s)\\n\"}", "github.com/gravitational/teleport/lib/utils/proxy::TestDialProxy/https", "TestOneFailingBackend (0.00s)\\n\"}", "TestCommands/q (0.00s)\\n\"}", "TestCircuitBreaker_Execute/no_errors", "TestServiceAccess/UpdateDynamicWindowsDesktop,allowed:NotRequired,v", "github.com/gravitational/teleport/lib/utils::TestParseHostPort", "github.com/gravitational/teleport/api/client::TestLoadTLS", "TestNewManager/missing_HealthCheckConfig", "TestForceGroupsDone/unsupported_strateg", "TestIsResponseSuccessful/other_error (0.00s)\\n\"}", "TestClose (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_unset_unset}", "github.com/gravitational/teleport/lib/secretsscanner/reporter::TestReporter/succeess", "TestLog", "TestDestinationFromURI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/debug::TestCollectProfile/profile", "TestParseShortcut/auth_servers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/unsigned_manifest", "TestApplyTraits/kube_group_substitute_i", "TestGetAWSPolicyDocument/aws-elasticache", "github.com/gravitational/teleport/lib/web/ui::TestMakeCAKeySet/JWT_keys", "FuzzFetchMySQLVersion/seed#10 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnmarshalDevice/success", "TestTrimToMaxSize/db.session.cassandra.regis", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'passthrouggh_match_ignores_implicit_role'", "TestResumption/tunnel/SSH_through_resum", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateSessionRecordingConfig/unauthorized", "TestAppPortsValidation/port_bigger_than_65535 (", "FuzzParsePacket/seed#27 (0.00s)\\n\"}", "TestGetPolicyVersions/PolicyFound (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGetKubeClientGettter/test#1", "github.com/gravitational/teleport/lib/utils::TestParsing", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/first_group_rolledback,_second_should_not_start", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/get_no_access", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestSelectVersion/exact_mmatch", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/codes.Unaavailable_error", "FuzzParserEvalBoolPredicate/seed#10 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToWindowsDesktop/oone_role_more_permissive_than_another", "TestUnmarshalAccessGraphS", "github.com/gravitational/teleport/lib/srv/discovery/common::TestIsRDSInstanceSuppported", "TestKeyCompare/empty_keys_are_equal (0.00s)\\n\"}", "Tes", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/invalid_unix_sockket", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch/db_name_glob_match", "github.com/gravitational/teleport/lib/services::TestValidateRoles/role_templates", "TestVerifyTLSUser/OSS_dt=nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseTunnelService_ChecckAndSetDefaults/missing_service", "TestCredentialCreation_Validate/empty", "github.com/gravitational/teleport/lib/proxy/peer::TestSendReceive", "TestParseShortcut/device (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsSSHDeviceVerified//all_extensions", "github.com/gravitational/teleport/lib/proxy/peer::TestServerTLS", "TestAddCred", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/when_role_max_duration_is_not_set:_requestedMaxDuration_is_ignored_if_>_roole_defined_sesssionTTL_(6h)", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString", "TestServiceAccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/events/pgevents::TestBuildSchema/postgres", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureSQLServer/empty_properties", "TestElastiCacheF", "TestParseShortcut/netconfig (0.00s)\\n\"}", "Test_attributesT", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/apps/IterateUnifiedResources/ascending", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/paggination/without_vpc_filter", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilterForScale/pageSize=100000,prop=48", "TestParse/[::]:443 (0.00s)\\n\"}", "TestRegexMatchesAny/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialAssertionResponse.Response_empty", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/over_max_groups_halt-on-error_cloud", "TestValidateDatabase/valid-dynamodb-withou", "TestCheckAccessToGitServer (0.00s)\\n\"}", "FuzzFetchMySQLVersion/seed#19 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/unix_socket", "TestNewFromConfig/fips (0.00s)\\n\"}", "TestCheckSAMLIDPCA/unparseable_cert (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFESVIDOutput_CheckAndSSetDefaults/missing_jwt_audience", "TestServiceAccess/UpdateDatabaseObject/allowed_admin_state", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults/file_exporter", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet", "TestBundleSet_Equal/bundle_set_3_equal", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestPPodmanAttestorConfig_CheckAndSetDefaults/no_addr", "TestRemoveCredentialProcessBy", "TestUnmarshalGraphError/empty (0.00s)\\n\"}", "TestOktaAssignmentWatcher (0.00s)\\n\"}", "TestListEC2ICE/valid_for_multiple_VPCs", "TestALPNDialer_getTLSConfig/cas_updated (0.00s)\\n\"}", "TestApplicationTunnelSe", "FuzzTraitsExpressionParser/seed#48 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_nomatch_match_match}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/crredential_picker_(2)", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/unreecognized_type", "TestServiceAccess/UpsertVnetConfig/allowed_admin_states/MFAVerif", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/challenge_response_error", "github.com/gravitational/teleport/lib/ui::TestMakeLabels/Single_map_multiple_labeels_case", "FuzzParserEvalBoolPredicate/seed#38 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/roles_anywhhere_tags", "TestConvertResponse/url_error (0.00s)\\n\"}", "TestIssuerFromPublicAddress/valid_ip:port (0.0", "TestTemplate_S", "TestAutoUpdateConfigEvents (0.00s)\\n\"}", "FuzzReadProxyLineV2/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestJoin", "TestConvertReq", "TestValidateTokenWithJWKS/no_expiry (0.00s)\\n\"}", "TestSAMLAuthRequest_Check/C", "Test_propertyTable/a", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTryReconcile/configg_and_version_exist,_no_existing_rollout", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.bind_EventFields", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//success_v6", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseUser", "TestSQSMessagesCollectorErrorsOnReceive (0.02", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGetServicePortss/One_supported_port", "TestReconc", "github.com/gravitational/teleport/lib/scopes/cache::TestCacheConcurrency", "TestVariable/internal_with_no_brackets (0.00s)\\n", "TestRDPLicense (0.00s)\\n\"}", "TestGetDis", "TestParseDestination/target_locat", "TestServiceAccess/ListDatabaseObjectImportRules/allow", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/DeleteDynamicWindowsDesktop,allowed:MFAVerified,verbs:[]", "TestCompare/empty_rhs_root_in_equivalence_cas", "TestGetMCPServerTransportType/unknown (0.00s)\\n\"}", "TestAuthConfig/unknown_mode (0.00s)\\n\"}", "TestElastiCacheFetcher/fetch_all (0.00s)", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups,_same_day,_same_start_hour,_no_wait_time", "TestServiceAccess/UpsertDynamicWindowsDesktop,allowed:", "TestHardwareKeyAgent_Server (0.65s)\\n\"}", "TestListDeployedDatabaseServices/returns_empty_list_when_the_ECS_Clust", "github.com/gravitational/teleport/lib/services::TestValidateRoles", "Test_cosignKeyValidator_ValidateAndResolveDiges", "TestFil", "github.com/gravitational/teleport/lib/kube/token::TestGetTokenAudiences/no_token", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/transittion_from_recovering_to_standby", "github.com/gravitational/teleport/lib/utils::TestHMACAnonymizer", "TestServi", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/NotRequired/verbs=[update]]", "TestSQLManaged", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_OFF/JSON", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_client,_must_check_for_AWS_integration_subkind", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__PROCESS_KILL", "github.com/gravitational/teleport/lib/services::TestCheckSAMLEntityDescriptor", "github.com/gravitational/teleport/lib/cloud/azure::TestListServers/list_MySQL_serrvers_in_a_resource_group", "TestIteration/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/user.login_OneOf", "github.com/gravitational/teleport/api/types::TestNewAppV3/app_with_no_CORS_policyy", "github.com/gravitational/teleport/lib/services::TestDiscoveryConfigUnmarshal", "TestServiceAccess/veri", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestDeleteCertAuthorityy/ca_deleted", "github.com/gravitational/teleport/lib/services::TestRoleSetEnumerateDatabaseUserssAndNames/developer_allowed_only_specific_username/database_in_prod_database", "TestSystemdUnitDriver (0.00s)\\n\"}", "TestDatabaseFromMemoryDBCluster (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/error_when_profile_does_not_have_the_expected_comment", "TestGlobMatch/exclusive_child_glob_match_root", "TestNewResourceExpression/fail_to_parse/nam", "TestDocumentDBFetcher/sk", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_kkubernetes_resources_kind_namespace_not_supported_in_v6", "TestUpdateSessionRecord", "TestVariableDurationIncDec (0.00s)\\n\"}", "TestUsageReporterBatchSubmit (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestJoinServiceClient_RegisterUsinggTPMMethod", "github.com/gravitational/teleport/api/types::TestPortRangesContains/15", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstApplyDatabaseObjectImportRules", "TestIsTLSDeviceVerified/nok:_nil_exte", "TestCheckedPrefixWriter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/saml.created_OneOf", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_rrevocation.create_OneOf", "TestDatabaseP", "TestMultiJitter (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/valid_segment", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=telepoort", "TestEvents/auto_update_config.update_OneOf (0.00s", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialCreationResponse.Response_empty", "github.com/gravitational/teleport/lib/itertools/stream::TestMergeStreams/compare__always_favors_A", "github.com/gravitational/teleport/lib/utils::TestClickableURL", "github.com/gravitational/teleport/api/types::TestAppIsAWSConsole", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states", "TestAppIsAzureCloud/not_Azure_Cloud (0.00s)\\n\"}", "Test_Channel_CheckAndSetD", "TestAuditUnmarshaling (0.00s)\\n\"}", "TestParser/and_literals (0.00s)\\n\"}", "TestRegistrationFlow_Begi", "TestEvents/db.session.postgres.state", "github.com/gravitational/teleport/api/mfa::TestMFACeremony/OK_ceremony_not_requirred", "github.com/gravitational/teleport/lib/backend::TestKeyPrependKey/empty_key_is_preepended", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/untrusted_signed_manifest", "TestServiceAccess/UpsertVnetConfig_wi", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestClose/closed_bby_server", "TestEvents/saml.created_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGitServer/expliccit_deny", "TestValidateFields/invalid_key_(does_not_", "TestValidate_WithAllowRequestKubernetesResources/allo", "github.com/gravitational/teleport/lib/events/dynamoevents::TestEndpoints", "TestReplaceRegexp/simple_values_are_rep", "TestList", "Test_consumer_sqsMessagesCollector (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestPublisherConsumer/missinng_event_id", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##24", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles", "TestServiceAccess/GetAutoUpdateAgentRollout/allowed_admin_st", "github.com/gravitational/teleport/lib/web/ui::TestSortedLabels", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenSource_GetIDToken", "TestServiceAccess/UpsertAutoUpdateVersion/allowed_admin_s", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/multi-segment_tooo_short", "TestUpsertTask (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/role_is_llimited_to_default_namespace", "FuzzTraitsExpressionParser/seed#43 (0.00s)\\n\"}", "TestMatchResourceByFilters_Helper/error_in", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_afterExecution//successful_execution", "FuzzParseWebLinks/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_unset_unset_match}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/string_variable", "TestDesktopClipboard (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.review_EventtFields", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation/kubernettes_app_http", "github.com/gravitational/teleport/lib/tpm::TestPrintQuery", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_started_event", "github.com/gravitational/teleport/lib/services::TestParseShortcut/kube_clusters", "github.com/gravitational/teleport/lib/srv/app/aws::TestResolveEndpoints/unsupportted_SDK_resolver", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/paath_style_addressing_enabled_by_default", "TestTrimToMaxSize/db.session.mysql.init_db (0.00s", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/component", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_match_unset}", "TestEvents/db.session.query_EventFields (0.00s)\\n\"}", "TestGCPServiceAccountMatcher_Match (0.01s)\\n\"}", "Test_setVersionMetric/old_expired_ver", "github.com/gravitational/teleport/lib/client/db/mcp::TestEmptyDatabasesServer/Toool", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/custom_endpoints#01", "TestAppPublicAddrValidation/kubernetes_app_h", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:Unauthorized,verbs:[]", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/s3_accesss_missing_credentials", "TestRDSDBProxyFetcher/fetch_all (0.00s)\\n", "TestExtractConditionForIdentifier (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestListVirtualMachines/all_reesource_groups", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/ownership-requires", "github.com/gravitational/teleport/lib/secret::TestSeal", "TestIsUserFunctions/IsLocalUser/system_user (0.00", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/invalid_uri", "TestUpdateAppUsage", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode/unknown_modde", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_Run/macOS__device_succeeds", "TestUnifiedResourceCacheIteratio", "github.com/gravitational/teleport/lib/utils/aws/stsutils::TestNewFromConfig/invallid_does_not_change_FIPS", "github.com/gravitational/teleport/lib/inventory/internal/delay::TestMultiJitter", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_unset_match}", "github.com/gravitational/teleport/lib/utils::TestSliceMatchesRegex/foo-test", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/deev_cluster_with_resource_access_request", "TestSetEnvs/envs_set_via_env", "TestPortRangesContains (0.00s)\\n\"}", "TestCertAuthorityUTCUnmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_unset_match_nomatch}", "github.com/gravitational/teleport/lib/events::TestEvents/port_OneOf", "github.com/gravitational/teleport/lib/integrations/azureoidc::TestAccessGraphAzurreConfigOutput", "github.com/gravitational/teleport/api/types::TestPortRangesContains/42", "TestRoles/FindRoleByARN/found (0.00s)\\n\"}", "TestCommands (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/skip_danngerous_exact", "TestSSHPortForwarding/legacy_deny (0.00s)\\n\"}", "TestPollAWSRD", "TestDiscoveryConfigCRUD (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyComponents/multiple_componeents", "TestWorkloadIdentit", "FuzzParserEvalBoolPredicate/seed#1 (0.00s)\\n\"}", "TestGithubAuthRequest_Check (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams/StreamManyPParts/Flaky=true,ForceFlush=true", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_unset_unset}", "TestGetMode/version_enables,_no_config (0", "TestAlertAcknowledgement_Check/empty (0.00s)\\n\"}", "TestJoinServiceGRPCServe", "TestEvents/trusted_cluster_token.create_", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/only_address_default_port", "TestKubeResourceMatchesRegex/list", "github.com/gravitational/teleport/lib/cloud/provisioning::TestOperationCheckAndSeetDefaults/defaults_output_to_stdout", "TestParseSignatureAlgorithmSuite/1/json (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:MFAVerifiedWithReuse,verbs:[listt]", "TestCompareResources/cmp_equal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/services::TestConvertResource/handles_unexppected_RFD_153_resource", "github.com/gravitational/teleport/lib/services::TestAppWatcher", "TestServiceAccess/ListAutoUpdateAgentReports/allow", "TestNewResource", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_nomatch_match_nomatch}", "TestMigrate/storage_config_with_no_desti", "TestParseShortcut/windows_desktop (0.00s)\\n\"}", "TestServerConversion (0.00s)\\n\"}", "TestResourceExpression_NameIdentifier (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMarshalUnmarshalSecurityReporrt", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS/Multiple_Prroxy_public_addrs_with_port", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAM/rrole_exists_with_existing_trust_policy_and_without_matching_tags", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/expired", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/bad_custom_endpoints_#01", "TestIntegrationUnmarshal (0.00s)\\n\"}", "TestAlertAcknowledgement_Check (0.00s)\\n\"}", "TestReporter/pre-reconcile_error (0.03s)\\n", "Test_formatJSON/none (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerForCluster/api_returnns_not_found", "TestInsecureSkipVerify (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/mattch_at_least_one_role", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_reconciler_computeeStatus/status_is_reset_if_target_version_changes", "Test_splitExpression", "TestParseShortcut/network_restrictions (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws/endpoint::TestCreateURI/invalid_ssecure_endpoint", "TestAuthPreferenceValidate/se", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[updatee]", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/ok_host", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestPollAWWSRDS/reuse_last_synced_databases_on_failure", "TestContextLockTargets/Node (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestVerifyPassword", "TestCheckAccessWithLabelE", "github.com/gravitational/teleport/lib/web/app::TestMatchHealthy/WithHealthyApp", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/segment_with_trrailing_separator", "TestStreamerCompleteEmpty (0.00s)\\n\"}", "TestDatabaseTunnelService_", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules", "TestParseReviewFrequency/1year (0.00s)\\n\"}", "TestLockKey/empty_parts (0.00s)\\n\"}", "TestBundleSet_Equal/bundle_set_1_equal", "TestUseDatabaseTranslator/UnsupportedProtocol", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFEWorkloadAPIService_CCheckAndSetDefaults/valid", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/saml/resource_iterator/ascending", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestGetInstanceID/request_eerror", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/CreateDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[creeate]", "github.com/gravitational/teleport/lib/authz::TestContext_GetAccessState/mfa:_locaal_user", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestReconncileResults/OverlapOldAndNewResults", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/FindRolesByName/found__one", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestParseMetadataClientError (0.00s)\\n\"}", "TestJoinServiceGRPCServer_RegisterUsingToke", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/unsuppported_schedule", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeSS3Protos/New_is_nil,_existing_is_non-nil", "TestGetAccessGraphConfig/authorized_proxy", "TestCheckAccessToAWSConsole (0.01s)\\n\"}", "TestConfig_SetFromURL/fips_mode", "TestRegisterDatabase (0.00s)\\n\"}", "TestOIDCAuthRequest_Check/SSO", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/okta_service_delleting_okta_resource_is_allowed", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/ECS_Tags/extra_tags_in_aws_resource", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'partial_maatch'", "TestReadableDatabaseProtocol (0.00s)\\n\"}", "TestSPIFFESVIDOutput_CheckAndSetDef", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_match_unset}", "TestCreateS", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/podutils::TTest_isPodUnhealthy", "TestGetPolicyVersions/PolicyNotFound (0.00s)\\n\"}", "TestUserPreferencesUpdateForRoot", "TestNewDatabasesFromDocumen", "TestIDTokenValidator_Validate/expired (0.00s)\\", "github.com/gravitational/teleport/lib/events::TestNew", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_unset_unset}", "TestCheckGCPServiceAccounts/denying_wil", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/transittion_from_tripped_to_recovering", "github.com/gravitational/teleport/lib/cloud/azure::TestSQLListWithinGroup", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig", "TestWeakValidate/empty_rejected (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/slices::TestFilterMapUnique/not_incluuded_values_are_not_returned", "github.com/gravitational/teleport/api/types::TestNewAppV3/mcp_missing_spec", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_unset_match}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/device", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetServerUUID/returnss_leaf_cluster_server_UUID", "TestParseSignatureAlgorithmSuite/3 (0.01s)\\n\"}", "TestSanitize//namespaces//params (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMinVerWithoutPreRelease/ignores__dev", "github.com/gravitational/teleport/lib/events::TestEvents/secreports.report.run_OnneOf", "FuzzTraitsExpressionParser/seed#45 (0.00s)\\n\"}", "TestCheckAccessWithLabelExpressions/wi", "github.com/gravitational/teleport/lib/services::TestUserLoginStateUnmarshal", "github.com/gravitational/teleport/lib/services::TestApplyTraits/the_first_variablle_value_is_picked_for_label_keys", "TestString (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestHealthCheckConfigWatcher", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_match_nomatch_nomatch}", "TestEvents/kube.create_EventFields (0.00s)\\n\"}", "TestValidate_RequestedMaxD", "TestBuildPrincipals (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/role.updated_OneOf", "TestCheckAccessToS", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Events", "TestAddRoleDefaults/requester_(not_enterpri", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.permissions.uupdate_OneOf", "TestUploadFromPath/no-dir.upload (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleParse/no_input,_should_noot_parse", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/incorrect_URI_schema_is_rejected", "TestPublisherConsumer/missing_event_time (0.", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_nomatch_match}", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/update", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceWatcher_PrevenntDuplicates", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discovery_fetch_event", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/NotRequired/verbs=[read]", "github.com/gravitational/teleport/lib/events::TestEvents/instance.join_EventFieldds", "github.com/gravitational/teleport/lib/utils/typical::TestParser/unsupported_functtion", "TestSafeEnvAddFull/skip_dangerous_exact (0.0", "TestServiceAccess/UpsertUserTa", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/Auth", "github.com/gravitational/teleport/lib/services::TestMatchAndFilterKubeClusters/alll_match", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.delete_all_EventFields", "github.com/gravitational/teleport/lib/services::TestCompareResources/cmp_not_equaal#01", "TestParseReviewFrequency/1_month (0.00s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestRateLimit", "TestALPNDialer_getTLSConfig/no_update (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/mfa.add_OneOf", "TestOriginLocalRedirectURI/invalid_url (0.00s)\\n\"}", "TestCheckAccountID (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/client.disconnect_OneOf", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftServerlessVPCEndpoint", "TestApplyGKENameSuffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/secret::TestKey", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/connect_too_metrics_database,_get_reader/writer_role", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_unset_match}", "TestValidateSegment/segment_with_trailing_s", "TestAccessGraphAzureConfigOutput (0.00s)\\n\"", "TestMemory/CRUD (0.00s)\\n\"}", "TestValidateRoleARNAndExtractRoleName/", "TestOpCompressed/compressed_OP_QUERY (", "TestChe", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[create]", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGenerateServiceWiithTaskDefinition", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestParseMetadataClientErrror", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGCP", "github.com/gravitational/teleport/lib/services::TestCheckRuleSorting", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfigReqDeefaults", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/empty_segment", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_match_match}", "TestGetUserLoginStates (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse", "github.com/gravitational/teleport/lib/utils::TestSet/iteration", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.end_OneOf", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestCertificateVerificatioon/wrong_proxy", "Test_rolloutChangedInWindow (0.00s)\\n\"}", "TestValidateSegment/segment_with_middle_se", "github.com/gravitational/teleport/lib/services/local/generic::TestNonceParallelissm", "TestGetServicePorts/One_supported_por", "github.com/gravitational/teleport/lib/services::TestGetKubeResources", "Test_computeRolloutState/every_group_d", "TestEvents/auto_update_config.create_OneOf (0.00s", "TestConvertRequestFailureError (0.00s)\\n\"}", "TestEncodeDecodeCreateDatabas", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_reconciler_computeeStatus/new_groups_are_populated_if_previous_ones_were_empty", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestLargeEventssParse", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics/basic_nil", "TestSortCachePagination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter::TestUsageReporterTimeSubmit", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.execute_EventFields", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequired/upgraade_required_(unadvertised_ALPN_error)", "TestServiceAccess/DeleteAutoUpdateAgentReport/allowed", "TestResourceParserLabelExpansion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/negative_screen_nnumber", "github.com/gravitational/teleport/lib/services::TestDraftExternalAuditStorage", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureSQLServer/empty_FQDN", "TestServiceAccess/CreateDatabaseObject/allowed_admin_states/MFAV", "TestReviewThresholds/promoted_skip", "github.com/gravitational/teleport/lib/events::TestEvents/session.data_EventFieldss", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestRollbackGroups/unsuupported_strategy", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout", "github.com/gravitational/teleport/lib/utils/log::TestSlogTextHandlerComponentPaddding/no_padding", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#13", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/reader", "TestKeyCompare/greater (0.00s)\\n\"}", "TestKeyAppendKey/suffix_with_no_leading_", "github.com/gravitational/teleport/lib/utils::TestSet/union/empty_union_populated", "TestClient_DialTimeout (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_RunAdmin/nnon-existing_device,_enrollment_error", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/api/types/accesslist::TestSelectNextReviewDate//one_month,_fifteenth_day", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher", "TestWriteSSHConfig/modern_Open", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_credential_provider,_but_using_ambient_credentials", "TestCreateTable (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/unsuppported_desired_state", "github.com/gravitational/teleport/lib/services::TestCheckAccessToUserGroups/no_maatching_labels,_no_access", "github.com/gravitational/teleport/lib/accesslists::TestGetMembersFor_FlattensAndSStopsOnCycles", "github.com/gravitational/teleport/lib/services::TestGetCreateDatabaseCreateMode/ddelete_mode_take_precedence", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress", "TestGlobMatch/inline_root_glob_match (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/typical::TestParser/negation_of_literral", "TestClusterExternalAuditStorage (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/role_matcches_any_label_out_of_multiple_labels", "TestUpdateAppUsageTemplate/", "github.com/gravitational/teleport/lib/services::TestUserNotificationsCache/correcctly_fetches_sorted_notifications_for_usernameA_with_a_startKey", "TestMatchResourceByFilter", "TestEncodeDecodeRequireMFAType/OFF (0.00s)\\n\"}", "TestProtoToResource/disabled (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestGCPIPType/private", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/NotRequired/verbs=[update]", "TestServiceAccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/No", "github.com/gravitational/teleport/lib/services::TestKubeResourcesMatcher/user_reqquests_a_pod_that_does_not_match_any_role", "github.com/gravitational/teleport/lib/services::TestUserNotificationsCache/correcctly_fetches_sorted_notifications_for_usernameB_with_no_startKey", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille/reconciliation_faces_missing_rollout_on_first_try,_should_retry_and_create_thee_rollout", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/equals()", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_match_unset}", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/doees_not_match_user_'level'_trait", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/untrusted_signed_manifesst", "TestValidateStaticHostUser/ok (0.00s)\\n\"}", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings/wrong_name", "TestCredPropsConversio", "github.com/gravitational/teleport/lib/proxy/peer::TestClientCredentials/invalid_rrole", "TestCapture_WriteTo (0.00s)\\n\"}", "TestGetServiceAccoun", "github.com/gravitational/teleport/lib/events::TestGetTeleportUser/event_without_uuser_metadata", "TestMig", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_unset_unset}", "TestForwarder_getToken/timeout (0.00s)\\n\"}", "TestGetDbServerName/return", "TestDestinationKuberne", "TestValidateRole/unsupported_functio", "github.com/gravitational/teleport/lib/services::TestMCPToolMatcher/allow_literal", "github.com/gravitational/teleport/lib/itertools/stream::TestCollectPages", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Begin", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/saml.idp.auth", "TestParse//gateways/foo (0.00s)\\n\"}", "TestSelectVersion/no_match (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS/Tail_match", "TestUpsertClusterNetworkingCon", "TestEvents/reset_password_token.create_Ev", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredPropsConversionns/CredentialCreation_from_protocol", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_unset_nomatch}", "TestTLSIdentity_roundtrip/zero_tlsca.Identit", "TestIsClaimed (0.00s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestRateLimitFailure//stream-only", "TestServiceAccess/UpdateAutoUpdateAgentRollout/allowed_admin_", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_KEEP", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/global_mode_disabled_only", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/EmpptyTeleportMatcherKinds", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettClusterName/success", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityJWTServicee_CheckAndSetDefaults/missing_destination", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/destination_with_uunsupported_config_type", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.funcction_OneOf", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/conflictingg_roles:_deny_all_with_legacy_allow", "TestEvents/integration.create_OneOf (0.00s)\\n\"}", "TestServiceAccess/GetCrownJewel/allowed_admin_states/MFAVerifiedWit", "Test_transport_", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzRPCClientParrtialLength", "TestServiceAccess/DeleteDatabaseObject/allowed_admin_states/MFAV", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[update_creatte]", "TestParseRegionFromOCID (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestParseIPV6", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults/empty_scheme_defaults_to_grpc", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_nomatch_unset}", "github.com/gravitational/teleport/api/internalutils/stream::TestMergeStreams/streeam_A_empty", "TestGetResourceNames (0.00s)\\n\"}", "TestAutoProtocolDetec", "TestSafeEnvAdd (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/ingress::TestIngressReporter", "github.com/gravitational/teleport/lib/utils::TestClickableURL/hostname", "TestString//clusters/telepor", "TestSafeEnvAddFull/duplicate_allowed (0.00s)\\n\"", "TestClient_ClusterDetails (0.01s)\\n\"}", "TestAWSConfigFilePath/AWS_CONFIG_FIL", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level_calleer_timestamp", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.send_long_data_OneOf", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/no_region_fips", "TestEvents/db.session.cassandra.prepare_", "github.com/gravitational/teleport/lib/events::TestEvents/plugin.delete_OneOf", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsRoot", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilterForScale/pageSize=5,prop=45", "Test_applyMappingToObject (0.00s)\\", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_GetVersion//version_invalid", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseTunnelService_ChecckAndSetDefaults/valid", "TestValidateGCPRe", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnrollEKSClusterss/if_access_entry_is_already_present_we_don't_create_another_one_and_don't_deletee_it", "TestRouter_DialHost/dial_success_to_agentl", "Test_kubernetesSupportsBoundTokens/N", "TestNewKubeClusterFromGCPGKE (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_unset_match}", "TestGCPIPType/unknown (0.00s)\\n\"}", "TestRedshiftServerlessFetcher/fet", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenSource_GetIDTokeen/untagged/value_present", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCheckAccountID", "github.com/gravitational/teleport/lib/proxy::TestGetServers/no_matches_for_uuid", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse/verbss=[]", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/threshold_ommission_related_sanity-check", "TestIsValidHostname/only_lower_case_works (0.00s)\\n", "TestJoin/trailing_empty_segment_preserved (0.00s)\\", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/json", "github.com/gravitational/teleport/lib/decision::TestLockTargetConversion", "TestAutoProtocolDetection (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/keylesss_trusted_roots_contains_no_tlogs_or_timestampAuthorities", "TestAttachPolicy/UnsupportedIdentity (0.00s)\\n\"}", "TestGetScaleSetVirtu", "TestEvents/session.join_EventFields (0.00s)\\n\"}", "TestContext_GetAccessState (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestAutoUpdatteAgentRolloutEvents", "TestNewResourceExpression/fail_to_parse/|| (0.0", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/no_default_profile", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/normal__request", "TestMigrate/real_world_3 (0.00s)\\n\"}", "TestParseReviewDayOfMonth/first (0.00s)\\n\"}", "TestServiceAccess/CreateAutoUpdateAgentReport/allowed_admin_st", "github.com/gravitational/teleport/lib/utils::TestSliceMatchesRegex/staging", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestGetInstanceID/with_ID", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_CheckAndSeetDefaults/default_set_but_not_stable/cloud", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceEnrolllStatus/from_\\", "TestKeyHasSuffix/prefix_is_not_a_suffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/Unauthorized/verbs=[]", "TestToResource (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_match_unset}", "TestAtomicWriteValidation/basic_case (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/golden_request", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/real_world_4", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/cloud/azure::TestGetVirtualMachine/client_eerror", "TestFileContextTemplate (0.00s)\\n\"}", "TestGetIntegrationCer", "TestParseRoleARN/iam_arn_is_not_a_role (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_unset_match}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestDocumentDBFeetcher/fetch_all", "TestStringOrMap/unmarshal (0.00s)\\n\"}", "TestEvents/access_request.delete_EventFields (0", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/full_sppec_of_the_remote_destination", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_nno_name", "TestGlobMatch/inline_glob_mismatch", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/sqlserver", "TestIsTLSDeviceVerified/nok:_missin", "Test_inWindow (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse", "TestFetchCloudEnvironment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/envutils::TestReadEnvironment", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.create_EventtFields", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/pointer_to_non-empty_struct", "github.com/gravitational/teleport/lib/events::TestEvents/lock.created_OneOf", "TestParseShortcut/cert_authorities (0.00s)\\n\"}", "Test_setVersionMetric/same_version,_", "FuzzTraitsExpressionParser/seed#22 (0.00s)\\n\"}", "TestConfig_SetFromURL/fips_mod", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/since_and__from/to_specified", "TestLoginFlow_Finish_errors/NOK_nil_resp (0.", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGCP/full_access__role", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/get/deny_rbac", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/explicit_denyy_-_id_path", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/services::TestGlobalNotificationsCache", "github.com/gravitational/teleport/lib/tlsca::TestPrincipals/FromKeys", "TestGetResources/SAMLIdPServiceProvider (0.27s)\\n\"}", "TestRoleMap/test_case_'direct_match' (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#37 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_DefaultChaannel/default_channels", "TestParseReviewFrequency/12month (0.00s)\\n\"}", "TestNewStreamErrors/CreateAuditStream (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/success_case/success_case_auth", "TestValidateAcc", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/invalid_syntax", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_formatJSON/auto_commpact", "github.com/gravitational/teleport/lib/client/debug::TestGetReadiness/Failure", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed/ccompressed_OP_QUERY", "TestKeyPrependKey/all_with_leading_separators", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel", "github.com/gravitational/teleport/lib/services::TestFilterSAMLEntityDescriptor", "github.com/gravitational/teleport/lib/services::TestLockTargetsFromTLSIdentity/alll_locks", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_nomatch_nomatch_match}", "TestIdentityOutput_Check", "TestMF", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/multiplee_entities_but_only_one_of_them_is_wildcard", "TestKeyHasSuffix/valid_multi_component_suffix", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#12", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_success/successs_in_recovery_below_limit", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestGetTags/instance_not_foound", "Test_propertyTable/sc", "TestSAMLIdPBuildScript", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.create__db_OneOf", "TestEventEqual/empty_not_equal (0.00s)\\n\"}", "TestParser/equality_rhs_dynamic (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress", "TestEvents/auto_update_config.update_EventF", "TestValidateRole/valid_syntax (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/prefers_newer_credential_(no_user)", "github.com/gravitational/teleport/api/types::TestDatabaseElastiCacheEndpoint/invaalid_URI", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject", "TestCredentialLifetimeValidate/negative_TTL", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/ec2_tags", "Test_inWindow/out_of_window (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNewAuthPreference_secondFactors", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSecurityGroupps/valid_for_listing_instances", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_states/Unauthor", "TestEndpoints/fips (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/NOK_otp_with_per--session_MFA", "TestEvents/instance.join_EventFields (0.00s)\\n\"}", "TestSanitize//namespaces/. (0.00s)\\n\"}", "TestListDeployedDatabas", "TestAuthConfig/Azure_AD_Auth/Ap", "TestWriteMuxedSSHConfig/mode", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#2", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/allow_a_list_of_different_request.kubernetes_resources_from_samee_role", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_unset_match}", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestHandleAccessReequest/test_non-existent_user", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/empty_rejected", "TestIdentityCenterAccountMatcher/", "TestWriteSSHConfig/test_shellQuote (0.00s)\\n\"}", "TestValidateAccessRequestClusterNames (0.00s)\\n\"}", "TestKey_SignAndVerifyAWSOIDC/RSA2048 (0.43s)\\n\"}", "TestNewDatabaseObject (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#11", "github.com/gravitational/teleport/lib/srv/discovery/common::TestGetLabelEngineVerrsion/azure-mysql-8.0.0_flex_server", "TestUpdateDeployServices/", "TestValidateDatabase/valid-spanner-without-", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy", "github.com/gravitational/teleport/lib/events::TestEvents/session.end_OneOf", "TestCredentialsCache/Windowed", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/delete/oktta_service_deleting_non-Okta_user_is_an_error", "TestWindowsDesktopGroups/one_group_denied (0.00s", "TestValidateAssumeStartTime/expired_start_time", "TestCheckAccessW", "github.com/gravitational/teleport/lib/utils/parse::TestVariable", "TestNewResour", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerifiedWithReuse", "TestJoinServiceGRPCServer_RegisterUsingBoundKeypa", "TestBackpressure (1.21s)\\n\"}", "TestFetchContainerRuntime (0.00s)\\n\"}", "TestGCPIPType/#00 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestLockKey/empty_parts", "TestSortCachePagination/descending (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss", "TestServiceAccess/Upsert", "github.com/gravitational/teleport/lib/utils::TestMaxVersions", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_CheckAndSeetDefaults", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/list", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbServerName/returrns_root_cluster_db_server_name", "github.com/gravitational/teleport/lib/services::TestApplyTraits/kube_group_substiitute_in_deny_rule", "github.com/gravitational/teleport/lib/events::TestEvents/session.start_EventFieldds", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/events::TestEvents/okta.applications.updatee_EventFields", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_nomatch_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/services::TestMarshal/enterprise", "Test_prog", "TestCreateClusterNetworkingConfig/creation_allowed_wh", "github.com/gravitational/teleport/lib/services::TestResourceMatchersToTypes/emptyy", "TestGenericWrapperWithPrefix (0.00s)\\n\"}", "TestServiceAccess/DeleteUserTa", "TestEvents/desktop.directory.share_OneOf (0.00s)\\n\"", "TestConfig_CheckAndSetDefaults/inva", "TestPolicyEnsureStatements (0.00s)\\n\"}", "TestTrimToMaxSize/device.authenticate.confirm", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_NNewCosignSignleKeyValidator", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse", "TestServiceAccess/UpdateAutoUpdateVersion/allowed_admin_states/MFA", "TestIntervalResetTo (2.42s)\\n\"}", "TestGetIdentity/unsupported_identity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/web/ui::TestMakeDatabaseSupportsInteractivee", "github.com/gravitational/teleport/lib/services::TestAccessRequestCacheResets", "github.com/gravitational/teleport/lib/web/app::TestHandlerAuthenticate/without_coookie_or_client_cert", "TestContextLockTargets (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_x55c_with_wrong_type", "TestNewAWSNodeFromEC2Instance", "TestResourceWatcher_Backoff (0.00s)\\n\"}", "TestLogin_creden", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/first_trigger_skipped,_second_getter_failure", "TestIterateUsers_Empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_list.revieew", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.create_OneOff", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.mysql..init_db", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountAssignmeentMatcher/simple_match", "TestTeleportOI", "TestRegisterAndLogin (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestLoadIdentityFile", "Test_progressG", "Test_consumer_sqsMessagesCollecto", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/one", "TestApplyAWSDatabaseNameSuffix (0.01s)\\n\"}", "TestEvents/lock.created_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_regex_expression_allow", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/upsert_with_update_permission_only", "TestSigstoreAttestor_Attes", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/invalid_role", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/invalid_path", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/no_list_access_to_discovery_config", "TestNewResourceExpression/fail_to_parse/. (0.00s", "TestCheckAccessToSAML", "TestServiceAccess/CreateAutoUpdateAgentRollout/allow", "Test_setVersionMetric/no_versions (0.00s)\\n\"}", "TestListSubscriptionIDs (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/httplib::TestSetIndexContentSecurityPolicy", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.close_OneOf", "TestRequireResident", "github.com/gravitational/teleport/lib/web/app::TestHasName", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialAssertion_empty", "github.com/gravitational/teleport/lib/circleci::TestValidateToken/success", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/verify_coverage/DeleteCrownJewel", "TestGetKubeClientGetter/test#4 (0.00s)\\n\"}", "TestDateExporterResume (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/x11-forward_EventFields", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=/telepport", "TestHostUsers_getGroups/test", "TestInstallFlagsYAML/extra (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/emppty_engines_list", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/filenamme_with_IPv6_address", "TestSafeEnvAddFull (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyHasSuffix/empty_suffix", "github.com/gravitational/teleport/lib/events/filesessions::TestUploadOK", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/correct_URI", "TestApplyTraits/databas", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_root_glob_mismmatch", "github.com/gravitational/teleport/lib/web/app::TestAuthPOST", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_x55c_invalid_cert", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_nomatch_match}", "TestServiceAccess/UpsertAutoUpdateAgentReport/a", "TestUnifiedResourceCache", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/iam_role_arn_iss_missing_role_name", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/prepared_sstatements", "TestMatchResourceByFil", "TestVariable/valid_with_brackets (0.00s)\\n\"}", "TestListDatabases/listing_instances_returns_all_valid_instances_and_ign", "TestIsRoot/leaf_cluster_resource_URI (0.00s)\\", "TestListSecurityGroups/pagination (0.00s)\\n\"", "github.com/gravitational/teleport/api/internalutils/stream::TestFilterMap", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#8", "github.com/gravitational/teleport/lib/auth/webauthn::TestCredentialRPID", "TestListResources/WindowsDesktop (0.04s)\\n\"}", "TestWriteOperationPlan (0.00s)\\n\"}", "TestParser/unary_func_with_env_no_arg (0.00s)\\n", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/valid_base_URL", "TestUploadCompleterEmitsSessionEnd/session.en", "TestGetIntegrationCert", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/string_heelpers", "TestComputeMinRolloutTime/empty", "github.com/gravitational/teleport/lib/proxy::TestCheckedPrefixWriter/success/singgle_write", "github.com/gravitational/teleport/lib/utils/typical::TestParser/integer_inequalitty_(false)", "TestValidateStaticHostUser/no_matchers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-rediis-incorrect-mode", "github.com/gravitational/teleport/api/types/accessgraph::TestAuthorizedKey/missinng_HostID#01", "github.com/gravitational/teleport/lib/inventory::TestAgentMetadata", "TestAzureRedisFetchers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/double_aadd", "TestValidateSigstorePolicy/no_keyle", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/AccessGraphPlugin", "github.com/gravitational/teleport/lib/events::TestEvents/integration.update_OneOff", "github.com/gravitational/teleport/lib/services::TestVerifyPassword/password_too_llong", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/saml/resource_iterator/descending", "github.com/gravitational/teleport/lib/utils::TestGlobToRegexp/simple_values_are_nnot_replaced", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeResourceNamesppace/returns_empty_string_when_given_root_cluster_URI", "TestParseSignatureAlgorithmSuite/\\\"hsm-v1", "TestAccessLists/access_li", "github.com/gravitational/teleport/lib/srv/discovery/common::TestExtraElastiCacheLLabels/all_tags", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstApplyDatabaseObjectImportRules/empty_inputs", "TestEventEqual/empty_equal (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestLogin/uv_discouraged", "github.com/gravitational/teleport/lib/services::TestGCPServiceAccountMatcher_Matcch", "TestQuery (0.09s)\\n\"}", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/DynamoDB__access", "github.com/gravitational/teleport/lib/utils::TestSliceMatchesRegex/test", "TestAtomicWriteValidation/empty_revision (0.00s)\\n", "github.com/gravitational/teleport/api/profile::TestRequireKubeLocalProxy/ALPN_connnection_upgrade_not_required", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/OSType/OS_TTYPE_UNSPECIFIED", "github.com/gravitational/teleport/lib/events::TestEvents/role.created_OneOf", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#31", "TestEvents/session.end_OneOf (0.00s)\\n\"}", "TestServiceAccess/DeleteDynamicWindowsDesktop,allowed:MFAVerified,v", "TestMemory/Items/pagination (0.00s)\\n\"}", "Test_zipStreams_Process/one (0.00s)\\n\"}", "TestTemplate_UnsetValue (0.00s", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/upsert/deny_mfa", "TestGetKubeClusterDomain (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzReadAndRewriteXAuthPackett/seed#2", "TestReviewToProtoChanges (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc/credprovider::TestCreaateAWSConfigForIntegration", "TestCreateUser (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/auto_update_config.updatte_OneOf", "TestUpdateAuthP", "TestSlogTextHandlerComponentPadding/no_pad", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/missing_destination", "github.com/gravitational/teleport/lib/utils/typical::TestParser/binary_variadic_ffunction", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient/GetTToken/succeed_(specific_database_name)", "TestSearchSessionRange/since_and_from/t", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequired/upgraade_not_required_(other_handshake_error)/direct", "TestRegistrationFlow_Begin_webID (0.00s)\\n\"}", "TestAtomicWriteValidation/zero_action (0.00s)\\n\"}", "TestValidateReverseTunnel/valid_tunnel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/player::TestPlayPause", "TestSliceOrString/marshal/slice (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetAuthPreference/unauthorized", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRequest", "TestCheckOIDCIdP/no_active_keys (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp/partial_conversionns_are_supported", "github.com/gravitational/teleport/lib/events::TestEvents/device.update_OneOf", "github.com/gravitational/teleport/lib/auth/webauthn::TestRegistrationFlow_BeginFiinish", "github.com/gravitational/teleport/lib/services::TestApplyTraits/values_are_expandded_in_group_labels", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_WebListenAddr_and_SSHProxyTunnelListenPort", "TestReviewFromProtoNils (0.00s)\\n\"}", "TestAccessRequestCacheBasics (1.21s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/delete_no_acceess", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFEWorkloadAPIService_CCheckAndSetDefaults/missing_listen_addr", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_Endpoint//file_exporter_with_limit", "github.com/gravitational/teleport/lib/cloud/azure::TestGetVirtualMachine/invalid__resource_ID", "TestServiceAccess/GetVnetConfig/allowed_admin_states/Unauthorized/verbs", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisClient/GetToken/accesss_denied", "TestParsePacket/network_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/unkknown_version_is_invalid", "TestServiceAccess/UpsertCrownJewel/allowed_admin_states/MFAVerified", "TestAppPublicAddrValidation/addr_wi", "TestExhaustiveNonEmptyBasics/non-zero_int", "github.com/gravitational/teleport/lib/events::TestEvents/sigstore_policy.create_EEventFields", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/multi-segment_innvalid_chars_fist", "TestRedshiftFetcher (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/srv/server::TestToEC2Instances/with_name", "TestCredentialsCache/Retrieve (0.00", "Test_querier_fetchResults/events_with_trimmable_event_exceeding_>", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestSelectVersion/more_reecent_version", "TestServiceAccess/UpsertDynamicWindowsDesktop", "github.com/gravitational/teleport/lib/events/filesessions::TestPlainFileOpsReservvations", "github.com/gravitational/teleport/lib/services::TestParseShortcut/lock", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule", "github.com/gravitational/teleport/lib/utils::FuzzParseWebLinks/seed#5", "TestWriteCmd/[]nil (0.00s)\\n\"}", "TestReadAndRewriteXAuthPacket/xauth_p", "github.com/gravitational/teleport/lib/web/app::TestAuthPOST/success", "TestKeyIDHasConsistentOutputForAnInput (0.75s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateSAMLIdPACSURLAndRelayyStateInputs/https://sp.com/acs;", "TestFindAllEmptyStruct/struct_with", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin/NOK:_Origgin_with_subdomain_and_different_host", "TestCheckAccessToServer/", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestCalculatePerrmissions", "TestIsValidHostname/empty_label (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/!", "TestServiceAccess/UpsertDatabaseObject/allowed_admin_states/MFAV", "TestEventEqual/regular_protobuf_oneof_not_eq", "TestIDTokenValidator_Validate/success", "TestServiceAccess/DeleteAutoUpdateVersion/allowed_admin_states/MFA", "TestResourceRequest (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/server::TestMakeEvents", "TestDeleteMessagesFromQueue (0.00s)\\n\"}", "TestProtoToResource (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/unix_socket#02", "github.com/gravitational/teleport/lib/limiter::TestListener", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/https://sptest.iamshowcase.com/acs>", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_computeRolloutStatte/empty_groups", "TestMux/DisableTLS (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.token.creaate", "github.com/gravitational/teleport/lib/integrations/awsoidc/credprovider::TestCreddentialsCacheRetrieveBeforeInit", "TestComputeMinRolloutTime/two_groups,_cannot_happen_on_the_s", "TestValidateWorkloadIdentity/maximu", "TestWithMemberIneligibleStatusField", "TestGetServers/match_by_uuid (1.34s)\\n\"}", "TestDisplay/negative_display_number (0.00s)\\n\"}", "FuzzCommands/seed#2 (0.00s)\\n\"}", "TestChallengeVa", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFEWorkloadAPIService_CCheckAndSetDefaults/missing_path", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/api/client/proxy::TestClient_DialCluster", "TestServiceAccess/DeleteAutoUpdateAgentReport/allowed_admin_states/NotR", "TestUpsertUserLoginState (0.00s)\\n\"}", "TestNewAction (0.00s)\\n\"}", "TestSSHHostOutput_CheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestEC2IsInstanceMetadataAvvailable/response_with_old_id_format", "TestRouteScoring/dial_by_ip_and_port (0.00s)\\n\"}", "TestParserForI", "TestInstallFlagsYAML/enterprise (0.00s)\\n\"}", "TestEvents/saml.idp.service.provider.updat", "TestRolesForResourceRequest/den", "github.com/gravitational/teleport/lib/events/athena::TestRunWithMinInterval/functtion_takes_longer_than_minInterval,_noting_more_should_happen", "TestDatabaseOutput_CheckAndSetDef", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users/negative_range", "TestIsALPNConnUpgradeRequired (0.10s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##6", "TestGetMode/config_suspends,_versio", "TestValidateSegment/segment_with_leading_", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix/ipv4_locaalhost", "TestEvents/resize_OneOf (0.00s)\\n\"}", "TestParseShortcut/trusted_cluster (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/srv/debug::TestCollectProfiles", "TestIsInstanceMetadataAvailable/zero_ID (0.0", "github.com/gravitational/teleport/lib/services::TestApplyTraits/invalid_variable__in_logins_does_not_get_passed_along", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/verify_coverage/UpdateVnetConfig", "TestRemoveCredentialProcessByComment/removes_the_enti", "github.com/gravitational/teleport/lib/circleci::TestValidateToken", "github.com/gravitational/teleport/lib/services::TestServerDeepCopy", "github.com/gravitational/teleport/lib/utils::TestSliceMatchesRegex/test|staging", "TestRegister/RRK_", "TestWrapPayload/unsu", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError/agg_badParrameter_and_accessDenied_with_wrap", "github.com/gravitational/teleport/api/internalutils/stream::TestMergeStreams/bothh_streams_empty", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/eu-central-1_fips", "TestCollectPages/empty-case (0.00s)\\n\"}", "TestCreateSession/ch", "TestParser/argument_is_express", "github.com/gravitational/teleport/lib/services::TestHostUsers_HostSudoers/multiplle_roles,_one_not_matching", "TestProjectIDFromServiceAccountName/empt", "TestServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAV", "github.com/gravitational/teleport/lib/services::TestValidateReverseTunnel/no_diall_address", "TestSAMLAuthRequest_Check/SSO", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/instance_metadata_generated_labels_are_not_replaced_by_instance_tags", "TestPreparerIncrementalIndex (0.00s)\\n\"}", "TestCheckAccessToSer", "github.com/gravitational/teleport/lib/web/app::TestHasName/NOK_-_invalid_host", "TestPageFunc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/utils::TestSingleBackendLB", "TestMemory/DeleteRange (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust::TestHandleUnimplemented/unrelaated_err", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/invallid_format_#_7", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/NotRequired/verbs=[create]", "TestMCPToolMatcher/allow_regex_regex (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestTwoBackendsLB", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteSuite/Other", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_evaluate/equals(resource.incorrect.selector,_\\", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_nomatch_match}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/disallowed_admin_states", "TestServiceAccess/UpdateDatabaseObj", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/missing_prefix_rrejected", "TestServiceAccess/GetVnetConfig/allowed_admin_states/MFAVerifie", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_match_unset}", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/two_unsigned_PROXY_headers,_gets_an_error", "TestJSON/MySQL_statement_fetch (0.00s)\\n\"}", "TestSuites/SIGNATURE_ALGORITHM_SUITE_HSM_V", "TestAWSAppAccessConfigReqDefaults (0.00s)\\n\"", "TestValidateRole/malformed_kind (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/resize_EventFields", "TestNewUserContextCloud (0.00s)\\n\"}", "TestConvertEventReq", "Test_formatJSON/to_compact (0.00s)\\n\"}", "github.com/gravitational/teleport/api/mfa::TestMFACeremony", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestCertificateVerificatioon/unknown_client", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/acccess_pod_outside_namespace_allowed_by_roles", "FuzzProxyLine_Bytes/seed#2 (0.00s)\\n\"}", "TestRoleParse/validation_error,_no_name (0.00s)\\n\"", "github.com/gravitational/teleport/lib/jwt::TestPublicOnlyVerify/RSA2048", "github.com/gravitational/teleport/lib/scopes::TestCompare", "TestCheckAccessWithLabel", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/non-uuid_name", "TestRedisClient/GetToken (0.00s)\\n\"}", "TestUpsertCertAuthority/create_ca (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[update]", "TestTrimToMaxSize/sftp_summary (0.00s)\\n\"}", "TestRBAC/delete (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/first_trigger_success_firing", "TestUsageReporterTimeSubmit (0.00s)\\n\"}", "TestUpsertCertAuthority/update_ca (0.01s)\\n\"}", "TestServiceAccess/CreateAutoUpdateAgentRollout/allowed_admin_", "TestParser/dynamic_map_lookup (0.00s)\\n\"}", "TestProxyLine_VerifySignature/wrong_CA_cert", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateClusterNetworkingConfig/creation_allowed_when_proxy_peering_is_set_in_enterprrise", "TestCountCatchAll/no_common_group (0.00s)\\n\"}", "TestStreams/StreamManyP", "TestConvertAuditEvent/AccessPathChan", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/empty_groups", "TestEvents/db.session.postgres.function_OneOf", "github.com/gravitational/teleport/lib/jwt::TestMarshalJWK/ECDSAP256", "TestOktaImportRuleMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[read]", "TestParseReviewFrequency/6month (0.00s)\\n\"}", "TestAutoEnrollCeremony_Run/macOS_device", "github.com/gravitational/teleport/lib/services::TestMatchAndFilterKubeClusters/emmpty_values", "FuzzParserEvalBoolPredicate/seed#19 (0.00s)\\n\"}", "TestWorkloadIdentityX509RevocationMarshaling", "TestAccessLists (0.08s)\\n\"}", "TestManagedSQLListAll (0.00s)\\n\"}", "TestGetServer/get_a_mysql_server (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertAuthPreference/invalid_device_trust_settings", "github.com/gravitational/teleport/lib/events::TestEvents/scp_OneOf", "TestReconcileResults/NoNewResult", "TestEKSFetcher (0.01s)\\n\"}", "TestParseRoleARN/valid_role_arn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyAppendKey", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenSource_GetIDToken/vallue_present", "TestA", "FuzzFetchMySQLVersion/seed#3 (0.00s)\\n\"}", "TestMergeStreams/compare_always_favors_A", "TestCheckGCPServiceAccounts/readon", "github.com/gravitational/teleport/lib/backend::TestLockKey/with_parts", "TestSearchEventsLimiterConfig (0.00s)\\n\"}", "TestEvents/print_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Running", "TestCursorBasics (0.03s)\\n\"}", "TestCheckAccessToKubernetes (0.00s)\\n\"}", "TestSliceMatchesRegex/foo-test (0.00s)\\n\"}", "TestSet/create/populated_with_duplicates (0.00s)\\n\"}", "TestClusterNetworkingConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_match_unset}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsRoot/root_cluster_UURI", "FuzzParsePacket/seed#5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/app/common::TestHeaderRewriter", "TestGetPolicyVersions/PolicyMatchLabels (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA/valid_CA", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction", "TestUnmarshalGraphError (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCheckAccountID/caaller_identity_does_not_match_expected_account_ID", "github.com/gravitational/teleport/lib/services::TestRoleParsing/test_case_'1'", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumentt/aws-redshift", "TestEC2SSMIAMConfigReqDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestAllowWhitespace", "TestConfig_CheckAndSetDefaults/f", "TestEvents/access_list.review_EventFields (0.00s)\\", "TestTrimToMaxSize/db.session.postgres", "TestOnceFunc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::FuzzReadProxyLineV2/seed#1", "TestRouter_DialSite/failure_to_dial_local_site", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_unset_unset}", "TestNewAWSNo", "github.com/gravitational/teleport/lib/utils/fanoutbuffer::TestCursorFinalizer", "TestMakeLabels/Multiple_maps_single_label_case (0", "github.com/gravitational/teleport/lib/events/pgevents::TestBuildSchema/cockroach", "FuzzParseRefs/seed#11 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/SessionRecordingAccess", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/node", "TestResolution (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/NotRequired/verbs=[update]", "TestFindAllEmptyStruct/struct_with_nil", "TestEvents/user.delete_OneOf (0.00s)\\n\"}", "TestExtraFields/text/level_component_times", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseTunnelService_ChecckAndSetDefaults/missing_listen", "TestEvents/db.session.mysql.debug_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyTrimPrefix/non-matching_triim_trims_nothing", "github.com/gravitational/teleport/lib/resumption::TestResumption/tunnel/SSH_throuugh_resumable_conn", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_match_nomatch}", "TestUpdateAppUsageTemplate (0.00s)\\n\"}", "TestStat", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_match_unset}", "TestCircuitBreaker_befo", "github.com/gravitational/teleport/lib/services::TestParseShortcut/db_services", "TestCredPropsConversions/CredentialC", "TestKubeResourceC", "TestRoleSetLockingMode (0.00s)\\n\"}", "TestSearchEventsLimiterConfig/empty_logger (0.00s", "TestRedisClient/GetToken/access_denied (0.00s)\\n", "TestGetKubeClientGetter/test#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/kube/token::TestGetTokenAudiences/modern_boound_token_with_default_kube_audience", "TestConve", "github.com/gravitational/teleport/lib/services::TestApplyTraits/GitHub_permissionns_in_allow_rule", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-snowwflake", "TestSAMLAuthRequest_Check/below_min_CertTTL (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_unset_unset_nomatch}", "TestSearchEvents (0.08s)\\n\"}", "TestAccessChecker_EnumerateMCPTool", "TestOktaCRUD/dele", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/!equals(labels.env,_\\", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/Proxy", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[]", "TestHostUsers_HostSudoers/glob_deny (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/marshal/slice", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/apps/IterateUnifiedResources/descending", "TestMigrate/real_world_4 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/real_world_1", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync/WWriteTimeout", "TestValidate_RequestedMaxDuration/only_the_assi", "TestEncodeDecodeCreateDatabaseUserMode (0.00s)\\n\"}", "TestIsValidHostname/label_too_long (0.00s)\\n\"}", "TestFilterItems/Multiple_Filters (0.00s", "TestOpenSearchFetcher/fetch_all (0.00s)\\n", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_prefer_webauthhn_over_sso", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/tampered_with_audience", "TestIsPermanentEmitError/agg_badParameter_", "TestServiceAccess/UpsertAutoUpdateAgent", "TestCheckSAMLIDPCA/unparseable_key (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/services::TestValidateWorkloadIdentity/maxiimum_x509_ttl_too_large", "TestPruneRequestRoles/user_login_hint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestDropConnections", "TestParseLegacyDynamoAttributes/st", "TestAuthorizer_AuthorizeAdminAction/OK_bot (0.00s)", "TestReviewRoundtrip (0.00s)\\n\"}", "TestSafeEnvAdd/duplicate_different_ca", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestPoll//WithResults", "TestStaticHostUserCRU", "github.com/gravitational/teleport/lib/utils/aws::TestIsRoleARN/valid_full_arn", "TestKubernetesServerUnmarshal (0.00s)\\n\"}", "TestMarshal/enterprise (0.00s)\\n\"}", "TestInitializeCache (0.00s)\\n\"}", "TestKeyTrimPrefix/empty_trim_trims_nothing (0.00", "TestKey_SignAndVerifyPROXY (0.25s)\\n\"}", "TestServiceAccess/DeleteCrownJewel/allowed_admin_states/MF", "TestParser/inequality_rhs_dynamic (0.00s)\\n\"}", "FuzzParseRefs/seed#12 (0.00s)\\n\"}", "TestSigstoreAttestorConfig_CheckAndSetDefaults/additional", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/duplicatte_ignore", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/verify_coverage/CreateDatabaseObject", "github.com/gravitational/teleport/lib/events::TestUploadCompleterEmitsSessionEnd//session.end", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/uuntrusted_signer", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeResourceNamesppace/returns_root_cluster_namespace_name", "Test_g", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/NotRequired", "TestLoginFlow_Begin_errors/NOK_empty_user (", "Test_makeGroupsStatus (0.00s)\\n\"}", "FuzzParseRefs/seed#10 (0.00s)\\n\"}", "TestMakeTableWithTruncatedColumn/column2 (0.00s", "TestCLIPrompt/OK_sso_with_per-session_MFA (0.0", "TestDesktopClipboard/single_role,_ex", "TestEscapeHelp (0.00s)\\n\"}", "TestEvents/auth_EventFields (0.00s)\\n\"}", "TestCheckAccessToSe", "TestEvents/saml.idp.service.provider.creat", "TestGetSingleHeader/NoValue (0.00s)\\n\"}", "TestSearchEvents/query_on_time_", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_DefaultChaannel/nil_channels", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/OK_required_scope_satisfied", "TestLoadProfile/non_existent_profile (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestSessionWriter/ResumeMiddle", "github.com/gravitational/teleport/api/internalutils/stream::TestRateLimitFailure", "TestIntegrationMarshalCycle (0.00s)\\n\"}", "TestServiceAccess/CreateCrownJewel/allowed_admin_states/MFAVerified", "TestCloudLabelsValidKey (0.00s)\\n\"}", "Test_parseRedisURI/single_insta", "TestGlobMatch/exclusive_child_glob_match (0.00s)\\n\"", "TestRedshiftFetcher", "TestIDTokenValidator", "TestValidateServerSideAgentConfig/over_max_groups_halt-on-error_cloud_", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/mattches_one_of_user_'level'_trait", "TestParser/error_evaluating_key (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphIAMConnfigReqDefaults/missing_integration_role", "github.com/gravitational/teleport/api/client::TestGetResourcesWithFilters", "TestParseShortcut/remote_cluster (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/single_group", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_generation", "Test_formatJSON/auto_compact (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertClusterNetworkingConfig/no_admin_action", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_unset_match}", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/storage_config_witth_absurd_destination", "github.com/gravitational/teleport/lib/services::TestApplyTraits/invalid_regexp_inn_logins_does_not_get_passed_along", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/scp", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/NotRequired", "TestWriteCmd/int (0.00s)\\n\"}", "TestPlatformAttestationProto (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestAttachPolicy/AttachToUser", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Equal//bundle_set_1_and_3_not_equal", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_Run/linux__device_succeeds", "TestReadAndRewriteXAuthPacket", "TestAccessCheckerKubeResources (0.01s)\\n\"}", "TestSearchEvents/query_on_time_range (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/lib/plugindata::TestModifySuccess", "TestAccessCheckerK", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/NotRequired/verbs=[create]", "TestReasonRequired (0.02s)\\n\"}", "TestGetServers/git_server_not_found (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##14", "FuzzParsePacket/seed#11 (0.00s)\\n\"}", "TestHostUsers_getGroups (0.00s)\\n\"}", "TestWritePreLoginResponse (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestAutoUpdatteVersionEvents", "TestDeleteCertAuthority/ca_deleted (0.00s)\\n\"", "TestVerifyAttestation/OK_allowed_devic", "TestVisitorRelative (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/array_of_objects_with_object_field", "TestOIDCAuthRequest_Check/normal_request (0.00s)\\", "Test_GetTcpAddr (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAPIServicee_CheckAndSetDefaults/too_many_selectors", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/2-leevel_object_2-elements", "TestEvents/session.upload_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/hasPrefix(1,_2)", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[updatee]", "TestAuthorizer_AuthorizeAdminA", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/NOK_no_sso_responnse", "Test_formatJSON/to_pretty (0.00s)\\n\"}", "TestCheckSAMLEntityDescriptor (1.46s)\\n\"}", "TestAuthorizer_Au", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestSSigstoreAttestorConfig_CheckAndSetDefaults/allowed_private_network_prefixes_is_innvalid", "TestParser/unary_func_with_env (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/server::TestSSMInstaller/ssm_run_failedd_in_download_content", "github.com/gravitational/teleport/lib/utils::FuzzReadYAML/seed#5", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/reject_when_requested_role_does_not_match_ALL_requested_kinds", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstDatabaseObjectImportMatch/mismatch", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestDeleteUser", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix/ipv6_mediium", "TestProtoStreamer/get_a_part_per_message (0.00s)\\n\"", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/user.update", "TestConfig_SetFromUR", "TestNewEC2InstanceFetcherTags (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::FuzzProxyLine_Bytes/seed#5", "github.com/gravitational/teleport/lib/services::TestApplyTraits/logins_substitutee_in_allow_rule_with_function", "TestMakeDesktopServiceHiddenLabel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestCalculatePerrmissions/deny_removes_permissions", "TestEvents/cert.generation_mismatch_OneOf (0.00s)\\", "github.com/gravitational/teleport/lib/config/openssh::TestWriteSSHConfig/modern_OOpenSSH_-_multiple_clusters", "FuzzTraitsExpressionParser/seed#34 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/SESSIION/encode", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_isJSONCompact", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/missing_QueueURL", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_nomatch_unset}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDBService", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_single_resource_with_matching_verb", "TestValidateAccessMonit", "TestValidateLocalAuthSecrets_passwordHash (0.00s", "TestEmitEditorChangeEvent/User_is_removed_from_the_editor_role_but_", "github.com/gravitational/teleport/api/observability/tracing::TestUploadTraces/nott_implemented", "TestFilterSAMLEntityDescriptor/no_filtering (0", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__STMT_SEND_LONG_DATA", "TestReporterTopRequestsLimit (0.00s)\\n\"}", "TestGetAWSPolicyDocument/aws-rds (0.00s)\\n\"}", "TestGetKubeResources (0.00s)\\n\"}", "TestValidateSQLServerDatabaseURI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/DeleteDynamicWindowsDesktop,disallowed:Unauthorized", "TestStdioHelpers/client_call_tool (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzReadAndRewriteXAuthPackett/seed#1", "github.com/gravitational/teleport/lib/services::TestConvertResource", "TestAccessGraphAWSIAMCo", "TestFindMatchingProxyDNS/Empty_FQDN_", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/pop_unknown_iid", "TestMinVerWithoutPreRelease (0.00s)\\n\"}", "TestEvents/access_list.create_OneOf (0.00s)\\n\"}", "TestReasonRequired/resource_request:_do_not_require_", "github.com/gravitational/teleport/lib/auth/stableunixusers::TestStableUNIXUsers", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_nomatch_nomatch}", "TestDeleteCertAuthority (0.04s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/events::TestEvents/app.delete_EventFields", "TestLicenseUnmarshal (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/msgraph::TestIterateGroupMembers", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/deny_wildcard_request_when_deny_is_matched", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_deploy_service_event", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Include_and_Exclude_-_exclude_wins_case_2", "TestListEC2ICE (0.00s)\\n\"}", "TestApplicationTunnel", "github.com/gravitational/teleport/lib/services::TestValidateStaticHostUser/no_mattchers", "TestRoleParse/non-scalar_and_scalar_v", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig/cloud_agent_connection_count", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_unset_match}", "TestCredentialLifetimeValidate/TTL_too_long", "TestProtoStreamLargeEvent/large_t", "TestParseShortcut/oktaassignments (0.00s)\\n\"}", "TestRoundTripper_RoundTrip/error_when_tripped", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRequest/remoove_teleport_web_session_cookies", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsRemoteUser/sysstem_user", "TestRe", "TestEvents/okta.applications.update_OneOf (0.00s)\\", "TestSSHMultiplexerService_CheckAndS", "github.com/gravitational/teleport/lib/msgraph::TestIterateUsers", "TestDatabaseExtensions (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestApplyTraits/full_kubernetes_rresources_replace_rules", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError/badParametter_err", "TestParseAdvertiseAddr/ipv6_address (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateAuthPreference/no_admin_action", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher//empty_nonmatch", "TestEvents/github.updated_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_unset_match}", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_empty_pointer", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfig/vvalid", "TestKeyHasSuffix/default_key_is_suffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/missing_args", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/storage_error", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[updatee_create]", "TestIsResponseSuccessful/codes.Unknown_error (", "FuzzParsePacket/seed#12 (0.00s)\\n\"}", "FuzzParsePacket/seed#28 (0.00s)\\n\"}", "TestMemoryDBFetcher", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_nomatch_unset}", "FuzzParsePacket/seed#14 (0.00s)\\n\"}", "TestCreateURI/valid_endpoint (0.00s)\\n\"}", "TestCheckAccessToWin", "github.com/gravitational/teleport/lib/events::TestEvents/kube.create_OneOf", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/Unauthorized/verbs=[list]", "TestMatch/unknown_namespace (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestReconciler/complex_scenario_wwith_multiple_created/updated/deleted_resources", "TestFilterItems/Exclude_All (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheNodeGroupsNameOverride/via_TeleportDatabaseName", "github.com/gravitational/teleport/lib/utils::TestSetTransform", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/vaalid:_no_TTL_request_defaults_to_the_const_requestTTL_if_access_expiry_is_larger", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_beforeRequest/rrecovering_after_allows_executions", "github.com/gravitational/teleport/lib/auth/keygen::TestBuildPrincipals", "TestServiceAccess/ForceAutoUpdateAgentGroup/disallowed_admin_states/U", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_CheckAndSeetDefaults/no_channels", "TestListReleases/OK_response (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestCloudProhibited/Clooud_prohibits_being_a_leaf_cluster_(UpsertTrustedCluster)", "github.com/gravitational/teleport/lib/healthcheck::Test_dialEndpoints/resolved_muultiple_healthy_addrs", "TestServiceAccess/UpdateUserTask (0.00s", "github.com/gravitational/teleport/lib/client/tncon::TestBufferedChannelPipeRead", "TestNewResourceExpression/fail_to_parse/e", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/upsert_no_acceess", "TestParser/and_expressions (0.00s)\\n\"}", "TestRotatingFileClient (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/invalid_issuer", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin/sseed#4", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumenttForAssumedRole", "TestServiceAccess/ListAutoUpdateAgentReports/", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/events::TestEvents/login_rule.create_OneOf", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestRemoveCredentialProccessByComment/no_config_file", "TestEvaluateTraitsMap/ifelse (0.00s)\\n\"}", "TestEC2SSMIAMConfigReq", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/no_label_match", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN", "TestValidateAccessRequest", "TestResourcePresenceReporting (0.0", "github.com/gravitational/teleport/lib/auth/keygen::TestGenerateHostCert", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate/nil_challenge", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/access_list_grants_to_user_event", "TestMFACeremony/OK_ceremony_not_required (0.00s)\\n\"}", "TestSessionAccessJoin/failRole/ssh (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteSuite/Max", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbServerName", "TestCLIPrompt/NOK_no_sso_response (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/MFAVerified/verbs=[updatee]", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::Test_basicHTTTPMaintenanceClient_Get/all_good_with_newline", "FuzzTraitsExpressionParser/seed#47 (0.00s)\\n\"}", "TestValidateSAMLIdPAC", "github.com/gravitational/teleport/lib/utils::TestOneFailingBackend", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestDocumentDBFeetcher/skip_unsupported_databases_with_assume_role", "github.com/gravitational/teleport/lib/services::TestProtoResourceRoundtrip/new", "TestServiceAccess/Create", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheNodeGroupsNameOverride", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGenerateHostCert/faail", "TestCircuitBreaker_afterExecution/su", "github.com/gravitational/teleport/api/client/webclient::TestParse/https://examplee.com:443/path?query=query#fragment", "TestRoundTripper_RoundTrip/failure_in_standby", "TestWriteCmd/Redis_nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeSS3Protos/Both_existing_and_new_are_nil", "TestExhaustiveNonEmptyBasics/non-empty", "TestListEC2ICE/pagination (0.00s)\\n\"}", "TestEventField_Schemas/2-level_object (0.00s)\\", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport", "TestParsePacket/COM_CHANGE_USER_inval", "github.com/gravitational/teleport/lib/sshutils/sftp::TestHomeDirExpansion/just_tiilde", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/missing_too", "github.com/gravitational/teleport/api/client::TestGetResources", "TestCreateBucketConfiguration/regular_region", "github.com/gravitational/teleport/lib/multiplexer::FuzzProxyLine_Bytes/seed#2", "TestDatabasePermissionMatch (0.00s)\\n\"}", "TestServiceAccess/UpsertDynamicWindowsDesktop,allowed:NotRequ", "TestMinVerWithoutPreRelease/ignores_rc (0.00s)\\n\"}", "FuzzNewExpression/seed#3 (0.00s)\\n\"}", "TestGlobToRegexp/special_chars_are_quoted (0.00s)\\n", "github.com/gravitational/teleport/lib/srv/db/endpoints::TestGetResolver", "TestValidateHealthCheckConfig/default_is_va", "TestHostUsers_CanCreateHostUser (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2", "github.com/gravitational/teleport/lib/backend::TestRangeEnd", "TestValidateCrownJewel/EmptyName (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetCreateDatabaseCreateMode/ddisabled", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/ipv6_address__and_port", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/no_storage_config", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/SSOTesttFlow_requires_ConnectorSpec", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Items", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetSessionRecordingConfig/no_admin_action", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/missingg_path", "TestCheckExpiredCreden", "github.com/gravitational/teleport/lib/services::TestFillSAMLSigningKeyFromExistinng/should_read_signing_key_from_existing_connector_with_matching_cert", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##1", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/MFA_credentials_for_another_user", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/future", "TestNormalizeECSResourceName/with_dots", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/secondd_factors/otp_allowed", "TestLoginFlow_BeginFinish/OK_Webau", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/expression_match", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/dangling_sepparator_multi", "TestRollbackGroups/unsupported_strategy", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/segment_too_longg", "FuzzTraitsExpressionParser/seed#20 (0.00s)\\n\"}", "TestValidateSAMLIdPACSURLAndR", "TestCompressAsTarGzArchive (0.00s)\\n\"}", "TestValidateAccessRequestC", "github.com/gravitational/teleport/lib/utils::TestByteCount/1kb", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/without_an_integration_client,_must_return_missing_credential_provider_eerror", "TestProxyLine_VerifySignature/failure_ipv6->ipv4", "FuzzParseDisplay/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_ValidateWithJWWKS/invalid_audience", "TestMatchAndFilterKubeClusters/empty_values (0", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequiredByEnv//upgraded_not_required_(for_target_addr)", "github.com/gravitational/teleport/lib/utils/mcputils::TestStdioHelpers", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/query_on_tiime_range_with_keyset", "TestServiceAccess/GetAutoUpdateAgentRollout/allowed_adm", "FuzzFetchMySQLVersion/seed#0 (0.00s)\\n\"}", "TestCreateURI/invalid_insecure_endpoint", "github.com/gravitational/teleport/api/client/proxy::TestClusterCredentials", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS/Empty_FQDN__returns_empty_string", "TestServiceAccess/DeleteData", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerDEBUG-1", "github.com/gravitational/teleport/lib/healthcheck::Test_dialEndpoints/resolved_zeero_addrs", "TestParseShortcut/kube_server (0.00s)\\n\"}", "TestEvents/sigstore_policy.delete_OneOf (0.00s)\\n\"}", "TestSQLManagedSe", "TestAppIsAWSConsole/CLI-only_AWS_App (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/duplicate_diifferent_case_ignore", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout", "github.com/gravitational/teleport/lib/events/dynamoevents::TestFromWhereExpr", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_MFA_and_MFA_was_verified", "TestMarshal/oss_with_public_endpoint (0.00s)\\n\"}", "TestSortedLabels/database_with_az", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Equal//bundle_set_1_and_2_not_equal", "TestEvents/github.deleted_OneOf (0.00s)\\n\"}", "TestOpenTunnelEC2 (0.01s)\\n\"}", "TestPublicOnlyVerifyAzure/RSA2048 (0.92s)\\n\"}", "TestRegisterAndLogin/passwordless (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParserHostCertContext", "TestValidateTokenWithJWKS/missing_boun", "FuzzParseDisplay/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/auth_preference.update_OOneOf", "TestEmitEditorChangeEvent/", "github.com/gravitational/teleport/lib/events::TestEvents/kube.update_EventFields", "TestFindMatchingProxyDNS/Tail_match (0.00s)\\n\"}", "TestAuthPreferenceValid", "TestMatchResourceLabels/wil", "TestParseReviewDayOfMonth/last (0.00s)\\n\"}", "Test_cosignKeyValidator_ValidateAndResolveDigest/untrusted_wron", "github.com/gravitational/teleport/lib/vnet/dns::TestServer/only_v6", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/v3_wiith_wildcard_deny.kubernetes_labels", "TestMapErr (0.00s)\\n\"}", "TestProjectIDFromServiceAccountName/missing", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics", "github.com/gravitational/teleport/lib/utils::TestGetAnyHeader", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/denying__an_uppercase_role_works", "github.com/gravitational/teleport/lib/utils::TestMarshalYAML/list_of_maps", "TestAutoProtocolD", "TestDatabas", "TestServiceAccess/CreateAutoUpdateConfig/allowed_adm", "TestEvents/db.session.permissions.update_OneO", "TestServiceAccess/GetAutoUpdateAgentReport/allowed_admin_states/", "github.com/gravitational/teleport/lib/events::TestEvents/auto_update_config.creatte_EventFields", "TestRoleMap/test_case_'dif", "TestTrustedClusterRBAC/update_no_access", "github.com/gravitational/teleport/lib/services/readonly::TestAccessGraphSettings", "TestGetServers/no_matches_for_ec2_id (1.34s)\\n\"}", "TestLogLimiter/", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/disallowed_admin_states", "github.com/gravitational/teleport/lib/utils::TestLocalAddrs", "github.com/gravitational/teleport/lib/cloud/aws::TestParsePolicyDocument/parse_wiithout_principals", "github.com/gravitational/teleport/lib/multiplexer::TestMux/required_PROXY_line", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse", "FuzzParserEvalBoolPredicate/seed#36 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_match_match_nomatch}", "github.com/gravitational/teleport/lib/tlsca::TestKeyUsage", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestDocumentDBFeetcher/skip_unavailable_databases", "github.com/gravitational/teleport/lib/tbot/config::TestSSHMultiplexerService_ChecckAndSetDefaults/wrong_destination_type", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal", "TestForceGroupsDone/unsupported_schedul", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/fails_if_slugged_jwt_is_used_with_non-slug_idp", "github.com/gravitational/teleport/lib/asciitable::TestMakeTableWithTruncatedColummn", "TestProxyLine_AddSignature/missing_cert (0.00s)", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/coomplete_initiators", "TestValidateAssumeStartTime/valid_start_time (0.", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/exists(labels.env)_||_(exists(labels.os)_&&_labels.os_!==_\\", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/exec", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestForceGroupsDone/vallid_transition", "TestParseAdvertiseAddr/trim_space (0.00s)\\n\"}", "TestKeyIDCompatibility/RSA (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestSessionTTL", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_nomatch_match}", "TestDialProxy/socks5 (0.00s)\\n\"}", "TestParseReviewDayOfMonth/15 (0.00s)\\n\"}", "TestGetConfigIntegratio", "TestVariable/no_curly_bracket_prefix (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestDatabasePermission", "TestExtraFields/text/caller (0.00s)\\n\"}", "TestGetScaleSetVirtualMachine/client_error (", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/verify_coverage", "TestStreams/DownloadNotFound (0.00s)\\n\"}", "Test_basicHTTPMa", "TestIDTokenValidator_Validate (0.48s)\\n\"}", "TestConfig", "TestRoles/FindRolesByName/found_one (0.00s)\\n\"}", "TestEmitEditorChangeEven", "TestServiceAccess/DeleteDatabaseObject/allowed_admin_states/MFAVeri", "TestServiceAccess/ListAutoUpdateAgentReports/allowed_admin_sta", "github.com/gravitational/teleport/lib/utils/typical::TestParser/integer_equality__(true)", "github.com/gravitational/teleport/lib/release::TestNewClient", "github.com/gravitational/teleport/lib/utils::TestKernelVersion/5.0.0-1028-gcp", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_match_match}", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenValidator_Validate//future", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached", "TestLogLevel/SetDEBUG (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/healthcheck::Test_newHealthCheckConfig", "github.com/gravitational/teleport/lib/srv/db/common/databaseobject::TestNewDatabaaseObject/missing_name", "TestPortRangesContains/42 (0.00s)\\n\"}", "TestResetCluste", "github.com/gravitational/teleport/lib/client/debug::TestGetReadiness/Success", "github.com/gravitational/teleport/lib/integrations/awsoidc/credprovider::TestCreddentialsCache", "TestParser/unary_func_no_args (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[]", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/us-west-2_with_region_from_imdsv2", "FuzzParsePacket/seed#18 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/nodes/resource_iterator/ascending", "TestToTouchIDCredentialPicker/", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestNextAuditDDateZeroTime", "github.com/gravitational/teleport/lib/player::TestBasicStream", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/signed_manifest_needs_reesolution", "TestStreams/Stream/Flaky=false,F", "TestGetRequestableRoles/filter_by_resources (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_unset_nomatch}", "TestUpsertAuthPreference/upser", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfig", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/auth/webauthn::TestCredentialBackupFlags", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/first_trigger_success_not_firing", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseNamesAndUsers/coombined_roles", "TestIsALPNConnUpgradeRequiredByEnv (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestRateLimitFailure", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/access_list_create_event", "github.com/gravitational/teleport/lib/healthcheck::TestNewManager/missing_Events", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_rolloutChangedInWiindow/rollout_changed_a_week_ago", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_unset_unset_match}", "Test_progressGroupsHaltOnError/single_group_unstarted_", "TestRotateCertAuthority/fail (0.00s)\\n\"}", "TestNextAuditDateZeroTime (0.00s)\\n\"}", "TestEvents/spiffe.federation.delete_OneOf (0.00s)\\", "TestGenerateKeypairEmptyPass (0.00s)\\n\"}", "TestJoinServiceGRPCServer_RegisterUs", "TestAccessMonitoringRuleCRUD/no_list_access_to_AccessMonitor", "TestPruneRequestRoles/app_request (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpsertUserTask/verbs=[create_update]", "github.com/gravitational/teleport/lib/auth/keygen::TestGenerateUserCert", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/Unauthorized/verbs=[read]", "TestStaticHostUserCRUD/l", "TestFindAllEmptyStruct (0.00s)\\n\"}", "TestParseShortcut/kube_servers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseUser/(caase-insensitive_db)_developer_allowed_only_specific_username/database_in_prod_dattabase", "TestIdentity_ToFromSubject/user_type:_sso (0.00s)\\n", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Items/ascending__order/sub_prefix_range_fetch", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/beloww_min_CertTTL", "TestInterpolate/traits_with_prefix_and_su", "github.com/gravitational/teleport/lib/events/athena::TestCollectedEventsMetadataMMerge/Merge_with_non-empty_metadata", "TestAWSSignerHandler/AssumeRole_denied (0.01s)\\n", "TestDeleteCertAuthority/ca_not_found (0.00s", "github.com/gravitational/teleport/lib/services::TestGetKubeClusterDomain/service11_fallback_to_cluster.local", "github.com/gravitational/teleport/api/types/accesslist::TestAccessListMemberDefauults", "github.com/gravitational/teleport/lib/services::TestUserLoginStateMarshal", "TestKeyTrimSuffix/empty_trim_trims_nothing (0.00", "github.com/gravitational/teleport/lib/backend::TestRangeEnd//abc", "github.com/gravitational/teleport/lib/web/ui::TestNewUserContext", "TestComputeMinRolloutTime", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstNewDatabaseObjectImportRule", "TestFetchInstallMethods (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestGetInstanceID/with_emptty_ID", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsSSHDeviceVerified//nok:_missing_AssetTag", "github.com/gravitational/teleport/lib/services::TestNewAccessCheckerForRemoteClusster", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/disallowed_admin_states/Unauthorized", "TestGetKubeClusterDomain/service1_dns_res", "TestEKSIAMConfigReqDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestPoll//NoVmsFeats", "TestMatchAzureIdentity/allow_exact_match (0.00s)\\", "TestEvents/session.leave_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestRegistrationFlow_Begin_wwebID/user_without_webID_mapping", "TestEnsureSCIMEndpoint/tcp_scheme (", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults", "github.com/gravitational/teleport/lib/events/athena::TestDeleteMessagesFromQueue", "TestValidateOrigin/N", "TestEvents/access_request.delete_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRequest/resiign_azure_JWT", "TestDatabaseFromRDSCluster (0.00s)\\n\"}", "TestServiceAccess/UpsertAutoUpdateAgentR", "FuzzParsePacket/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError/SStatusNotFound", "TestLoginFlow_Finish_errors/N", "TestFilterMapUnique/deduplicates_items (0.00s)\\", "github.com/gravitational/teleport/lib/backend::TestKeyCompare/greater", "github.com/gravitational/teleport/lib/srv/app/aws::TestURLForResolvedEndpoint/badd_resolved_endpoint", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin/sseed#6", "Test_Channels_CheckAndSetDefaults/n", "TestEventField_Schemas/1-level_object (0.00s)\\", "TestEvents/access_graph.crown_jewel.d", "github.com/gravitational/teleport/lib/services::TestApplyTraits/full_deny_kuberneetes_resources_replace_rules", "TestParseRoleARN/arn_fails_to_parse (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##38", "Test_exportEndpoint/write_value (0.00s)\\n\"}", "TestCheckGCPServiceAccounts/full_access_role", "TestFromProtoNils/spec (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/ssuccess", "TestParseShortcut/okta_assignment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMeetsMaxVersion_emptyOrInvalid", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/access_list_review_create_event", "TestTrimToMaxSize/db.session.cassandra.prepar", "TestServiceAccess/get_verb_not_al", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/unix_socket#01", "TestRDSFetch", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestRoundtrip", "TestMergeStreams/compare_always_favor", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//update_ok", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestAppendLeafCluster", "TestMergeStreams/both_streams_empty (0.00s", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/onnly_1_very_big_trimmable_event", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetServerUUID/returnss_empty_string_when_given_leaf_cluster_URI", "TestDesktopClipboard/multipl", "Test_Channels_CheckAndSetDefaults", "TestGlobMatch/simple_literal_mismatch (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/ConnecttorSpec_requires_SSOTestFlow", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumentt", "github.com/gravitational/teleport/lib/utils/aws::TestValidateRoleARNAndExtractRolleName/invalid_account_ID", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetServerUUID/returnss_root_cluster_server_UUID", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/everything_at_once", "github.com/gravitational/teleport/lib/cloud/azure::TestManagedSQLListAll/servers", "TestMergeS3Protos/Policy_merg", "TestEvents/device.update_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accesslists::TestAccessListIsMember", "TestResetClusterNetworkin", "github.com/gravitational/teleport/api/types::TestAppIsAzureCloud", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/UpdateAutoUpdateVersion", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetIntegrrationCertAuthorities/github-success", "github.com/gravitational/teleport/api/types::TestCheckAndSetDefaultsWithLink", "TestAllDeviceEnumsMapped/OSType/OS_TYPE_LINUX (", "TestCloudLabelsDisabled (0.00s)\\n\"}", "TestPlainHttpFallback/Ping (0.00s)\\n\"}", "TestNewResourceExpression/matching", "TestPostgresRecording/queries (0.00s)\\n\"}", "TestBufferOverflow (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/ForceAutoUpdateAgentGroup", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_nomatch_match}", "TestServiceFile (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding", "TestAccessGraphAWS", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenValidator_Validate/fuuture", "TestAddCredentialProcessToSec", "github.com/gravitational/teleport/lib/services::TestCertAuthorityWatcher/Subscribbe_with_filter", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_match_match}", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/component_ttimestamp", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_match_match_unset}", "github.com/gravitational/teleport/api/types/accessgraph::TestAuthorizedKey/missinng_user", "TestServiceAccess/GetDynamicWindowsDesktop,allowed:Unauthorized,verbs", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenSource_GetIDTokenn", "TestValidateAccessMonitoringRule/invali", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewMatcher/seed#2", "Test_computeRolloutState/one_group_done", "github.com/gravitational/teleport/lib/labels::TestCloudLabelsAsync", "TestAWSIAMPollOIDCProviders (0.00s)\\n\"}", "TestEncodeDecodeRequireMFAType/OFF/decode (0.00s)\\n", "TestSet/iteration/with_populated_set (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws::TestValidateRoleARNAndExtractRolleName/not_role_arn", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/empty__keyless_authority", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestRPCClientReqquestPartialLength", "TestResetAuthPreference/", "TestCheckAndSetDefaultsWithLink (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/MFAVerifiedWithReuse/veerbs=[create_update]", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/services::TestAccessCheckerWorkloadIdentityy/no_labels_role,_no_labels_wi", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/Create/oktta_service_creating_okta_users_is_allowed", "TestCheckSPIFFESVID/no_roles (0.00s)\\n\"}", "TestIsInstanceMetadataAvailable/not_av", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users/enabled", "github.com/gravitational/teleport/lib/cloud/aws::TestParsePolicyDocument/parse_wiithout_resource", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/invallid_format_#_4", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsSSHDeviceVerified//nok:_empty_extensions", "github.com/gravitational/teleport/lib/saml::TestWriteSAMLPostRequestWithHeaders", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseDBURI//clusters//foo/leaves/bar/dbs/db", "github.com/gravitational/teleport/lib/scopes::TestCompare/root_equivalence", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/ECS_Tags/all_tags_match", "github.com/gravitational/teleport/lib/events::TestDynamicUnknownType", "TestProxyLine_AddSignatu", "TestConvertUsageEvent/di", "github.com/gravitational/teleport/lib/joinserver::TestTimeout/bad_proxy_client", "TestTrimToMaxSize/device (0.00s)\\n\"}", "TestConvertA", "TestGetCertAuthority/ca_not_found (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenValidator_Validate/fuuture", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName/contains_uppercase_character", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenValidator_Validate/suuccess", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfigReqDeefaults/missing_region", "TestValidateWorkloadIdentity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestWatcherMulti", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestHandleAccessReequest/test_unapproved_user_for_approved_role", "FuzzTraitsExpressionParser/seed#38 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_unset_unset}", "github.com/gravitational/teleport/api/types::TestPortRangesContains/0", "TestConvertResponse/timeout_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyHasPrefix", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_match_unset}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCheckAccountID/emmpty_expected_account_ID_is_always_valid", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstApplyDatabaseObjectImportRules/errors_are_counted", "TestEvents/trusted_cluster.delete_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestReconciler/resources_with_diffferent_origins_overwrite_each_other_when_allowed", "github.com/gravitational/teleport/lib/web/app::TestMatchAll", "github.com/gravitational/teleport/lib/events::TestStreamSessionEvents/Error", "TestCreateGitServerRequest_Check/missin", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestDDockerAttestorConfig_CheckAndSetDefaults/not_a_UDS", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/get_authoritiees_no_access", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfig/inteegration_role_does_not_exist", "TestParseRegion/valid_full_region (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#28", "github.com/gravitational/teleport/lib/kube/token::Test_kubernetesSupportsBoundTokkens", "github.com/gravitational/teleport/lib/backend::TestSanitize//namespaces/.", "TestJoin/multi_segment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_unset_match}", "TestServiceAccess/DeleteDatabaseObjec", "github.com/gravitational/teleport/lib/utils/aws/stsutils::TestNewFromConfig/falsee_does_not_change_FIPS", "TestDatabaseUnmarshal/tls_mode_insecure (0.00s)\\n\"", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters", "TestGuessProxyHostAndVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateStaticHostUser/invaliid_node_labels", "TestKubeR", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName/starts_with_number", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers//skip_unrecognized_engines_with_assume_role", "TestRollbackGroups/group_already_rol", "TestVariable/invalid_syntax (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbs=[[]", "github.com/gravitational/teleport/lib/events::TestEvents/kube.request_OneOf", "TestNewWebClientHTTPProxy (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/inventory/internal/delay::TestHeapBasics", "github.com/gravitational/teleport/lib/cryptosuites::TestSuites/SIGNATURE_ALGORITHHM_SUITE_LEGACY", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/200", "TestApplyAzureDatabaseNameSu", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/kubernetes/resource_iterator", "github.com/gravitational/teleport/lib/scopes::TestCompare/multi-level_descendant", "github.com/gravitational/teleport/lib/healthcheck::Test_newUnstartedWorker", "TestPruneRequestRoles/root_login_hint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct", "TestWrapPayload/non", "github.com/gravitational/teleport/lib/httplib::TestConvertResponse/timeout_error", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_unset_unset}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/oktta_service_updating_non-Okta_user_is_an_error", "TestEvents/plugin.delete_OneOf (0.00s)\\n\"}", "TestGetInstanceID/with_resource_ID (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnmarshalDevice/fail_string_aas_num", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasksByIntegration/verbs=[]", "FuzzParserEvalBoolPredicate/seed#30 (0.00s)\\n\"}", "TestCheckAccessToRemoteCluster (0.00s)\\n\"}", "Test_computeRolloutState/empty_groups (0.0", "TestIsALPNConnUpgr", "github.com/gravitational/teleport/lib/events/s3sessions::TestEndpoints/fips", "TestBuildRoleARN/valid_r", "Test_parseRedisURI/correct_URI (0.00s)\\n\"}", "TestValidateRoleARNAndExtractRoleName/i", "TestDatabaseUnmarshal (0.01s)\\n\"}", "TestInvalidPayloadSize/invalid_paylo", "TestEvents/access_list.delete_OneOf (0.00s)\\n\"}", "TestRedshiftServerlessFetcher (0.03s)\\n\"}", "TestLastTick (0.00s)\\n\"}", "TestConvertVPC/with_name_tag (0.00s)\\n\"}", "TestValidateSegment/valid_segment (0.00s)\\n\"}", "Test_attributes", "TestGetInstanceID/request_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA/multiple_activve_keys", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_makeGroupsStatus", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.bind_OneOf", "Test_setContainerImageFrom", "Test_copyAtMost (0.00s)\\n\"}", "TestIsInstanceMetadataAvailable/on_moc", "TestValidate_RequestedMaxDuration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/saml", "TestServiceAccess/Ups", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/disallowed_admin_states", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestSAMMLIdPBuildScriptCheckAndSetDefaults/empty_pool_name", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/EmpptyName", "github.com/gravitational/teleport/lib/auth/okta::TestCheckOrigin", "github.com/gravitational/teleport/lib/services::TestAccessChecker_EnumerateMCPToools/allow_wildcard,_deny_specific_value", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect", "github.com/gravitational/teleport/lib/services::TestParseShortcut/apps", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors//NOK_assertion_with_bad_origin", "github.com/gravitational/teleport/lib/vnet/dns::TestServer/forward_to_upstream", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/deny_remotee_and_local", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/error", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/multi-segment_innvalid_chars_last", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//\\", "github.com/gravitational/teleport/lib/srv/discovery/common::TestAuroraMySQLVersioon/5.6.mysql_aurora.1.22.1", "TestRegistrationFlow_BeginFinish (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_IssueCChallenge", "TestParser/negation_of_expression (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups,_same_day,_different_start_hour,_no_wait_time", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp/simple_values_are__replaced_directly", "TestUnifiedResourceCacheIterateResources (0.05s)\\", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__with_no_labels_has_access_to_nothing", "TestCertAuthorityWatcher/Subscribe_with_fil", "github.com/gravitational/teleport/lib/reversetunnel/track::TestFullRotation", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/NotFirstConnSynnc/BasicIO", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbServerName/returrns_leaf_cluster_db_server_name", "github.com/gravitational/teleport/lib/events/s3sessions::TestEndpoints/without_fiips", "github.com/gravitational/teleport/lib/utils::TestRemoveSecure_symlink", "TestValidate_RequestedMaxDuration/only_the_assigne", "TestAWSSignerHandler/s3_access_missi", "github.com/gravitational/teleport/lib/services::TestCheckAccessToWindowsDesktop", "TestReadEnvironment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey//support_nil_RequireResidentKey", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_nil_pointer", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//create_no_access", "TestEvents/upgradewindowstart.update_OneOf (0.00s", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheNodeGroupsNameOverride/via_teleport.dev/database_name", "TestAddRoleDefaults/okta_", "TestValidateTokenWithJWKS/wrong_audience (0.00s", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/one_rrole_in_the_roleset_matches", "TestProxyLine_VerifySignature/success_v6 (0.00", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/membership-requires", "github.com/gravitational/teleport/api/types::TestCloning/*types.ServerV2", "FuzzParsePacket (0.01s)\\n\"}", "FuzzMongoRead/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/error_rremain_tripped", "TestParseShortcut/access_requests (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestJSON/session_leave_event", "TestEvents/health_check_config.create_Even", "FuzzParserEvalBoolPredicate/seed#2 (0.00s)\\n\"}", "TestParseReviewFrequency/12m (0.00s)\\n\"}", "TestCeremony_Run/windows_ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/slices::TestFilterMapUnique", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAPIServicee_CheckAndSetDefaults/valid_with_labels", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/utils/gcp::TestSortedGCPServiceAccounts/mixxed_invalid_and_valid_accounts", "TestKubeResourcesMatcher (0.00s)\\n\"}", "TestDiscoverEventDataToUsageEvent (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/wrongly_signed_index", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/invalid_connection_mode", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__mismatch_equivalent", "TestIntegrationAthenaEventExport (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstCalculateDatabaseNameFilter/no_matching_rules", "Test_newHealthCheckConfig/applies_defaults (", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.directory.read_OOneOf", "github.com/gravitational/teleport/lib/reversetunnelclient::TestResolveViaWebCliennt/no_addrs_yields_errors", "TestEvents/access_graph.crown_jewel.create_", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/reject_when_requested_role_does_not_allow_all_requested_kinds", "TestEvents/mfa_auth_challenge.create_EventF", "github.com/gravitational/teleport/lib/srv/db/common/kerberos::TestConnectorKInitCClient/invalid_AD_config", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_unset_nomatch}", "Test_pro", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_unset_unset_unset}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.user.ddeactivate", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/automaticupgrades::TestIsEnabled/invalid_vaalue_returns_false", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/disallowed_admin_states/Unauthorized", "TestHostUsers_getGroups/test_deny_on_grou", "TestSet/contains/on_empty_set (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy/peer::TestClientCredentials/invalid_ppeer_id", "Test_progre", "TestCircuitBreaker_Exe", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerForCluster", "TestWriteClusterSSHConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//OK_bot", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/CreateUserTask", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestIsInstanceMetadataAvaillable/zero_ID", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_regex_expression_deny_but_doesn't_apply_to_all_pods", "github.com/gravitational/teleport/lib/services::TestParseShortcut/session_recordiing", "github.com/gravitational/teleport/lib/events/athena::Test_consumer_sqsMessagesColllector/verify_if_collector_finishes_execution_(via_closing_channel)_upon_reachinng_maxUniquePerDayEvents", "github.com/gravitational/teleport/lib/srv/server::TestAzureWatcher/all_vms", "Test_dialEndpoints/resolver_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_nomatch_unset}", "TestEvents/access_graph.crown_jewel.c", "TestExtraElastiCacheLabels/no_nodes (0.00s", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[update__create]", "TestRoleParse/full_valid_role_v6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerifiedWithReuse/verbs=[list]", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/duplicate_iggnore", "github.com/gravitational/teleport/lib/services::TestGuessIfAccessIsPossible/sessiion_write_denied", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/wworks_with_denied_roles", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeSS3Protos/Policy_merge_failed", "github.com/gravitational/teleport/lib/services::TestValidateReverseTunnel/valid_ttunnel", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/target__location_using_wildcard", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_beforeRequest", "github.com/gravitational/teleport/lib/services::TestParseShortcut/netconfig", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCreateEC2ICERequeest/no_fields", "TestMigrateProcessDataObjects (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestGetClientUserIsSSO", "TestServiceAccess/UpdateVnetConfig/allowed_admin_states/MF", "TestJSON/MySQL_statement_reset (0.00s)\\n\"}", "TestHostUsers_HostSudoers/multi", "TestParseDestination (0.00s)\\n\"}", "TestRouter_DialSite/default_to_dialing_loca", "TestHostUsers_HostS", "TestEvaluateTraitsMap/set_methods (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCheckAccountID/caaller_identity_matches_expected_account_ID", "TestMemoryListenerDialTimeout (0.10s)\\n\"}", "TestDatabaseFromAzureDBServer (0.00s)\\n\"}", "TestAuthConfig/GCP_IAM_Auth/check (0.00s)\\n\"}", "TestListEC2ICE/no_vpc_id (0.00s)\\n\"}", "TestCheckDatabaseRoles (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToAzureCloud/emptyy_role_set", "github.com/gravitational/teleport/lib/utils/aws::TestIsUserARN", "TestWriteCmd/int64 (0.00s)\\n\"}", "TestSessionRecordingMode/strict_def", "TestUnifiedResourceCacheIteration/", "TestAzureDBServerFetchers/skip", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_reconciler_computeeStatus/groups_are_unset_if_schedule_is_immediate", "TestMultiIntervalVariableDuration (0.90s)\\n\"}", "TestSignAndVerify/Ed25519 (0.00s)\\n\"}", "Test_transport_rewriteRedirect/remot", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/connect_too_test_database,_no_auto-provisioning", "TestDatabaseFromRDSProxy (0.00s)\\n\"}", "TestGetClusterU", "TestInterpolate/mapped_traits_with_email", "TestEvents/x11-forward_OneOf (0.00s)\\n\"}", "TestCalc", "TestSet/add/to_populated_set (0.00s)\\n\"}", "TestCheckAccessToDatabase (0.00s)\\n\"}", "TestMemoryDBFetcher/fetch_prod (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/root", "TestOIDCCheckAndSetDefaults (0.00s)\\n\"}", "TestRoundTripper_RoundTrip/success_in_standby", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/utils/typical::TestParser/and_literals", "TestShouldDeleteServerHeartbeatsOnShutdown (0.0", "TestWriteCmd/error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/NotRequired/verbs=[update]", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSubnets/paginnation", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/float", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/UpsertAutoUpdateVersion", "TestMakeCAKeySet/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpInsert", "github.com/gravitational/teleport/lib/services::TestMatchResourceByHealthStatus/sserver_health_is_empty", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/memory:://", "TestReadProxyLineV2/malformed_PROXY_v2_he", "TestEvents/db.session.mysql.", "TestNewAWSNodeFromE", "TestEKSIAMConfig/valid (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/disallowed_admin_states", "FuzzParserEvalBoolPredicate/seed#21 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::FuzzProxyLine_Bytes/seed#1", "TestEvents/saml.deleted_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestDiscoveryConfigMarshal", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_match_unset}", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/standard_literal", "TestKey_SignAndVerifyPROXY/ECDSAP256 (0.00s)\\n\"}", "TestComputeMinRolloutTime (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestOutput/text/warn", "TestParseReviewFrequency/3months (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/remmote_app,_redirect_to_app_public_addr", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/NOK_required_challenge_extensions_not_provided", "TestGetMode/config_enables,_no_version (0", "TestIDTokenValidator_Validate (0.00s)\\n\"}", "TestMakeDiscoverySuffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestCompare/empty_root_in_ancestor__case", "TestAzureWatcher/resource_group_wildcard (0.00s", "github.com/gravitational/teleport/lib/auth/touchid::TestRegisterAndLogin", "TestBuildRoleARN", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_bbad_version", "TestOutput/json/trace (0.00s)\\n\"}", "TestMarshalMapConsistency (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/vnet/diag::TestGenerateReport_FailedCheck", "TestPortRangesContains/30 (0.00s)\\n\"}", "TestUnifiedResourc", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_match_nomatch_match}", "TestEvents/cert.create_EventFields (0.00s)\\n\"}", "TestCreateGitServerRequest_Check (0.00s)\\n\"}", "TestJSON/session_end_event (0.00s)\\n\"}", "TestString//clusters/teleport.sh/dbs/", "TestParseShortcut/networking (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams/UploadDownlload", "github.com/gravitational/teleport/lib/sshutils/x11::TestReadAndRewriteXAuthPackett", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_client,_must_return_the_credentials", "TestEvents/saml.idp.auth_OneOf (0.00s)\\n\"}", "TestSe", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet_CheckAndSetDefaults", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync/BBasicIO", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel", "github.com/gravitational/teleport/lib/srv/server::TestAzureWatcher/filter_by_locaation", "TestIssuerFromPublicAddress/valid_", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAMWiithPresetPolicy/with_PolicyPresetUnspecified", "TestAzureIdentityMatcher_Match/deny_m", "TestConversion/AccessDenied (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level", "TestOktaCRUD/Cre", "github.com/gravitational/teleport/lib/services::TestParseShortcut/accessrequest", "TestClient_ClusterDetails (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestDefaultImplicitRules", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/FindRolesByName", "TestIDTokenVa", "Test_newHealthCheckConfig (0.00s)\\n\"}", "TestHealthCheckConfigCRUD/CreateHealthCheckConfig_is_not_allowed (0.00s", "github.com/gravitational/teleport/lib/client/db/opensearch::TestWriteConfig", "github.com/gravitational/teleport/lib/events::TestEvents/port_EventFields", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationDrryRunValidation", "TestTrimToMaxSize/spiffe.svid.issued (0.00s)\\n\"}", "TestEKSIAMConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/session.disk", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/secondd_factors/bypass_self_hosted", "TestRateLimitFailure/simultaneous (0.00s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateAgentRollout/allow", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states", "TestIDTokenValidator_Validate/invalid_au", "TestIsRDSInstanceSupported (0.00s)\\n\"}", "FuzzParsePacket/seed#24 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/accessrequest::TestGetResourceDetails", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/multii_allowed_roles", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.authenticaate", "github.com/gravitational/teleport/lib/services::TestWindowsDesktopGroups/allow_laabels", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetWARN", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/get_current_ussers_when_no_access", "github.com/gravitational/teleport/lib/events::TestEvents/privilege_token.create_OOneOf", "github.com/gravitational/teleport/lib/client/debug::TestSetLogLevel/Success", "TestMux/required_PROXY_line (0.01s)\\n\"}", "TestDisplay/invalid_unix_socket (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/ui::TestNewUserContextCloud", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/NOK_no_ca", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states", "github.com/gravitational/teleport/lib/services::TestRoleSetEnumerateDatabaseUserssAndNames/developer_allowed_any_username_in_stage_database_except_root", "TestAllDeviceEnumsM", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_unset_match}", "TestServiceAccess/ListDatabaseObjectImportRules/allo", "github.com/gravitational/teleport/lib/services::TestServersCompare/compare_serverrs", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/verify_coverage/UpsertDatabaseObject", "TestRBAC/get_with_secrets_no_access (0.00s)\\", "TestDestinationFromURI/relative/dir (0.00s)\\n\"}", "TestOIDCUnmarshal/multiple_redirect_urls (0.00s)\\", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/NotRequired/verbs=[create_update]", "FuzzParserEvalBoolPredicate/seed#35 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/DatabaseUserCreate", "TestSafeEnvAddFull/skip_dangerous_", "TestNewAppV3/mcp_missing_run_as_host_user (0.00s)\\n", "github.com/gravitational/teleport/lib/cloud/provisioning::TestOperationCheckAndSeetDefaults/trims_trailing_and_leading_spaces", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Role_is_granted_to_user", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress/onlly_host", "github.com/gravitational/teleport/lib/backend::TestKeyIsZero", "github.com/gravitational/teleport/lib/auth/join/oracle::TestCreateSignedRequest", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/NotFirstConnSynnc/CloseTimeout", "TestServiceAccess/verify_coverage (0.00s", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/success", "TestDescendingSegments/root (0.00s)\\n\"}", "TestNodeWatcherFallback (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setGroupStates/morre_groups", "TestContext_GetAccessState/device_trust:_", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/upsert_verb_not_allowed", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states", "github.com/gravitational/teleport/lib/client/db/mysql::TestOptionFile", "TestParseShortcut/semaphore (0.00s)\\n\"}", "TestWi", "TestEvents/db.session.malformed_packet_OneOf (0", "github.com/gravitational/teleport/lib/events::TestJSON/MySQL_statement_close", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA/empty_key", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_empty_challengge", "TestVariable/too_many_levels_of", "TestCheckAccessWithLabelExpressions/user_gr", "TestIDTokenValidator_Validate/future (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestMetrics", "TestThirdpartyStreams/UploadDownload (0.00s)", "github.com/gravitational/teleport/lib/versioncontrol/github::TestCachedReleases", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/int64", "TestSuites/SIGNATURE_ALGORITHM_SUITE_FIPS", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:NotRequired,verbs:[read]", "TestTrimToMaxSize/access_lis", "TestKeyPrefix (0.00s)\\n\"}", "Test_windowRepr_", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser", "TestVerifyAttestation/OK_format=tpm_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_match_nomatch_unset}", "TestApplyDatabaseObjectIm", "github.com/gravitational/teleport/lib/events::TestEvents/bot.update_EventFields", "TestSearchSessionRange/since_specified (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2ICE/valid__for_listing_endpoints", "TestProjectIDFromServiceAccountNam", "github.com/gravitational/teleport/lib/utils/aws::TestResourceARN/role", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay/seed#1", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/update/nonn-okta_service_removing_okta_origin_is_an_error", "github.com/gravitational/teleport/lib/utils/slices::TestDeduplicateKey/EmptyStrinngSlice", "TestServiceAccess/TriggerAutoUpdateAgentGroup/allowed", "github.com/gravitational/teleport/lib/backend::TestKeyPrependKey", "TestServiceAccess/GetDatabaseObjectImport", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetServerUUID", "TestRollbackGroups/no_groups_in_rollout", "github.com/gravitational/teleport/lib/healthcheck::Test_dialEndpoints/resolved_a__mix_of_healthy_and_unhealthy_addrs", "TestCheckAzureIdentities/readonly_rol", "TestServiceAccess/ListDynamicWindowsDesktops,allowed:MF", "github.com/gravitational/teleport/api/client::Test_websocketALPNClientConn/Read", "TestOriginLocalRedirectURI (0.00s)\\n\"}", "TestParseLegacyDynamoAttributes/map_f", "TestRBAC/upsert (0.00s)\\n\"}", "TestCheckSAMLIDPCA/multiple_active_keys (0.00s)\\n\"", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//OK_local_user_valid_mfa", "Test_cosignKeyValidator_ValidateAndResolveDigest/untrusted_signed_ma", "github.com/gravitational/teleport/lib/utils/log::TestSlogTextHandler", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/role_name_in_chhina_partition_and_account", "github.com/gravitational/teleport/lib/healthcheck::TestManager", "TestUnknownIdentifier (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/win_desktop", "FuzzParsePacket/seed#26 (0.00s)\\n\"}", "TestEncodeDecodeCreateData", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/valid", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewExpression/seed#0", "FuzzParsePacket/seed#31 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertSessionRecordingConfig/unauthorized", "github.com/gravitational/teleport/lib/events::TestDynamicTypeNotSet", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_nomatch_match}", "TestCreateEC2ICERequest/missi", "github.com/gravitational/teleport/lib/linux::TestDMI/success", "github.com/gravitational/teleport/lib/services::TestApplyTraits/values_are_expandded_in_windows_desktop_labels", "github.com/gravitational/teleport/api/client/webclient::TestPingError", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/reqquested_roles_is_empty", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL", "github.com/gravitational/teleport/lib/services::TestServersCompare", "github.com/gravitational/teleport/lib/services::TestValidateSAMLIdPACSURLAndRelayyStateInputs", "Test_transport_rewriteRedirect/local_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states/NotRequired", "TestGetRootClusterURI/trims_", "TestServiceAccess/ListAut", "Test_setGroupStates/no_groups (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceEnrolllStatus", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/role_requuires_trusted_device,_device_verified", "TestDestinationFromURI/file:///absolute/dir", "TestValidate_WithAllowRequestKubernetesResources/al", "TestCheckSAMLEntityDescriptor/wi", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/nameespaced_resource_without_namespace_deny", "TestParseAdvertiseAddr/ok_host (0.00s)\\n\"}", "TestCreateGitServerRequest_Check/field-too-l", "TestCertAuthorityWatcher/Subscribe_all (1.01s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level_compoonent", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTryReconcile/existiing_rollout_and_config_but_no_version", "TestMarshalPluginWithStatus (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#22", "github.com/gravitational/teleport/lib/srv/db/endpoints::TestGetResolver/valid", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/set_defaults", "TestNewAppV3/mcp_missing_spec (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/no_curly_bracket__prefix", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiigOutput", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/disallowed_admin_states", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFESVIDOutput_CheckAndSSetDefaults/invalid_ip", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/desktops/IterateUnifiedResources/descending", "FuzzTraitsExpressionParser/seed#46 (0.00s)\\n\"}", "TestServ", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/allowed_read_access_to_discovery_configs", "github.com/gravitational/teleport/lib/asciitable::TestHeadlessTable", "Test_splitExpression (0.00s)\\n\"}", "TestValidateServe", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestForceGroupsDone/group_already_done (0", "TestListener/max_connections_exceeded (0.00s)\\n\"}", "TestCollectProfiles (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/node_labeels_with_empty_list_value_matches_nothing", "TestLogLevel/SetLowerINFO (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient/GetTToken", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestEC2IsInstanceMetadataAvvailable/not_available", "github.com/gravitational/teleport/lib/kube/token::TestIDTokenValidator_Validate", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/rediss_schema_is_accepted", "github.com/gravitational/teleport/lib/itertools/stream::TestCollectPages/basic-deepagination", "TestIDTracker/pop_unknown_id (0.00s)\\n\"}", "TestServiceAccess/UpsertVnetConfig_with_existing/allo", "TestIDTokenValidator_Val", "TestSSMInstaller/ssm_with_custom_steps (0.00s)\\n\"", "TestServiceAccess/delete_success (0.00s", "TestRedisClient/List/ListWithinGroup (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKernelVersion/4.18.0-80.11.2.el88_0.x86_64", "TestValidateLocalAuthSecrets_empty (0.00s)\\n\"}", "TestDatabaseOutput_CheckAndS", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/NotFirstConnSynnc/ConcurrentMethods", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/int32", "TestServiceAccess/CreateCrownJewel", "TestGetResourcesWithFilters (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/inventory::TestServiceCounter", "github.com/gravitational/teleport/lib/utils/aws/dynamodbutils::TestIsFIPSEnabled//FIPS_binary_with_skip", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServicesRequest/missing_region", "TestSearchEventsLimiterConfig/empty_burs", "TestJoinServiceGRPCServer_RegisterUsing", "TestConfigTLS (0.00s)\\n\"}", "TestGetServer/get_a_postgres_server (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.cassanndra.prepare", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.mysql..statements.bulk_execute", "github.com/gravitational/teleport/lib/utils/interval::TestVariableDurationScalingg/standard_presence_params", "TestAccessRequestFilter/user_", "github.com/gravitational/teleport/api/observability/tracing::TestUploadTraces/succcessfully_uploads_spans", "TestClusterCredentials/no_cluster_oid_set (0", "TestCommands/session (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNewAppV3/aws_app_using_integratiion", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/delete_nonexisting_resource", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/NotRequired/verbs=[read]", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialCreationResponse_nil", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestString//clusters/teleeport.sh/db_servers/dbserver1", "TestServiceAccess/ListDatabaseObjectImportR", "TestOriginLocalRedirectURI/host_only (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetServiceFQDN/service2", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_nomatch_match}", "github.com/gravitational/teleport/lib/accesslists::TestGetInheritedGrants", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/string_literal", "github.com/gravitational/teleport/lib/backend::TestSanitize//./params", "github.com/gravitational/teleport/lib/config/openssh::TestWriteMuxedSSHConfig/moddern_OpenSSH_-_multiple_clusters", "github.com/gravitational/teleport/api/types::TestAccessRequestFilter", "TestGetAuthorizationHeaderValues (0.00s)\\n\"}", "TestMatchResourceByFilters_Helper/no", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-spanneer-without-uri", "TestFilterSAMLEntityDescriptor/all_invalid (0.0", "TestParseS", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerified", "TestServiceAccess/UpdateAutoUpdateConfig/allowed_admin_states", "TestServiceAccess/GetUserTask/ver", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_nomatch_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_match_nomatch}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeResourceNamesppace", "TestMovesCorruptedUploads (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/postgres/custom_endpoint", "github.com/gravitational/teleport/api/trail::TestConversion/io.EOF", "FuzzTraitsExpressionParser/seed#18 (0.00s)\\n\"}", "TestAuthConfig/missing_GCP_con", "github.com/gravitational/teleport/lib/services::TestTraitsToRoleMatchers", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestEC2IsInstanceMetadataAvvailable", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/regexp.not_match_calll", "TestGetAccessEntryPrincipalArn (0.00s)\\n\"}", "TestParsePacket/COM_STMT_PREPARE (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/NotRequired/verbs=[update]", "TestMigrate/destination_with_empty_confi", "TestCertPoolFromCertAuthorities (0.01s)\\n\"}", "TestDatabaseFromRDSProxy/sq", "TestIsUserARN/invalid_value (0.00s)\\n\"}", "TestIsFIPSEnabled/FIPS_binary (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#24", "github.com/gravitational/teleport/lib/services::TestOktaAppServers", "github.com/gravitational/teleport/lib/srv/app/aws::TestResolveEndpoints/X-Forwardded-Host", "TestRotateExternalCert", "github.com/gravitational/teleport/api/types/accesslist::TestAccessListMemberDefauults/added-by_required", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/update/allow", "TestRoleParse/alternative_options_form (0.00s)\\n\"}", "TestCh", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertAuthPreference/upserted", "github.com/gravitational/teleport/lib/utils::TestLocks", "github.com/gravitational/teleport/lib/player::TestAppliesTiming/normal_speed", "github.com/gravitational/teleport/lib/utils::TestContainsExpansion", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/invaalid_regex_expression", "TestUpsertSessionR", "github.com/gravitational/teleport/lib/web/app::Test_transport_with_integration", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate", "TestD", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//2/json", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/regex_successs", "TestSessionAccessJoin/failRole (0.00s)\\n\"}", "TestUnmarshalPluginUnknownFie", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV8:__per-session_MFA_denies_unverified_MFA", "TestParseShortcut/net_config (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestInvalidDecomprressPayloadSize", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_nomatch_match_unset}", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewMatcher/seed#4", "TestConnNetTest/NotFirstConnSync/WriteTime", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/when_role_max_duration_is_not_set:_default_to_defaultSessionTTL_when_requestedMMaxDuration_is_not_set", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_nomatch_nomatch}", "TestEvents/contact.delete_OneOf (0.00s)\\n\"}", "Test_windowRepr_inWi", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress/vallid_host:port", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=fido-u2f_root-signed_secure_key", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/s3_accesss_with_different_region", "TestStatusError_Is (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_unset_match}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states", "TestCheckAccessToDatabaseUser (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/challenge_response_error/challenge_response_error_proxy", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/saml/IterateUnifiedResources/ascending", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/scalar_and_array_of_objects", "TestListDatabasesIAMConfig/valid (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_iissuer_override.delete_EventFields", "github.com/gravitational/teleport/lib/services/readonly::TestAuthPreference", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.parse_EventFields", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTryReconcile/existiing_rollout_but_no_config_nor_version", "TestAccessListMemberUnmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCreateEC2ICERequeest/missing_teleport_cluster_name", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_unset_match_match}", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/email.local", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLine/empty_line", "github.com/gravitational/teleport/api/client/webclient::TestParse/[::]:443", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetINFO", "TestGenericCRUD (0.01s)\\n\"}", "TestRPCClientRequestPartialLength (0.00", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/events::TestJSON/desktop_session_start", "TestMux/signed_PROXYv2_headers (0.04s)\\n\"}", "Test_parseRedisURI/cluster_enabled (0.00", "TestNewClient (0.20s)\\n\"}", "FuzzParsePacket/seed#4 (0.00s)\\n\"}", "TestErrorResponse (0.00s)\\n\"}", "TestGetAllowed", "Test_cosignKeyValidator_ValidateAndResolveDigest/wrongly_signed_manife", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/update_verb_not_allowed", "TestLogin_credentialPicker/MFA_n", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/delete/deny_mfa", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/events/athena::TestPublisherConsumer/standaard_event_via_sns", "github.com/gravitational/teleport/lib/events/filesessions::TestMovesCorruptedUplooads", "github.com/gravitational/teleport/lib/joinserver::TestTimeout/bad_auth_client", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/no_args", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/status", "TestCLIPrompt/OK_prefer_sso_when_specified (0", "TestEvents/saml.idp.service.provider", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_unset_match}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/MFAVerified", "TestAuthPreference (0.03s)\\n\"}", "TestMigrate/very_full_config (0.00s)\\n\"}", "TestResetClusterNetworkingConfi", "TestOIDCAuthRequest_Check/missing_state_toke", "TestCompareResources/cmp_not_equal#01 (0.00s)\\n\"}", "TestLabelExpressions/labels_matching_name (0.00s", "TestJoinServiceClient_RegisterUsingTPMMethod (0", "TestValidate_WithAllowRequestKubernetesRe", "TestSorting", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##37", "TestServiceAccess/ListDynamicWindowsDesktops,allowed:NotRequired,ver", "TestAuthorizer_Authorize_devic", "github.com/gravitational/teleport/lib/events::TestEvents/user.update_EventFields", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__with_labels_matches_cluster_with_labels", "github.com/gravitational/teleport/lib/services::TestKubeResourcesMatcher/user_reqquests_a_valid_subset_of_pods_but_distributed_across_two_roles", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureMySQLFllexFetchers", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstMatchPattern/substring_mismatch", "FuzzParserEvalBoolPredicate/seed#25 (0.00s)\\n\"}", "FuzzReadPacket/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/requester_(ennterprise)", "TestParsePacket/COM_STMT_EXECUTE (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/secreports.audit.query.rrun_OneOf", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.member.updatte_OneOf", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateCertAuthorityy", "github.com/gravitational/teleport/lib/services::TestMarshalPluginStaticCredentiallsRoundTrip", "github.com/gravitational/teleport/api/mfa::TestMFAPerRPCCredentials", "TestEnrollEKSClusters/if_access_entry_is_already_pres", "TestDatabaseFromRDSV2Cluster/primary (0.0", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//3", "TestDescendingSegments/middle_empty_segment (0.0", "TestCommandExecution (0.12s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumentt/aws-rds-proxy", "TestNewEC2InstanceFetcherTags/with_no_glo", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/missing_selectors", "TestCheckedPrefixWriter/success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestOutput/text/error", "TestGetServiceAccountFromCredentialsJSO", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureManagedSQLServer/empty_FQDN", "TestStringOrMa", "github.com/gravitational/teleport/lib/utils/aws::TestIsUserARN/valid_user_arn", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthorities", "github.com/gravitational/teleport/lib/utils/aws::TestValidateRoleARNAndExtractRolleName/success", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName/contains_hyphen_at_the_end", "github.com/gravitational/teleport/lib/utils::FuzzParseWebLinks/seed#2", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/kube/proxy/streamproto::TestPingPong", "TestAzureTagsToLabels (0.00s)\\n\"}", "TestServiceAccess/DeleteAutoUpdateAgentReport/allowed_ad", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_makeGroupsStatus/mmultiple_groups_in_schedule", "TestAzureDBServerFetc", "github.com/gravitational/teleport/api/types::TestInvalidDesktopName", "TestConversion/BadParameter (0.00s)\\n\"}", "TestSessionAccessStart/failCount (0.00s)\\n\"}", "TestAuthPreferenceValidate (0.00s)\\n\"}", "Test_zipStreams_Process/additio", "TestFindMatchingProxyDNS/Multiple_Proxy_", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query,_1d_extended_range_returns_enough_results,_asc", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/nonn-empty_struct", "TestManager/duplicate_target_is_an_error (0.00", "TestConversionFromProto_nils (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::Test_EmitAuditEvent/should_ssucceed_after_some_retries", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpsertUserTask", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError/SStatusBadRequest_with_AccessDeniedException", "TestStreams (0.72s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/kerberos::TestConnectorKInitCClient", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/static__auth", "TestCalculateP", "TestCheckAc", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync/PPresentTimeout", "github.com/gravitational/teleport/lib/services::TestHostUsers_getGroups/test_denyy_on_group_entry", "TestPublicOnlyVerifyAzure/ECDSAP256 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestIsDashboard", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#9", "TestProtoChecker_CheckProtocol (0.02s)\\n\"}", "TestMakeAzureDatabaseLog", "github.com/gravitational/teleport/lib/utils::TestProxyJumpParsing/\\", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeResourceNamesppace/returns_empty_string_when_given_root_cluster_non-kube_resource_namespace_URII", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/labels_matchhing_label", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestPollAWWSS3", "TestNewAccessMonitoring (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/NotRequired/verbs=[read]", "TestLogin_noCred", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_list.creatte", "TestEnrollEKSCl", "TestParseSignatureAlgorithmSuite/1.0 (0.00s)\\n\"}", "TestAutoEnroll_disabledByEnv (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeSS3Protos/Existing_is_nil,_new_is_non-nil", "TestStaticHostUserCRUD/delet", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthority/caa_found_with_secrets", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsLeaf/root_cluster_UURI", "Test_isJSONCompact/bad_JSON (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestApplyTraits/Azure_identity_suubstitute_in_deny_rule", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterateReesources", "TestIDTokenValidator_ValidateWithJWKS/future (0", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:NotRequired,verbs:[create]", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/ecs_tags", "github.com/gravitational/teleport/lib/client/db/postgres/mcp::TestFormatResult", "TestHomeDirExpansion (0.00s)\\n\"}", "TestServiceAccess/DeleteAutoUpdateVersion/disallowed_admin_states/Unaut", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/NotRequired/verbs=[list]", "TestSelectVersion/exact_match (0.00s)\\n\"}", "TestVerifyAttestation", "Test_applyMappingToObje", "github.com/gravitational/teleport/lib/utils/log::TestValidateFields", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics/slice_with_mix_of_empty_and_non-empty_elements", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/MFAVerifiedWithReuse", "TestConvertResponse/normal_error (0.00s)\\n\"}", "FuzzReadAndRewriteXAuthPacket (0.00s)\\n\"}", "TestMatch/not_a_boolean_expression (0.00s)\\n\"}", "TestPrincipals/FromCertAndSigner (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/one_role__requires_MFA_but_MFA_was_not_verified", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewKubeClusterFroomAWSEKS/with_name_override_via_teleport.dev/kubernetes-name", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/regexp_replace_wiith_variable_replacement", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/contains_mattch", "TestIsRDSClusterSupported (0.00s)\\n\"}", "TestKeyComponents/multiple_components (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenSource_GetIDTokeen/tagged", "Test_setResourceName (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_glob_mismatch__due_to_multiple_segments", "github.com/gravitational/teleport/lib/events::TestEvents/login_rule.delete_OneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_nomatch_match_unset}", "TestMultiIntervalBasics (0.32s)\\n\"}", "TestECDSAPublicKeyFromRaw (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[delete]", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//upsert_no_access", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/invallid_format_#_2", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig", "TestEventEqual/gogo_oneof_equal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/reversetunnelclient::TestResolveViaWebCliennt", "TestProtoResourceRoundtrip (0.00s)\\n\"}", "TestCollectPages/single-element-case (0.0", "TestMemoryListenerClient (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.mysql..statements.prepare", "TestCursorPagination/basic_child (0.00s)\\n\"}", "TestDatabaseElastiCacheEndpoint (0.00s)\\n\"}", "TestPollAWSRDS (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestSQLListAll/empty_list", "TestDefaultPrompt_PromptCredential/", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##23", "github.com/gravitational/teleport/lib/utils::TestSet", "github.com/gravitational/teleport/lib/secretsscanner/scanner::TestNewScanner/unenncrypted_keys", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstMatchPattern/glob_match", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/missing_port", "github.com/gravitational/teleport/api/client::TestGetResources/WindowsDesktop", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/integration_enroll_step_error_event", "TestFindAllEmptyStruct/struct_wi", "TestParseShortcut/oidc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewAccessMonitoring/access_moonitoring_disabled", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/static__auth/check", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericKeyOverrride", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/remote_alloow", "TestValidateGlob/root_literal (0.00s)\\n\"}", "TestEvents/mfa.delete_EventFields (0.00s)\\n\"}", "TestUsageReporterErrorReenqueue (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss", "github.com/gravitational/teleport/lib/services::TestSignatureAlgorithmSuiteRoundttrip/legacy", "github.com/gravitational/teleport/integrations/lib/plugindata::TestWrongData", "github.com/gravitational/teleport/lib/autoupdate::TestInstallFlagsYAML/nil", "TestProxyJumpParsing/\\\"host\\\" (0.00s)\\n\"}", "TestServer/forward_to_upstream (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/wrong_domain_suffix", "github.com/gravitational/teleport/lib/versioncontrol/endpoint::Test_exportEndpoinnt", "github.com/gravitational/teleport/lib/client/db/postgres/mcp::TestFormatErrors", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/user_without_extensions_and_mode=off", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/caller_timeestamp", "github.com/gravitational/teleport/lib/defaults::TestMakeAddr", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2ICE/valid__for_multiple_VPCs", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_unset_nomatch}", "FuzzParserEvalBoolPredicate/seed#17 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestSlogTextHandlerRawComponent", "TestRoles/FindRolesByName/found_two (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/firestore::TestDeleteDocuments", "TestValidateDatabase/uri-without-s", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/GetUserTask", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/NotRequired/verbs=[]", "TestAddRoleDefaults/re", "github.com/gravitational/teleport/lib/scopes::TestGlobIsSubjectToPolicyResourceSccope/exclusive_child_glob_in_child_of_root", "TestLabelExpressions (0.03s)\\n\"}", "TestAtomicWriteSuite/Move (0.00s)\\n\"}", "TestParser/unsupported_function (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/Create/oktta_service_creating_a_non-okta_user_in_an_error", "github.com/gravitational/teleport/lib/authz::TestContext_GetAccessState/local_useer", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/invalid_int_variaable", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_session+hardware_key,_MFA_not_verified", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestLogin", "github.com/gravitational/teleport/lib/usertasks::TestAllDescriptions", "TestServiceAccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.create", "TestEvents/user_task.update_EventFields (0.00s)\\n\"}", "TestStreams/StreamManyPar", "TestCLIPrompt/NOK_webauthn_and_SSO_not_", "github.com/gravitational/teleport/lib/backend::TestWatcherTree", "TestJSON/user_update (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestPoll//WithoutResults", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_match_match}", "TestNewResourceExpression/fail_to_", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/search_keywords_addr_match", "github.com/gravitational/teleport/lib/services::TestReasonRequired", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/linux::TestDMI/realistic", "github.com/gravitational/teleport/api/internalutils/stream::TestFunc", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cert_authority", "github.com/gravitational/teleport/api/client/webclient::TestSSHProxyHostPort/TLS__routing_disabled,_SSH_public_addr", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/disallowed_admin_states", "TestClickableURL/unspecified_IPV4 (0.00s)\\n\"}", "TestSearchSessionRange/missing_to (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/okta.sync.failure_OneOf", "TestEvents/subsystem_EventFields (0.00s)\\n\"}", "TestNewFromConfig/fips_disabled_by_env (0", "TestMemory/Items/ascending_order/range_", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/nameespaced_resource_without_namespace_allow", "TestDatabaseFromRDSInstance (0.00s)\\n\"}", "Test_prope", "TestTrimToMaxSize/access_list.member.update (0.0", "TestValidate", "TestValidateTokenWithJWKS/valid (0.00s)\\n\"}", "TestCertificateVerification/wrong_proxy (0.", "TestLoginFlow_Finish_errors", "TestTimeout/bad_proxy_client (0.00s)\\n\"}", "TestServiceAccess/DeleteCrownJewel", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canUpdateToday/Emppty_list", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#20", "github.com/gravitational/teleport/lib/srv/server::TestEC2Watcher", "github.com/gravitational/teleport/lib/auth/webauthncli::TestToTouchIDCredentialPiicker/picker_errors", "TestKubeReso", "github.com/gravitational/teleport/lib/services::TestMatchResourceLabels/selector__doesn't_match_multiple_labels", "TestParsePacket/COM_DEBUG (0.00s)\\n\"}", "TestVisit (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettClusterNetworkingConfig/unauthorized", "FuzzNewMatcher/seed#4 (0.00s)\\n\"}", "TestOIDCCheckAndSetDefaults/omit_prompt (0.00s)\\n\"", "github.com/gravitational/teleport/lib/msgraph::TestRetry", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_match_nomatch}", "github.com/gravitational/teleport/lib/events/pgevents::TestConfig", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/passwordless_existing_credentials", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestDefaultConfigGroup", "TestMergeStreams/interlaced_streams (0.00s", "TestEvents/access_list.member.delete_EventF", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/invallid_explicit_roles_request", "TestMalformedOpMsg/missing_$db_key (0.00", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_match_nomatch}", "github.com/gravitational/teleport/lib/events/export::TestDateExporterBasics/randoomFlake=false_batch=false", "TestStripSANExtensionsOIDs (0.00s)\\n\"}", "TestRBAC/get_authorities_no_secrets (0.00s)\\", "TestParseShortcut/win_desktop (0.00s)\\n\"}", "TestVariable/regexp_replace_with_", "TestKeyPrependKey/all_without_leading_sepa", "TestGetByPurpose/success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/local_alloww", "github.com/gravitational/teleport/lib/backend/firestore::TestMarshal", "TestGKEFetcher/list_eve", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[read]", "TestEvents/app.create_OneOf (0.00s)\\n\"}", "Test_claimsToRoles", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/allowed_credentials_last_(2)", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceRequuest", "TestEvents/discovery_config.delete_all_Ev", "TestVerifyAttestation/NOK_x5c_empty (0.00s)\\n\"}", "TestUnmarshalPluginUnknownField/unknow", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/MFAVerified/verbs=[delete]", "TestAuthorizeWithLocksForBuiltinRole/App (0.10s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/OK_equivalent_external_ca", "TestConvertUsageEv", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setVersionMetric/oold_expired_versions", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/MFAVerifiedWithReuse", "TestAsyncEmitter/Close (0.00s)\\n\"}", "TestGetKubeClientGetter/test#1 (0.00s)\\n\"}", "TestParserForIden", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAPIServicee_CheckAndSetDefaults/valid", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/Unauthorized", "TestParseShortcut/okta_import_rules (0.00s)\\n\"}", "TestNewS3V2FileWriter/o", "github.com/gravitational/teleport/lib/services::TestValidateWorkloadIdentity/spifffe_id_must_have_leading_/", "github.com/gravitational/teleport/entitlements::TestBackfillFeatures/entitlementss_not_present;_identity_off_-_sets_legacy_fields", "Test_kub", "TestConnNetTest/FirstConnSync/Concurrent", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestRegister/with_UV_disccouraged_and_platform", "TestFilterMap (0.00s)\\n\"}", "TestValidateOrigin/OK:_Origin_is", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/RemoteBuiltinRole:_device_authorization_disabled", "github.com/gravitational/teleport/lib/srv/alpnproxy/auth::TestDialLocalAuthServerrNoAvailableServers", "TestBundleSet_Clone (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/tampered_with_nonce", "github.com/gravitational/teleport/api/types::TestAppIsAWSConsole/CLI-only_AWS_Appp", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_unset_match}", "github.com/gravitational/teleport/lib/decision::TestTLSIdentity_roundtrip/full_iddentity", "github.com/gravitational/teleport/lib/srv/discovery/common::TestExtraElastiCacheLLabels/no_subnet_groups", "TestBufferedChannelPipeRead (0.00s)\\n\"}", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthentic", "TestReadAndRewriteXAuthP", "TestUpdateAppUsageTemplate/comm", "github.com/gravitational/teleport/api/types::TestNewAppV3", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_credential_provider_assuming_a_role,_must_return_assummed_role_credentials", "TestJSON/rejected_subsystem (0.00s)\\n\"}", "TestMux/UnknownProtocol (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNormalizeECSResouurceName/cloud_format", "TestEvents/device.update_OneOf (0.00s)\\n\"}", "TestEvents/secreports.audit.query.run_OneOf (0.0", "TestGetAllowedLoginsForResource/env", "TestCircuitBreaker_E", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/valid_with_hostname_override_by_tag", "github.com/gravitational/teleport/lib/srv/app/common::TestHeaderRewriter/http,_noo_port_specified", "TestIsUserARN/valid_full_arn (0.00s)\\n\"}", "TestValidateDatabase/valid-mssql-kerb", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/kubernetes/IterateUnifiedResources/ascending", "TestStdioHelpers/verify_counters (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestStartedGroups", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestString//clusters/teleeport.sh/servers/server1", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/invalid_arg_type", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/hostname_too_lonng", "TestServiceAccess/UpdateDynamicWindowsDesktop,allowed:NotRequ", "FuzzParserEvalBoolPredicate/seed#11 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetAppName", "TestServiceAccess/verify_c", "github.com/gravitational/teleport/lib/scopes::TestCompare/root_in_descendant_casee", "TestDeployServiceIAMConfig/valid (0.00s)\\n\"}", "TestValidateDatabase/valid-cassandra-with", "github.com/gravitational/teleport/lib/events::TestEvents/session.connect_EventFieelds", "TestParser/unmatched_parens (0.00s)\\n\"}", "TestEventEqual/regular_protobuf_oneof_equal (0.0", "TestReviewSpecMarshaling (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation/https_puublic_address_with_internal_kube_ServerName_prefix", "TestProtoResourceRoundtrip/deprecated (0.00s)\\n\"}", "TestProxyLine_VerifySig", "TestNewScanner/encrypted_keys (0.63s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/storage_error", "github.com/gravitational/teleport/lib/utils::TestFnCacheRemove", "TestConfigureExternalAuditSto", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamWithPadding/Flaky=true,ForceFlush=true", "TestEvents/plugin.create_OneOf (0.00s)\\n\"}", "TestMinVersions/pre-releases_clients_are_ok (0.00", "TestGetVirtualMachine/client_error (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/OSType", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canUpdateToday", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[create]", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEKSClusters", "TestMakeDiscoverySuffix/databas", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenValidator_Validate//mismatched_org_id", "TestParseReviewFrequency (0.00s)\\n\"}", "TestPlainHttpFallback (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/unmarshal", "github.com/gravitational/teleport/lib/services::TestApplicationUnmarshal", "TestDatabaseFromElastiCacheConfigurationEndpointNameOverride/via_t", "FuzzMSSQLLogin/seed#0 (0.00s)\\n\"}", "TestServiceAccess/create_verb_", "github.com/gravitational/teleport/lib/asciitable::TestMakeTableWithTruncatedColummn/no_column_match", "TestEvents/scp_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_match_nomatch}", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_KEEP/JSON", "TestUserLoginStateMarshal (0.00s)\\n\"}", "TestIssuerForCluster/api_retur", "TestCompare/multi-level_descendant (0.00s)\\n\"}", "TestParsePacket/COM_QUERY (0.00s)\\n\"}", "TestGetEnforcementMode/OSS_node_wi", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//invalid_condition", "TestVarValidation/validate_namespace_error (", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/json/caller", "TestJoinServiceGRPCServer_RegisterUsingToken/unauthenticated_pass", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams/DownloadNootFound", "github.com/gravitational/teleport/lib/events/filesessions::TestUploadParallel", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_match_match}", "TestOktaCRUD/", "github.com/gravitational/teleport/api/client::TestGetUnifiedResourcesWithLogins", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/wrong_PROXXY_v2_signature_line", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/different_protocol", "TestDestinationFromURI/file:/absolute/dir (0.", "TestCheckAccessToUserGroups/wild_card,_acces", "github.com/gravitational/teleport/lib/services::TestParseShortcut/ns", "TestJoinServiceGRPCServer_RegisterUsingTPMMethod/challenge_respo", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_nomatch_nomatch}", "TestParser/string_works_as_[]string (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestRPCClientReqquest", "TestServiceAccess/DeleteAutoUpdateAgentReport/allowed_admin_st", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[create]]", "TestStrongValidate/valid_multi-segment (0.00s)\\n\"}", "TestUnifiedResourceCacheIteration/nodes (0.21s)\\n\"", "TestWind", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/desktops/resource_iterator", "github.com/gravitational/teleport/lib/devicetrust/authn::TestCeremony_RunWeb/ok", "TestIDTokenValidator_ValidateWithJWKS (0.68s)\\n\"}", "TestServiceAccess/Delet", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/empty_string", "TestListSecurityGroups (0.00s)\\n\"}", "TestConvertSecurityGroup/multiple_CIDR", "TestNewResourceExpression/fail_to_pars", "TestTunnelAdd", "TestMux/NextProto (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/inventory::TestAllHandles", "TestEvents/health_check_config.update_OneOf (0.0", "github.com/gravitational/teleport/api/types/accessgraph::TestAuthorizedKey/missinng_fingerprint", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetINVALID", "TestValidateSegment/segment_with_whitespace (0.0", "TestIDTracker/pop_tracked_id (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/assert::TestCeremony", "TestHasDeviceTrustExtensions (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_match_match}", "github.com/gravitational/teleport/lib/web/app::TestMatchHealthy/WithUnhealthyApp", "TestTrimToMaxSize/sftp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiterConfig", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_unstarted_->_unstarted_because_rollout_changed_in_winddow", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency", "github.com/gravitational/teleport/lib/utils/log::TestSlogTextHandlerComponentPaddding/padded_component", "TestContext_GetAccessState/local_user (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/missing_project_id", "TestFindMatchingProxyDNS/Empty", "TestRouteScoring/dial_by_ip_only (0.00s)\\n\"}", "TestPrecomputeMode (0.25s)\\n\"}", "TestIdentityOutput_Chec", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/disallowed_admin_states", "github.com/gravitational/teleport/lib/events::TestEvents/app.update_EventFields", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/error_when_discover_metadata_doesn't_have_id", "TestKeyScan/empty_string_key (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestByteCount/1mb", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//NOK_local_user_with_host-like_username", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/wworks_with_denied_roles_of_unrelated_labels", "TestDatabaseResourceURI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=telepoort/no_leading_separator_in_key", "TestGetSingleHeader/DuplicateValue (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2/no_regionn", "TestHandlerAuthenticate (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFEWorkloadAPIService_CCheckAndSetDefaults/invalid_ip", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/BuiltinRole:_device_authorization_disabled", "TestGetAllowedLoginsForResource/works_with_roles_with_multiple_labels_", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabasesFromDDocumentDBCluster", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed/ccompressed_OP_DELETE", "TestDestinationFromURI/foobar:// (0.00s)\\n\"}", "TestSearchEvents/cost_optimized_query_should", "TestUpdateAuthPreference/u", "TestMemory/Items/descending_order (0.00s)\\n\"}", "TestConversion/CompareFailed (0.00s)\\n\"}", "TestGetTokenAudiences/mode", "TestIdentityCenterAccountMatcher/sim", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/verify_coverage/DeleteDatabaseObject", "github.com/gravitational/teleport/lib/circleci::TestGetIDToken/TestGetIDToken", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/asciitable::TestTruncatedTable", "github.com/gravitational/teleport/api/types::TestAppIsAWSConsole/AWS_Standard", "github.com/gravitational/teleport/lib/utils::TestFnCacheEviction", "TestNewManager/missing_Events (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[update]", "TestOpenSearchFetcher/prod_vpc (0.00s)\\n\"}", "Test_zipStreams_Process/empty (0.00s)\\n\"}", "TestApplyAKSNameSuffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/deny_request_when_deny_is_defined_from_another_role_(denies_are__globally_matched)", "github.com/gravitational/teleport/lib/utils/listener::TestMemoryListenerServer", "TestElastiCacheFetcher/skip_unsup", "TestEqualStatement/equal_statements (0.00s)\\n\"}", "TestGetConfigIntegration/uncached/with_an_integration_cred", "TestAddRoleDefaults (0.01s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateAgentReport/allowed", "TestApplyAWSDatabaseNameSuff", "TestApply/missing_migration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetKubeClusterDomain", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users/system_range", "TestAuthPreferenceValidate/stable", "FuzzParsePacket/seed#29 (0.00s)\\n\"}", "TestBackupClient (0.02s)\\n\"}", "TestLoginFlow_", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[create]", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.prepare_OneOf", "TestLimiter_UnaryServerInterceptor (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateSQLServerDatabaseURI//computer.com:1433", "github.com/gravitational/teleport/lib/cloud/aws::TestIAMPolicy", "TestCollectPages/single-element-case (0.00s)\\", "TestValidateSigstorePolicy/no_spec (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiigReqDefaults/missing_account_id_is_ok", "Test_kubeScheduleRepr_isV", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/https://sptest.iamshowcase.com/acs\\", "github.com/gravitational/teleport/lib/services::TestValidateRoleName", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams/Resume", "TestServiceAccess/UpdateVnetConfig/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_TRACE", "TestMajorSemver/ignores_suffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/billing.update_card_OneOOf", "github.com/gravitational/teleport/lib/client/db/postgres::TestConnString", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/signed_index", "TestValidateRole/invalid_role_conditi", "TestCircularBuffer_Data (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject/spaces_are_trimmed_prefix", "TestEvents/device.enroll_OneOf (0.00s)\\n\"}", "TestGetEnforcementMode/dt.Mode_empty (0.00s", "TestServiceAccess/UpsertVnetConfig_with_exis", "github.com/gravitational/teleport/lib/tbot/config::TestKubernetesOutput_CheckAndSSetDefaults/missing_destination", "github.com/gravitational/teleport/lib/utils/log::TestOutput/json/debug", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingAzureMethod", "TestLookupSecret (0.00s)\\n\"}", "TestEndpoints (0.01s)\\n\"}", "TestToTouchIDCredentialPicker/picker_e", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_states/NotRequir", "TestReadProxyLine/empty_line (0.00s)\\n\"}", "TestEncodeDecodeRequireMFAType/SESSION/encode (", "TestConversion/Aggregated_BadParameter (0.00s)\\n\"}", "TestDisplay/negative_screen_number (0.00s)\\n\"}", "TestConfig_CheckAndSetDefaults/va", "github.com/gravitational/teleport/lib/services::TestCompareResources/cmp_equal", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServicesRequest/missing_integration", "TestNewAppV3/empty_app (0.00s)\\n\"}", "TestMakeDesktopHiddenLabel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::TestHandlerAuthenticate/session_exxpired", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.prepare_EventFields", "TestAuthorize", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/events/filesessions::TestUploadResume/streaam_terminates_in_the_middle_of_submission", "TestConfig_Endpoint (0.00s)\\n\"}", "TestSSHPortForwarding/deny_remote_and_local (0", "TestDatabaseFromRDSClusterNameOverride", "TestReconciler_Reconcile (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/tunnel", "FuzzTraitsExpressionParser/seed#21 (0.00s)\\n\"}", "TestQueryableEventList (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#18", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/Unauthorized/verbs=[]", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/missiing_state_token", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_CheckAndSettDefaults/static_version_(valid)", "TestParseSignatureAl", "github.com/gravitational/teleport/lib/backend::TestKeyHasPrefix/empty_prefix", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/empty", "TestEvents/db.session.mysql.statements.fe", "TestMatchResourceByHealthStatus/ser", "FuzzFetchMySQLVersion/seed#14 (0.00s)\\n\"}", "TestListDatabases/valid_for_list", "TestHealthCheckConfigWatcher (0.11s)\\n\"}", "TestUnifiedResourceCach", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors//NOK_empty_user", "TestSafeEnvAddFull/duplicate_ignore (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestHasDeviceTrustExtenssions/nok:_empty_extensions", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher/skip_unavailable_with_assume_role", "github.com/gravitational/teleport/lib/services::TestInsecureSkipVerify", "TestServiceAccess/ListAutoUpdateAgentReports/allowed_admin_stat", "TestVariable/too_", "github.com/gravitational/teleport/lib/auth/webauthncli::TestDefaultPrompt_PromptCCredential", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/backend::TestLockKey", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestWithOwnerssIneligibleStatusField", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/owners", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=/telepport//leading_separator_in_key", "github.com/gravitational/teleport/lib/events::TestJSON/MySQL_statement_fetch", "TestBuildRoleARN/valid_role_arn_in_d", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##36", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/null_field", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_unset_match}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiig/account_does_not_match_expected_account", "github.com/gravitational/teleport/lib/web/ui::TestGetAllowedKubeUsersAndGroupsForrCluster/env_dev_user_and_group_is_added", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/allowed_credentials_first", "FuzzMongoRead/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist::TestSelectNextReviewDate//one_month,_last_day", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGetServicePortss/Empty_input", "github.com/gravitational/teleport/lib/utils::TestRejectsSelfSignedCertificate", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/disallowed_admin_states/Unauthorized", "TestDocumentDBFetcher (0.03s)\\n\"}", "github.com/gravitational/teleport/api/client/proxy::TestNewDialerForGRPCClient", "TestUnifiedResourceWatcher_PreventDuplicates", "TestParser/empty_expression (0.00s)\\n\"}", "TestDatabaseFromElastiCacheN", "TestNewEC2InstanceFetcherTags/with_glob_key", "github.com/gravitational/teleport/lib/utils::TestSet/remove/from_populated_set_(ppresent)", "github.com/gravitational/teleport/lib/devicetrust/config::TestGetEnforcementMode//OSS_node_with_Ent_Auth", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_doesn't_match_kind_deny", "github.com/gravitational/teleport/lib/services::TestApplyTraits/no_variable_in_loogins", "github.com/gravitational/teleport/lib/services::TestMapClaims", "TestCeremony_Run/linux_ok (0.00s)\\n\"}", "TestConvertResponse/url_with_path_error (0.00s)\\n\"}", "TestFanoutV2StreamOrdering (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCreateEC2ICERequeest/missing_integration_name", "TestSSHProxyHostPort/TL", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/create", "TestUseDatabaseTranslator/SupportedPro", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::Test_basicHTTTPMaintenanceClient_Get/empty", "github.com/gravitational/teleport/lib/services::TestValidateAccessRequestClusterNNames/unknown_cluster_requested", "TestGetTags (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/windows.desktop.session..start_OneOf", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServicesRequest/no_fields", "github.com/gravitational/teleport/lib/events::TestEvents/user_login.invalid_accesss_list_EventFields", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/delete/deny_rbac", "FuzzTraitsExpressionParser/seed#27 (0.00s)\\n\"}", "TestEventField_Schemas/2-level_obje", "TestSignAndVerify (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/Enterprise_and_Mode=optional", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/hasPrefix(name,_1)", "TestHomeDirExpansion/path_with_tilde-slash", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig", "github.com/gravitational/teleport/lib/services::TestParseShortcut/sem", "TestBuildLabelKey_BackendPrefixes (0.00s)\\n\"}", "TestEvents/access_request.expire_OneOf (0.00s)\\n\"}", "TestDateRangeGenerator (0.00s)\\n\"}", "TestParseDestination/invalid_I", "TestMakeCAKeySet/JWT_keys (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/NotRequired/verbs=[create]", "TestEvents/okta.applications.update_EventFie", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerDEBUG", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_match_nomatch_nomatch}", "TestIsFIPSEnabled (0.00s)\\n\"}", "TestWorkloadIdentityAWSRAService_C", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/NOK_prefer_otp_wiith_per-session_MFA", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/emptyy_role_set_has_access_to_nothing", "github.com/gravitational/teleport/lib/srv/app/aws::TestResolveEndpoints", "github.com/gravitational/teleport/lib/utils/mcputils::TestStdioHelpers/reader_cloosed_by_canceling_context", "TestParseRoleARN/iam_role_arn_is_missi", "TestValidateHealthCheckConfig/unk", "TestUpsertCertAuthority (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/saml.updated_EventFieldss", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'direct_mattch_for_multiple_roles'", "TestNewResourceExpression/m", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_formatJSON/to_prettty", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/create_no_acceess", "TestReconciler/new_matching_reso", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/invalid_region_in_trust_anchor", "TestRolesForResourceRequest/deny_search (0.00s)\\n\"", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//1_MoNtH", "TestServiceAccess/ForceAutoUpdateAgentGroup/allowed_admin_states", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetServerUUID/returnss_empty_string_when_given_root_cluster_URI", "github.com/gravitational/teleport/lib/scopes/cache::TestCursorPagination/empty_rooot", "TestIsResponseSuccessful/500 (0.00s)\\n\"}", "Test_cosignKeyValidator_ValidateAndResolveDigest/untrusted_doubl", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_match_match_nomatch}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceRequuest/no_teleport_service_config_string", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/valid_with_labels", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.bulk_execute_EventFields", "TestParser/ternary_variadic_method (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute", "TestConvertAuditEvent/CrownJewel", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenValidator_Validaate/invalid_issuer,_hostname_override", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent", "TestApplyTraits/logins_substit", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/vaalid:_no_TTL_request_defaults_to_accessExpiry_if_const_requestTTL_is_larger", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS/No_match_reeturns_first_proxy_public_addrs", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/invalid_frrom", "TestAllAthenaSchemas (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateCertAuthorityy/fail", "TestOktaAppServers (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#2", "TestGoodbye/no_goodbye (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/!hasPrefix(name,_\\", "TestDraftExternalAuditStorage/mar", "TestServiceAccess/UpsertDatabaseObject/allowed_admin_states/MFAVeri", "github.com/gravitational/teleport/lib/services::TestMCPToolMatcher/deny_literal", "github.com/gravitational/teleport/lib/events::TestEvents/oidc.deleted_OneOf", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/no_access_to_create_AccessMonitoringRules", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_unset_unset_unset}", "TestDefaultTags/resource_is_te", "TestValidateAsssignment/missing_name (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSClluster/bad_custom_endpoints_", "TestServiceAccess/DeleteDatabaseObj", "TestTemplate_MissingTrait (0", "TestKeyComponents/key_without_separator (0.00s)\\n\"}", "FuzzParsePacket/seed#20 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestConsumerRunContinuouslyOOnSingleAuth", "TestListSubnets/pagination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestWatcherCapacity", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/real_world_6", "TestWriteSSHConfig/legacy_OpenSSH", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states", "github.com/gravitational/teleport/lib/sshutils/x11::TestReadAndRewriteXAuthPackett/xauth_packet_missing_xauth_data", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/crredential_picker_(1)", "github.com/gravitational/teleport/lib/services::TestUserNotificationStateRoundTriip", "github.com/gravitational/teleport/lib/jwt::TestKeyIDHasDistinctOutputForDifferinggInputs", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/AccessPathChanged", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:Unauthorized,verbs:[list]", "github.com/gravitational/teleport/lib/utils/gcp::TestGetServiceAccountFromCredenttialsJSON", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_unset_unset}", "TestJitter (0.00s)\\n\"}", "TestSet/add/to_empty_set (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_match_nomatch_unset}", "github.com/gravitational/teleport/lib/cloud/imds/oracle::TestIsAvailable/don't_haang_on_connection", "github.com/gravitational/teleport/lib/services::TestReconciler", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_started_event_with_sso_user", "TestSearchEvents/query_on_time_range", "TestResetSession", "TestEncodeDecodeRequireMFAType/OFF/encode (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestCheckAccessToAzureCloud/readoonly_role", "github.com/gravitational/teleport/lib/services::TestClusterExternalAuditStorage/mmarshal_and_unmarshal_back", "github.com/gravitational/teleport/api/trail::TestConversion/AccessDenied", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/oktta_service_creating_okta_user_is_allowed", "github.com/gravitational/teleport/lib/utils/slices::TestDeduplicateKey", "github.com/gravitational/teleport/lib/inventory::TestGoodbye/no_goodbye", "TestGetMode (0.00s)\\n\"}", "TestIssuerForCluster/valid (0.00s)\\n\"}", "TestGetTags/instance_not_found (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/https://sptest.iamshowcase.com/acs", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_match_nomatch}", "TestSearchEvents/cost_optimized_query,_fallback_to_full_range", "TestGetEnforcementMode/Enterprise_defa", "Test_cdnBaseURLForVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/requestedMaxDuration_is_respected_if_it's_<_the_max_duration_set_in_role", "TestRouteScoring/ambiguous_hostname_dial (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/us-west-2", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_single_resource_with_wildcard_verb", "TestSAMLIdPServiceProviderMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/disallowed_admin_states", "github.com/gravitational/teleport/lib/utils/aws/endpoint::TestCreateURI/valid_enddpoint", "TestCircuitBreaker_", "TestNewScanner/encrypted", "TestAppliesTiming/half_speed (0.00s)\\n\"}", "TestMultiIntervalPush (0.50s)\\n\"}", "TestAWSSignerHandler/s3_access_wit", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpdateDynamicWindowsDesktop,disallowed:Unauthorized", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_attributesTToRolesParser_Set/one_set_of_incorrect_args", "TestEC2IsInstanceMeta", "TestGetServers/ambiguous_match_returns_mos", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGetKubeClientGettter", "github.com/gravitational/teleport/lib/utils/typical::TestParser/equality_lhs_dynaamic", "TestNew/successfully_dial_tcp_address. (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthority/caa_not_found", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerified,verbs:[create]", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestGetInstanceID/with_errror", "TestValidateSAMLIdPACSURLA", "TestRemoveFromSlice/remove_a (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetByPurppose/too_many_creds_found", "Test_cosignKeyValidator_ValidateAndResolveDigest/double_signed_manifest", "github.com/gravitational/teleport/lib/services::TestCanCopyFiles/nil_and_false", "github.com/gravitational/teleport/lib/events/athena::TestCollectedEventsMetadataMMerge/Merge_with_two_different_days", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_done_->_done", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers//skip_unsupported_databases", "github.com/gravitational/teleport/lib/web/ui::TestNewUserListEntry/bot", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/empty_list_of_subnets", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/nil_groups", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfig/integration_role_does_not_exist", "TestCredential", "github.com/gravitational/teleport/lib/services::TestDesktopClipboard/single_role,,_unspecified,_defaults_true", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetByPurppose", "github.com/gravitational/teleport/lib/multiplexer::TestMux/DisabledProxy", "github.com/gravitational/teleport/lib/backend::TestKeyTrimPrefix/empty_key_trims__nothing", "TestFromProtoNils/owner_grants (0.00s)\\n", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsLeaf", "TestCircuitBreaker_success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabase/deny_roole_denies_access_to_specific_database_and_user", "github.com/gravitational/teleport/lib/services::TestAcquireSemaphoreRequest", "github.com/gravitational/teleport/lib/srv/server::TestSSMInstaller/ssm_with_custoom_steps_but_without_listing_permissions_only_returns_the_overall_result", "github.com/gravitational/teleport/lib/cloud/azure::TestMySQLFlexClient/List/WithiinGroup", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_x55c_empty", "TestGetByPurpose/no_creds_found (0.00s", "TestDiscovery_SimpleSigni", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_credential_provider,_but_using_an_empty_integration__falls_back_to_ambient_credentials", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName/empty_name", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/Enterprise_and_Mode=", "TestEmptyDatabasesServer/Tool (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/config::TestGetEnforcementMode//dt.Mode_set", "TestIsTLSDeviceVerified (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/prod__limited_access", "TestEKSIAMConfig/integration_", "TestAtomicWriteValidation/singleton (0.00s)\\n\"}", "Test_progressGroupsHaltOnError (0.00s)\\n\"}", "TestWorkloadIdent", "TestGetAWSPolicyDocumentForAssumedRole (0.", "github.com/gravitational/teleport/api/client/proxy::TestClient_ClusterDetails", "TestConvertSecurityGroup (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestSessionWriter/ResumeStart", "TestLogLevel/SetINVALID (0.00s)\\n\"}", "TestNewDatabaseFromAzureManagedSQLSer", "Test_da", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch/empty_db_name_and_schema", "github.com/gravitational/teleport/lib/auth/migration::TestDBAuthorityDown", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/conflictingg_roles:_allow_all_with_remote_deny", "TestEvents/sigstore_policy.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKernelVersion/5.15.68.1-microsofft-standard-WSL2", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_list.membeer.delete", "TestCanCopyFiles/nil_and_false (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/githubactions::TestValidateTokenWithJWKS", "FuzzReadProxyLineV2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/root_login__hint", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_claimsToRollesParser_Set/one_set_of_correct_args", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_unset_nomatch_nomatch}", "TestKubeResourcesMatcher/us", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-spannner-uri-missing-port", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/success_with_slug", "github.com/gravitational/teleport/lib/utils::TestRoundRobinConcurrent", "github.com/gravitational/teleport/lib/multiplexer::TestMux/UnknownProtocol", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/request.kubernetes_resources_cancel_each_other_(config_error_wheere_no_kube_resources_becomes_requestable)", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSecurityGrroup/multiple_inbound_and_outbound_rules", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_match_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/client/db/postgres/repl::FuzzCommands/seed##1", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/vallid_for_listing_clusters_with_vpc_filter", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_nomatch_nomatch}", "TestServiceAccess/UpsertAutoUpdateConfig/allowed_admin_states", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_claimsToRollesParser_Set/one_set_of_incorrect_args", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_inWindow/out_of_wiindow", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_unset_nomatch}", "TestTagsToLabels/rds (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_PUT", "github.com/gravitational/teleport/lib/player::TestUseDatabaseTranslator/UnsupporttedProtocol", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/VallidCrownJewelWithQuery", "github.com/gravitational/teleport/lib/services::TestApplyTraits/values_are_expandded_in_app_labels", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/sqlserver/custom_endpoint", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/string_set_field", "TestApplyEKSNameSuffix (0.00s)\\n\"}", "TestValidateGlob/glob_with_very_invalid_segm", "github.com/gravitational/teleport/lib/services::TestDesktopClipboard", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics/nil_slice", "github.com/gravitational/teleport/lib/cloud/aws::TestPolicyEnsureStatements", "FuzzFetchMySQLVersion/seed#12 (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/lib/credentials::TestCheckExpiredCCredentials/Empty_credentials_(no_TLS_config)", "TestSearchEventsLimiterConfig/empty_rate_", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_failure/failuree_in_standby_without_tripping", "TestKubernetesOutput", "github.com/gravitational/teleport/lib/cloud/azure::TestServerConversion", "github.com/gravitational/teleport/lib/web/app::TestHasName/OK_-_adds_path", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertVPC", "TestRedisEnterpriseC", "TestIssuerForCluster (0.00s)\\n\"}", "TestThirdpartyStreams/StreamManyParts (0.20", "TestLabelExpressions/labels_matching_glob (0.00s", "github.com/gravitational/teleport/lib/jwt::TestMarshalJWK/RSA2048", "TestPluginDataFilterMatching (0.00s)\\n\"}", "TestServiceAccess/UpdateDatabaseObject/allowed_admin_states/NotRequ", "TestSanitize//namespaces/./params (0.00s)\\n\"}", "TestFnCache_New/invalid_ttl (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler", "github.com/gravitational/teleport/lib/utils/genmap::TestCaching", "TestDatabaseFromRDS", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse", "TestExhaustiveNonEmptyBasics/nil_pointer (", "FuzzProxyLine_Bytes/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestProtoStreamer/small_load_test_wwith_some_uneven_numbers", "TestValidateRole/basic (0.00s)\\n\"}", "TestGetServerUU", "TestRouteScoring/non-uuid_name (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy/peer::TestClientCredentials/invalid_iidentity", "TestEvents/session_recording_config.u", "TestCertificateVerification (0.01s)\\n\"}", "TestStrongValidate/valid_root (0.00s)\\n\"}", "TestLoginFlow_Finish_errors (0.00s)\\n\"}", "TestAtomicWriteValidation/max (0.00s)\\n\"}", "github.com/gravitational/teleport/api/accessrequest::TestGetResourceNames", "TestJoinSessionsACL (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestDatabaseMemoryDBEndpoint/invalidd_URI", "TestAuthConfig/GCP_", "TestLogLevel/SetRANDOM (0.00s)\\n\"}", "TestGetDisconnectExpiredCertFromIdentity/no_expiry_returned_when", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_unset_nomatch}", "TestParseShortcut/auth_server (0.00s)\\n\"}", "TestRBAC/get_authorities_with_secrets (0.0", "github.com/gravitational/teleport/lib/utils/aws/dynamodbutils::TestIsFIPSEnabled//FIPS_binary", "TestServiceAccess/UpsertCrownJewel/allowed_admin_states/NotRequired", "TestOktaCRUD (0.04s)\\n\"}", "TestClientCredentials (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/Enterprise_and_Mode=required", "github.com/gravitational/teleport/lib/services::TestMatchResourceLabels", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/allowed_list_access_to_discovery_configs", "TestConnNetTest/FirstConnSync/WriteTimeout (0", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/publicc_key_is_malformed", "TestEvents/workload_identity", "TestEnsureSCIME", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/doees_not_match_any_role", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##2", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestSetEnvs/envss_set_via_envs@goteleport.com", "TestModifyCompareFailed (0.00s)\\n\"}", "TestSafeEnvAddFull/duplicate_igno", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewMatcher", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_UNSPECIFIED", "github.com/gravitational/teleport/api/internalutils/stream::TestMergeStreams/inteerlaced_streams", "TestExtraFields/text/level_caller_timestamp (", "github.com/gravitational/teleport/lib/reversetunnelclient::TestStaticResolver/invvalid_address_yields_error", "TestValidateWorkloadIdentity/invalid_expre", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_credential_provider,_but_no_credential_source", "TestPrivateKey (0.00s)\\n\"}", "TestTemplate_Success/m", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,disallowed:Unauthorized", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertClusterNetworkingConfig/unauthorized", "TestCeremony_Run (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestGCPIPType", "TestCheckOwner", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestErrorResponsse", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasks/verbs=[list]", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/databases/IterateUnifiedResources/descending", "TestOpCompressed/compressed_OP_MSG (0.00", "TestUnifiedResourceWatcher_DeleteEvent (0.22s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/botfs::TestReadWrite", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/events/export::TestCursorBadState", "github.com/gravitational/teleport/api/client::TestALPNDialer_getTLSConfig/missingg_tls_config", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_client,_must_return_token_generation_errors", "Test_rolloutChangedInWindow", "github.com/gravitational/teleport/lib/events/export::TestExporterBasics/case=densse,randomFlake=true", "github.com/gravitational/teleport/lib/utils/mcputils::TestJSONRPCNotification", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_KEEP/YAML", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/over_max_groups_time-based", "github.com/gravitational/teleport/lib/utils::TestOpenFileLinks/symlinkFileOpenAlllowed", "github.com/gravitational/teleport/lib/events::TestEvents/auto_update_config.delette_EventFields", "github.com/gravitational/teleport/lib/services::TestParseShortcut/clusters", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/remmote_app,_no_redirect", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_match_unset}", "TestParseShortcut/namespace (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_TunnelPublicAddr", "TestHealthCheckConfig_equiv", "github.com/gravitational/teleport/lib/utils/listener::TestMemoryListenerDialTimeoout", "TestEKSIAMConfig/acco", "github.com/gravitational/teleport/lib/client/mcp::TestDatabaseResourceURI", "TestResolveViaWebClient/no_addrs", "TestSessionAccessJoin/failKind (0.00s)\\n\"}", "TestIsLeaf/leaf_cluster_resource_URI (0.00s)\\", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Filter_by_Name", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSClluster/primary", "github.com/gravitational/teleport/lib/services::TestLicenseUnmarshal", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/singlee_entity_without_entries", "github.com/gravitational/teleport/lib/utils::TestSet/subtract/empty_minus_populatted", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/non-scim_subdomain", "github.com/gravitational/teleport/lib/srv/ingress::TestPath", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-dataabase-assume-role-arn-resource-type", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#3", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/repeated_item_property_names", "TestManagedSQLListAll/auth_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws::TestIsRoleARN/invalid_value", "Test_isJSONCompact/compact (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/empty_puut", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_match_match_match}", "TestSignatureAlgorithmSuiteRoundtrip/#00 (0.00s)\\", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_AddSignature/misssing_signature_bytes", "github.com/gravitational/teleport/api/client::TestGetResourcesWithFilters/Node", "github.com/gravitational/teleport/lib/web/ui::TestMakeDesktopHiddenLabel", "github.com/gravitational/teleport/lib/cloud/provisioning::TestRun/success", "TestCreateSignedSTSIdentityRequest/no_re", "github.com/gravitational/teleport/integrations/lib/credentials::TestCheckExpiredCCredentials/Single_valid_credential", "TestLoginFlow_userVerification (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFESVIDOutput_CheckAndSSetDefaults/missing_destination", "TestListDeployedDa", "TestStringOrMap/unmarsh", "TestDefaultTags/resource_is_teleport_managed/IAM_Tags/missing_on", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestRollbackGroups/grouup_already_rolledback", "github.com/gravitational/teleport/lib/utils::TestMajorSemver/incorrect_version_iss_rejected", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/hasPrefix(labels.os,_\\", "TestSQLListWithinGroup/auth_error (0.00s)\\n\"}", "FuzzCommands (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/export::TestDateExporterResume/randoomFlake=true", "github.com/gravitational/teleport/lib/services::TestCheckAccessToUserGroups/labells_expression,_access", "TestCertAuthorityEquivalence (0.00s)\\n\"}", "TestPasswordlessFlow_Finis", "github.com/gravitational/teleport/lib/utils/log::TestOutput/json", "TestParser/unary_func_with_env_wrong_type (", "TestReviewSpecUnmarshaling (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_4242,_portName:_#01", "FuzzMSSQLLogin/seed#6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilterForScale/pageSize=7,prop=89", "TestVerifyAttestation/NOK_unknown_device (0.", "TestSet/union/empty_union_empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//invalid_desired_state", "TestWrappedSSHConn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestKubernetesOutput_CheckAndSSetDefaults/missing_kubernetes_config", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisClient/List/ListAll", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#9", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/git/resource_iterator/descending", "github.com/gravitational/teleport/lib/web/app::TestTransport_DialContextNoServerssAvailable", "FuzzParsePacket/seed#10 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/upsert/allow", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/one_role__needs_to_access_servers_sharing_the_partially_same_label_value", "TestValidateReverseTunnel/no_dial_address (0.00s", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig/cloud_web_idle_timeout", "TestSetLogLevel/Failure (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestMux/DisableSSH", "TestGetConfigIntegration/uncached/with_an_integration_client,_mus", "TestServiceAccess/UpsertAutoUpdateVersion/disallowed_admin_states/Unaut", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/deffault_is_valid", "TestValidateSigstorePolicy/no_keyles", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/too_llong_ttl", "TestEvents/session.join_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_success/successs_in_standby", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_POST", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/connect_too_metrics_database,_requested_writer_role", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/mapped_traits__with_email.local", "TestRequestFilterConversion (0.00s)\\n\"}", "TestOpenFileLinks/unsafe-directFileOpenAllowed", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDBService/ddeploying_without_providing_an_AccountID", "github.com/gravitational/teleport/lib/events/athena::TestRunWithMinInterval", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.member.delette_all_for_access_list_OneOf", "github.com/gravitational/teleport/lib/web/ui::TestMakeDatabaseConnectOptions", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/OK_scope_not_required", "Test_Channel_GetVersion/version_too_high", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate/ok", "github.com/gravitational/teleport/lib/web/ui::TestMakeCAKeySet/SSH_keys", "TestDatabaseFromRDSInstanceNameOverrid", "TestGetRootClusterURI/noop_on_root_", "github.com/gravitational/teleport/lib/utils/aws/dynamodbutils::TestIsFIPSEnabled//non-FIPS_binary", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_computeRolloutStatte/one_group_active", "FuzzReadProxyLineV2/seed#0 (0.00s)\\n\"}", "TestEvents/app.session.chunk_EventFields (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestParseShortcut/reverse_tunnelss", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse", "TestGetServers/no_matches_for_uuid (1.33s)\\n\"}", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange", "TestSPIFFEWorkloadAPIServic", "github.com/gravitational/teleport/lib/utils::TestClose", "TestIsLeaf/leaf_cluster_URI (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/uri_specifiess_port", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/role_max_duration_is_still_respected_even_with_dry_run_(which_requests_for_longger_maxDuration)", "github.com/gravitational/teleport/lib/srv/server::TestConvertEC2InstancesToServerrInfos", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewKubeClusterFroomAWSEKS/with_name_override_via_TeleportKubernetesName", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSecurityGrroup/no_rules", "TestDeployServi", "github.com/gravitational/teleport/lib/srv/server::TestSSMInstaller/detailed_eventts_if_ssm:DescribeInstanceInformation_is_available", "TestEvents/db.session.postgres.statemen", "Test_reco", "TestMatchers/regexp_matcher_negative (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/okta::TestCheckOrigin/resources_createed_by_okta_service_without_okta_origin_ia_an_error", "github.com/gravitational/teleport/lib/events/export::TestExporterBasics/case=densse,randomFlake=false", "github.com/gravitational/teleport/lib/scopes::TestCompare/root_in_ancestor_case", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/storage_config_witth_no_destination", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/empty", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.delete", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpdateDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[]", "github.com/gravitational/teleport/lib/services::TestGCPServiceAccountMatcher_Matcch/non-wildcard_deny_matches", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/label_expreession_role", "TestModifySuccess (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/cannonicalize_empty_location_to_/,_preserve_query_params", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/above_mmax_CertTTL", "TestUploadTraces/successfully_upl", "github.com/gravitational/teleport/api/types::TestCheckAndSetDefaults", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/over_max_groups_halt-on-error_cloud_unlimited", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_empty_slice", "github.com/gravitational/teleport/lib/utils/typical::TestParser/negation_of_expreession", "TestParseShortcut/tokens (0.00s)\\n\"}", "TestSessionRecordingMode (0.00s)\\n\"}", "TestServiceAccess/UpsertAutoUpdateAgentRollout/allowed_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[]", "TestPostgresReco", "TestDatabaseFromRDSProxy/sqlserver (0.00s)\\", "github.com/gravitational/teleport/lib/utils/aws::FuzzParseSigV4", "github.com/gravitational/teleport/lib/services::TestRoleParse/alternative_optionss_form", "TestContext_GetAccessState/device_au", "Test_progressGroupsHaltOnError/first_group_done", "TestValidateRoleARNAndExtractRoleName (0.00s)\\n\"}", "TestConnectionError (0.00s)\\n\"}", "TestReadAndRewriteXAuthPa", "github.com/gravitational/teleport/lib/events::TestEvents/unknown_EventFields", "TestSanitize//namespaces/.params (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/session.start", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Unknown", "github.com/gravitational/teleport/lib/services::TestLabelCompatibility", "TestJoinServ", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_rolloutChangedInWiindow/zero_rollout_start_time", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[upddate]", "TestEvents/oidc.updated_EventFields (0.00s)\\n\"}", "TestClientMap/get_from_cache (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/provisioning::TestRun", "TestMatchResourceByFilters (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/backend/dynamo::TestCreateTable", "TestGetServiceAccountFromCredentialsJSON (0.00s)", "TestUsageReporterGracefulStop (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestCountCatchAll/no_coommon_group", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setGroupStates", "github.com/gravitational/teleport/lib/utils/slices::TestDeduplicateKey/NoStringDuuplicates", "TestValidateHealthCheckConfig (0.01s)\\n\"}", "github.com/gravitational/teleport/api/client/proxy::TestNewClient", "TestParseDestination/filename_with_'@'_", "TestFailoverTrigger_CanStart/nil (0.", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsRemoteUser/remmote_user", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/disallowed_admin_states", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults", "TestPod", "TestAlertAcknowledgement_Check/success (0.00s)\\n\"}", "TestSQLManagedServerFet", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[]", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/apps/resource_iterator/descending", "FuzzParserEvalBoolPredicate/seed#27 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/struct_with_empty_embed", "TestParseShortcut/recording_config (0.00s)\\n\"}", "TestCircuitBreaker_success/success_in_standby", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/no_list_access_to_AccessMonitoringRule", "TestCloning/*types.AccessRequestV3 (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestPoorlyFormeedFiltersAreAnError/Bad_regex", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_match_unset}", "github.com/gravitational/teleport/lib/services::TestConvertResource/handles_unexppected_legacy_resource", "TestNewResourceExpressio", "github.com/gravitational/teleport/lib/auth/touchid::TestRegister_rollback", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_match_unset}", "TestParsePolicyDocument/parse_without_reso", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/valid_single-seggment", "TestFormatLabels/handles_nil_labels (0.00s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestChain", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[read]", "github.com/gravitational/teleport/api/client/webclient::TestParse/example.com", "TestPublisherConsumer/missing_event_id (0.01s)", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialHost", "TestSSHPortForwarding/local_deny (0.00s)\\n\"}", "TestServiceAccess/GetDynamicWindowsDesktop,allowed:MFAVerifie", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpdateDynamicWindowsDesktop,allowed:MFAVerified,verbs:[update]", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestParseMetadataClientErrror/error_message", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/NotRequired/verbs=[create]", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/marshal/wildcardd_but_at_least_one_entry", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestSendSSHPublicKeyRRequest/missing_instance_id", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsLocalUser/remoote_user", "TestBuildSchema (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation", "TestParseSignatureAlgorithmSuite/\\\"fips-", "TestJoinServiceGRPCServer_Regist", "TestConnString/user_and_database_set (0.00s", "TestEvents/okta.user.sync_OneOf (0.00s)\\n\"}", "TestNewExporter/successful_http_expo", "TestGetResolver/builder_error (0.00s)\\n\"}", "TestProtoStreamLargeEvent/la", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Begin_errors/NNOK_no_registered_devices", "TestGetClusterName (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/wworks_with_server_with_multiple_labels", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialCreation.PublicKey_empty", "TestIDTracker/pop_unknown_id/mcp.Reque", "TestRDSFetchers/skip_unsupport", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/observability/tracing::TestNewExporter/invaalid_exporter_url", "TestToTouchIDCredentialPicke", "TestProxyJumpParsing/\\\"host:12345\\\" (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_resource_selection_event", "github.com/gravitational/teleport/lib/client/db/postgres::TestConnString/insecuree", "TestEncodeAccessRequestData (0.00s)\\n\"}", "TestDynamicTypeNotSet (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/deny__search", "TestParser/integer_inequality_(true) (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_credential_provider,_but_using_an_empty_integration_faalls_back_to_ambient_credentials", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/IAM_Tags/missing_one_of_the_labels_should_return_false", "TestProxyLine_VerifySign", "TestSliceMatchesRegex/test-foo (0.00s)\\n\"}", "FuzzFetchMySQLVersion/seed#15 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestPasswordlessFlow_BeginAnndFinish", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/empty_rolle_set_has_access_to_nothing", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetByPurppose/no_creds_found", "github.com/gravitational/teleport/lib/utils::TestClickableURL/specified_IPV6", "TestToEC2Instances (0.00s)\\n\"}", "TestServiceAccess/ListDynamicWindowsDesktops,allowed:NotRequired", "TestKeyTrimSuffix/all_trimmed_on_exact_match (", "github.com/gravitational/teleport/lib/utils::TestReadAtMost/limit_not_reached", "TestOpenFileLinks/unsafe-hardlinkFileOpenDeni", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/unsuppported_resource_kind", "github.com/gravitational/teleport/lib/githubactions::TestValidateTokenWithJWKS/exxpired", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check/SSOTesttFlow_requires_ConnectorSpec", "TestListEC2/no_integration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertSessionRecordingConfig/upserted", "FuzzNewMatcher/seed#1 (0.00s)\\n\"}", "TestParseShortcut/windows_service (0.00s)\\n\"}", "TestRedisClient/GetToken/succeed (0.00s)\\n\"}", "TestService", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient/GetTToken/succeed_(default_database_name)", "TestFromWhereExpr (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/user_login__hint", "TestMatchGCPServiceAccount/wildc", "github.com/gravitational/teleport/lib/devicetrust/authn::TestCeremony_Run", "TestSuites/SIGNATURE_ALGORITHM_SUITE_", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeSS3Protos", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSDBProxyFeetcher", "TestParseReviewFrequency/1month (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed/ccompressed_OP_INSERT", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/acccess_prod_cluster_with_kube_cluster<prodCluster>_and_kube_pod<devvCluster>_resource_access_request", "TestIsHTTP/Reject_\\\"GE\\\" (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestListSubscriptionIDs", "TestMatchers/not_matcher (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/healthcheck::Test_dialEndpoints/resolved_onne_healthy_addr", "github.com/gravitational/teleport/api/client/webclient::TestSSHProxyHostPort/TLS__routing_disabled,_SSH_listen_addr", "TestMFACeremony/NOK_prompt_mfa_fail (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_states/", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition", "TestEvents/db.update_EventFields (0.00s)\\n\"}", "TestTemplate_Success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__CHANGE_USER", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/GetDatabaseObject/allowed_admin_states/Unauthorized/verbs=[read]", "github.com/gravitational/teleport/lib/utils/aws::TestNewS3V2FileWriter/writer.Cloose_waits_for_upload_to_finish", "TestConfigureExternalAuditStorage/ba", "github.com/gravitational/teleport/api/client::TestInventoryControlStreamPipe", "TestParser/map.key_syntax (0.00s)\\n\"}", "TestGetMCPServerTransportType/stdio (0.00s)\\n\"}", "TestGlobMatch/root_literal_match_child (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateSAMLIdPACSURLAndRelayyStateInputs/https://sp.com/acs", "TestMatchResourceByFilters_Helper/label_matc", "TestCheckAccessToGCP/full_access_role (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnmarshalPluginUnknownField", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#12", "TestConnWithSrcAddr/valid_clientSrcAddr (0.00s)\\n\"}", "FuzzCommands/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMarshal", "TestAuroraMySQLVersion/5.6.10a (0.00s)\\n\"}", "TestReconcileResults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws::TestIsRoleARN/invalid_partial_arrn", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/one_scalar", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_match_nomatch}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__QUIT", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_SSHPublicAddr_and_TunnelListenAddr", "TestCheckKubeGroupsAndUsers (0.00s)\\n\"}", "TestValidate_WithAllowRequestK", "TestCheckAccessWithLabelExpressions/rem", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/no_mettadata", "github.com/gravitational/teleport/lib/services::TestNewUserACLCloud", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[read]", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/json/not_configuured", "TestEvents/mfa_auth_challenge.validate_Ev", "TestSSHPortForwarding/remote_allow (0.00s)\\n\"}", "TestConflictingRules (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestMySQLFlexClient/List", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/IP_address_passes", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_unset_unset_match}", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_empty_value", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_unset_unset}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/equals(resource.spec.hostname,_\\", "TestMigrate/no_storage_config (0.00s)\\n\"}", "TestTake/full_stream (0.00s)\\n\"}", "TestConvertAuditEvent/SessionRe", "TestCheckedPrefixWriter/missing_prefix (0.00s)\\n\"}", "FuzzMongoRead/seed#1 (0.00s)\\n\"}", "TestKubeRe", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_deenied_device_series", "TestValidateConfigAga", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_PublicAddr_with_ProxyWebPort_if_TLSRoutingEnabled_was_enabled", "TestCertPoolFromCertAuthoriti", "TestCanCopyFiles/nil (0.00s)\\n\"}", "TestPostgresRecor", "TestNewResourceExpression/matching_expressions/equals(resource.metadata", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/signed_manifest", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestGetTags/denied_access_tto_tags", "TestOktaCRUD/upse", "github.com/gravitational/teleport/lib/utils::TestAllCombinations", "github.com/gravitational/teleport/lib/utils/aws/region::TestGetKnownRegions", "github.com/gravitational/teleport/lib/events::TestEvents/ssm.run_EventFields", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#21", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr", "TestConnectionMetadata (0.00s)\\n\"}", "TestString//clusters/teleport.sh/", "TestMatchResourceByFilters/unsupporte", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_claimsToRollesParser_Set", "TestAutoUpdateAgentRolloutEvents (0.0", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/replaces_default_credential_process", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/valid_service_account", "TestRateLimitFailure/limiter-only (0.00s)\\n\"", "github.com/gravitational/teleport/lib/jwt::TestExpiry", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasksByIntegration/verbs=[read_list]", "TestDatabaseOutput_CheckAndSetDe", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError/SStatusConflict", "TestUploadTraces/not_implemented (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestFields", "github.com/gravitational/teleport/api/client/proxy::TestClient_SSHConfig", "TestParseSignatureAlgorithmSuite/1 (0.01s)\\n\"}", "TestWindowsDesktopGroups/irrelevant_deny (0.00s)\\", "github.com/gravitational/teleport/lib/itertools/stream::TestRateLimitFailure/simuultaneous", "TestGetEnforcementMode (0.00s)\\n\"}", "TestValidateSigstorePolicy/public_key_i", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/no_expression_match", "TestDatabaseFromElastiCacheNodeGroups (0", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[update]]", "github.com/gravitational/teleport/lib/events/athena::Test_EmitAuditEvent/valid_puublish", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/unknown", "TestIsRoot/gateway_URI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityJWTServicee_CheckAndSetDefaults/valid_with_labels", "TestIDTokenSource_GetIDToken/tagge", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/ignore_map_value_field", "TestParseDBURI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob", "TestEvents/oidc.created_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/reset_password_token.creeate_OneOf", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__DROP_DB", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/missing_task_role", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/prrod_cluster_with_resource_access_request", "TestALPNDialer_getTLSConfig/missing_tls_confi", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingIAMMethod/pass_case", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_unset_match}", "TestVariable/invalid_namespaces_are_allowed", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestBottInstanceActivityReportSplitting", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/missing_proxy_url", "TestServiceAccess/ve", "TestIsHTTP/Accept_HEAD (0.00s)\\n\"}", "TestPruneRequestRoles/label_expression_role (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseUser/dattabase_types_require_AWS_roles_as_database_users", "TestSliceMatchesRegex/test (0.00s)\\n\"}", "TestGenerateServiceWithTaskDefinition (0", "github.com/gravitational/teleport/lib/utils/aws::TestResourceARN/policy", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenSource_GetIDToken/vallue_missing", "TestRecon", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/GCP_IAMM_Auth_with_IP_type", "TestValidVersionChange (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGKEFetcher/filtter_not_found", "TestDatabaseFromRedshiftCluster/succes", "TestPageRequestToken/updati", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/singlee_entity_with_multiple_entries", "github.com/gravitational/teleport/lib/events::TestEvents/session.join_OneOf", "TestEC2SSMIAMConfig/ssm_docume", "TestConfig_Endpoint/with_https_scheme (", "TestListDeployedDatabaseServices/p", "TestTeleportBotV1Spec_DeepCo", "TestAccessListMemberDefaults/added-", "TestSortedLabels/Server_with_aws_labe", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV7:__cluster-level_MFA_denies_unverified_MFA", "TestPrincipals/FromKeys (0.00s)\\n\"}", "TestRouter_DialSite/successfully__dial_rem", "TestValidateSegment/root-like_segment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/file:/aabsolute/dir", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[delete]", "TestNewResourceExpression/fai", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_formatJSON/auto_preetty", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[create]", "TestClickableURL/specified_IPV6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws/stsutils::TestNewFromConfig/env_nnot_set", "TestTagsToLabels/ec2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet/existing_secret", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.user.deactivaate_OneOf", "TestIsResponseSuccessful/200 (0.00s)\\n\"}", "TestAccessRequestFilter/user_want", "TestOriginLocalRedirectURI/empty (0.00s)\\n\"}", "FuzzNewExpression/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/update/oktta_service_removing_Okta_origin_is_an_error", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#9", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/only_the_assigned_role_that_allows_the_requested_roles_are_considered_for_maxDuuration", "TestCommands/teleport (0.00s)\\n\"}", "TestChallengeValidator_IssueChallenge (0.00s)\\n\"", "github.com/gravitational/teleport/lib/utils/typical::TestParser/error_evaluating__argument", "TestServiceAccess/UpsertUserTask (0.00s", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation_windowwsHello", "TestRejectsInvalidPEMData (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/access_(defauult_rules_match_preset_rules)", "github.com/gravitational/teleport/lib/services::TestApplyTraits/invalid_function__call_in_logins_does_not_get_passed_along#01", "github.com/gravitational/teleport/lib/scopes::TestCompare/empty_root_in_descendannt_case", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityJWTServicee_CheckAndSetDefaults/missing_audience", "TestServiceAccess/TriggerAutoUpdateAgentGroup/allowed_admin_st", "TestGCPIPType/public (0.00s)\\n\"}", "TestIsEnabled (0.00s)\\n\"}", "TestRBAC/update (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestCredentialRPID/register__writes_credential_RPID", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertClusterNetworkingConfig/oss_proxy_peering", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[]", "TestDecorr (0.00s)\\n\"}", "TestHTTPConnStateReporter/with_client_certs", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestRessourcePresenceReporting", "TestMalformedOpMsg/multiple_$db_keys (", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[update_creatte]", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__match_multipart", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/no_keyyless_identity_subject", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestAutoEnrollCeremony__Run", "TestIssueAndVerifyJoinState (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/observability/tracing::TestRotatingFileClieent/larger_limit_has_no_rotations", "Test_setVersionMetric/same_versi", "github.com/gravitational/teleport/lib/backend::TestKey", "TestProxyLine_VerifySignature/mangled_s", "TestServiceAccess/UpsertAutoUpdateAgentReport/allowed_ad", "TestGenerateReport_SkipCommands (0.00s)\\n\"}", "TestLabelExpressions/regexp.replace (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetKubeResources/labels_alloww", "github.com/gravitational/teleport/lib/events::TestEvents/session.leave_EventFieldds", "TestConvertRequestFailureError/StatusForbi", "TestFilterItems/No_Filters (0.00s)\\n\"}", "TestListVirtualMachines/all_resource_groups", "TestSafeEnvAdd/duplicate_ignore (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestRandomDuration", "TestParseShortcut/saml_sp (0.00s)\\n\"}", "TestIDTracker/track_last_5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/delete", "github.com/gravitational/teleport/api/client::TestEventEqual/regular_protobuf_oneeof_not_equal", "TestResourceMatchersToType", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch", "github.com/gravitational/teleport/lib/events::TestJSON/desktop_session_end", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.webtoken.ccreate", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_command_help", "github.com/gravitational/teleport/lib/utils/gcp::TestGetServiceAccountFromCredenttialsJSON/service_account_credentials", "github.com/gravitational/teleport/lib/srv/db/secrets::TestAWSSecretsManager", "Test_splitExpressi", "TestListSubnets/valid_for_listing_su", "TestOIDCAuthRequest_Check/below_min_CertTTL (0", "TestDeployDBServi", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertSessionRecordingConfig", "github.com/gravitational/teleport/lib/resumption::TestResumption/mux/plain_SSH", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//2/yaml", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromMemorryDBClusterNameOverride/via_teleport.dev/database_name", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay/seed#9", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/regexp_replaceement_with_named_match", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/IAM_Tags/all_tags_match", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpMsgSingleBoddy", "TestSearc", "TestExhaustiveNonEmptyBasics/empty_slice (", "TestUnmarshalDevice/fail_string_as_num (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestGetVirtualMachine", "TestDep", "TestConfigureIdPIAMOutput (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/valid_multi-segmment", "TestParseShortcut/session_recording (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestJSON/session_network_event", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfigReqDeefaults/set_defaults", "TestListDataba", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiigReqDefaults", "github.com/gravitational/teleport/lib/release::TestListReleases/bad_request", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/mixed_upper_casee_fails", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_sta", "TestValidateAccessReques", "TestKubeResourceCouldMatchRule", "github.com/gravitational/teleport/lib/versioncontrol::TestVisitorBasics", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/valid_sso_role__arn", "TestDesktopDirectorySharing/s", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/[]nil", "TestReconciler/resources_t", "github.com/gravitational/teleport/lib/services::TestParseShortcut/okta_assignmentts", "Test_VersionUpdater_GetVe", "FuzzRPCClientPartialLength (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAccessCheckerHostUsersShell", "TestServiceAccess/DeleteDatabaseObjectImportRule/disallowed_a", "github.com/gravitational/teleport/lib/web/ui::TestCreateGitServerRequest_Check/unnsupported-subkind", "TestLogin_cred", "TestIDTokenValidator_Validate/valid (0.00s)\\n\"}", "FuzzParseRefs/seed#4 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasksByIntegration/verbs=[read]", "TestExhaustiveNonEmptyStruct/ig", "TestGuessIfAccessIsPossible/g", "TestDescendingSegments/single-segment (0.00s)\\n\"}", "TestRegisterDatabase/Resources (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestJoinServiceClient_RegisterUsinggOracleMethod", "github.com/gravitational/teleport/api/client::TestEventEqual/gogo_oneof_not_equall", "TestWrapperConn (0.00s)\\n\"}", "TestEvents/user_task.delete_OneOf (0.00s)\\n\"}", "TestIdentityConversion (0.00s)\\n\"}", "TestSelectNextReviewDate/one_mon", "TestServiceAccess/UpsertAutoUpdateVersion/allowed_admin_states/MFA", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/name_==", "github.com/gravitational/teleport/lib/utils::TestReadAtMost/limit_reached_at_5", "github.com/gravitational/teleport/lib/utils/pagination::TestPageRequestToken/updaating_token_resets_stale_state", "TestServiceAccess/GetAutoUpdateAgentReport/allowed_admin_states/N", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__REFRESH", "github.com/gravitational/teleport/lib/services::TestParseShortcut/kube_servers", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.enroll", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/DynamoDB__access_missing_credentials", "TestDatabaseWatcher (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_unset_match}", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/EmpptyAWSMatcherKinds", "TestEvents/db.session.user.deactivate_Even", "TestGuessIfAccessIsPossible (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMinVerWithoutPreRelease/compare__greater_major_versions", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/raw_regexp", "TestConversion/NotFound (0.00s)\\n\"}", "TestVariable/regexp_function_call_not_all", "github.com/gravitational/teleport/lib/devicetrust/challenge::TestSignAndVerify", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/expired", "github.com/gravitational/teleport/lib/inventory::TestGetSender", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestMemberFrommProtoNils/accesslist", "github.com/gravitational/teleport/lib/proxy::TestGetServers/no_matches_for_hostnaame", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_match_unset_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_match_unset}", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim", "TestMarshalYAML/list_of_yaml_documents (0.00s)\\n\"}", "TestJSON/session_leave_event (0.00s)\\n\"}", "TestTrimToMaxSize/access_list.member.create (0.0", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_evaluate/labels.env.toomanyfield", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#5", "TestCacheOperations (0.00s)\\n\"}", "FuzzParsePacket/seed#8 (0.00s)\\n\"}", "TestFilterMapUnique/structs (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Cluster/primary/with_name_override_via_teleport.dev/database_name", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/invalid_s3_arn", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL", "TestToGRPC_statusError/unwrapped_status (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestApplyAWSDatabaseNNameSuffix/RDS_Aurora_cluster", "github.com/gravitational/teleport/lib/services::TestUserNotificationsCache/correcctly_fetches_sorted_notifications_for_usernameB_with_a_startKey", "github.com/gravitational/teleport/lib/web/ui::TestMakeClusterHiddenLabels", "TestGetUser (0.02s)\\n\"}", "TestStrongValidate/valid_single-segment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/storage_error", "github.com/gravitational/teleport/lib/auth/storage::TestRDPLicense", "TestDisplay/unix_socket#01 (0.00s)\\n\"}", "TestValidateTokenWithJWKS (0.01s)\\n\"}", "TestNewScanner (0.76s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestPageFunc", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canUpdateToday/Willdcard", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/podutils::TTest_isPodUnhealthy/unready_but_terminating", "github.com/gravitational/teleport/lib/services::TestAccessChecker_EnumerateMCPToools/no_tools_permission", "TestParseShortcut/lock (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/unmarshal/erroor_int", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__requires_MFA_and_MFA_verified", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFESVIDOutput_CheckAndSSetDefaults", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/git/IterateUnifiedResources/descending", "TestCompare/empty_root_equivalence (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/jwt::TestPublicOnlyVerify", "TestGetServicePorts/One_unsup", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/equals(name,_`test-hostname`)", "TestN", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states", "TestRegistrationFlow_Begin_webID/", "TestVariable/invalid_int_variable (0.00s)\\n\"}", "TestIPv6Fix/empty (0.00s)\\n\"}", "TestCheckAccessToKuberne", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/get_authoritiees_no_secrets", "github.com/gravitational/teleport/lib/events::TestEvents/contact.delete_OneOf", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateSessionRecordingConfig/no_admin_action", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_unset_unset_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_match_unset}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV7:__per-session_MFA_denies_unverified_MFA", "TestServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVeri", "github.com/gravitational/teleport/lib/services::TestCertPoolFromCertAuthorities", "github.com/gravitational/teleport/api/types::TestAlertAcknowledgement_Check", "github.com/gravitational/teleport/lib/services::TestParseShortcut/access_lists", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//wrong_signature_(cluster)", "TestSPIFFEWorkload", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_nomatch_match}", "TestAzureMySQLFlexFetchers (0.00s)\\n\"}", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationDrryRunValidation/event_without_time", "TestGetResolver/builder_not_registered (0.0", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/FindRoleByARN/not_founnd", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_nomatch_unset_match}", "TestLoginFlow_scopeAndReus", "TestM", "github.com/gravitational/teleport/lib/client/mcp/claude::TestFileConfig_sampleFille", "TestServiceAccess/DeleteAutoUpdateVersion/allowed_admin_states/Not", "TestApplyTraits/logins_substitute_in_allow", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestInvalidPayloaddSize/invalid_payload", "github.com/gravitational/teleport/lib/services::TestSSHAccessLockTargets", "TestParseOSReleaseFromReader (0.00s)\\n\"}", "TestListDatabases/invalid_rds_type (0.00s)\\", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/AssumeRolle_denied", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerifiedWithReuse/verbs==[]", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/MFA_unknown_credential_IDs_(2)", "github.com/gravitational/teleport/api/types::TestAppIsAWSConsole/Not_an_AWS_Consoole_URL", "github.com/gravitational/teleport/lib/utils::TestContainsExpansion/escaping_is_hoonored", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/podutils::TTest_isPodUnhealthy/stuck_unready", "github.com/gravitational/teleport/lib/services::TestCheckAccessToAzureCloud/no_acccess_role", "TestValida", "TestCheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnmarshalPluginUnknownField/uunknown_plugin_type", "TestMemory/KeepAlive (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/challenge_response_error/challenge_response_error_auth", "TestMakeLabels/Multiple_maps_with_hidden_labels", "TestWorkloadIdentityJWTService", "Test_zipStreams_Process/already_in_sync (0.00s", "TestClient_DialCluster (0.51s)\\n\"}", "TestSearchEvents/session_id (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.postgrres.statements.parse", "TestEvents/auth_preference.update_EventFields", "TestMatchResourceLabels (0.00s)\\n\"}", "TestEvents/db.session.postgres.s", "TestAccessCheckerHostUsersShell (0.00s)\\n\"}", "TestDeleteAllUserLoginStates (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_makeGroupsStatus/oone_group_in_schedule", "TestEvents/login_rule.delete_OneOf (0.00s)\\n\"}", "TestUpsertPolicy/CreateNewPolicy (0.00s)\\n\"}", "TestEvents/bot.delete_OneOf (0.00s)\\n\"}", "TestJSON/session_print_event (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#10", "TestDestinationKubernetesSecret/labels (0.00s)\\n", "FuzzTraitsExpressionParser/seed#8 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter::TestUsageReporterDiscard", "TestServiceAccess/GetAutoUpdateConfig/allowed_admin_state", "TestMemoryDBFetcher/skip_unavailable", "github.com/gravitational/teleport/lib/client/db/postgres/repl::FuzzCommands/seed##2", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams/Stream/Flaaky=true,ForceFlush=true", "github.com/gravitational/teleport/lib/itertools/stream::TestEmpty", "TestCertAuthorityWatcher (2.01s)\\n\"}", "TestKeyScan/invalid_type_bool (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/saml/IterateUnifiedResources", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_nomatch_unset}", "github.com/gravitational/teleport/lib/events::TestPreparerTimeBasedIndex", "github.com/gravitational/teleport/lib/srv/discovery/common::TestAuroraMySQLVersioon/5.6.mysql_aurora.1.22.1.3", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_AddSignature", "TestAuthConfig/GCP_IAM_Auth/Appl", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_WebListenAddr_with_default_https_port_if_TLSRoutingEnabled_was_enabled", "TestMFAVerificationInterval (0.00s)\\n\"}", "TestEvents/workload_identity_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_nomatch_unset}", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text", "TestOutput/text/error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.fetch_OneOf", "github.com/gravitational/teleport/lib/utils::TestParseDefaults", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//invalid_automatic_review_decision", "TestKeyPrependKey/empty_prepend_is_noop (0.00s)\\n\"}", "TestRBAC/list_no_access (0.00s)\\n\"}", "TestFindMatchingProxyDNS/Multi", "TestSessionWriter/ResumeMiddle (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/missing_account_id", "TestMemoryDBFetcher/skip_unsupported", "TestParseShortcut/remote_clusters (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_rolloutChangedInWiindow/epoch_rollout_start_time", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseNamesAndUsers/tttl_doesn't_match", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/mysql/custom_endpoint", "github.com/gravitational/teleport/lib/scopes::TestPolicyAndResourceScope/simple_rroot", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestIdPIAMConfigReqDeefaults/set_defaults", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##15", "TestPasswordlessFlow_F", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level_compoonent_caller_timestamp", "TestValidateDa", "Test_websocketALPNClientConn/Write (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig", "TestWorkloadIdentityX509Servi", "TestServiceAccess/verif", "github.com/gravitational/teleport/lib/utils/log::TestOutput/json/info", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_match_match}", "github.com/gravitational/teleport/lib/services::TestAccessCheckerWorkloadIdentityy/no_labels_role,_labels_wi", "TestCompare/empty_root_in_ancestor_case (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestAWSIAMMPollOIDCProviders", "TestIsUserFunctions/IsRemoteUser/local_user (0.00", "github.com/gravitational/teleport/lib/services::TestOIDCUnmarshal", "github.com/gravitational/teleport/lib/multiplexer::FuzzProxyLine_Bytes/seed#4", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//12_month", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states", "TestTemplate_MissingMapVa", "github.com/gravitational/teleport/lib/utils/aws::TestIsUserARN/valid_full_arn", "TestRotatedAccessTokenProvider/Init", "TestStdioHelpers/reader_closed_by_cl", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors", "TestContext_GetAccessState/builtin_role (0.00s)\\n\"}", "TestAuthorizer_AuthorizeAdminAction (0.00s)\\n\"}", "TestParseSignatureAlgorithmSuite/1/yaml (0.00s)\\n\"", "TestSanitize//test+subaddr@example.com (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query,_1d_extended_range_returns_enough_results,_desc", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRedshiftFetccher/skip_unavailable_with_assume_role", "TestEvents/kube.request_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/NotRequired", "TestConnResume/Sync (0.00s)\\n\"}", "TestClusterCredentials/no_server_cert (0.00s)\\n\"", "TestMemberRoundtrip (0.00s)\\n\"}", "TestGlobIsSubje", "github.com/gravitational/teleport/lib/srv/discovery/common::TestExtraElastiCacheLLabels/no_nodes", "TestEvents/desktop.recording_EventFields (0.00s)\\n\"", "TestSta", "TestUnmarshalGraphError/valid (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestForEachResource_StopIteration", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/deev_cluster_with_kube_cluster_resource_access_request", "TestServiceAccess/DeleteDatabaseObject/allowed_admin_states/NotRequ", "TestTemplate_Suc", "github.com/gravitational/teleport/lib/events::TestPreparerIncrementalIndex", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenValidator_Validaate", "TestRoleMap/test_case_'mapping_is_deduplic", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2/valid_butt_all_instances_are_windows", "TestServiceAccess/ListDatabaseObjectImportRu", "TestConnectionsLimiter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/MFFA_single_credential", "TestMatchResourceByFilters_Helper/no_sea", "FuzzParsePacket/seed#15 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/circleci::TestGetIDToken", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__STMT_PREPARE", "TestCursorPagination/empty_child (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/404", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSecurityGroupps", "github.com/gravitational/teleport/lib/events::TestEvents/client.disconnect_EventFFields", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet_CheckAndSetDefaults/missing_name", "github.com/gravitational/teleport/lib/services::TestCheckAccessToAWSConsole/no_acccess_role", "TestIPv6Fix/ipv6_medium (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/operator/controllers/reconcilers::", "TestLockWatcherSubscribeWithEmptyTarget (1.00s)\\n\"", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewExpression/seed#3", "github.com/gravitational/teleport/lib/auth/webauthn::TestRegistrationFlow_Begin_eexcludeList/MFA", "TestCheckAccessToSAMLIdP/roleV7:_idp_o", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay/seed#0", "github.com/gravitational/teleport/lib/utils/parse::TestVarValidation", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpsertUserTask/verbs=[create]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cluster_authenttication_preferences", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#27", "TestStatusError_Is/distinct_s", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/TimedOut", "github.com/gravitational/teleport/lib/services::TestApplyTraits/invalid_function__call_in_logins_does_not_get_passed_along", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress/remmoves_443_port", "FuzzFetchMySQLVersion/seed#11 (0.00s)\\n\"}", "TestEvents/workload_identity_x509_", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/prefix,_expr,_suffix", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[read]", "TestDatabaseFromRDSClusterNam", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[]", "TestEncodeDecodeCreateDataba", "github.com/gravitational/teleport/lib/services::TestReasonRequired/resource_requeest:_do_not_require_reason_when__all__roles_do_not_require_reason_for__all__resouurces", "github.com/gravitational/teleport/lib/utils/aws::TestIsRoleARN", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/git/IterateUnifiedResources", "TestUnmarshalGraphError/invalid (0.00s)\\n\"}", "TestAuthPreferenceValidate/stable_uni", "TestUploadResume", "github.com/gravitational/teleport/lib/utils::TestSet/contains", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple", "github.com/gravitational/teleport/lib/cloud/aws::TestGetIdentity/unsupported_idenntity", "github.com/gravitational/teleport/lib/srv/db/redis/connection::FuzzParseRedisAddrress", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/secondd_factors", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/git/resource_iterator", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/pass_case/pass_case_auth", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setGroupState", "TestIsUserARN/invalid_partial_arn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsDB", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_unset_unset}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch/just_schema", "TestGetByPurpose/backend_issue (0.00s)\\", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpGetMore", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/full_sppec_of_the_remote_destination_using_ipv4_address", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServices/ignores_ECS_Services_without_ownership_tags", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/non-okta_servicee_creating_non-okta_resource_is_allowed", "github.com/gravitational/teleport/lib/utils::TestMarshalYAML/list_of_yaml_types", "TestServiceAccess/GetDatabaseObje", "TestKeyIDHasDistinctOutputForDifferingInpu", "TestRoleSetEnumer", "TestEvents/db.session.start_EventFields (0.00s)\\n\"}", "TestMatchPattern/substri", "github.com/gravitational/teleport/api/types::TestNewAppV3/empty_app", "TestCheckAccessToServer/no_logins_means_", "TestConnNetTest/NotFirstConnSync/FutureTi", "TestEvents/db.session.malformed_packet_Ev", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSecurityGrroup/multiple_CIDRs", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestRegister/RRK_from_ReqquireResidentKey_if_is_empty_ResidentKey", "TestRedisEnterpriseClient (0.00s)\\n\"}", "TestValidateDatabaseObj", "TestGetServers/match_by_host_only_for_tunnels (", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/Unauthorized/verbs=[read]", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/get_success", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialSite/unknown_cluster", "TestValidateFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/services::TestDesktopClipboard/single_role,,_explicitly_disabled", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_kube_eks_enroll", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/services::TestCheckSAMLEntityDescriptor/witth_certificate_padding", "TestOpCompressed/compressed_OP_GET_", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestCertificateVerificatioon/bad_server_certificate", "TestMatchResourceByFilters/app_server (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#26", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/poiinter_to_empty_struct", "TestRoleMap/test_case_'mu", "github.com/gravitational/teleport/lib/events::TestStreamSessionEvents/Error/WithCCallback", "github.com/gravitational/teleport/lib/utils::TestTimeProtoConv", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetAuthPreference", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/mix", "TestServiceAccess/CreateAutoU", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[]", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGetServicePortss/One_unsupported_port_(UDP)", "TestValidateReverseTunnel (0.00s)\\n\"}", "TestValidateConfigAgainstModules (0.00s)\\n\"}", "TestValidateAssumeStartTime/star", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey//ResidentKey_discouraged", "TestHeaderRewriter/http,_no_port_specifie", "FuzzParseProxyJump/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/missing_table_name", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/MFFA_no_credentials_allowed", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/reviewer_(entterprise,_existing_review_requests)", "github.com/gravitational/teleport/lib/utils::TestGetSingleHeader", "github.com/gravitational/teleport/api/types/accessgraph::TestPrivateKey/missing_ffingerprint_file", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/kube.request", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress/vallid_ip:port", "TestExtraFields/text/caller_timestamp (0.00s)\\n\"}", "TestParseDestination/co", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_Run/windowws_device_succeeds", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/no_namme", "TestCertificateVerification/client_n", "github.com/gravitational/teleport/lib/services::TestApplyTraits/invalid_function__call_in_logins_does_not_get_passed_along#02", "TestLoginFlow_Finish", "TestServiceAccess/UpsertAutoUpdateVersion/allowed_admin_stat", "github.com/gravitational/teleport/api/types::TestDatabaseMemoryDBEndpoint/valid_UURI", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeSS3Protos/Policy_status_merge_failed", "github.com/gravitational/teleport/lib/utils/typical::TestParser/incorrect_runtimee_type", "TestMCPToolMatcher/deny_empty (0.00s)\\n\"}", "TestValidateHealthCheckConfig/mi", "TestMultiVariable (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_nomatch_match}", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error/not_found", "github.com/gravitational/teleport/lib/events::TestEvents/cert.generation_mismatchh_EventFields", "github.com/gravitational/teleport/lib/web/ui::TestNewUserListEntry", "github.com/gravitational/teleport/lib/automaticupgrades/cache::TestTimedMemoize_GGet/valid_cache", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##28", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/no_access_to_update_discovery_config", "TestServiceAccess/UpdateAutoUpdateVersion/allowed_admin_s", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamManyParts", "TestNewAppV3/non-cloud_app (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstDatabaseObjectImportMatch/empty_name_matches_no_objects", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_ValidateWithJWWKS/success", "TestV5ReadSelfContained (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/cloud_should_reject_long_rollouts", "TestParseGatewayTargetURI//clus", "github.com/gravitational/teleport/lib/decision::TestTLSIdentity_roundtrip", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//NOK_local_user_reused_mfa_with_reuse_not_allowed", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumentt/aws-elasticache", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsLeaf/root_cluster_rresource_URI", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial", "github.com/gravitational/teleport/lib/events::TestEvents/discovery_config.delete__all_OneOf", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/when_role_max_duration_is_not_set:_requestedMaxDuration_is_respected_when_\\u0033c_role_defined_sessionTTL_(6h)", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisClient/List/ListWithiinGroup", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/nodes/resource_iterator/descending", "TestConnNetTest/NotFirstConnSync/Conc", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/Unauthorized/verbs=[read_list]", "github.com/gravitational/teleport/lib/backend/dynamo::TestKeyPrefix", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults/invalid_service", "github.com/gravitational/teleport/lib/srv/discovery/common::TestApplyAWSDatabaseNNameSuffix", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/create/deny_mfa", "github.com/gravitational/teleport/lib/services::TestResourceMatchersToTypes", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_nomatch_nomatch}", "TestApplyTraits/deduplicate (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNormalizeECSResouurceName/valid", "TestNewFromConfig/invalid_does_no", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_success", "TestCountCatchAll/all_group_hit (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestCreateGitHuubAuthRequest", "github.com/gravitational/teleport/lib/services::TestParseShortcut/okta_assignmentt", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/ConneectorSpec_with_SSOTestFlow_works", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_nomatch_unset}", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestWrapPayload", "github.com/gravitational/teleport/lib/utils/aws/endpoint::TestCreateURI", "github.com/gravitational/teleport/lib/events::TestCheckUploadsContinuesOnError", "TestMatchResourceByFilters_He", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse/verbs=[[update]", "TestGCPIPType (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix/ipv6_smalll", "TestSSHProxyHostPort (0.00s)\\n\"}", "TestEvents/okta.access_list.sync_EventFields (0", "TestCheckAccessToSAMLIdP (0.01s)\\n\"}", "TestUpsertSessionRecordingConfi", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_match_match}", "TestEvents/ssm.run_OneOf (0.00s)\\n\"}", "TestServiceAcces", "TestNewManager/missing_Component (0.00s)\\n\"}", "TestEvents/db.session.query_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/app/gcp::TestHandler_getToken", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher/skip_unavailable_with_assume_role", "TestDatabaseFromRDSProxy/po", "github.com/gravitational/teleport/lib/events::TestEvents/device.delete_OneOf", "TestDeduplicateKey/StringDuplicates (0.00s)\\n\"}", "TestMux/signed_", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cert_authoritiees", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/missing_region", "TestEvents/sigstore_policy.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/list/allow", "github.com/gravitational/teleport/lib/scopes/cache::TestCursorPagination", "TestAppPublicAddrValidation/kubernetes_app_ht", "TestTemplate", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors//NOK_assertion_with_bad_RPID", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestUpdateUser", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources", "github.com/gravitational/teleport/lib/services::TestApplicationMarshal", "TestValidateAssertionConsumerServicesEndpoin", "github.com/gravitational/teleport/lib/services::TestParserHostCertContext/complexx/negative", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#13", "TestEKSIAMConfigReqDefaults/set_defau", "github.com/gravitational/teleport/lib/srv/db/cassandra/protocol::FuzzReadPacket/sseed#1", "github.com/gravitational/teleport/entitlements::TestBackfillFeatures/entitlementss_present;_keeps_entitlement_values", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerified/verbs=[read]", "TestOpUpdate (0.00s)\\n\"}", "TestKeyTrimPrefix/empty_key_trims_nothing (0.00s)", "TestServiceAccess/UpsertDatabaseObj", "github.com/gravitational/teleport/lib/utils::TestSyncMap", "TestLabelKeyValidation (0.00s)\\n\"}", "TestEvents/app.delete_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestPoorlyFormeedFiltersAreAnError/Bad_exclude_regex", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/disallowed_admin_states/Unauthorized", "TestEvents/ssm.run_EventFields (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdateAgentReport/allowed_admin_stat", "TestResetSessionRec", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/valid_service_rrole_arn", "TestNewA", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_unset_match}", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerTRACE", "github.com/gravitational/teleport/lib/services::TestApplyTraits/deduplicate", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError/add_accesssDenied_and_badParameter", "github.com/gravitational/teleport/lib/services::TestReconciler/resource_with_updaated_matching_labels_should_be_updated", "github.com/gravitational/teleport/lib/loglimit::TestLogLimiter/logs_are_deduplicaated_over_time_windows", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[update_create]", "github.com/gravitational/teleport/api/observability/tracing::TestUploadTraces/errror_uploading_spans", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/requester_(noot_enterprise)", "TestEvents/access_list.member.update_EventF", "github.com/gravitational/teleport/lib/utils/fanoutbuffer::TestBasics", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/wrongg_audience", "TestAppPublic", "github.com/gravitational/teleport/lib/utils::TestEmpty", "TestCheckGCPServiceAccounts/denying_a_rol", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_kube_eks_enroll#01", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate/empty_RPID", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/databases", "TestNewResourceE", "github.com/gravitational/teleport/lib/services::TestExtractFrom", "github.com/gravitational/teleport/lib/cloud/aws::TestTagsToLabels", "TestMatchResourceLabels/selector_", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__mismatch_ancestor", "TestCheckKubeGrou", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertAuthPreference/no_admin_action", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_rolledback_->_rolledback", "FuzzTraitsExpressionParser/seed#23 (0.00s)\\n\"}", "TestGetClusterURI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfig/iintegration_role_does_not_exist", "TestCheckAccessToGCP/readonly_role (0.00s)\\n\"}", "TestKeyTrimSuffix/prefix_trim_trims_nothing (0.", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/normal_add", "TestRo", "TestServiceAccess/ListUserTasks (0.00s)\\", "TestCreateClusterNetworkingConfig/creation_prevent", "github.com/gravitational/teleport/lib/config/openssh::TestWriteMuxedSSHConfig/leggacy_OpenSSH_-_single_cluster", "TestParseAdvertiseAddr/missing_port (0.00s)\\n\"}", "TestServiceAccess/UpsertDatabaseObject/allowed_admin_states/NotRequ", "Test_websocketALPNClientConn/Read (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_unset_unset}", "TestConversionFromProto_n", "github.com/gravitational/teleport/lib/utils/typical::TestParser/error_evaluating__key", "github.com/gravitational/teleport/api/types::TestDatabaseRedshiftEndpoint", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/Unauthorized/verbs=[read]", "TestGetRequestableRoles/no_resources_to_", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsSSHDeviceVerified", "TestEvents/auto_update_version.delete_OneOf (0.0", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenValidator_Validate//invalid_issuer", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_match_nomatch_match}", "TestConvertUsageEvent/", "TestAWSSecretsManager/PutValue (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/pop_unknown_iid/mcp.RequestId#01", "TestListDeployedDatabaseServ", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingIAMMethod/auth_error/auth_error_auth", "github.com/gravitational/teleport/lib/events::TestEvents/auto_update_config.creatte_OneOf", "FuzzFetchMySQLVersion/seed#4 (0.00s)\\n\"}", "TestParseShortcut/sems (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_4242,_portName:_dns", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/equals(labels.env,_\\", "TestCredentialCreation_Validate (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_unset_nomatch}", "github.com/gravitational/teleport/lib/devicetrust/assert::TestCeremony/ok_(macOs))", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/invalid_QueueURL", "TestFilterMapUnique/multiple_strings,_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_unset_unset}", "TestWorkloadIdentityAWSRASer", "TestAuthConfig/invalid_GCP_IP_Type (0.00s)\\n", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/events::TestJSON/MySQL_statement_execute", "TestParseShortcut/cluster (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromMemorryDBClusterNameOverride", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/podutils::TTest_isPodUnhealthy/unready_but_just_deployed", "TestSessi", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster", "TestAuthConfig/static_auth (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin", "github.com/gravitational/teleport/lib/events::TestEvents/device_OneOf", "TestThirdpartyStreams/StreamWithPadding (", "github.com/gravitational/teleport/api/types::TestNewAppV3/aws_app_CLI_only", "TestMigrate/backwards_comp", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeSS3Protos/New_and_existing_both_non-nil,_no_failures", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/nuumber_of_events_equals_limit_in_req,_make_sure_that_pagination_keyset_is_returnedd", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetClusterNetworkingConfig/reset", "github.com/gravitational/teleport/lib/utils::TestMarshalYAML/simple_yaml_value", "TestLogin_", "TestCreateAWSConfigForIntegration/should_auto_init_credential", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/mysql", "github.com/gravitational/teleport/api/internalutils/stream::TestTake/drain_streamm_of_size_<_n", "TestProxyLine_AddSignature/", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/no_access_to_read_AccessMonitoringRules", "TestAddRoleDefaults/auditor_(only_missing", "github.com/gravitational/teleport/lib/darwin::TestECDSAPublicKeyFromRaw", "github.com/gravitational/teleport/lib/utils/log::TestSlogTextHandlerComponentPaddding/truncated_component", "TestParseShortcut/kube_cluster (0.00s)\\n\"}", "TestValidateRoles/missing_role (0.20s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/misssing_spec_is_invalid", "TestDatabaseObjectImportMatch", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/passwordless_empty_user", "TestTrimToMaxSize/device.update (0.00s)\\n\"}", "TestSelectNextReviewDate/one_month,_", "TestBotConfig_YAML/minimal_config (0.00s)\\n\"}", "TestRBAC/delete_no_access (0.00s)\\n\"}", "TestCredentialRPID (0.00s)\\n\"}", "TestConnectorKInitCl", "TestValidateHealthCheckConfig/nil_obje", "TestAppIsAWSConsole/AWS_China (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate/nil_user_ID", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/unmarshal/singgle_string", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/no_logiin,_'@'_and_':'_in_path", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/reader#01", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_unset_unset_unset}", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_Name/nil", "github.com/gravitational/teleport/lib/services::TestCanCopyFiles/false", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[delete]", "FuzzParseSigV4/seed#1 (0.00s)\\n\"}", "TestDefaultPrompt_", "TestDiscovery_Attestations", "TestIDTokenValidator_Validate/invalid_audienc", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/database_ddoesn't_match", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Items", "TestSendSSHPublicKeyRequest (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/operator/apis/resources/v1::TestTeeleportBotV1Spec_DeepCopyInto", "github.com/gravitational/teleport/lib/services::TestTraits", "github.com/gravitational/teleport/lib/healthcheck::TestTarget_checkAndSetDefaultss", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/missingg_host", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__with_mismatched_labels_does_not_match_cluster_with_labels", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/s3_accesss_by_assumed_role", "TestServiceAccess/CreateAutoUpdateAgentReport/allowed_admin_states/MFAV", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams/UploadDownnload", "github.com/gravitational/teleport/lib/services::TestValidateLocalAuthSecrets_deviiceTypes", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialWindowsDesktop", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/CreateDynamicWindowsDesktop,allowed:NotRequired,verbs:[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_unset_unset}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestHasDeviceTrustExtenssions/nok:_missing_DeviceID", "TestPruneRequestRoles/foreign_resource (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/gcp::TestSortedGCPServiceAccounts/emppty", "TestNewDatabasesFromDocumentDBCluster (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_unset_match}", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient/Listt/ListALL", "github.com/gravitational/teleport/lib/utils::TestSet/union/empty_union_empty", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/segment_with_miiddle_separator", "github.com/gravitational/teleport/lib/auth/moderation::TestSessionAccessStart/succcess", "github.com/gravitational/teleport/lib/services::TestSessionRecordingMode", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzReadAndRewriteXAuthPackett/seed#3", "TestCreateBucketConfiguration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestInvalidPayloaddSize/exceeded_payload_size", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_unstarted_->_active#01", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/siingle_user,_multi_credential,_explicit_user", "TestRedshiftSer", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/first_trigger_skipped,_second_getter_success", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsRoot/leaf_cluster_UURI", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/auditor_(onlyy_missing_label)", "github.com/gravitational/teleport/lib/authz::TestContextLockTargets", "github.com/gravitational/teleport/lib/web/ui::TestMakeDatabaseSupportsInteractivee/supported", "github.com/gravitational/teleport/lib/automaticupgrades::TestIsEnabled", "github.com/gravitational/teleport/lib/services::TestLabelKeyValidation", "github.com/gravitational/teleport/lib/cloud/aws::TestEqualStatement/different_connditions", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_unset_match}", "TestDBAuthorityDown (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-spannner-uri-host", "TestIsAvailable/not_available (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdateAgentRollout/allowed_admin_state", "TestGenericKeyOverride (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetKubeResources/one_denied", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/misssing_name_is_invalid", "github.com/gravitational/teleport/lib/auth/okta::TestCheckOrigin/resources_createed_by_non-okta_service_must_not_supply_okta_origin", "github.com/gravitational/teleport/lib/utils/mcputils::TestStdioHelpers/client_iniitialize", "github.com/gravitational/teleport/api/types::TestAccessRequestFilter/user_wants_ttheir_own_requests", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_unset_match}", "TestQuery/query (0.01s)\\n\"}", "FuzzTraitsExpressionParser/seed#6 (0.00s)\\n\"}", "TestBufferedChannelPipeWrite/buffer=0,_le", "TestVali", "github.com/gravitational/teleport/lib/events::TestEvents/ssm.run_OneOf", "Test_ge", "github.com/gravitational/teleport/lib/utils/log::TestSlogJSONHandlerReservedKeysOOverrideTypeDoesntPanic", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetClusterNetworkingConfig", "TestBuildSchema/cockroach (0.00s)\\n\"}", "github.com/gravitational/teleport/api/trail::TestConversion/ConnectionProblem", "TestNewAppV3/azure_app (0.00s)\\n\"}", "TestCircuitBreaker_beforeRequest (0.00s)\\n\"}", "TestOpCompressed/compressed_OP_INSERT", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Canceled", "github.com/gravitational/teleport/lib/client/tncon::TestBufferedChannelPipeClose", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::TestFileReader", "TestListReleases/bad_request (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAccessRequestCacheBasics", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_match_nomatch}", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/marshal/singlee_string", "Test_splitExpre", "TestCreateGitHubAuthRequest (0.01s)\\n\"}", "TestCheckAccessWithLabelExpressions/db (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::TestHealthCheckAppServer", "TestMatchHealthy/WithHealthyApp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/ui::TestGetAllowedKubeUsersAndGroupsForrCluster", "FuzzParserEvalBoolPredicate/seed#41 (0.00s)\\n\"}", "TestAzureWatcher/location_wildcard (0.00s)\\n\"}", "TestValidateGCPR", "TestParseReviewFrequency/12months (0.00s)\\n\"}", "TestCreateEC2ICERequest/missing_subn", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDBService/ccluster_does_not_have_the_ownership_tags", "Test_Channel_GetVersion/version_invalid (", "TestParsePacket/COM_PROCESS_KILL (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/imds/oracle::TestIsAvailable/not_avaiilable", "TestConnString/default_settings (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_match_nomatch}", "TestIssuerFromPublicAddress/removes_443_por", "TestWindowTrigger_CanStart (", "TestUnmarshalUserTask (0.00s)\\n\"}", "TestServiceAccess/UpdateCrownJewel/allowed_admin_states/NotRequired", "TestNewWebClientHTTPProxy/use_http_proxy", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError/SStatusBadRequest", "TestCreateSe", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/ssm.run", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_unset_nomatch_nomatch}", "TestKubeResourcesMatcher/user_requests", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/invalid_connection_string", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'wildcard_mmatches_empty_as_well'", "github.com/gravitational/teleport/lib/backend/pgbk::TestMessage", "TestStartedGroups (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/GCP_IAMM_Auth", "TestStrongValidate/empty_rejected (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/self-hosted_should_allow_custom_weekdays", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/Enterprise_and_nil_config", "FuzzParsePacket/seed#33 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/pass_case/pass_case_proxy", "TestNewResourceExpression/matching_expressions/ha", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/double_signed_manifest", "TestDialProxy/unknown (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenValidator_Validate/suuccess", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/signeed_by_unknown_key", "TestResetClusterNe", "github.com/gravitational/teleport/lib/backend::TestKeyHasSuffix/default_key_is_suuffix", "TestAllDeviceEnumsMapped/OSType/OS_TYPE_WINDO", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_evaluate", "TestConversionFromPr", "TestDefaultTags/resource_is_teleport_ma", "github.com/gravitational/teleport/lib/tbot/config::TestIdentityOutput_CheckAndSettDefaults/missing_destination", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/empty_teleport_config", "TestDatabaseOutput_CheckAndSetDefaults/val", "github.com/gravitational/teleport/lib/services::Test_setResourceName", "TestDiscovery_Infinit", "github.com/gravitational/teleport/lib/proxy::TestCheckedPrefixWriter/missing_preffix", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCreateEC2ICERequeest/missing_endpoints_list", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerifiedWithReuse/verbs=[read]", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/bad_custom_endpoints_", "TestGetServiceAccountFromCre", "TestCredentialAsser", "TestParseRoleARN/iam_role_arn_", "TestRateLimitFailure/stream-only (0.00s)\\n\"}", "TestUpdateCluster", "TestFlatten (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/kube_requesst", "TestParser/integer_equality_(false) (0.00s)\\n\"}", "TestMatchGCPServiceAccount (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/comments_are_kept", "FuzzFetchMySQLVersion/seed#13 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/MFFA_multiple_credentials_(2)", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/UpdateAutoUpdateAgentRollout", "TestGenerateHostCert/fail (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[read]", "github.com/gravitational/teleport/lib/web/ui::TestMakeCAKeySet/TLS_keys", "github.com/gravitational/teleport/lib/backend::TestSanitize//namespaces//params", "github.com/gravitational/teleport/lib/utils/aws::TestIsUserARN/invalid_arn", "Test_VersionUpda", "TestOverlap (0.00s)\\n\"}", "TestUnmarshalAccessGraphSett", "TestSSHPortForwarding", "TestJSON/desktop_session_end (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/invalid_region", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAKSFetcher", "TestEvents/kube.delete_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestFilterMap", "github.com/gravitational/teleport/lib/events::TestEvents/aws_identity_center.resoource_sync.failed_EventFields", "github.com/gravitational/teleport/lib/tlsca::TestRenewableIdentity", "TestMarshalCrownJewelRoundTrip (0.00s)\\n\"}", "TestRedisEnterpriseClient/GetToken/acc", "TestGetInstanceID/with_empty_ID (0.00s)\\n\"}", "TestNewUserListEntry (0.00s)\\n\"}", "TestReadProxyLine/malformed_line (0.00s)\\n\"}", "TestEventField_Schemas/field_wit", "github.com/gravitational/teleport/lib/automaticupgrades/version::TestFailoverGettter_GetVersion/first_getter_skipped,_second_getter_skipped", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestRollbackGroups/unsuupported_schedule", "TestInterpolate/regexp_replacemen", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/DatabasePermissionUpdate", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.execute_EventFields", "FuzzTraitsExpressionParser/seed#40 (0.00s)\\n\"}", "TestIPv6Fix (0.00s)\\n\"}", "FuzzMongoRead/seed#8 (0.00s)\\n\"}", "TestParse/https://example.com:443 (0.00s)\\n\"}", "TestExtraFields/text/level_component_caller (", "TestServersCompare/compare_DatabaseServices (0", "TestAsyncEmitter/Receive (0.00s)\\n\"}", "TestSessionAccessJoin/success/ssh (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/map_field", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/services::TestParserForIdentifierSubconditiion", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestSendSSHPublicKeyRRequest", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics/slice_with_empty_element", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_match_unset}", "TestParseShortcut/app (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_unstarted_->_unstarted_with_reports", "github.com/gravitational/teleport/lib/utils::TestParseMultiple", "github.com/gravitational/teleport/lib/itertools/stream::TestChunks", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/missing_ec2_private_ip_address", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfig/aaccount_does_not_match_expected_account", "TestValidateSigstorePolicy/", "github.com/gravitational/teleport/lib/services::TestParseShortcut/auth_servers", "TestUnifiedResourceCacheIteration/desktops (0.1", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/KeepAlive", "TestValidateRole/malformed_name (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureManagedSQLServer/complete_server", "TestReadLogin7 (0.00s)\\n\"}", "TestPoll/PollErrors (0.00s)\\n\"}", "TestApplyDatabaseObjectImportRules/database_labels_are_matched_b", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/over_max_groups_halt-on-error", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfigOutpuut", "TestFetchContainerOrchestrator (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/user", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/legacy_denyy", "github.com/gravitational/teleport/lib/services::TestValidateSQLServerDatabaseURI//0.0.0.0:1433", "TestParseSignatureA", "TestEvents/db.session.spanner.rpc_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/double_signed_index", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_match_match_nomatch}", "github.com/gravitational/teleport/lib/utils::TestClickableURL/specified_IPV4", "TestCalculatePermissions (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/self-hosted_should_allow_long_rollouts", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/impliciit_user's_home_directory", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_reconciler_computeeStatus", "TestGetIntegrationCe", "TestContainsExpansion/escaping_and_expansion (0.", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamWithPadding/Flaky=false,ForceFlush=true", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateAuthPreference/invalid_device_trust_settings", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_WebListenAddr_with_custom_ProxyWebPort_if_TLSRoutingEnabled_was_enabled", "TestServiceAccess/ListDynamicWindowsDesktops,allowed:Unauthorized,v", "TestMySQLFlexClient (0.00s)\\n\"}", "TestEvents/saml.created_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestPPodmanAttestorConfig_CheckAndSetDefaults/missing_path", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstDatabaseObjectImportMatch/glob", "TestEvents/bot.update_OneOf (0.00s)\\n\"}", "TestEvents/sftp_summary_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/different_interval", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSecurityGroupps/pagination", "github.com/gravitational/teleport/lib/web/ui::TestMakeUserGroups/empty", "github.com/gravitational/teleport/lib/accesslists::TestAccessListIsMember_RequireementsAndExpiry", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/verify_coverage/GetCrownJewel", "Test_databaseObjectScopeMatch", "TestFailoverTrigger_Name (0.00s)\\n\"}", "TestEvents/user.create_EventFields (0.00s)\\n\"}", "TestVerifyAttestation/OK_for", "TestNewResourceExpression/fail_to_parse/| (0.00s", "TestUnmarshalPluginUnknownField (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/segment_with_whhitespace", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/first_ffailed_execution_recovering_remains_in_recovering", "TestBootstrapInfra (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_unset_match_match}", "TestParser/negation_of_wrong_type (0.00s)\\n\"}", "TestTrustedClusterRBAC/upsert_ok (0.00s)\\n\"}", "Test_se", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestSAMMLIdPBuildScriptCheckAndSetDefaults/empty_idpMetadataURL", "TestParse//clusters/foo/leaves/bar (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[create]", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_userVerificatiion/pwdlessDev_succeeds_mismatched_UserVerification", "TestServiceAccess/UpdateAutoUpdateAgentReport/allowed_ad", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[read]", "TestExtraFields/text/timestamp (0.00s)\\n\"}", "TestValidateSegment/segment_with_trailin", "TestCreateSes", "TestEvents/app.session.end_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::Test_makeGCPCloudSQLAuuthOptionsForServiceAccount", "TestServiceAccess/UpdateAutoUpdateVersion/allowed_a", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestHandleAccessReequest/test_approved_user_for_approved_role", "github.com/gravitational/teleport/lib/auth/webauthncli::TestToTouchIDCredentialPiicker", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestClient/serveer_supports_tracing", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate", "TestLabelExpressions/contains_match (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParserHostCertContext/complexx", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation", "TestCredentialCreation_Validate/nil_cc (0", "TestFromProtoNils/owners (0.00s)\\n\"}", "TestSessionAccessJoin/successGlobJoin/k8s", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthenticated/sig", "TestEncryptedCredentialProto (0.00s)\\n\"}", "TestOpCompressed/compressed_OP_UPDATE", "TestParser/inequality_lhs_dynamic (0.00s)\\n\"}", "TestAccessMonitoringRuleCRUD/no_access_to_create_AccessMo", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/TTL_ignnored_without_cert", "TestSanitize//a-b/c:d/.e_f/01 (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#33 (0.00s)\\n\"}", "TestCheckAccessToSAMLIdP/roleV", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestDefaultConfigGroup//no_CMC", "TestTeleportResourc", "TestResetAuthPreference (0.00s)\\n\"}", "TestKubernetesOutput_CheckAndSetDefaults", "github.com/gravitational/teleport/lib/jwt::TestKeyIDHasDistinctOutputForDifferinggInputs/RSA2048", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabase", "github.com/gravitational/teleport/lib/inventory::TestKubernetesServerBasics", "TestEC2IsInstanceMetadataAvailable (0.00s)\\n\"}", "FuzzMongoRead/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiig/integration_role_does_not_exist", "github.com/gravitational/teleport/lib/services::TestRoleSet_GetAccessState", "TestValidVersionChange/upgrade (0.00s)\\n\"}", "TestRotatingFileClient/sm", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2/valid_butt_some_instances_are_windows,_it_ensures_the_page_is_never_empty", "TestServer/only_v6 (0.00s)\\n\"}", "TestCreateEC2ICE_success_multiple (0.00s)\\n\"", "TestSessionAccessJoin/successSameUser/ssh", "github.com/gravitational/teleport/lib/utils::TestContainsExpansion/escaping_is_hoonored#01", "TestExtraFields/json/component (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/NotRequired/verbs=[]", "TestGetClusterURI//clusters/cluster.sh (0.0", "github.com/gravitational/teleport/lib/events::TestEvents/subsystem_EventFields", "TestConvertSecuri", "TestEvents/device.delete_OneOf (0.00s)\\n\"}", "TestOpInsert (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyComponents/key_without_sepaarator", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#7", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[update]", "TestParseSignatureAlgorithmSuite/\\\"legacy\\\" (0", "TestServiceAccess/UpsertVnetConfig_with_existing/a", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig/unauthorized", "TestServiceAccess/UpsertAutoUpdateAgentRollout/disallowed_admin_st", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::Test__copyAtMost", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestDocumentSequennceInsertMultipleParts", "github.com/gravitational/teleport/lib/utils::TestConnWithSrcAddr", "TestEvents/bot.update_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[update_creaate]", "TestServiceAccess/RollbackAutoUpdateAgentGroup/allowed_", "TestParseShortcut/kube_clusters (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestRegistrationFlow_Begin_wwebID", "TestServiceAccess/ListAutoUpdateAgentReports/allowed_a", "TestBotConfig_WithCAPathAndCAPins (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/port_bigger_tthan_65535", "github.com/gravitational/teleport/api/types::TestValidateAssumeStartTime/before_ccreation_start_time", "github.com/gravitational/teleport/lib/scopes::TestPolicyAndResourceScope/simple_rroot_resource", "TestCheckAccessToAzureCloud/empty_role_set (0.0", "TestUnifiedResourceCacheItera", "TestHostUser", "TestDateExporterBasics/randomFlak", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_unset_match}", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/prrod_cluster", "github.com/gravitational/teleport/lib/tlsca::TestDatabaseExtensions", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/get_verb_not_allowed", "TestSSHPortForwarding/", "github.com/gravitational/teleport/lib/authz::TestCheckIPPinning", "TestCheckAccessToKubernetes", "TestReasonRequired/role_request:_do_not_require_reason_when_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/Unauthorized/verbs=[]", "github.com/gravitational/teleport/lib/web/desktop::TestStreamsDesktopEvents", "TestNewFromConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/mfa_auth_challenge.creatte_EventFields", "TestLogin_credentialPicker/credenti", "TestCeremony_Run/windows_device_succeed", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/wrong_type", "TestRoleS", "TestNewResourceExpression (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleParsing/test_case_'0'", "github.com/gravitational/teleport/lib/utils::TestRoundRobinSequential", "github.com/gravitational/teleport/lib/utils/typical::TestParser/literal", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/auth/webauthncli::TestDefaultPrompt_PromptCCredential/credential_by_name", "github.com/gravitational/teleport/lib/scopes::TestJoin/leading_empty_segment_presserved", "github.com/gravitational/teleport/lib/events::TestEvents/spiffe.federation.deletee_EventFields", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[update]", "TestMergeStreams/compare_always_favors_B", "TestEnsureSCIMEndpoint/valid_ba", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[create]", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestBasicFunctionality", "TestPublicOnlyVerify/RSA2048 (0.93s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestReconciler/new_non-matching_rresource_should_not_be_registered", "github.com/gravitational/teleport/lib/utils/aws::TestIsUserARN/invalid_partial_arrn", "TestWrapPayload (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/exact_match", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/NotRequired/verbs=[]", "Test_transport_rewriteRequest/resign_azure_J", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Multiple_Filters", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNewIdPIAMConfigurreClient/no_aws_region_env_var,_returns_an_error", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/MFAVerified/verbs=[read]", "FuzzParseRedisAddress/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_formatJSON/none", "github.com/gravitational/teleport/lib/web/ui::TestMakeDatabaseHiddenLabels", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=/telepport//no_leading_separator_in_key", "github.com/gravitational/teleport/lib/utils::TestKernelVersion/invalid_kernel_verrsion", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/rationalist__approval_with_valid_reasons", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_nomatch_unset_match}", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//OK_bot_impersonating_local_user", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/negative_display__number", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/client/db/mcp::TestEmptyDatabasesServer", "TestRegistrationFlow_BeginFinish/MFA (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/remote_cluster", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/MFAVerifiedWithReuse", "TestWrapPayload/emp", "TestGitHubIdentity (0.00s)\\n\"}", "TestLoginFlow_Begin_errors/NOK_n", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/root_login__unavailable", "FuzzReadProxyLineV1/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/app.session.start_OneOf", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::Test_basicHTTTPMaintenanceClient_Get/invalid_response", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationOutput_CheckAnddSetDefaults", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/backend::TestKeyHasSuffix/prefix_is_not_a_ssuffix", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__CHANGE_USER_invalid", "github.com/gravitational/teleport/lib/cloud/azure::TestGetServer", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode/config_susppends,_version_enables", "github.com/gravitational/teleport/lib/utils::TestRenameHeaders", "TestCheckAccessToServer/MFA_", "TestStreams/UploadDownload (0.00s)\\n\"}", "TestAut", "github.com/gravitational/teleport/lib/authz::TestContextLockTargets/Node", "TestCheck", "TestEvents/kube.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/unknown_function", "TestUserCertCompatibility (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingIAMMethod/auth_error/auth_error_proxy", "TestServiceAccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/MFAV", "github.com/gravitational/teleport/lib/events/filesessions::TestUploadResume", "TestSearchEvents/query_with_event_types (0.01", "TestConversion/AlreadyExists (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetTRACE", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_CheckAndSeetDefaults/many_channels", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/cannonicalize_empty_location_to_/", "TestParseRegion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestPPodmanAttestorConfig_CheckAndSetDefaults/not_a_UDS", "TestValidateAccessMonitoringRule (0.00s)\\n\"}", "TestIDTracker/request_missing_ID_not_tr", "github.com/gravitational/teleport/lib/services::TestRequestFilterMatching", "TestGuessesIPAddress/prefers_192.168.0.0/16 (0.00", "github.com/gravitational/teleport/lib/services::TestGetCreateDatabaseCreateMode/eenabled_mode_take_precedence", "TestRedshiftServerlessFetc", "TestEvents/user.login_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleParse/non-scalar_and_scallar_values_of_labels", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedPendingTTLAAndMaxDuration", "TestCheckGCPServiceAccounts/de", "TestVerifySSHUser/OSS_mode=off (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/msgraph::TestUnmarshalGraphError/empty", "github.com/gravitational/teleport/lib/cloud/azure::TestSQLListWithinGroup/serverss", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/invalid_namespacees_are_allowed", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users/empty_range_disabled", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/success", "TestMFACeremony/NOK_create_challenge_fail (0.00s)\\n\"}", "TestRotatedAccessTokenProvider/", "Test_canUpdateToday (0.00s)\\n\"}", "TestMatchAzureIdentity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialSite/successfully__diial_remote_site", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountAssignmeentMatcher/empty_nonmatch", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/trying_to_appprove_an_already_denied_request", "github.com/gravitational/teleport/lib/cloud/aws::TestAttachPolicy/AttachError", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canUpdateToday/Mattching_day", "github.com/gravitational/teleport/lib/srv/alpnproxy/common::TestWithPingProtocolss", "TestFileConfig_fileNotExists (0.00s)\\n\"}", "TestFailoverTrigger_Name/empty (0.00s)", "TestSignatureAlgorithmSuiteRoundtrip/legacy (0", "FuzzParserEvalBoolPredicate/seed#33 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestString", "TestEvaluateCondition (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation", "TestEvents/reset_password_token.create_OneOf (0", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestGetTags", "github.com/gravitational/teleport/lib/web/ui::TestMakeIntegration/github-my-org", "github.com/gravitational/teleport/lib/scopes::TestPolicyAndResourceScope/simple_rroot_privilege", "TestGetAllowedKubeUsersAndGroupsForCluster (0.00s", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_unset_nomatch_nomatch}", "TestIsTracingSupported (0.02s)\\n\"}", "TestRotateCertAuthority (0.00s)\\n\"}", "FuzzFetchMySQLVersion/seed#16 (0.00s)\\n\"}", "TestKeyScan/empty_byte_slice_key (0.00s)\\n\"}", "TestCanCopyFiles/false (0.00s)\\n\"}", "TestGetClusterURI//clusters/", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/SESSIION_AND_HARDWARE_KEY/decode", "github.com/gravitational/teleport/lib/utils/parse::TestVarValidation/no_validatioon", "TestParser/iequality_both_operands_dynamic", "TestMergeStreams (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/session.leave_OneOf", "TestListEC2 (0.00s)\\n\"}", "TestServiceAccess/CreateDynamicWindowsDesktop,allowe", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/pop_tracked_iid", "TestDestinationFromURI/memory://foo/bar (0.00s)", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/TriggerAutoUpdateAgentGroup", "FuzzMongoRead/seed#19 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUserNotificationsCache", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Removed_from_multiple_roles,_including_editor", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[]", "TestGenerateHostCert (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/valid_exclusive_chhild_glob", "github.com/gravitational/teleport/lib/utils::TestSet/subtract/populated_minus_poppulated", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSClluster", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfig/valid", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_match_match}", "github.com/gravitational/teleport/lib/reversetunnel/track::TestProxyGroups", "TestUnifiedResourceCacheIteration/apps (0.25s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/wildcard", "FuzzParseRefs/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseOutput_CheckAndSettDefaults/invalid_format", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_nomatch_match}", "TestIdentityCenterAccountMatcher/ac", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceWatcher", "Test_makeGCPCloudSQLAuthOption", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[delete]", "FuzzParsePacket/seed#13 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestHostUsers_getGroups/multiple__roles,_one_no_match", "TestValidateRoles/valid_roles (0.14s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/auto_update_version.deleete_OneOf", "TestRoleMap/test_case_'all_empty' (0.00s)\\n\"}", "TestMakeTableWithTruncatedColumn/no_col", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes", "TestAuthConfig/static_auth/ApplyT", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_Validate/expirred", "TestParseShortcut/db_service (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/valid", "github.com/gravitational/teleport/lib/events::TestEvents/okta.user.sync_EventFiellds", "TestMakeAppRedirectURL/OK_-_no_path (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestWeakValidate/empty_rejected", "TestTarget_checkAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/NotRequired/verbs=[create_update]", "github.com/gravitational/teleport/api/types::TestDatabaseElastiCacheEndpoint/valiid_URI", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/success_case/success_case_proxy", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/prrod_cluster_with_list_verb_but_tries_to_access_get", "TestValidateStaticHostUser/valid_wildcard", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/valid_with_brackeets", "TestIteration/multiple_elements (0.00s)\\n\"}", "TestEventField_Schemas/string (0.00s)\\n\"}", "TestParseShortcut/user (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_makeGroupsStatus/nnil_schedules", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_CONNECT", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix/empty", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher/prod_default", "TestDatabaseFromRDSCluster/custom_", "Test_zipStreams_Process/mix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess", "TestPlainHttpFallback/Find (0.01s)\\n\"}", "TestAccessGraphAWSIAMConf", "TestOperationCheckAnd", "TestSetEnvs/envs_set_individually (0.00", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-redis", "TestIPv6Fix/ipv4_localhost (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/basic_caase", "TestServiceAccess/GetDynamicWindowsDesktop,allowed:NotRequired,ver", "Test_applyMapping", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/auth_error/auth_error_auth", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=packed_simple_check", "github.com/gravitational/teleport/lib/jwt::TestPublicOnlyVerify/ECDSAP256", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Equal", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[]", "TestEvents/contact.delete_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/success", "TestEvents/db.session.mysql.create_db_Even", "github.com/gravitational/teleport/lib/srv/discovery/common::TestApplyAzureDatabasseNameSuffix/Azure_MySQL_Flex", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/nil", "TestSortedGCPServiceAccounts/unsorted_acco", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_states/MFAVerifi", "github.com/gravitational/teleport/lib/automaticupgrades::TestIsEnabled/falsy_valuue_returns_false", "TestStreamSessionEvents/Error/WithCallback (0.00s", "TestCheckKubeGroupsAnd", "TestParseShortcut/win_service (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_unset_nomatch_match}", "TestExtraMemoryDBLabels (0.00s)\\n\"}", "TestParse/example.com:443 (0.00s)\\n\"}", "FuzzParseRefs/seed#8 (0.00s)\\n\"}", "TestString//clusters/teleport.sh/apps/a", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/iinvalid_join_state", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/events::TestEvents/device.authenticate.conffirm_OneOf", "github.com/gravitational/teleport/lib/circleci::TestGetIDToken/TestGetIDToken#01", "github.com/gravitational/teleport/api/mfa::TestMFACeremony/NOK_create_challenge_ffail", "TestCachedParser (0.01s)\\n\"}", "TestListEKSClusters (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyTrimPrefix/all_trimmed_on_eexact_match", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/no_access_to_update_AccessMonitoringRule", "Test_isPodUnhe", "TestAccessLists/access_l", "TestMCPToolMatcher/allow_literal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyTrimPrefix", "TestStringOrMap/unmarshal/s", "TestStrongValidate/multi-segment_inval", "TestSAMLAuthRequest_Check/normal_request (0.00s)\\", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/labels[\\", "TestEvents/workload_ide", "github.com/gravitational/teleport/lib/client/debug::TestGetReadiness/Closed", "TestSSHMultiplexer", "TestDiscoveryConfigMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_unnknown_device", "TestGenericLis", "github.com/gravitational/teleport/lib/utils::TestStreamJSONArray", "TestMatchApplicationServers (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events/filesessions::TestUploadResume/streaam_created_when_checkpoint_is_lost_after_failure", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/no_access_to_upsert_AccessMonitoringRule", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/deny__request", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/FindRoleByARN", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/regexp_replaceement_with_numeric_match", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGetKubeClientGettter/test#2", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[create]", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/different_unhealthyThreshold", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//automatic_review_decision_required", "TestCursorScenarios (0.00s)\\n\"}", "TestCheckAccessWithLabelExpressions (0.00s)\\n\"}", "TestOpenSearchFetcher (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/desktop.recordingg", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=/telepport/", "TestIDTo", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetServerUUID/returnss_empty_string_when_given_root_cluster_non-server_resource_URI", "Test_Channels_CheckAndSetDefault", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/uri-without--schema-native-protocol", "TestCreateURI/empty_endpoint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_nomatch_match_match}", "TestEvents/access_request.review_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAssertionInfo_RoundTrip/full", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher", "TestServiceAccess/DeleteAutoUpdateVersion/allowed_admin_stat", "TestOIDCUnmarshal/basic_connector (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestRangeEnd//xyz", "TestIsHTTP/Accept_GET (0.00s)\\n\"}", "TestSQLBatch (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/role_is_llimited_to_labels_in_default_namespace", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_nomatch_nomatch}", "TestServiceAccess/DeleteDynamicWindowsDesktop,allowed:NotRequ", "TestServiceAccess/ListDynamicWindowsDesktops,allowed:Unaut", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_nomatch_unset_match}", "TestCreateBucketConfiguration/unknown_region", "TestValidateAccessMonitorin", "TestValidateDatabaseObject (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction", "TestIsResponseSuccessful/codes.Canceled_error", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_base_config", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/unauthenticated_pass_case/unauthenticated_pass_case_auth", "github.com/gravitational/teleport/lib/auth/webauthncli::TestDefaultPrompt_PromptCCredential/credential_by_number_(1)", "TestCheckAzureIdentities (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Role_is_not_granted_or_removed", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateSessionRecordingConfig", "TestPostgresRecording/multi", "TestTrustedClusterRBAC/create_no_access", "TestInstallFlagsYAML/both (0.00s)\\n\"}", "TestBackfillFeatures/entitlements_not_present;_identity_on_-_sets_lega", "TestCheckedPrefixWriter/success/single_write (0.", "TestCheckAccessToDatabaseUser/(case-insensitive_db)_developer", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/valid_role_arn__in_different_partition", "TestCheckAccessToGitServer/no_roles (0.00s)\\n\"}", "TestDiscoveryConfigUnmarshal (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialAssertion.PublicKey_slice_elements_nil", "TestRoleSet_GetAccessState (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestRemoveFromSlice/remove_b", "TestBootstrapInfra/ap-south-1 (0.00", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress/vallid_ip:port_with_path", "github.com/gravitational/teleport/lib/services::TestMarshalUnmarshalSecurityReporrtState", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialWindowsDesktop/failurre_connecting_to_desktop_service", "github.com/gravitational/teleport/lib/services::TestParseShortcut/accesslist", "TestConfig_CheckAndSet", "TestFileConfig_sampleFile (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##8", "github.com/gravitational/teleport/lib/utils/typical::TestParser/or_expressions", "TestServer/no_domain (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/vallid_for_listing_instances", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestSSigstoreAttestorConfig_CheckAndSetDefaults/additional_registries.host_is_invalid", "github.com/gravitational/teleport/lib/services::TestGuessIfAccessIsPossible/own_ssession_list/read_allowed", "github.com/gravitational/teleport/lib/events::TestEvents/billing.update_info_OneOOf", "TestCheckAccessWithLabelExpressions/node (0.03s)\\", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_unstarted_->_unstarted", "TestAccessCheckerWorkloadIdenti", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet/labels", "TestIsHTTP/Reject_\\\"some_random_junk\\\" (0.00s)\\n", "github.com/gravitational/teleport/lib/utils/mcputils::TestStdioHelpers/client_calll_tool", "github.com/gravitational/teleport/lib/events::TestJSON/session_disk_event", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/untrusted_wrongly_signed_manifest", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/git", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/NotRequired/verbs=[delete]", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams/StreamManyPParts/Flaky=true,ForceFlush=false", "TestListDeployedDatabaseServicesReques", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertAuthPreference/unauthorized", "github.com/gravitational/teleport/lib/itertools/stream::TestLegacyCompat", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialAssertion.PublicKey_empty", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.start", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.recording_EventFFields", "TestExporterBasics/case=sparse,rando", "github.com/gravitational/teleport/lib/events::TestEvents/scp_EventFields", "TestAzurePostgresFlexFetchers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKernelVersion/4.19.72-25.58.amznn2.x86_64", "TestMatchGCPServiceAccount/wildcard_in_d", "TestCheckDatabaseRoles/no_auto-pro", "github.com/gravitational/teleport/lib/jwt::TestMarshalJWK", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2/no_integrration", "github.com/gravitational/teleport/lib/client/debug::TestSetLogLevel", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewKubeClusterFroomGCPGKEWithoutLabels", "TestConfig_Endpoint/file_exporter (0.00s)\\n", "TestTrimToMaxSize/access_list.delete (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/jwt::TestKeyIDCompatibility", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_match_match}", "github.com/gravitational/teleport/api/trail::TestConversion/NotFound", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.malformed_paccket_OneOf", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[create]]", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//1/json", "github.com/gravitational/teleport/lib/resourceusage::TestGetAccessRequestMonthlyUUsage", "TestRegexMatchesAny/no_exact_match (0.00s)\\n\"}", "TestVariable/string_variable (0.00s)\\n\"}", "Test_makeGroupsStatus/no_groups_in_s", "TestDialLocalAuthServerAvailableServers", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap", "TestIdentityOutput_CheckAndSetDefaults/val", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestDatabasePermmissionMatch", "github.com/gravitational/teleport/api/client/proxy::TestClusterCredentials/no_cluuster_oid_set", "TestClusterCredentials (0.00s)\\n\"}", "TestFillSAMLSigningKeyFromExisting/should_read_signing_key_from_exis", "TestCon", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/component_ccaller_timestamp", "TestParseShortcut/db_server (0.00s)\\n\"}", "TestEvents/db.session.start_OneOf (0.00s)\\n\"}", "TestConfigure", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpdateUserTask/verbs=[update]", "TestServiceAccess/GetDynamicWindowsDesktop,allowed:MFAVerified,ver", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestReadWriteStatus", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestCertificateVerificatioon/success", "TestValidateTokenWithJWKS/too_long_ttl (0.00s)\\n\"", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_credential_provider,_but_using_ambient_credentials", "TestAuthor", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{unset_unset_unset_unset}", "github.com/gravitational/teleport/lib/srv/app/aws::TestURLForResolvedEndpoint", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/missed_traits", "TestURLForResolvedEndpoint/bad_resolve", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/cluster_enabled", "github.com/gravitational/teleport/lib/utils/aws/endpoint::TestCreateURI/invalid_iinsecure_endpoint", "TestGithubAuthRequest_Check/missing_state_", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/tampered_with_issuer", "TestApplyTraits/no_variable_in_logins (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/scripts::TestMarshalLabelsYAML", "TestEvents/secreports.report.run_EventFields (0", "github.com/gravitational/teleport/lib/secretsscanner/scanner::TestNewScanner/invaalid_keys", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/noo_data_returned_from_query,_return_empty_results", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/no_display_numberr", "github.com/gravitational/teleport/lib/backend::TestBuildLabelKey_BackendPrefixes", "TestSigstoreAttestorConfig_CheckAndSetDefaults/allo", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/paggination", "TestVariable/incomplete_variables_are", "TestValidateAccessMonitor", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/too_many_levels_oof_nesting_in_the_variable", "github.com/gravitational/teleport/lib/limiter::TestCustomRate", "Test_Channel_CheckAndSetDefaults", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_nomatch_nomatch}", "TestUpdateSessionRecordingConfi", "github.com/gravitational/teleport/lib/utils::FuzzReadYAML/seed#4", "github.com/gravitational/teleport/api/types::TestAppIsAzureCloud/Azure_Cloud", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/MFA_empty_user", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/connect_too_metrics_database,_get_reader/writer_permissions", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_nomatch_match}", "TestIsAutoUsersEnabled/unsupported_protocol (0.00", "TestParseDe", "github.com/gravitational/teleport/lib/services::TestProtoResourceRoundtrip", "TestTrimToMaxSize/app.session.request (0.00s)\\n\"}", "TestAccessListIsMember (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_success/successs_in_recovery_above_limit", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/regexp_replace", "TestEnsureSCIMEndpoint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestGetServers/match_by_ip", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/v2_config_without__version_field", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/git/resource_iterator/ascending", "github.com/gravitational/teleport/lib/events::TestEvents/okta.assignment.process__EventFields", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/no_roles", "TestProxyLine_VerifySignature (0.00s)\\n\"}", "TestCursorPagination/basic_root (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/create/allow", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstMatchPattern/glob_mismatch", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/user_with_extensions_and_mode=required", "TestIsResponseSuccessful/404 (0.00s)\\n\"}", "TestDefaultConfigGroup/unexp", "TestExtraFields/text/component_caller (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_unset_match_unset}", "TestIsResponseSuccessful/codes.Unavaila", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_nomatch_match}", "TestWrites/repeated_fill_and_empty (0.00s)\\n\"}", "TestUploadTraces (0.00s)\\n\"}", "TestDatabaseFromRDSProxy/s", "github.com/gravitational/teleport/lib/services::TestMatchResourceLabels/wildcard__selector_matches_empty_labels", "TestCompareResources/cmp_not_equal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/GCP_IAMM_Auth_with_IP_type/check", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFEWorkloadAPIService_CCheckAndSetDefaults", "TestIdentityCenterAcco", "Test_transport_rewriteReq", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/when_discover_has_resources_count_and_its_values_is_zero:_no_error", "github.com/gravitational/teleport/lib/labels::TestInvalidCommand", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/denying__wildcard_works", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/kube/token::TestGetTokenAudiences/modern_boound_token_with_custom_audience", "github.com/gravitational/teleport/lib/utils::TestSet/iteration/with_empty_set", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/misssing_matcher_is_invalid", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/MisssingMetadata", "TestPluginDataExpectations (0.00s)\\n\"}", "TestEvents/user_task.delete_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_match_match_unset}", "TestFormatResult/query_results (0.00s)\\n\"}", "TestMigrationDryRunValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/listener::TestMemoryListenerClient", "TestRouteConflictDiag (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/verify_coverage/DeleteVnetConfig", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGCP/readonly_rolle", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/allow_namespace_request_when_deny_is_not_matched_with_leaf_clustters", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseService", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestSetEnvs/envss_set_individually", "TestParseDBURI//clusters/foo/dbs/db (0.00s)\\n\"", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_Bytes", "TestFromProtoNils/recurrence (0.00s)\\n\"}", "TestDestinationFromURI/./relative/dir (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams/Stream", "TestCeremony (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/too_big", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetIntegrrationCertAuthorities/github-no-creds", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/nok:_OSS_and_Mode=optional", "TestLogin_findsCorrectCredential (0.00s)\\n\"}", "TestApplyTraits/logins_subst", "TestGetIntegrationCertAuthorities (0", "TestGetUserLoginStates (0.04s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Equal//bundle_set_1_equal", "TestAccessMonitoringRuleCRUD/allowed_list_access_to_Ac", "TestLoadTokenFromFile (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust::TestEncryptedCredentialProto", "TestStaticHostUserCRUD/ge", "TestReadError (0.00s)\\n\"}", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestIsTracingSuppported/supported", "TestTruncatedTable (0.00s)\\n\"}", "TestIsSSHDeviceVerified/nok:_nil_exte", "TestGetByPurpose (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client/webclient::TestParse", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/SSOTeestFlow_requires_ConnectorSpec", "github.com/gravitational/teleport/lib/events/export::TestExporterBasics/case=sparrse,randomFlake=false", "github.com/gravitational/teleport/lib/backend::TestWatcherReset", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFEWorkloadAPIService_CCheckAndSetDefaults/path_missing_leading_slash", "TestKeyPrefix/prefix=/te", "TestServiceAccess/Cre", "TestProxyLine_Bytes/without_TLV (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#6 (0.00s)\\n\"}", "TestOneOffScript/invalid_", "github.com/gravitational/teleport/lib/inventory::TestTimeReconciliation", "TestTrimToMaxSize/okta.access_list.sync (0.00s)\\n\"}", "TestRoleMap/test_case_'par", "TestThirdparty", "TestGlobMatch/inline_glob_match_multipart (0.00s)\\", "FuzzTraitsExpressionParser (0.00s)\\n\"}", "TestStrongValidate/long_but_ok_segment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::FuzzParseProxyJump/seed#1", "TestMinVerWithoutPreRelease/ignores_beta (0.00s)\\n\"}", "TestCheckAccessToServer (0.01s)\\n\"}", "TestSer", "github.com/gravitational/teleport/lib/multiplexer::FuzzReadProxyLineV2/seed#2", "github.com/gravitational/teleport/api/internalutils/stream::TestSlice", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityX509Servicce_CheckAndSetDefaults/valid", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2ICE", "FuzzMongoRead/seed#14 (0.00s)\\n\"}", "TestCanCopyFiles/true (0.00s)\\n\"}", "TestPollAWSEKSClusters (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_single_resource_with_unmatching_verb", "TestGoodbye/goodbye_soft-reload (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/Unauthorized/verbs=[read]", "TestGetServiceFQDN/service2 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNewAppV3/app_with_basic_CORS_pollicy", "github.com/gravitational/teleport/api/types::TestPortRangesContains", "TestProjectIDFromServiceAccountNa", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_BeginFinish/OKK_Webauthn_device_login", "TestDatabaseFromRDSProxy/mysql/", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftCluster/missing_endpoint", "TestSessionRecordingConfig (0.00s)\\n\"}", "Test_getMessageSentTimestamp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature", "Test_computeRolloutState (0.00s)\\n\"}", "FuzzParseRefs/seed#5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestResourceMatchersToTypes/singlle_element_with_single_label", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_reconciler_computeeStatus/status_is_not_reset_if_mode_changes", "TestMux/WebListener (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromMemorryDBClusterNameOverride/via_TeleportDatabaseName", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_formatJSON/to_compaact", "github.com/gravitational/teleport/lib/events::TestJSON/MySQL_statement_reset", "TestFilterRulesForDa", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_foormat_not_supported", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/multiple_templates", "TestOpReply (0.00s)\\n\"}", "TestTrimToMaxSize/db.session.postgres.", "TestGetResolver/valid (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/invalidd_IPv6_addr,_only_one_colon", "TestRoleParse/full_valid_role (0.00s)\\n\"}", "TestGetTokenAudiences/legacy_token_w", "TestPrintQuery/ekpub_debug (0.00s)\\n\"}", "TestProxyLine_Bytes/with_TLV (0.00s)\\n\"}", "TestAccessChecker_", "TestGenerateUserCert (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch", "TestRoleMap/test_case_'pas", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canStartHaltOnErroor", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[create]", "TestAtomicWriteShim/QueryRange (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch/schema_name_glob_match", "github.com/gravitational/teleport/api/types::TestIsAutoUsersEnabled", "TestDialLocalAuthServerNoServers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/debug::TestGetReadiness/Not_found", "github.com/gravitational/teleport/lib/utils/mcputils::TestJSONRPCResponse", "TestRoleParse/validation_error,_no_version (0.0", "TestValidateServerSideAgentConfig/cloud_unlimited_should_allow_custom_w", "TestResourceMatchersToTypes/s", "TestMakeIntegration/github-my-org (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canStartHaltOnErroor/second_group,_wait_days_over", "TestEmptyDatabasesServer/Resources (0.00s)\\n\"}", "TestParseReviewFrequency/unknown (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/GetDynamicWindowsDesktop,allowed:MFAVerified,verbs:[read]", "TestOktaCRUD/update (0.01s)\\n\"}", "TestDestinationKubernetesSecret/no_e", "TestAccessRequestFilter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/gcp::TestSortedGCPServiceAccounts/invvalid_accounts", "TestAccessGraphIAMConfigReqDe", "TestMakeLabels/Single_map_single_label_case (0.00s)\\", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups,_wait_hours_is_several_days", "TestCreateSignedSTSIdentityRequest (0.01s)\\n\"}", "TestGetKubeResources/labels_allow (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServicesRequest/missing_teleport_cluster_name", "TestEqualStatement/different_resource_values", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/equals(labels.env,_\\", "TestApplyTraits/invalid_windows_login (0.00s)\\n\"}", "TestParseMetadataClientError/non-JS", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_unset_nomatch_unset}", "TestSessionAccessJoin/success/k8s (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGCP/no_access_roole", "TestIterateRange (0.00s)\\n\"}", "TestParseAdvertiseAddr/missing_host_ (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseDBURI", "TestChallengeVal", "TestOIDCAuthRequest_Check/TTL_ignored_w", "Test_splitExpression/empty", "TestParseAdvertiseAddr/multicast_address (0.00s)\\n\"}", "TestAssertionInfo_RoundTrip/full (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/saml", "TestNewAccessCheckerForRemoteCluster (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestRegistrationFlow_Begin_eexcludeList", "FuzzMongoRead/seed#7 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestElastiCacheFFetcher/fetch_prod_with_assume_role", "TestParserHostCertContext/simple (0.00s)\\n\"}", "TestServiceAccess/get_resource_den", "github.com/gravitational/teleport/api/breaker::TestRoundTripper_RoundTrip/successs_in_standby", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/services::TestKubeResourcesMatcher/user_reqquests_a_denied_pod", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[]", "TestWorkloadIden", "github.com/gravitational/teleport/lib/proxy::TestGetServers/match_by_ec2_id", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/paggination/with_vpc_filter", "TestIteration/multi", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGetChartUrl", "TestCircuitBreaker_generation (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_match_match}", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/prrod_cluster_with_list_verb", "github.com/gravitational/teleport/lib/inventory::TestDatabaseServerBasics", "github.com/gravitational/teleport/lib/devicetrust::TestHandleUnimplemented", "github.com/gravitational/teleport/lib/services::TestParseShortcut/networking_conffig", "TestNewExporter/invalid_exporter_url (0.", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/NotSpecified", "TestParseShortcut/win_desktop_service (0.00s)\\n\"}", "TestNewAccessMonitoring/access_monitori", "github.com/gravitational/teleport/lib/services::TestApplyTraits/logins_substitutee_in_allow_rule", "github.com/gravitational/teleport/lib/services::TestSAMLIdPServiceProviderMarshall", "github.com/gravitational/teleport/lib/backend::TestSanitize//../params", "TestApplyDat", "FuzzFetchMySQLVersion/seed#6 (0.00s)\\n\"}", "TestGetInheritedGrants (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/asciitable::TestMakeTableWithTruncatedColummn/column3", "github.com/gravitational/teleport/lib/decision::TestTLSIdentity_roundtrip/zero-too-zero", "TestInstallFlagsYAML/fips (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__with_labels_does_not_match_cluster_with_no_labels", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse", "TestSafeEnvAdd/normal_add (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/kuberneetes-secret:///my-secret", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/okta.user.sync", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canUpdateToday/No__matching_day", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/MFAVerified/verbs=[read]", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/variable_with_preefix_and_suffix", "TestParsePacket/COM_STMT_RESET (0.00s)\\n\"}", "TestServiceAccess/DeleteDatabaseObjectImpor", "TestClientMap/expire_from_cache (0.00s)\\n\"}", "TestGetUnifiedResourcesWithLogins (0.00s)\\n\"}", "TestDatabaseOutput_CheckAndSetDefaults (0.00s)\\n", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_GetVersion//normal_version", "TestCircuitBreaker_beforeRequest/", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialAssertion_nil", "github.com/gravitational/teleport/lib/jwt::TestSignAndVerify/RSA2048", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_match_match}", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/query_on_tiime_range_with_keyset_from_dynamo_and_desc_order", "github.com/gravitational/teleport/lib/events::TestEvents/bot.create_EventFields", "TestTake (0.00s)\\n\"}", "TestApply/deleted_migrations (0.00s)\\n\"}", "TestEvents/session.data_OneOf (0.00s)\\n\"}", "TestJoinServiceGRPCServer_RegisterUsingToken/unauthenticated_pass_", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/no_curly_bracket_preefix", "TestKeyIDHasDistinctOutputForDifferingIn", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/remote_denyy", "TestParseDestination/filename_with_IP", "github.com/gravitational/teleport/lib/events::TestEvents/okta.user.sync_OneOf", "TestParseSigna", "TestEvents/subsystem_OneOf (0.00s)\\n\"}", "TestParser/key_with_wrong_type (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestRoleSetForBuiltinRoles/RoleMDM_iis_mapped", "github.com/gravitational/teleport/entitlements::TestBackfillFeatures/entitlementss_not_present;_identity_on_-_sets_legacy_fields_&_drops_limits", "TestValidateHealthCheckConfig/mis", "TestSessionAccessStart (0.00s)\\n\"}", "TestIssuerForCluster/api_returns_not_found (0", "github.com/gravitational/teleport/lib/services::TestGetCreateDatabaseCreateMode", "TestAuthorizeWithLocksForBuiltinRole/Node (0.10s)\\n", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode/version_enaables,_no_config", "TestCreateSignedSTSIdentityReque", "FuzzParseRefs/seed#15 (0.00s)\\n\"}", "TestGetIdentity/role_identity (0.00s)\\n\"}", "TestMemberFromProtoNils/spec (0.00s)\\n\"}", "TestDeployDatab", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.delete_OnneOf", "github.com/gravitational/teleport/lib/utils/slices::TestDeduplicateKey/StringDupllicatesWeirdKeyFn", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[creeate]", "TestAuthPreferenceValida", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/notfound.eexample.com", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/invalid_dot_syntaax", "TestServiceAccess/UpdateAutoUpdateAgentRollout", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups,_cannot_happen_on_the_same_day_because_of_wait_hours", "Test_inWindow/invalid_weekdays (0.00s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateAgentReport/allowed_admin_states/NotR", "github.com/gravitational/teleport/lib/services::TestRoleParse/v4_role_gets_v4_deffaults", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/duplicatte_ignore_different_case", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error/resource_aalready_exists#01", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfig", "github.com/gravitational/teleport/api/types/accesslist::TestAuditUnmarshaling", "github.com/gravitational/teleport/lib/healthcheck::Test_newHealthCheckConfig/copiies_all_settings", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_nomatch_match}", "TestSPIFFEFederationMarshaling/normal (0.00s)\\n\"}", "TestValidate_Wi", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/verify_coverage/GetVnetConfig", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/prefix,_expr,_suffix_with_extra_whitespace", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS/Multiple_Prroxy_public_addrs", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestBasicFunctionality/succcessful_dial", "github.com/gravitational/teleport/lib/services::TestMFAVerificationInterval/Role__with_MFA_off_but_enforcement_is_true,_TTL_adjusted", "TestTrimToMaxSize/unknown (0.00s)\\n\"}", "TestServiceAccess/ListAutoUpdateAgentReports/allowed_admin_", "TestGithubAuthRequest_Check/normal_request (0.0", "TestLimitExceededError (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::Test_consumer_sqsMessagesColllector/verify_if_collector_finishes_execution_(via_closing_channel)_upon_reachinng_batchMaxItems", "TestExtraFields/json/timestamp (0.00s)\\n\"}", "TestIDTracker/pop_unknown_id/mcp.RequestI", "TestParser/or_literals (0.00s)\\n\"}", "TestOperationCheckAndSetDefaults (0.00s)\\n\"}", "TestValidateOrigin/OK:_Origin_without_port", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertAuthPreference/access_prevented", "TestRegexMatchesAny/regexp_must_match_full_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_nomatch_match_match}", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_three_roles,_3_exact_match,_mode_defaults_to_keep", "github.com/gravitational/teleport/lib/jwt::TestSignAndVerify/ECDSAP256", "Test_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_match_match}", "TestLabelExpressions/label_equality (0.00s)\\n\"}", "TestHealthCheckConfigCRUD/DeleteHealthCheckConfig_is_not_allowed (0.00s", "TestJoinServi", "github.com/gravitational/teleport/api/types::TestCloning", "TestTrimToMaxSize/secreports.report.run (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accesslists::TestAccessListHierarchyCirculaarRefsCheck", "TestKubernetesV2Output_CheckAndSe", "github.com/gravitational/teleport/lib/services::TestDraftExternalAuditStorage/Unmmarshal_from_testdata_and_compare", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/CreateDynamicWindowsDesktop,disallowed:Unauthorized", "TestEC2SSMIAMConfi", "FuzzMSSQLLogin/seed#2 (0.00s)\\n\"}", "TestRegistrationFlo", "TestTraceProvider/spans_export", "TestGetDisconnectExpi", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/services::TestMatchGCPServiceAccount/wildcaard_in_deny_works", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_webauthn_or_ottp_with_stdin_hijack_and_per-session_MFA,_no_choice_presented", "TestIdentity_ToFromSubje", "TestAtomicWriteSuite/Lock (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/connect_too_prod_database,_get_reader_role", "TestTLSIdentityToTLSCA_zeroTimestamp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_match_unset}", "github.com/gravitational/teleport/api/trail::TestConversion/NotImplemented", "TestFnCacheReloadOnErr (0.00s)\\n\"}", "TestCreateEC2ICERequest/missing", "TestWriteCmd/int32 (0.00s)\\n\"}", "TestIdentityCenterA", "TestDefaultTags/resource_is_teleport_managed/ECS_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/MFAVerified", "TestGetResolver (0.00s)\\n\"}", "TestServersCompare/compare_servers (0.00s)\\n\"}", "TestGenericWrapperCRUD (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.clipboard.receivve_EventFields", "github.com/gravitational/teleport/lib/jwt::TestKey_SignAndVerifyPROXY/RSA2048", "TestIsAvailable/not_on_oci (0.00s)\\n\"}", "TestAuthPreferenceValidate/default (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckGCPServiceAccounts/denyiing_wildcard_works", "TestIsDBTLSProtocol (0.00s)\\n\"}", "TestCloning/*types.UserV2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig/oss_proxy_peering", "TestServiceAccess/UpsertAutoUpdateAgentRollout/allowed_admin_", "TestServiceAccess/DeleteAutoUpdateAgentReport/a", "TestExporterBasics/case=empty,randomF", "TestDefaultPrompt_PromptCred", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_BEST_EFFORT_DROP/JSON", "TestLogin/uv_required,_attachment_platf", "TestParseShortcut/accessrequest (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::TestReadAndRewriteXAuthPackett/xauth_packet_doesn't_match", "github.com/gravitational/teleport/lib/accessmonitoring::TestInitializeCache", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings/wrong_version", "TestVerifyPassword/password_too_short (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestGetScaleSetVirtualMachine//vm_with_only_user_managed_identities", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestGetInstanceInfo/with__resource_ID", "github.com/gravitational/teleport/lib/events::TestCheckUploadsSkipsUploadsInProgrress", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/label_match", "TestEqualStatement/different_condition_valu", "TestDeployServiceRequest/fill_defaults", "TestIsResponseSuccessful/nil_error (0.00s)\\n\"}", "TestOpCompressed/compressed_OP_REPLY (", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/MFAVerified/verbs=[]", "TestHandlerAuthenticate/with_cookie (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenSource_GetIDTokeen/untagged/value_missing", "github.com/gravitational/teleport/lib/scopes::TestGlobIsSubjectToPolicyResourceSccope/child_of_root", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/segment_with_leeading_separator", "TestTLSConfigForLDAP (0.14s)\\n\"}", "TestValidateOrigin/OK:_Origin_host_sa", "TestRDSDBProxyFetcher (0.01s)\\n\"}", "TestParseShortcut/semaphores (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_UNSPECIFIED/YAML", "TestServiceAccess/verify", "TestTunnelAddr/should_use_TunnelPublicA", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/hasPrefix(name,_\\", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingAzureMethod/challenge_response_error/challenge_response_error_auth", "github.com/gravitational/teleport/api/types::TestNewAppServerForAWSOIDCIntegratioon/error_when_HostID_is_missing", "TestGetAWSPolicyDocument/aws-redshift (0.00", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/secreports.audit..query.run", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAMWiithPresetPolicy/without_policy-preset", "TestTraceProvider/not_sampl", "TestGetCertAuthorities/ca_type_doe", "TestAccessGraphIAMConfigReqDefaults (0.00s", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeName/returns_eempty_string_when_given_leaf_cluster_non-kube_resource_URI", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/marshal/nil_sllice", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_request.reeview", "Test_reconciler_computeStatus (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestClickableURL/original_URL_is_OK", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/last_errror_below_limit_remain_in_standby", "TestServiceAccess/DeleteVnetConfig/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/UpploadDownload", "github.com/gravitational/teleport/lib/inventory::TestSSHServerBasics", "TestIDTokenValidator_Validate/invalid_audi", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestClose/closed_bby_context", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_list.membeer.create", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate/future", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_unset_unset}", "TestServiceAccess/UpdateDatabaseObject/allowed_admin_states/MFAV", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/wworks_with_roles_with_multiple_labels_that_role_shouldn't_access", "TestDatabaseTunnelService", "TestEnsureSCIMEndpoint/non-", "github.com/gravitational/teleport/lib/utils/typical::TestParser/negation_of_wrongg_type", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//allow_automatic_review_to_be_nil", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#19", "github.com/gravitational/teleport/lib/accesslists::Test_userLockedError_IsUserLoccked", "TestCLIPrompt/OK_prefer_otp_when_specified (0", "TestCheckOIDCIdP/multiple_active_keys (0.00s)\\n\"}", "TestTriggerGroups/no_groups_in_rollout (0", "github.com/gravitational/teleport/lib/events::TestSessionWriter/Backoff", "TestStatefulSetVersionUpdater_unblockStatef", "TestServiceAccess/List", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/glob_must_match__full_string", "TestPROXYEnabledListener_Accept/PROXY_v", "github.com/gravitational/teleport/lib/services::TestAccessChecker_EnumerateMCPToools/allow_wildcard,_deny_specific_value/allow_wildcard,_deny_specific_value", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/too_many_levels_oof_nesting_in_the_variable_with_property", "TestContainsExpansion (0.00s)\\n\"}", "Test_isPodUn", "TestTemplate_Multiple", "github.com/gravitational/teleport/lib/services::TestCheckGCPServiceAccounts/full__access_role", "github.com/gravitational/teleport/lib/backend/pgbk/common::Test_makeGCPCloudSQLAuuthOptionsForServiceAccount/impersonate_a_service_account", "github.com/gravitational/teleport/lib/backend/pgbk::TestColumn", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/QueryRange", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestPing", "TestEvaluateTraitsMap/set_union (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/NotRequired", "TestEvents/billing.create_card_EventFields (0.00s", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.review_OnneOf", "TestOpenTunnelRequest (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyScan", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Begin_errors/NNOK_empty_user", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestIsInstanceMetadataAvaillable", "TestConvertVPC/no_name_tag (0.00s)\\n\"}", "TestConfig_CheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_match_match_nomatch}", "TestAccessListDefaults/owners_are_requi", "TestParseLegacyDynamoAttribute", "github.com/gravitational/teleport/lib/events::TestEvents/mfa.delete_OneOf", "github.com/gravitational/teleport/lib/proxy/peer::TestClientUpdate", "TestListDat", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/real_world_3", "TestServiceAccess/GetCrownJewel/allowed_admin_states/MFAVerifie", "TestCheckAccessWith", "TestEvents/windows.desktop.session.star", "TestCollectProfile/invalid_profile (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMajorSemver", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestGetInstanceID/with_old__ID_format", "TestResou", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'partial_emmpty_expand_section_is_removed'", "TestGetKnownRegions/IsValidRegion (0.00s)\\n\"}", "TestConvertIAMv2Error/resource_already_e", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/App", "TestUpdateAuthPreference/update", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestCommands", "github.com/gravitational/teleport/lib/services::TestDatabaseWatcher", "TestIdentityCenterAccountMatcher/accou", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/upsert", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetClusterNetworkingConfig/config_file_origin_prevents_reset", "TestGetDatabaseRoleMatchers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/TTL_iignored_without_cert", "github.com/gravitational/teleport/api/types/accessgraph::TestPrivateKey", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_unset_match}", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisClient/List", "TestPortRangesContains/10 (0.00s)\\n\"}", "TestIssuerFromPublicAddress/only_host_wi", "TestNewAuthPreference_secondF", "github.com/gravitational/teleport/api/types::TestDatabaseStatus", "TestMCPToolMatcher/allow_globbb (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType", "TestConvertUsag", "TestOpenSearchFet", "github.com/gravitational/teleport/lib/services::TestApplyTraits/Azure_identity_suubstitute_in_allow_rule", "TestEvents/session.upload_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewKubeClusterFroomAzureAKS", "github.com/gravitational/teleport/lib/services::TestSAMLIdPServiceProviderUnmarshhal", "TestParseShortcut/reverse_tunnels (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/upsert_withoutt_create", "TestInterpolate/error_in_mapping_traits (0.00s)", "TestVariable/string_literal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/server::TestNewEC2InstanceFetcherTags/wwith_glob_key", "TestResumption/tunnel/plain_SSH (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/httplib::TestConvertResponse/normal_error", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenValidator_Validaate/expired", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=apple_Touch_ID_attestation", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_unset_nomatch}", "TestPostgresRecording/prepared_", "github.com/gravitational/teleport/lib/multiplexer::TestIsDifferentTCPVersion", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/FindRolesByName/found__two", "TestClientUpdate (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_ValidateWithJWWKS/expired", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestSortingExpoortFile/equality_check,_more_data_then_maxSize", "github.com/gravitational/teleport/lib/auth/webauthncli::TestToTouchIDCredentialPiicker/picks_last_credential", "TestGetTokenAudiences (0.00s)\\n\"}", "TestReviewThresholds/rational", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/internal_with_spaaces_removed", "github.com/gravitational/teleport/lib/client/escape::TestEscapeHelp", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.clipboard.send_EEventFields", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/role_requuires_trusted_device,_device_not_verified", "github.com/gravitational/teleport/lib/loglimit::TestLogLimiter/logs_that_do_not_mmatch_log_substrings_are_logged_right_away", "TestReplaceRegexp/partial_conversions_are", "github.com/gravitational/teleport/lib/services::TestCertAuthorityEquivalence", "TestParseShortcut/rec_config (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/server::TestAzureWatcher/resource_groupp_wildcard", "TestConnString/insecure (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/pagination::TestPageRequestToken/recyycling_a_value_is_an_error", "FuzzParseWebLinks/seed#5 (0.00s)\\n\"}", "TestParsePolicyDocument (0.00s)\\n\"}", "TestKeyPrefix/prefix=/telepo", "github.com/gravitational/teleport/lib/asciitable::TestMakeTableWithTruncatedColummn/column2", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.result_OneOf", "TestConvertUsageEvent/access_", "TestReconciler_Reconcile/reconciliation_faces_mi", "TestKeyPrefix/prefix=teleport (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseUser/devveloper_allowed_only_specific_username/database_in_prod_database", "TestAtomicWriteShim/WatchersClose (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateRole/valid_syntax", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_webauthn_with__per-session_MFA", "TestParseDestination/implicit_use", "TestInstanceHeartbeatDisabledEnv (0.00s)\\n\"}", "TestParseDestination/complex_login (0.00s)\\n\"}", "TestGetClusterNetwor", "TestQuery/multiline_query (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/verify_coverage/UpdateDatabaseObject", "github.com/gravitational/teleport/lib/msgraph::TestUnmarshalGraphError/valid", "github.com/gravitational/teleport/lib/events::TestUploadCompleterNeedsSemaphore", "github.com/gravitational/teleport/api/internalutils/stream::TestCollectPages/emptty-case", "TestServiceAccess/Delete", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/repeated_property_names", "github.com/gravitational/teleport/lib/healthcheck::Test_dialEndpoints/resolved_onne_unhealthy_addr", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/disallowed_admin_states", "TestTeleportResourceReconciler_Delete/delete_non-existing_Resource (0.", "TestParseShortcut/accesslist (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/end_port_smalller_than_2", "TestConversion/NotImplemented (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams", "TestGetClusterName/success (0.00s)\\n\"", "TestParsePacket/COM_SHUTDOWN (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/unauthenticated_-_faked_metadata_ignored/unauthenticated_-_faked_mmetadata_ignored_auth", "TestNewStreamErrors/CreateAuditStrea", "github.com/gravitational/teleport/lib/services::TestCheckAccessToAzureCloud", "github.com/gravitational/teleport/lib/secret::TestOpen", "TestCheckOrigin/resourc", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams", "FuzzMongoRead/seed#9 (0.00s)\\n\"}", "TestAccessGraphIA", "TestThirdpartyS", "TestGetServers/ambiguous_match_fails (1.33s)\\n\"}", "TestApplyTraits/invalid_unix_login (0.00s)\\n\"}", "TestAtomicWriteShim (0.32s)\\n\"}", "TestIntegrationAthenaLargeEvents (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#8", "TestServiceAccess/UpdateCrownJewel/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/valid_role_arn__in_default_partition_and_account", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/TELEPORT_TTUNNEL_PUBLIC_ADDR_overrides_tunnel_address", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_DELETE", "TestBackfillFeatures/e", "TestValidateConfigAgain", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsLeaf/gateway_URI", "TestGetConfigIntegration/uncached/with_an_integration_client,_", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSubnet", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateConfig", "github.com/gravitational/teleport/lib/events::TestEvents/github.created_OneOf", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/double_signed_index", "TestJSONRPCNotification (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/creates_directory_if_it_does_not_exist", "TestParseRoleARN/sts_arn_is_not_iam (0.00s)\\n\"}", "TestMarshal/oss_with_private_endpoint (0.00s)\\n\"}", "TestGetInstanceID/with_ID (0.01s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestCollectPages/erroor-case", "TestVariable/regexp_replace (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/invalid_audience", "TestConvertEventReqToUsageEvent (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Instance/with_name_override_via_TeleportDatabaseName", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/missing_scheme", "github.com/gravitational/teleport/lib/ui::TestMakeLabels/Multiple_maps_single_labbel_case", "TestRedisClient/List/ListAll (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestSet/subtract/populated_minus_emppty", "TestContainsExpansion/escaping_is_honored (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers//skip_unavailable_databases", "github.com/gravitational/teleport/api/types/accesslist::TestAuditUnmarshaling/witthout_next_audit_date", "TestInterpolate/literal_expression (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/disallowed_admin_states/Unauthorized", "TestParseAdvertiseAddr/ok_address (0.00s)\\n\"}", "TestSuites/SIGNATURE_ALGORITHM_SUITE_LEGAC", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityX509Servicce_CheckAndSetDefaults/valid_with_labels", "TestServiceAccess/CreateAutoUpdateAgentReport/allowed_admin_states/NotR", "TestDatabaseFromRDSProxy/pos", "github.com/gravitational/teleport/lib/reversetunnelclient::TestResolveViaWebCliennt/unreachable_proxy_yields_errors", "github.com/gravitational/teleport/lib/versioncontrol/github::TestLabelParse", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'mapping_iss_deduplicated'", "github.com/gravitational/teleport/lib/services::TestValidateAccessRequestClusterNNames", "TestEvents/cluster_networking_config", "TestVarValidation/validate_namespace_ok (0.00s)", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/readonlyy_role,_short_session", "TestMemory/CompareAndSwap (0.00s)\\n\"}", "TestDestinationKubernetesSecret/existin", "TestApplyTraits/values_are_expanded_in_", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/okta.assignment.ccleanup", "TestValidateStaticHostUser/no_name (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/MFAVerified/verbs=[]", "TestOIDCGetRedirectURL/other.example.com:443", "github.com/gravitational/teleport/api/client/webclient::TestNewWebClientHTTPProxyy/ignore_proxy_when_no_proxy_is_set", "github.com/gravitational/teleport/lib/utils/interval::TestLastTick", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/clustter_requires_MFA_but_MFA_not_verified", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation/kubernettes_app", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestSortingExpoortFile", "TestAuthConfig (1.64s)\\n\"}", "TestAccessCheckerWorkloadIdentity", "github.com/gravitational/teleport/lib/backend::TestKeyScan/invalid_type_bool", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/empty_roole_set", "TestEvents/db.session.postgres.st", "FuzzParseDisplay/seed#2 (0.00s)\\n\"}", "TestPageRequestToken/recycling_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestReadLogin7", "TestListDatabasesIAMConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Deleted", "TestDefaultTags (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/native::TestStatusError_Is/disttinct_statuses_are_not_equal", "github.com/gravitational/teleport/lib/events::TestEvents/okta.assignment.process__OneOf", "github.com/gravitational/teleport/lib/events::TestEvents/mfa.delete_EventFields", "github.com/gravitational/teleport/api/client/webclient::TestSSHProxyHostPort/TLS__routing_enabled,_web_public_addr_with_listen_addr", "github.com/gravitational/teleport/lib/auth/migration::TestDBAuthorityUp", "TestEvents/user.login_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestWrapPayload//recording_spans_are_propagated", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate", "TestLabelExpressions/email.local (0.00s)\\n\"}", "TestEvents/user.create_OneOf (0.00s)\\n\"}", "Test_transport_rewriteRequest (0.00s)\\n\"}", "TestGetAWSPolicyDocument (0.00s)\\n\"}", "TestValidateCrownJewel/EmptyTelepo", "TestFindAllEmptyStruct/struct_with_e", "TestAcquireSemaphoreRequest (0.00s)\\n\"}", "TestMergeStreams/both_streams_empty (0.00s)\\n\"", "TestServiceAccess/CreateAutoUpdateVersion/allowed_admin_stat", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseUser/(caase-insensitive_db)_developer_allowed_any_username_in_stage_except_superuser", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestKubeAgentLabels", "github.com/gravitational/teleport/lib/services::TestParseShortcut/connectors", "TestJoinServiceGRPCServer_Re", "TestMatchers/prefix/suffix_matcher_negative", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSClluster/custom_endpoints", "TestCursorScenarios/basic (0.00s)\\n\"}", "TestManagedSQLListAll/servers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.update_EvventFields", "TestAppliesTiming/double_speed (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/okta::TestCheckOrigin/resources_createed_by_non-okta_service_omit_origin", "TestGetConfigIntegration (0.01s)\\n\"}", "TestEvaluateTraitsMap/contains_all (0.00s)\\n\"}", "TestEvents/join_token.create_OneOf (0.00s)\\n\"}", "TestCeremony_RunAdmin/non-existing_dev", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//mangled_signature", "TestCheckAccess/non-o", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/NotRequired/verbs=[]", "TestTimeReconciliation (0.05s)\\n\"}", "TestIsAutoUsersEnabled/postgres_with_admin_us", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/disallowed_admin_states/Unauthorized", "TestServiceAccess/CreateUserTask (0.00s", "TestUpsertSessionRecor", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_nomatch_nomatch}", "TestReadJSON_ContentType (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestMalformedOpMsgg/empty_$db_key", "github.com/gravitational/teleport/lib/utils/aws/region::TestIsKnownRegion", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID", "TestRevi", "TestRoleParse/validation_erro", "TestGlobMatch/exclusive_child_glob_mi", "TestGithubAuthRequest_Check/TTL_ignor", "TestMergeStreams/stream_B_empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/cloud_should_reject_custom_weekdays", "TestLoginFlow_BeginFinish (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_match_match}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/events::TestEvents/trusted_cluster_token.crreate_OneOf", "github.com/gravitational/teleport/lib/web/ui::TestMakeDatabaseSupportsInteractivee/unsupported", "TestGetTeleportUser/event_with_user_metadata (0", "TestEnsureSCIMEndpoint/invalid_pa", "TestCheckAccess/okta_servi", "github.com/gravitational/teleport/lib/events/s3sessions::TestEndpoints", "github.com/gravitational/teleport/api/client::TestListResources/DatabaseServer", "github.com/gravitational/teleport/lib/events::TestEvents/oidc.updated_OneOf", "TestVerifyAttestation/OK_format=p", "TestInstallFlagsYAML/empty (0.00s)\\n\"}", "FuzzParseWebLinks/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToUserGroups/deny__labels,_no_access", "TestGetConfigIntegration/uncache", "github.com/gravitational/teleport/lib/services::TestDesktopDirectorySharing/multiiple_conflicting_roles,_disable_wins", "TestHealthCheckConfig_equ", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/oktta_service_removing_Okta_origin_is_an_error", "TestServiceAccess (0.01s)\\n\"}", "TestStaticHostUserCRUD/upser", "TestGetTags/ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/MFAVerified", "TestCeremony/ok_(macOs) (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestGetDisconnectExpiredCertFromIdenntity/unset_when_disconnectExpiredCert_is_false", "TestParseSignatureAlgorithmSuite/2 (0.00s)\\n\"}", "TestSPIFFESVIDOutput_CheckAndSetDefaults (0.00", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/search(1,2)", "github.com/gravitational/teleport/lib/events::TestGetTeleportUser", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/auth/webauthncli::TestToTouchIDCredentialPiicker/picker_returns_bogus_credential", "FuzzTraitsExpressionParser/seed#39 (0.00s)\\n\"}", "TestFromProtoNils/membership-requ", "TestAzureIdentityMatcher_Match (0.00s)\\n\"}", "TestConvertSubnet (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteSuite/Lock", "TestCredentialCreation_Validate/nil_", "FuzzParseRefs/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query_disabled", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestRPCClientReqquestParam", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/hasPrefix(name,_\\", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSInnstanceNameOverride/via_TeleportDatabaseName", "TestUnhealthyWorkloadTrigger_CanStart/statefulset_(replicated_OK) (0.", "TestNewClient_TCP (0.00s)\\n\"}", "TestFailoverGetter_GetVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/nok:_OSS_and_Mode=required", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/below_mmin_CertTTL", "TestIsTLSDeviceVerified/all_extensions (0.", "github.com/gravitational/teleport/lib/services::TestMarshalNotificationRoundTrip", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#16", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName", "github.com/gravitational/teleport/lib/auth/touchid::TestRegisterAndLogin/passworddless", "TestNewManager/success_with_m", "TestIsALPNConnUpgra", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/regexp_no_match", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingIAMMethod/pass_case/pass_case_auth", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/CreateGitHubAuthRequest_success", "TestValidat", "github.com/gravitational/teleport/lib/utils::TestFnCacheSet", "github.com/gravitational/teleport/lib/utils/sortmap::TestWrites/empty", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setVersionMetric/oold_non-expired_versions", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetIntegrrationCertAuthorities", "TestEvaluateCondition/matches_all_us", "TestEvents/app.session.request_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/jwt::TestKey_SignAndVerifyAWSOIDC/RSA2048", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/tcp_scheme", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstNewDatabaseObjectImportRule/nil_spec", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsLocalUser/systtem_user", "TestProxyLine_AddSignature/missing_s", "TestAssertionInfo_RoundTrip/empty (0.00s)\\n\"}", "TestCheckAccessWithLabe", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/storage_error", "TestCheckSPIFFESVID/simple_success (0.00s)\\n\"}", "TestPortRangesContains/0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/socks::TestHandshake", "github.com/gravitational/teleport/lib/reversetunnelclient::TestResolveViaWebCliennt/valid_address_yields_NetAddr", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_client,_must_return_the_credentials", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/NotFirstConnSynnc/FutureTimeout", "github.com/gravitational/teleport/lib/utils/log::TestOutput/text/debug", "TestLogLevel/SetLowerDEBUG (0.00s)\\n\"}", "TestSlice (0.00s)\\n\"}", "TestKubeResourceCouldMatchR", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumenttForAssumedRole/aws-redshift-serverless", "github.com/gravitational/teleport/lib/services::TestMatchGCPServiceAccount/wildcaard_in_allow_doesn't_work", "github.com/gravitational/teleport/lib/services::TestMatchResourceLabels/one_of_muultiple_selectors_matches", "Test_databaseObjec", "TestUpdateRemoveCycle (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/ui::TestTransformCommandLabels", "github.com/gravitational/teleport/lib/auth/userloginstate/userloginstatev1::TestGGetUserLoginState", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.clipboard.receivve_OneOf", "TestSplitServerID (0.00s)\\n\"}", "TestListSubnets (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/namespaces", "github.com/gravitational/teleport/lib/services::TestWorkloadIdentityMarshaling/noormal", "TestIDTokenValidator_Validate (0.30s)\\n\"}", "TestSafeEnvAddFull/double_add (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/rts", "TestAWSSignerHandler/s3_access_by_assume", "FuzzTraitsExpressionParser/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authn::TestCeremony_RunWeb/saniity_checks", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/MFAVerified", "TestContextLockTargets/Auth (0.00s)\\n\"}", "TestIsAvailable/don't_hang_on_connection", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_formatJSON", "Test_dialEndpoints/resolved_one_unhealth", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/list_no_accesss", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//3/yaml", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/other.exammple.com:443", "TestNewKubeClusterFromAzureAKS (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/app/azure::TestForwarder_getToken", "github.com/gravitational/teleport/lib/srv/server::TestSSMInstaller", "TestNewAWSNodeFromEC2In", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegion/valid_fulll_region", "TestGenericReconciler (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCompareResources/IsEqual_not__equal", "github.com/gravitational/teleport/lib/utils::FuzzReadYAML/seed#0", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#8", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_hardware_key_pin,_MFA_not_verified", "TestApplyTraits/GCP_service_ac", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=fido-u2f_simple_check", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_Validate", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_nomatch_match}", "TestInvalidPayloadSize (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//6m", "github.com/gravitational/teleport/lib/events::TestEvents/access_graph_settings.uppdate_OneOf", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/GetAutoUpdateVersion", "TestEvents/contact.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpdateDynamicWindowsDesktop,allowed:NotRequired,verbs:[update]", "github.com/gravitational/teleport/lib/services::TestApplyTraits/kubernetes_namesppaces_replace_rules", "TestProxyGroups (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestSQLListAll/auth_error", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/disallowed_admin_states", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt", "TestIsHTTP/Accept_PATCH (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/mysql/default_endpoint", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[update]", "TestGenerateKeyWithAlgorithm (0.85s)\\n\"}", "FuzzMongoRead/seed#12 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_failure/failuree_in_recovering_transitions_to_tripped", "github.com/gravitational/teleport/lib/cloud/aws::TestGetPolicyVersions/PolicyNotMMatchingLabels", "TestAppIsAWSConsole/AWS_Standard (0.00s)\\n\"}", "TestCLIPrompt/OK_prefer_sso_over_otp (0.00s)\\n\"}", "TestServiceAccess/DeleteAutoUpdateConfig/allowed_admin_states/NotRe", "TestStrongValidate/long_but_ok_scope (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/GCP_IAMM_Auth_with_IP_type/ApplyToPoolConfigs", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_match_nomatch}", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsLocalUser/locaal_user", "TestParseShortcut/token (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobject::TestValidateDDatabaseObject/valid_object", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/empty", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericWrapperWWithPrefix", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/to_in_the__future", "github.com/gravitational/teleport/lib/srv/discovery/common::TestIsRDSInstanceSuppported/min_supported_version", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/invalidd_IPv6_addr,_only_one_colon#01", "TestIsHTTP/Accept_TRACE (0.00s)\\n\"}", "TestCreateURI/invalid_secure_endpoint (0.0", "github.com/gravitational/teleport/lib/services::TestCheckAccessToWindowsDesktop/llabels_expression_more_permissive_than_another_role", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/verify_coverage/GetDatabaseObject", "TestElastiCacheFetcher (0.02s)\\n\"}", "TestConfig_SetFromURL/region_param (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/saml/IterateUnifiedResources/descending", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/component_ccaller", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__QUERY", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenValidator_Validate//success", "TestMaxVersions/client_newer_than_max_version (", "TestReadPreLogin (0.00s)\\n\"}", "TestAppIsAWSConsole/Not_an_AWS_Console_URL (0.00s)", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/BuiltinRole:_context_always_disabled", "TestRoleParse/v3_role_with_no_spec_get", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/one_role__requires_MFA_and_MFA_was_verified", "TestDescendingSegments/multi-segment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/denied_access_to_read_discovery_configs", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenSource_GetIDTokeen/tagged/value_missing", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_nomatch_unset_unset}", "FuzzParserEvalBoolPredicate/seed#26 (0.00s)\\n\"}", "TestParseReviewDayOfMonth/1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_unset_match}", "TestCheckAccessToGitServer/explicit_deny (0.00s)\\", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/OFF/ddecode", "Test_propertyTable/scalar_and_object", "TestMarshalYAML/list_of_yaml_types (0.00s)\\n\"}", "TestSessionWriter/NonRecoverable (0.10s)\\n\"}", "TestRegexMatchesAny/exact_match (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/okta_service_upddating_non-okta_resource_is_an_error", "TestValidateCrownJewel/MissingMatchers (0.00", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/name_||", "TestAp", "github.com/gravitational/teleport/lib/player::TestUseDatabaseTranslator/SupporteddProtocols/postgres", "TestSA", "TestSSHPortForwarding/c", "github.com/gravitational/teleport/api/trail::TestConversion/AlreadyExists", "TestVerifySSHUser/OSS_dt=nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateRole/unsupported_funcction_in_labels_expression", "TestNewNopValidator (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/no_exxpiry", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig", "TestMemory/ConcurrentOperations (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyTrimSuffix/empty_key_trims__nothing", "TestRDSFetchers (0.05s)\\n\"}", "TestAddRoleDefaults/auditor", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[update_creaate]", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Exclude_by_NameRegex", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/lissting_clusters_returns_all_valid_clusters_and_ignores_the_others", "github.com/gravitational/teleport/lib/services::TestResourceMatchersToTypes/singlle_element_with_multiple_labels", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/very_full_config", "TestNewAWSNodeFromEC2Instance/instance_metadata_generated_l", "FuzzProxyLine_Bytes/seed#4 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMatchGCPServiceAccount/deny_eexact_match", "github.com/gravitational/teleport/lib/labels::TestStart", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/full_acccess_role", "TestKRBConfString (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMeetsMinVersion_emptyOrInvalid", "github.com/gravitational/teleport/lib/events::TestJSON/session_command_event", "github.com/gravitational/teleport/lib/events::TestEvents/login_rule.create_EventFFields", "TestResolveEndpoints/unsupported_SDK_reso", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/accessmonitoring::TestAccessMonitoringRule", "TestLoginFlow_scopeAndReuse/Begin (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client/webclient::TestNewWebClientHTTPProxyy/use_http_proxy", "TestMatchers/regexp_matcher_positive (0.00s)\\n\"}", "TestOpenTunnelRequest/missing_vpc_id (0.0", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/double_eequal_value", "TestEvents/db.session.mysql.drop_db_OneOf (0.00s)\\", "github.com/gravitational/teleport/lib/utils/aws/dynamodbutils::TestIsFIPSEnabled", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/valid_ARN_is_noot_an_IAM_role_ARN", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestMalformedOpMsgg", "github.com/gravitational/teleport/lib/services::TestCanCopyFiles/true", "github.com/gravitational/teleport/lib/events::TestEvents/user.delete_EventFields", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/verify_coverage/UpsertVnetConfig", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetSessionRecordingConfig/unauthorized", "TestReadProxyLineV2/suc", "TestValidateTokenWithJWKS/signed_by_unkn", "github.com/gravitational/teleport/lib/srv/discovery/common::TestExtraElastiCacheLLabels/no_resource_tags", "TestParserForIdentifierSubcondition/and-condition,_mixed_with_and_wit", "github.com/gravitational/teleport/lib/backend::TestKeyScan/empty_byte_slice_key", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_ValidateWithJWWKS", "TestServiceAccess/GetDatabaseObjectImportRule/disallowed_admin_s", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Equal//bundle_set_2_equal", "TestEvents/db.session.opensearch.request_OneO", "TestConvertUsageEvent/discove", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Filter_by_ID", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationChheckpoint/failure_after_50_calls,_refuse_to_reuse_checkpoint", "TestServiceAccess/DeleteDynamicWindowsDesktop,allowed:MFAV", "TestPostgresRecording/session_start (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::FuzzReadProxyLineV2/seed#0", "TestRollbackGroups/unsupported_schedule", "TestCursorFinalizer (0.20s)\\n\"}", "TestAppendLeafCluster (0.00s)\\n\"}", "TestMarshalLabelsYAML (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/internal_with_no__brackets", "TestAuth", "TestParsePacket/COM_DROP_DB (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMatchGCPServiceAccount", "TestGetScaleSetVirtualMachine (0.00s)\\n\"}", "TestOIDCAuthRequest_Check/C", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/no_isssued_at", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/nonn-okta_service_creating_okta_user_is_an_error", "TestAWSSignerHandler/DynamoD", "TestRouter_DialSite/failure_to_dial_remote_si", "github.com/gravitational/teleport/lib/utils::TestGlobToRegexp/wildcard_and_start__of_string_is_replaced_with_regexp_wildcard_expression", "TestWriteSAMLPostRequestWithHeaders (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services/local/generic::TestNonceBasics", "TestParseFromMetadata (0.24s)\\n\"}", "TestNewResourceExpressi", "TestDefaultPrompt_PromptCre", "FuzzTraitsExpressionParser/seed#24 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/skip_dangeroous_lowercase", "TestFakeStreams (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/endpoints::TestGetResolver/builder_nnot_registered", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings/invalid_settings", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/GetUserTask/verbs=[read]", "github.com/gravitational/teleport/lib/scopes/roles::TestValidateRole", "TestForceGroupsDone/valid_transition (0.00s", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/uri-without--schema-http-protocol", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_match_unset_nomatch}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance", "TestMarshalYAML/simple_yaml_value (0.00s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestMergeStreams/comppare_always_favors_A", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_unset_unset}", "github.com/gravitational/teleport/lib/services::TestAzureIdentityMatcher_Match", "TestCheckExp", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra/ap-southeast-1", "TestSearchEventsLimiter/with_limiter (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.review_OneOff", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/request.kubernetes_resources_cancel_each_other_also_rejects_kubee_cluster_kinds_(config_error)", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/empty_label", "TestHealthCheckConfig_equivalent (0.00s)\\n\"}", "Test_quer", "github.com/gravitational/teleport/lib/web/ui::TestMakeIntegration/aws-oidc", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Lockingg", "github.com/gravitational/teleport/lib/services::TestParseShortcut/proxy", "FuzzParseDisplay/seed#10 (0.00s)\\n\"}", "TestGuessesIPAddress/prefers_last (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestSlogJSONHandler", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetRANDOM", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_nomatch_nomatch_unset}", "TestIsRoot/leaf_cluster_URI (0.00s)\\n\"}", "TestCheckSPIFFESVID (0.00s)\\n\"}", "TestHandleUnimplemented/unrelated_status", "TestUpda", "github.com/gravitational/teleport/lib/web/ui::TestMakeDesktopServiceHiddenLabel", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/vaalid:_requested_ttl_==_default_request_ttl", "TestGlobToRegexp/simple_values_are_not_replac", "TestIssueAndVerif", "TestAccessRequestMarshaling (0.02s)\\n\"}", "TestStrongValidate/single-segment_invalid_ch", "TestURLForResolvedEndpoint (0.00s)\\n\"}", "TestAppPortsValidation/end_port_smaller_than_2", "Test_getContainerImageFrom", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_inWindow/inside_wiindow,_wrong_hour", "TestIDTokenSource_GetIDToken/untagged (0.00s)\\", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestQuery", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher/prod_default_with_assume_role", "github.com/gravitational/teleport/lib/utils::TestCollect_WithAdaptedLister", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParse//clusters/foo/lleaves/bar/kubes/kube", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/backend::TestKeyAppendKey/all_with_leading__separators", "TestEvents/desktop.clipboard.send_EventFields", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialWindowsDesktop/failurre_looking_up_cluster", "github.com/gravitational/teleport/lib/web/ui::TestMakeClusterHiddenLabels/Single__server_with_internal_label", "TestWriteCmd/[]string (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_match_unset}", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilterForScale", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/struct_with_nil_slice", "github.com/gravitational/teleport/lib/utils::TestReadAtMost/limit_reached_at_4", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error/unauthorizzed", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check", "github.com/gravitational/teleport/lib/events/export::TestDateExporterResume/randoomFlake=false", "TestLogin_credentialPicker/MFA_single", "TestCredentialAssertion_Validate/", "TestEvents/billing.update_info_EventFields (0.00s", "TestDatabaseF", "TestCreateEC2ICERequest/", "TestSafeEnvAdd/skip_dangerous_lowercase (0.0", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_afterExecution//generation_change", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialWindowsDesktop/dial_ssuccess", "github.com/gravitational/teleport/lib/services::TestGCPServiceAccountMatcher_Matcch/deny_matches_wildcard", "github.com/gravitational/teleport/api/client/proxy::TestClusterCredentials/no_serrver_cert", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_match_nomatch}", "TestGetAgentVersion/ping_error (0.00s)\\n\"}", "TestConvertUsageEvent/a", "TestOktaCRUD/upsert (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_match_nomatch}", "Test_basicHTTPMaintenanceClient_G", "TestKernelVersion/4.19.94 (0.00s)\\n\"}", "TestSessionAccessJoin/failKind/ssh (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2/paginatioon", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestDatabasePermmissionMatch/labels_and_glob_patterns", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/codes.Unkknown_error", "TestConnectorKInitClient/invalid_", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestClient", "github.com/gravitational/teleport/lib/services::TestParseShortcut/app", "TestGetAWSPolicyDo", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/apps", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/remmote_app,_redirect_to_non-app_addr", "github.com/gravitational/teleport/lib/events::TestEvents/instance.join_OneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationTunnelService_CCheckAndSetDefaults/missing_app_name", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups,_one_wait_hour", "TestIsSSHDeviceVerified/nok:_missin", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestCertificateVerificatioon/server_not_a_proxy", "Test_databaseObje", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/equals(resource.metadata.labels[\\", "FuzzParsePacket/seed#7 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_unset_unset}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/lib/events::TestEvents/db.create_EventFields", "TestHandleUnimplemented/unrelated_err (0.00s)\\n\"}", "TestHandleUnimplemented", "TestKubernetesServerMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/update_with_wrong_revision", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_Name/one_trigger", "TestDatabaseObjectImportM", "TestGet", "github.com/gravitational/teleport/lib/services::TestNewEnumerationResultFromEntitties/wildcard_allowed", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/verify_coverage/UpsertCrownJewel", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_OFF/YAML", "TestEvents/session.start_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/choose", "TestPollAWSS3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/db/postgres/repl::FuzzCommands/seed##3", "TestMatchPattern/glob_mismatc", "github.com/gravitational/teleport/lib/web/ui::TestCreateGitServerRequest_Check", "TestGetMode/config_suspends,_versi", "TestGetLabelEngineVersion (0.00s)\\n\"}", "TestFillSAMLSigningKeyFromExisting (0.91s)\\n\"}", "TestIssuerFromPublicAddress/valid_host:port", "TestParseShortcut/rc (0.00s)\\n\"}", "TestGetAWSPolicyDocument/aws-memorydb (0.00", "github.com/gravitational/teleport/lib/events::TestJSON/user_update", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/signed_manifest", "github.com/gravitational/teleport/lib/utils::TestStringsSet", "TestAWSSignerHandler/s3_access (0.04s)\\n\"}", "TestEvents/session.rejected_EventFields (0.00s)\\n\"}", "TestTLSIdentity_roundtrip/full_identity (0.00s)\\n\"", "TestUserTokenUnmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/slices::TestFilterMapUnique/deduplicaates_items", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//4/yaml", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/Limit", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults", "github.com/gravitational/teleport/lib/proxy::TestCheckedPrefixWriter/missing_preffix/two_writes", "TestTrustedClusterRBAC/update_ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/muulti_user,_multi_credential,_explicit_user_(2)", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpReply", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamWithPadding/Flaky=true,ForceFlush=false", "TestOIDCCheckAndSetDefaults/invalid_cl", "github.com/gravitational/teleport/lib/services::TestReasonRequired/role_request:__require_reason_when__any__role_with_reason.required_matches__any__roles", "FuzzParseWebLinks/seed#2 (0.00s)\\n\"}", "TestApplyTraits/values_are_expanded", "TestAuthorizedKey/missing_HostID (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateAuthPreference", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/MDM", "TestIdentityCenterAccountMatcher/empty_non", "TestChec", "github.com/gravitational/teleport/lib/web/session::TestCookies", "github.com/gravitational/teleport/lib/events::TestEvents/github.deleted_OneOf", "TestTrustBundleCache_Run (0.01s)\\n\"}", "TestAccessRequestCacheResets (0.28s)\\n\"}", "TestRDSFetchers/skip_unavailab", "TestGetReadiness/Failure (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::Test_keyset", "TestCollectPages/basic-depagination (0.00s)\\n\"", "TestStaticHostUserC", "github.com/gravitational/teleport/lib/devicetrust/authn::TestCeremony_Run/windowss_ok", "github.com/gravitational/teleport/lib/utils::TestRejectsInvalidPEMData", "TestTrimToMaxSize/recovery_code.used (0.00s)\\n\"}", "TestDeleteUser (0.00s)\\n\"}", "TestRDSDBProxyFetcher/fetch_vpc1 (0.00s)", "github.com/gravitational/teleport/api/client/webclient::TestParse/file://host/patth", "TestTake/drain_stream_of_size_n (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers//fetch_different_labels_for_different_regions", "github.com/gravitational/teleport/lib/services::TestAccessRequestWatcher", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/untrusted_wrongly_signedd_manifest", "TestIsHTTP/Reject_\\\"FAKE_/some/path_HTTP", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_nomatch_unset}", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/multiple_pparameters_prepared_statements", "TestReviewThresholds/tryin", "TestEvents/session_recording_config.update_", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestCloudProhibited", "github.com/gravitational/teleport/lib/srv/app/aws::TestRewriteRequest", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/non-okta_servicee_updating_non-okta_resource_is_allowed", "TestValidateConfigAgainstM", "github.com/gravitational/teleport/lib/services::TestRoleParsing", "TestEvents/user_task.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher//simple_account_match", "TestAtomicWriteShim/Limit (0.00s)\\n\"}", "TestEvents/billing.delete_card_OneOf (0.00s)\\n\"}", "Test_Channel_CheckAndSetDefaul", "TestEvents/access_request.create_OneOf (0.00s)\\n\"}", "Test_cosignKey", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialHost/failure_resolvinng_node", "TestUpsertAuthPreference (0.00s)\\n\"}", "TestGetKubeResources/irrelevant_deny (0.00s)\\n\"}", "TestGetConfigIntegration/cached/with_an_integration_credential_pr", "FuzzParseDisplay/seed#8 (0.00s)\\n\"}", "TestRoleParsing/test_case_'4' (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/linux::TestParseOSReleaseFromReader", "TestCredentialAssertionResponse_json (0.00s", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnrollEKSClusterss/cluster_with_already_present_agent_is_not_enrolled", "TestAtomicWriteShim/Ite", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/missing_cluster_name", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync/PPastTimeout", "TestPolicyAndResourceScope (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdateAgentReport/allowed_admin_sta", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialSite/default_to_dialiing_local_site", "github.com/gravitational/teleport/lib/services::TestParseShortcut/okta_import_rulles", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureExternallAuditStorage/role_not_found", "TestCreateSession/golden_request", "github.com/gravitational/teleport/lib/sshutils/x11::TestReadAndRewriteXAuthPackett/xauth_packet_empty", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGKEFetcher", "github.com/gravitational/teleport/lib/events/export::TestExporterBasics", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/anotherr_error_below_limit_remain_in_standby", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/ConneectorSpec_requires_SSOTestFlow", "TestConvertIAMv2Error/invalid_policy_docume", "github.com/gravitational/teleport/lib/services::TestCheckAccessToUserGroups", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateAuthPreference/updated", "Test_Channel_CheckAndSetDefaults (0.00s)\\n\"}", "TestDatabaseRDSEndpoint/valid_account_id (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/gcssessions::TestUploadFromPath", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftCluster/success_with_name_override_viateleport.dev/database_name", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_GET", "TestReadAtMost/limit_reached_at_5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/genmap::TestConcurrentTermination", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//NOK_local_user_mfa_verified_cert", "TestAtomicWriteSuite/Concurrent (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/missing_account_id_is_ok", "TestServiceAccess/UpdateAutoUpdateConfig/allowed_admin_sta", "TestAtomicWriteShim/Expiration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/rcs", "TestParseShortcut/okta_assignments (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/health_check_config.creaate_OneOf", "TestEvents/windows.desktop.session.end_Ev", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_afterExecution//failed_execution_causing_a_trip", "TestTeleportResourceReconciler_Delete/delete_existing_but_no", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/without_loggin_hint", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[updatee]", "TestLogin_credentialP", "TestParsePacket/COM_REFRESH (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/ddon't_add_login_from_unrelated_labels", "github.com/gravitational/teleport/lib/utils::TestGlobToRegexp/wildcard_is_replaceed_with_regexp_wildcard_expression", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query_should_not_extend_over_initial_end_of_range,_asc", "github.com/gravitational/teleport/lib/backend::TestKeyTrimSuffix", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/no_pubblic_key", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/valid_overlappping_ranges", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/prepared_sstatements_without_binding", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/DatabaseSessionStart", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerified/verbs=[update]", "TestServiceAccess/CreateAutoUpdateAgentRollout/disallowed_admin_st", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegion", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseGatewayTargetURII//clusters/foo/dbs/db", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_command_help/help_command", "TestNewResourceExpression/fail_t", "github.com/gravitational/teleport/lib/utils::TestToFieldsCondition", "TestTrimToMaxSize/join_token.create (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#44 (0.00s)\\n\"}", "TestCeremony_Run (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/escape::TestNormalReads", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_nomatch_match_unset}", "TestGetLabelEngineVers", "TestCheckDatabaseNamesAndUsers/empty_role (0.00s", "github.com/gravitational/teleport/lib/srv/db/redis/connection::FuzzParseRedisAddrress/seed#2", "TestExtraFields/text/level_component (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabase/roles_rrequires_trusted_device,_device_verified", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestCountCatchAll/all_ggroup_hit", "TestCLIPrompt/OK_sso (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestSessionWriter/NonRecoverable", "TestLockKey/with_parts (0.00s)\\n\"}", "TestEC2SSMIAMConfig (0.00s)\\n\"}", "TestDatabaseFromRDSV2Cluster/DB_Cluster_uses_network_informat", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/keylesss_identity_issuer_regex_invalid", "TestGKEFet", "TestNewAccessMonitoring/access_monitorin", "TestIDTokenValidator_ValidateWithJWKS/expired", "TestAuthorizeWithLocksForBuiltinRole/Db (0.10s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestUpsertIAMJoinToken (0.00s)\\n\"}", "TestCeremony_Run/macOS_ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille/reconciliation_succeeds_on_first_try,_should_exit", "TestDeduplicateOwners (0.00s)\\n\"}", "TestMakeAppTypeFromSAMLApp/saml", "github.com/gravitational/teleport/lib/events::TestExternalLog", "TestServiceAccess/CreateVnetConfig/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/desktops", "TestMemory/Events (0.00s)\\n\"}", "TestRoleSet_GetAc", "TestWeakValidate/empty_segment_passes (0.00s)\\n\"}", "TestSelectNextReviewDate (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdateConfig/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/events/athena::TestConsumerWriteToS3", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/fiips_mode_can_be_overridden", "TestConnString (0.00s)\\n\"}", "TestCredentialCreation_V", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/valid_ranges__and_single_ports", "github.com/gravitational/teleport/api/types::TestAccessRequestFilter/user_wants_aall_requests", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsRoot/root_cluster_rresource_URI", "TestPolicyAndResourceScope/simple_root_priv", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestReconncileResults/CompletelyNewResults", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd", "TestHealthCheckConfig_equivalent/both_nil (0.", "TestNewAppV3/app_with_basic_CORS_policy (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError/agg_badParrameter_and_nil", "TestIDTokenValidator_ValidateWithJWKS/success", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpsertUserTask/verbs=[]", "Test_inWindow/short_window (0.00s)\\n\"}", "TestContainsExpansion/detect_simple_expansion (", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumenttForAssumedRole/aws-redshift", "TestAccessListMemberMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states", "github.com/gravitational/teleport/lib/backend::TestKeyCompare/equal_keys", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/whitespaace_trim", "TestNewUserListEntry/bot (0.00s)\\n\"}", "TestDatabaseFromRDSProxy/postgres (0.00s)\\n\"", "Test_transport_rewriteRedir", "TestJoinSer", "github.com/gravitational/teleport/lib/multiplexer::TestWrapperConn", "TestRoles/FindRolesByName (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/MFAVerified", "TestMi", "github.com/gravitational/teleport/lib/utils/aws::TestIsUserARN/invalid_value", "TestIsUserARN/valid_user_arn (0.00s)\\n\"}", "Test_isPodUnhealthy (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestString//clusters/teleeport.sh/kubes/kube-cluster-name/namespaces/namespace-name", "TestBuildRoleARN/valid_ARN_is_not_an_IA", "github.com/gravitational/teleport/lib/client/db/opensearch::TestConfigNoTLS", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpUpdate", "TestMarshalPluginRoundTrip (0.00s)\\n\"}", "TestCircuitBreaker_Execute/no_error_rema", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[delete]", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/|", "TestNormalizeECSResourceName/", "TestAuthorizeWithLocksForBuiltinRole (1.12s)\\n\"}", "TestServiceAccess/DeleteVnetConfig/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiigReqDefaults/missing_integration_role", "github.com/gravitational/teleport/lib/srv/discovery/common::TestMakeAzureDatabaseeLoginUsername/mysql_flex", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenSource", "github.com/gravitational/teleport/lib/services::TestAccessCheckerWorkloadIdentityy", "github.com/gravitational/teleport/lib/events/athena::TestCollectedEventsMetadataMMerge/Merge_with_empty_b", "github.com/gravitational/teleport/lib/jwt::TestKeyIDHasConsistentOutputForAnInputt", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/VallidCrownJewel", "FuzzMSSQLLogin/seed#4 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestSkip", "github.com/gravitational/teleport/lib/automaticupgrades::TestIsEnabled/no_env_varr_returns_false", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/MFAVerified/verbs=[create]", "FuzzTraitsExpressionParser/seed#11 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/reversetunnel/track::TestIsClaimed", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/promoted_skiips_the_threshold_check", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/postgres", "github.com/gravitational/teleport/lib/services::TestWorkloadIdentityX509RevocatioonMarshaling/normal", "TestDateExporterBasics/randomFla", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpdateUserTask/verbs=[]", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.cassandra.preepare_EventFields", "github.com/gravitational/teleport/lib/services::TestRoleParsing/test_case_'2'", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize", "github.com/gravitational/teleport/api/internalutils/stream::TestMapWhile", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport", "TestSAMLAuthRequest_Check (0.00s)\\n\"}", "FuzzKubeControllerSchedule (0.01s)\\n\"}", "TestRoles/FindRolesByName/found_zero (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/extra_args", "TestListEC2/valid_for_listing_instance", "TestUpsertAccessGr", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/ValidateMFAAuthResponse_without_MFADevice", "TestOutput/json/warn (0.00s)\\n\"}", "Test_setGroupStates/more_groups (0.00s)\\n\"}", "Test_EmitAuditEvent/valid_publish (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Instance", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_ValidateWithJWWKS/future", "TestDatabaseFromRDSProxy/mysql", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=packed_root-signed_secure_key", "TestEvents/access_list.member", "TestDeployServiceIAMConfi", "TestK", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialSite", "TestEvents/access_list.review_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMinVersions", "github.com/gravitational/teleport/lib/utils::TestReadAtMost", "github.com/gravitational/teleport/api/types::TestPortRangesContains/10", "TestContainsExpansion/escaping_is_honored#01 (0.", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/disallowed_admin_states", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/ap-southeast-1_fips", "TestRolesForResourceRequest/inv", "TestMigrate/backwards_compat_w", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateConfig/disallowed_admin_states/Unauthorized", "TestPostgresRecording/session_end (0.00s)\\n\"}", "github.com/gravitational/teleport/api/observability/tracing::TestUploadTraces/no__spans_to_upload", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_match_nomatch_match}", "TestGetConfigIntegration/cached/with_an_integ", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/mattches_some_user_traits", "TestServiceAc", "TestCheckAccess/okta_", "TestEncodeDecodeCreat", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/dial_by_ip_only", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasks/verbs=[]", "github.com/gravitational/teleport/lib/services::TestResourceParserLabelExpansion", "github.com/gravitational/teleport/lib/backend::TestKeyString/empty_key_produces_eempty_string", "TestServiceAccess/ForceAutoUpdateAgentGroup/allow", "TestFindAllEmptyStruct/struct_with_emp", "TestGetTags/denied_access_to_tags (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/export::TestExporterBasics/case=emptty,randomFlake=true", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParse//clusters/foo/ddbs/db", "TestCheckKubeGroupsAndUse", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetERROR", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_can_create_when_create_host_user_mode_is_insecure-drop", "github.com/gravitational/teleport/lib/services::TestValidateSQLServerDatabaseURI//http://computer.domain.com:1433", "TestAddRoleDefaults/access_(", "TestServiceA", "github.com/gravitational/teleport/integrations/lib/credentials::TestCheckExpiredCCredentials", "TestCalculatePermission", "github.com/gravitational/teleport/api/client::TestListResources/ApplicationServerr", "TestEvents/secreports.audit.query.run_Even", "TestEKSFetcher/list_everything (0.00s)\\n\"}", "TestALPNConnUpgradeDialer/conn", "github.com/gravitational/teleport/lib/web/ui::TestStripProtocolAndPort", "TestConvertResource (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthncli::TestDefaultPrompt_PromptCCredential/output_text", "TestGetAllowedLogin", "TestParse/http://example.com:443 (0.00s)\\n\"}", "TestReadAtMost/limit_reached_at_4 (0.00s)\\n\"}", "TestGetRootClusterURI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=tpm_simple_check", "TestServiceAccess/UpsertVnetConfig_with_existing/disallowed_admi", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/static__auth/ApplyToPoolConfigs", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/delete/nonn-okta_service_deleting_okta_user_is_allowed", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/MFAVerified/verbs=[]", "TestParseShortcut/db (0.00s)\\n\"}", "TestMaxVersions/newer_pre-releases_are_no_ok (0.", "TestValidateServerSideAgentConfig/cloud_should_allow_long_rollouts", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/first_trigger_failure", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/multipple_entities_with_multiple_entries", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/MFAVerified", "TestSessionAccessJoin/failRoleInSubstring", "TestDialLocalAuthServerNoAvailableServ", "github.com/gravitational/teleport/lib/decision::TestSSHIdentityConversion", "github.com/gravitational/teleport/lib/utils::TestSet/remove", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateConfig/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/backend::TestKeyCompare", "TestListSubnets/no_vpc_id (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/kerberos::TestConnectorKInitCClient/keytab_without_Kerberos_config", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[read]", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/storage_error", "TestNewUserACLCloud (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/ui::TestMakeLabels/Multiple_maps_with_interrnal_labels", "github.com/gravitational/teleport/lib/cryptosuites::TestSuites/SIGNATURE_ALGORITHHM_SUITE_BALANCED_V1", "TestEvaluateCondition/requested_rol", "github.com/gravitational/teleport/lib/services::TestUnmarshal", "TestDatab", "TestIdentityOutput_CheckAndSetDefaults (0.00s)\\n", "github.com/gravitational/teleport/lib/proxy::TestGetServers/ambiguous_match_failss", "github.com/gravitational/teleport/lib/events::TestEvents/plugin.update_OneOf", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/local_deny", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_match_nomatch}", "TestJoinServiceG", "github.com/gravitational/teleport/lib/events/dynamoevents::TestEndpoints/without__fips", "github.com/gravitational/teleport/lib/auth/moderation::TestSessionAccessStart", "TestLockTargetConversion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/transittion_from_standby_to_tripped", "Test_canUpdateToday/Empty_list (0.00s)\\n\"}", "TestTrimToMaxSize/device.token.create (0.00s)\\n\"}", "TestConvertVPC (0.00s)\\n\"}", "TestEKSIAMConfigReqDefaults/missing", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerForCluster/only_the_ssecond_server_has_a_valid_public_address", "TestValidateRoleARNAndExtractRole", "TestRDSFet", "TestMultiIntervalFireNow (0.10s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestGetPolicyVersions", "TestCreateSignedSTSIdentityRequest/g", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//non_local_cluster", "TestResolveEndpoints (0.00s)\\n\"}", "TestExtraFields/text (0.00s)\\n\"}", "TestTemplate_MissingSub", "TestValidateOrigin/NOK:_Origin_empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/nodes/IterateUnifiedResources/ascending", "github.com/gravitational/teleport/lib/events::TestEvents/session.connect_OneOf", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead", "TestParseSignat", "TestStrongValidate/segment_too_long (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/labels::TestCloudLabelsDisabled", "TestUpdateAuthPreference (0.00s)\\n\"}", "TestCheckAcces", "github.com/gravitational/teleport/api/client/proxy::TestClusterCredentials/handshhake_error", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/Unauthorized/verbs=[]", "TestDeployDBService/nothing_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_nomatch_unset}", "github.com/gravitational/teleport/lib/utils/aws/stsutils::TestNewFromConfig/1_dissables_FIPS", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/tampered_with_nbf", "TestPortRangesContains/20 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobject::TestNewDatabaaseObject", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_match_nomatch}", "TestSSHPortForwarding/local_allow (0.00s)\\n\"}", "TestServiceAccess/ListDynamicWindowsDesktops,allowed:Unauthoriz", "github.com/gravitational/teleport/lib/services::TestRoleParse/full_valid_role_v6", "TestCountCatchAll/one_group_miss (0.00s)\\n\"}", "TestApplyTraits/the_firs", "TestIssuerForClus", "github.com/gravitational/teleport/lib/secretsscanner/scanner::TestNewScanner/encrryptedKey_without_public_key_file", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestSelectVersion", "TestEvents/access_request.create_EventFields (0", "TestNewClient/compliant_grpc_server (0.00s)\\n\"}", "TestRouter_DialSite/successfully_dial_local_", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet/no_existing_secret", "github.com/gravitational/teleport/gen/go/eventschema::TestQueryableEventList", "TestClientMap/create_client_failed (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_nomatch_match}", "github.com/gravitational/teleport/api/types/accesslist::TestReviewSpecMarshaling", "TestDeploy", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##0", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.query_EventFiields", "TestIsAL", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[read]", "FuzzParsePacket/seed#23 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestSanitize//..", "TestKubeResourceCouldMatchRules/input_h", "github.com/gravitational/teleport/lib/utils/sortmap::TestIteration/empty", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/external_with_no__brackets", "TestBotConfig_Base64 (0.00s)\\n\"}", "TestPruneRequestRoles/mixed_request (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/labels::TestCloudLabelsValidKey", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/json/caller_compponent", "github.com/gravitational/teleport/lib/events/s3sessions::TestUploadMetadata", "TestGlobToRegexp/wildca", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestSelectVersion/no_matcch", "FuzzParseRefs/seed#6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/windows.desktop.session..start_EventFields", "TestSSHPortForwarding/deny_all (0.00s)\\n\"}", "TestClientMap/get_credentials_failed (0.00s)\\n\"}", "TestRegistrationFlow_Finish_errors (0.00s)\\n\"}", "TestCheckAccessToServer/empty", "github.com/gravitational/teleport/lib/decision::TestTLSIdentity_roundtrip/nil-to--nil", "github.com/gravitational/teleport/lib/services/readonly::TestCloneBreaksEquality", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay", "TestConfigureIdPIAM/valid (0.00s)\\n\"}", "TestStaticHostUserCRUD/get (0.0", "TestListServers/list_all_PostgreSQL_servers", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-dataabase-CA-cert", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerifiedWithReuse/verbs==[read_list]", "github.com/gravitational/teleport/lib/events::TestEvents/oidc.created_EventFieldss", "TestValidateDatabase/valid-snowflake (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/interval::TestVariableDurationScalingg", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestParseMetadataClientErrror/ok", "TestServiceAccess/GetDatabaseObjectImportRule", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress/onlly_host_with_path", "github.com/gravitational/teleport/lib/services::TestMarshalUnmarshalAuditQuery", "TestListVirtualMachines/nonexistant_", "TestCeremony_Run/macOS_device_succeeds (0", "TestDatabaseMemoryDBEndpoint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestGetServers/match_by_host_only_foor_tunnels", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_match_match}", "TestAuthorizer_AuthorizeAdminAction", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.member.delette_EventFields", "FuzzTraitsExpressionParser/seed#14 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/Okta", "TestBackend_Put (0.00s)\\n\"}", "TestCheckKubeGroupsA", "github.com/gravitational/teleport/lib/web/ui::TestNewUserListEntry/malformed_sso", "github.com/gravitational/teleport/lib/authz::TestContext_GetAccessState", "github.com/gravitational/teleport/lib/services::TestParseShortcut/oktaimportrule", "TestMinVerWithoutPreRelease/compar", "TestIsUserFunctions/IsLocalUser/local_user (0.00s)", "github.com/gravitational/teleport/lib/authz::TestContext_GetAccessState/device_trrust:_local_user", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_unset_match}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/disallowed_admin_states/Unauthorized", "TestHandleAccessRequest (0.00s)\\n\"}", "TestListDatabasesIA", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_CheckAndSeetDefaults/single_channel", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/update_no_acceess", "TestCircuitBreaker_failure (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenSource_GetIDTokeen", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestUseerActivityReportSplitting", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/filenamme_with_'@'_suffix", "github.com/gravitational/teleport/lib/events/athena::TestIntegrationAthenaEventExxport", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/git/IterateUnifiedResources/ascending", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/skip_dangeroous_exact", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.permissions.uupdate_EventFields", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfig/sssm_document_already_exists", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.fetch_EventFields", "TestClose/closed_by_context (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/https://sptest.iamshowcase.com/acs;", "TestSSH", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_nomatch_match}", "TestDatabaseFromRedshiftServerless", "TestDatabaseFromAzureMySQLF", "github.com/gravitational/teleport/lib/events::TestEvents/session.start_OneOf", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/DeleteDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[]", "TestSSMInstaller/ssm_run_failed_in_r", "TestSliceOrString/marshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/config/openssh::TestWriteSSHConfig/legacy_OOpenSSH_-_single_cluster", "github.com/gravitational/teleport/lib/services::TestAccessListReviewUnmarshal", "TestIdPIAMConfigReqDefaults/missin", "github.com/gravitational/teleport/lib/events::TestEvents/aws_identity_center.resoource_sync.failed_OneOf", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.user.ccreate", "TestTrimToMaxSize/user.create (0.00s)\\n\"}", "TestMemory/ConditionalDelete (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/devicetrust/authn::TestCeremony_RunWeb", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.execute_OneOf", "github.com/gravitational/teleport/lib/events::TestEvents/user_task.delete_OneOf", "TestUpsertUser (0.00s)\\n\"}", "TestQuery/malformatted (0.01s)\\n\"}", "TestHTTPConnStateReporter (0.04s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/when_discover_has_resources_count_and_its_values_is_positive:_no_error", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/explicit_denyy_-_dns_san", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_match_unset_nomatch}", "github.com/gravitational/teleport/lib/events/filesessions::TestReserveUploadPart", "github.com/gravitational/teleport/lib/events/athena::Test_EmitAuditEvent", "TestExtraFields/json/not_configured (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/DeleteDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[dellete]", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#11", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/attesttations_and_artifact_signature", "github.com/gravitational/teleport/lib/authz::TestContextLockTargets/Kube", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/missing_integration_name", "TestRouter_DialHost/dial_failure (0.00s)\\n\"}", "TestParseShortcut/tunnel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsLeaf/leaf_cluster_UURI", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/no_access_to_read_discovery_configs", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/equals(resource.metadata.name,_\\", "TestSessionAccessJoin (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/join_token.createe", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestBuildAppURI", "TestGetTags/not_on_gcp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenValidator_Validaate/success", "github.com/gravitational/teleport/lib/cryptosuites::TestGenerateKeyWithAlgorithm", "github.com/gravitational/teleport/lib/events::TestJSON/failed_auth_attempt", "TestVariable/invalid_dot_syntax (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/imds/oracle::TestIsAvailable/not_on_ooci", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/DeleteDynamicWindowsDesktop,allowed:NotRequired,verbs:[delete]", "github.com/gravitational/teleport/lib/utils/aws::TestNewS3V2FileWriter", "github.com/gravitational/teleport/lib/utils::TestMinVersions/pre-releases_clientss_are_ok", "TestTrimToMaxSize/db.session.dynamodb.request", "FuzzParserEvalBoolPredicate/seed#15 (0.00s)\\n\"}", "TestFullRotation (3.50s)\\n\"}", "TestClient/server_supports_tracing (0.", "github.com/gravitational/teleport/lib/backend::TestSanitize//namespaces/..", "TestConversion/ConnectionProblem (0.00s)\\n\"}", "TestAssertAccessRequestImplementsResource", "github.com/gravitational/teleport/lib/utils/log::TestValidateFields/invalid_key_((does_not_exist)", "TestRewriter/trust_x-real-ip (0.00s)\\n\"}", "TestKernelVersion/invalid_kernel_version (0.00s)\\n\"}", "TestApplyTraits/GitHub_permissions_in_deny", "TestIDTokenSource_GetIDToken/unt", "TestMigrate/backwards_compat_with_https://goteleport.com/d", "TestWriteSSHConfig (0.01s)\\n\"}", "FuzzParsePacket/seed#30 (0.00s)\\n\"}", "TestDisplay/unix_socket (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups_different_days,_hour_diff_==_wait_hours_==_1_day", "TestOktaC", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/not_a_boolean_variabble", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_unset_nomatch}", "TestParser/correct_runtime_type (0.00s)\\n\"}", "TestMigrationDryRunValidation", "github.com/gravitational/teleport/lib/services::TestGenericReconciler", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthenticated", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGetAccessEntryPriincipalArn", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_AddSignature/no__existing_signature_on_proxy_line", "github.com/gravitational/teleport/lib/services::TestUserGroupUnmarshal", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams/DownloadNottFound", "TestWorkloadIdentityJWTService_Check", "FuzzParseDisplay/seed#7 (0.00s)\\n\"}", "TestGetAllowedLoginsForResource/wo", "TestAccessGraphAWSIAMConfig (0.00s)\\n\"}", "TestHasDeviceTrustExtensions/all_exte", "TestCheckSPIFFESVID/explicit_deny_-_ip_san (0.0", "TestValidateSQLServerDat", "github.com/gravitational/teleport/lib/utils/slices::TestDeduplicateKey/EmptySlicee", "TestEvents/db.session.postgres", "TestDatabaseFromRDSV2Cluster/primary/with_name_override_via_teleport.de", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_unset_nomatch}", "TestMCPToolMatcher/allow_wildcard (0.00s)\\n\"}", "TestSessionAccessJoin/failVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig", "TestNewDatabaseFromAzureSQLServer (0.00s)\\n\"", "FuzzParseWebLinks/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/user_task.create_OneOf", "github.com/gravitational/teleport/lib/srv/alpnproxy/common::TestIsDBTLSProtocol", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher/fetch_all", "github.com/gravitational/teleport/lib/scopes::TestCompare/empty_root_equivalence", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestIdPIAMConfigReqDeefaults/missing_cluster", "github.com/gravitational/teleport/api/types::TestNewAppV3/app_with_required_apps__list", "TestPoorlyFormedFiltersAreAnError (0.0", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/s3_accesss_with_integration", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/NOK_unauthorized_service", "TestDistrolessTeleportImageRepo (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/mfa_auth_challenge.validdate_OneOf", "TestProtoToResource/enabled (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/minimum_config_with_defaults", "github.com/gravitational/teleport/lib/reversetunnelclient::TestResolveViaWebCliennt/invalid_address_yields_errors", "github.com/gravitational/teleport/lib/backend::TestKeyComponents/single_value_keyy_has_a_component", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check/below_mmin_CertTTL", "TestRouter_DialHost/dial_success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/db_request", "github.com/gravitational/teleport/lib/utils::TestCircularBuffer_Data", "github.com/gravitational/teleport/lib/multiplexer::TestUnmarshalTLVs", "github.com/gravitational/teleport/lib/services::TestMCPToolMatcher/allow_globbb", "github.com/gravitational/teleport/lib/utils::TestByteCount", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_empty_map", "github.com/gravitational/teleport/lib/limiter::TestListener/invalid_remote_addresss", "TestEvents/access_list.member.delete_OneOf (0.00s", "TestCheckDatabaseRoles/check_fails (0.00s)\\n\"}", "TestSQLListWithinGroup/empty_list (0.00s)\\n\"}", "TestIdentity_ToFromSubject/device_extensions (0.", "TestLogin/uv_discouraged,_attachment_aut", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestMalformedOpMsgg/missing_$db_key", "TestCheckAzureIdentities/full_access_role (0.00s", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestPoorlyFormeedFiltersAreAnError", "github.com/gravitational/teleport/lib/httplib::TestMakeTracingHandler", "github.com/gravitational/teleport/lib/services::TestSessionTTL/greater_than_identtity_expiration_and_role_session_ttl_not_allowed", "github.com/gravitational/teleport/lib/utils::TestBadRoles", "FuzzParsePacket/seed#32 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states", "TestLabelExpressions/labels_matching_label (0.0", "TestElastiCacheFetcher", "TestReadAtMost/limit_not_reached (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestMergeStreams/both_strreams_empty", "github.com/gravitational/teleport/lib/services::TestMatchResourceLabels/selector__matches_multiple_labels", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/disallowed_admin_states", "TestGetInstanceID/with_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_nomatch_nomatch}", "TestUnknownIdentifier/dynamic_map (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#19 (0.00s)\\n\"}", "TestCanCopyFiles/nil_and_true (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/concurrentqueue::TestBackpressure", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_computeRolloutStatte/all_groups_unstarted", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases", "TestValidateHealthCheckConfig/missin", "github.com/gravitational/teleport/lib/backend::TestKeyAppendKey/empty_append_is_nnoop", "TestCompare/root_in_ancestor_case (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/disallowed_admin_states/Unauthorized", "TestJSON/resize_event (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#3 (0.00s)\\n\"}", "FuzzParsePacket/seed#2 (0.00s)\\n\"}", "TestGlobalNotificationsCache (0.66s)\\n\"}", "TestMakeTableWithTruncatedColumn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsTLSDeviceVerified//nok:_empty_extensions", "TestServiceAccess/ForceAut", "TestDisplay/no_display_number (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetClusterURI//clusteers/cluster.sh/servers/server1", "TestMigrate/v2_config_without_version_field", "TestNewGCPWorkforceService (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/label_inequaality", "github.com/gravitational/teleport/entitlements::TestBackfillFeatures", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#6", "github.com/gravitational/teleport/lib/observability/tracing::TestTraceProvider", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/secondd_factors/sso_and_webauthn_allowed", "TestGetServerUUID (0.00s)\\n\"}", "TestAuthorizeWithLocksForBuiltinRole/Kube (0.10s)\\n", "TestIdPIAMConfigReqDefaults/set_defau", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestElastiCacheFFetcher/skip_unavailable", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#10", "github.com/gravitational/teleport/lib/utils/log::TestOutput", "TestPostgresRecording/unknown_prepared_", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//1", "github.com/gravitational/teleport/lib/vnet/dns::TestServer/v4_and_v6", "github.com/gravitational/teleport/lib/tlsca::TestJoinAttributes", "github.com/gravitational/teleport/lib/services::TestClusterExternalAuditStorage", "github.com/gravitational/teleport/lib/inventory::TestUpdateLabels", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/ifelse", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_beforeRequest/ttripped_prevents_executions", "TestParseSignatureAlgorithmSuite/2/json (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestHostUsers_HostSudoers/glob_deeny", "github.com/gravitational/teleport/lib/events::TestEvents/oidc.created_OneOf", "TestJSON/session_disk_event (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/OK_HHEADER", "TestServiceAccess/DeleteDynamicWindowsDesktop,allowed:MFAVeri", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialCreation_nil", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestWritePreLogiinResponse", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/all_fields_equal_ignoring_labels", "github.com/gravitational/teleport/lib/scopes::TestGlobIsSubjectToPolicyResourceSccope", "TestFormatErrors (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/NillCrownJewel", "TestVerifySSHUser (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestIdentityOutput_CheckAndSettDefaults/invalid_ssh_config_mode", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.execute_OneOf", "TestEvents/client.disconnect_OneOf (0.00s)\\n\"}", "TestHealthCheckAppServer (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestApplyTraits/values_are_expandded_in_kube_labels", "TestValidateServerSideAgentConfig (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_nomatch_nomatch_match}", "TestHealthCheckConfigCRUD (0.0", "TestEvents/okta.assignment.process_EventField", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/struct_with_empty_map", "TestSelectVersion (0.00s)\\n\"}", "TestMySQLFlexClient/List (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille/reconciliation_meets_a_hard_unexpected_failure_on_first_try,_should_exit_in_errror", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/access_(accesss_review,_db_labels,_identical_rules)", "github.com/gravitational/teleport/lib/events::TestJSON/rejected_subsystem", "TestCompareResources/cmp_equal_", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.recording_OneOf", "TestEvents/role.deleted_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrateProccessDataObjects", "TestEmitEdi", "TestKubeResource", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##3", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewMatcher/seed#0", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNormalizeECSResouurceName", "TestAc", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/NOK_invalid_ca", "TestSearchSessionRange/invalid_from (0.00s)\\n\"}", "TestRequireResidentKey (0.00s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestFlatten", "TestRoundRobinSequential/single-item (0.00s)\\n\"}", "TestEvaluateCondition/matches_some_", "github.com/gravitational/teleport/lib/services::TestMFAVerificationInterval", "TestCredentialCreation_Validate/em", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/literal_with_whitespace", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:NotRequired,verbs:[create_updatte]", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateClusterNetworkingConfig/authorized_built_in_auth", "TestNewKubeClusterFromAWSEKS (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/installer", "Test_propertyTable/int_or_string_enu", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/requester_(ennterprise,_existing_requests)", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/error_when_discover_metadata_resource", "github.com/gravitational/teleport/lib/kube/token::Test_kubernetesSupportsBoundTokkens/Invalid_version", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/Sort", "github.com/gravitational/teleport/lib/client/db/postgres::TestConnString/default__settings", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/ssm_tags", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestGCPIPType/unknown", "TestListSubscriptionIDs/client_l", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_match_match}", "github.com/gravitational/teleport/lib/tbot/config::TestSSHMultiplexerService_ChecckAndSetDefaults", "Test_querier_fetchResults/o", "github.com/gravitational/teleport/lib/services::TestParseShortcut/oktaassignment", "FuzzProxyLine_Bytes/seed#0 (0.00s)\\n\"}", "TestMonitor (0.00s)\\n\"}", "TestNewDatabaseFromAzureSQLServer", "TestValidateSigstorePolicy/no_name (0.00s)\\n\"}", "TestRateLimitFailure/limiter-only (0.00s)\\n\"}", "TestAuthConfig/invalid_GCP_IP_Type/che", "TestIssuerFromPublicAddress/only_host (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/recovery_code.used_EventtFields", "TestGetKnownRegions (0.00s)\\n\"}", "TestConfig_CheckAndSetDefaults", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setVersionMetric/nno_versions", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/wrong_key", "TestServiceAccess/ForceAutoUpdateAgentGroup/allowed_adm", "TestDestinationKubernetesSecret_Che", "TestMatch/string_literal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/secretsscanner/reporter::TestReporter/pre-aassert_error", "TestGetInstallScript/Oneoff_install (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/utils/log::TestOutput/json/error", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Created", "github.com/gravitational/teleport/lib/srv/discovery/common::TestWatcherWithDynamiicFetchers", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName/contains_asterisk_at_the_end", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_nomatch_match}", "TestMatchResourceByFilters/node (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestDocumentDBFeetcher", "github.com/gravitational/teleport/lib/usertasks::TestEKSURLs", "TestIdPIAMConfigReqDefaul", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/oktta_service_updating_okta_user_is_allowed", "github.com/gravitational/teleport/lib/services::TestFillSAMLSigningKeyFromExistinng/should_error_when_there's_no_existing_connector", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName", "TestOIDCGetRedirectURL/other.example.com:308", "TestClickableURL/unspecified_IPV6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesReturnNextResource", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerifiedWithReuse/verbs==[read]", "TestKeyPrefix/prefix=telep", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/unsuppported_strategy", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher//account_glob_match", "TestBufferedChannelPipeClose (0.00s)\\n\"}", "TestAppPublicAddrValidation/kubernetes_app (0.00s)", "TestEncodeDecodeRequireMFAType/SESSION (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestProxyConnCancel", "TestIDTokenValidator_Validate/success (0.01s)\\n\"}", "TestMigrationDryRunVali", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/cloud/aws::TestEqualStatement/different_conndition_values", "TestCircuitBreaker_Execute/e", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/inteeger", "TestKeyHasPrefix/valid_single_component_pref", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cas", "github.com/gravitational/teleport/lib/web/ui::TestMakeAppTypeFromSAMLApp/saml_serrvice_provider_with_empty_preset_returns_unspecified", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Equal//bundle_set_2_and_3_not_equal", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetByPurppose/success", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group", "TestGetIDToken/TestGetIDToken (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/regexp_replace_coonstant_expression", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_nomatch_unset_unset}", "TestParseDestination/spec_with_ju", "github.com/gravitational/teleport/lib/resumption::TestResumption/mux", "TestDatabaseFromRDSCluster/primary (0.00s)\\", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNewIdPIAMConfigurreClient", "TestIssuerFromPublicAddress (0.00s)\\n\"}", "TestPingError/mangled_response (0.00s)\\n\"}", "TestReconciler_Reconcile/reconciliatio", "TestParseShortcut/saml (0.00s)\\n\"}", "TestPaginationKeyRoundtrip (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestSSigstoreAttestorConfig_CheckAndSetDefaults/credentials_path_is_a_directory", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/NOK_reuse_requested_but_not_allowed", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_unset_nomatch}", "TestThirdpartySt", "TestExhaustiveNonEmptyBasics/", "TestKernelVersion/4.18.0-80.11.2.el8_0.x86_64 (", "TestCredentialAssertion_Validate (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig", "github.com/gravitational/teleport/lib/auth/moderation::TestSessionAccessJoin", "TestLockTargetsFromTLSIdentity (0.00s)\\n\"}", "TestGetKubeResour", "TestEvents/device.token.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/list_resource_denied", "github.com/gravitational/teleport/lib/tlsca::TestPrincipals/FromTLSCertificate", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin/OK:_Origiin_host_same_as_RPID", "github.com/gravitational/teleport/api/internalutils/stream::TestTake/drain_streamm_of_size_n", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/wrong_arn_set_in_kms_key", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenSource_GetIDToken/vallue_present", "TestJSON/session_join (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher//multiple_account_assignments_match#01", "TestKubeResourceCouldMatchRules", "TestGetAll", "github.com/gravitational/teleport/lib/services::TestParseShortcut/windows_desktopp", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_list.membeer.delete_all_for_access_list", "TestReviewThresholds/threshold_omission_chec", "github.com/gravitational/teleport/lib/accesslists::TestAccessListHierarchyIsOwnerr", "github.com/gravitational/teleport/lib/jwt::TestPublicOnlyVerifyAzure/RSA2048", "TestServiceAccess/UpsertVnetConfig/allowed_admin_states/NotRequired", "TestReporter/success (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestAsyncEmitter/Close", "TestKeyHasSuffix/empty_suffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/apps/IterateUnifiedResources", "TestAutoProtocolDetecti", "github.com/gravitational/teleport/lib/services::TestFanoutV2StreamOrdering", "TestCircuitBreaker_afterExecution (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/IAM_Tags/extra_tags_in_aws_resource", "github.com/gravitational/teleport/lib/multiplexer::FuzzProxyLine_Bytes", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//4", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/pop_unknown_iid/mcp.RequestId#02", "TestMakeServersHiddenLabels (0.00s)\\n\"}", "TestListReleases/empty_response (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsSSHDeviceVerified//nok:_missing_CredentialID", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_match_match}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/login_rule", "github.com/gravitational/teleport/lib/auth/userloginstate::TestGitHubIdentity", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/valid_role_arn__in_correct_partition_and_account", "TestJSON/session_network_event (0.00s)\\n\"}", "TestCredentialRPID/login_writes_crede", "TestNewFromConfig/\\\"yes\\\"_disables_FIPS", "TestParseReviewDayOfMonth (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMaxVersions/newer_pre-releases_aare_no_ok", "github.com/gravitational/teleport/lib/utils::TestTrackingReaderEOF", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/name_&&", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt/no_fields", "github.com/gravitational/teleport/lib/events/athena::TestIntegrationAthenaSessionnEventsCRUD", "TestSanitize//.params (0.00s)\\n\"}", "TestConvertIAMv2Error (0.00s)\\n\"}", "TestClient_DialHost/connection_successfully_established_with_agent", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/auth_error/auth_error_auth", "github.com/gravitational/teleport/lib/utils::TestCollect", "github.com/gravitational/teleport/api/trail::TestConversion/LimitExceeded", "TestOpenTunnelRequest/missing_region (0.0", "github.com/gravitational/teleport/api/profile::TestRequireKubeLocalProxy", "TestVerifyAttestation_windowsHello (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGitServerWatcher", "TestUnifiedResourceCacheIter", "TestParser/unary_function_wrong_type (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestServersCompare/compare_DatabaaseServices", "github.com/gravitational/teleport/lib/utils/typical::Example", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_nomatch_nomatch}", "TestBasicFunctionality (0.06s)\\n\"}", "TestDatabaseFromRDSCluster/reader (0.00s)\\n\"", "TestKeyScan/invalid_type_int (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/backwards_compat_wwith_@teleport-actions/auth-k8s", "TestSearchSessionRange/missing_from (0.00s)\\n\"}", "TestUploadPart (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service", "TestParser/and_with_wrong_type (0.00s)\\n\"}", "TestKeyPrependKey/empty_key_is_prepended (0.00s)\\n", "TestParseShortcut/rts (0.00s)\\n\"}", "TestUserLoginStateUnmarshal (0.00s)\\n\"}", "TestStrongValidate/missing_prefix_rejected (0.00s", "TestClusterCredentials/no_tls_auth_info (0.00s", "TestRPCClientRequest (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/cloud_unlimited_should_allow_custom_weekdays", "Test_getWorkloadVersion/OK_regular_podSpec,_semver_tag_with_digest (0", "TestEvents/exec_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGitServer/expliccit_allow", "TestBackf", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/disallowed_admin_states", "github.com/gravitational/teleport/lib/accessmonitoring::TestCache", "TestFnCache_New/valid_ttl (0.00s)\\n\"}", "TestParseShortcut/usergroups (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_unset_nomatch}", "TestPollAWSS3/poll_s3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/DeleteRange", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/successfullly_read_proxy_v2_line_without_TLV", "TestCompareResources/IsEqual_equal (0.00s)\\n\"}", "TestServiceAccess/Update", "TestEvents/github.deleted_EventFields (0.00s)\\n\"}", "TestIteration/multiple_elements_", "TestValidateGlob/standard_literal (0.00s)\\n\"}", "TestIsHTTP/Accept_CONNECT (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_nomatch_nomatch}", "TestPoll/WithResults (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/lib/credentials::TestCheckExpiredCCredentials/Single_invalid_credential", "github.com/gravitational/teleport/lib/integrations/awsoidc/credprovider::TestCreddentialsCache/Retrieve", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/regexp_replace_wiith_variable_expression", "github.com/gravitational/teleport/lib/cloud/aws::TestAttachPolicy/AttachToRole", "TestEvents/db.session.mysql.statem", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_nomatch_unset}", "TestEvents/app.session.start_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/wworks_with_roles_with_regular_expressions", "TestConfig_Endpoint/with_grpc_scheme (0.", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerForCluster/api_returnns_an_empty_list_of_proxies", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/proxy_line_with_non-teleport_TLV", "TestResourcePresenceReportSp", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/missing_region", "TestIsUserFunctions/IsLocalUser/remote_user (0.00", "Test_parseRedisURI/only_addres", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[update]", "TestParseShortcut/apps (0.00s)\\n\"}", "TestCredentialBackupFlags (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestJSON/MySQL_statement_send_long__data", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/no_region", "TestParseAdvertiseAddr/ipv6_address_and_port (0.", "TestEvents/mfa.add_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/when_role_max_duration_is_not_set:_requestedMaxDuration_is_respected_when_\\u0033c_defaultSessionTTL", "TestCheckAccessT", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille/reconciliation_faces_conflict_on_first_try,_should_retry_but_context_is_expireed_so_it_bails_out", "github.com/gravitational/teleport/lib/utils::TestContainsExpansion/escaping_and_eexpansion", "github.com/gravitational/teleport/lib/services::TestValidateSPIFFEFederation/faill_-_wrong_version", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseDBURI//clusters//foo/kubes/kube", "TestConnectorKInitCli", "TestEvents/unknown_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.parse_OneOf", "TestEvents (0.01s)\\n\"}", "TestCLIPrompt/OK_prefer_webauthn_over_sso (0.0", "TestServiceAccess (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestManagedSQLListAll", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/get", "github.com/gravitational/teleport/lib/events::TestEvents/sigstore_policy.delete_OOneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_match_unset}", "TestSystemdUnitSchedule (0.00s)\\n\"}", "TestGetServerUUID/returns_root_", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/invalid_random_id_-_contains_another_host", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt", "TestBundleSet_Equal/bundle_s", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/non-amazonaws.com_domain", "TestAtomicWriteShim/Items/ascen", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS/Empty_proxyy_list_returns_empty_string", "TestCheckAccess/non-ok", "TestAccessListMemberDef", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/fails_if_non-slugged_jwt_is_used_with_idp", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/devicetrust::TestPlatformAttestationProto", "TestValidateSigstorePolicy", "TestParse/file://host/path (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/genmap::TestBackground", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceRequuest/no_deployment_mode", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/destination_with_dduplicate_config_types", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.close_EventFields", "Test_Ve", "github.com/gravitational/teleport/lib/services::TestApplyTraits/logins_substitutee_in_allow_rule_with_regexp", "github.com/gravitational/teleport/lib/cloud/aws::TestAttachPolicy", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_nomatch_unset_match}", "TestGetResourcesWithFilters/Node (0.12s)\\n\"}", "TestListServers/list_all_MySQL_servers (0.00s)\\n", "TestSQLMan", "github.com/gravitational/teleport/lib/web/ui::TestSortedLabels/database_with_azurre_labels_pushed_to_back", "TestEvents/db.delete_EventFields (0.00s)\\n\"}", "TestPageRequestToken/zero_value_is_valid", "TestMemory/QueryRange (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureDBServeerFetchers/skip_unavailable", "TestMatchResourceByFilters/db_server (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestDesktopDirectorySharing/singlle_role,_explicitly_disabled", "TestPing (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestJoin/multi_segment", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasks/verbs=[read_list]", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/json/component", "TestMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/inventory/internal/delay::TestJitter", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/http://sptest.iamshowcase.com/acs", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync/RReadTimeout", "TestMakeDatabaseSupportsInteractive (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/RollbackAutoUpdateAgentGroup", "TestSearchSessionRange/to_in_the_future (0.00s)\\n\"", "FuzzFetchMySQLVersion/seed#5 (0.00s)\\n\"}", "TestAuthPOST/success (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/utils/typical::TestParser/argument_is_expreession_returning_wrong_type", "github.com/gravitational/teleport/api/types/accessgraph::TestPrivateKey/valid_prootected", "TestIsUserFunctions/IsRemoteUser/system_user (0.", "TestEC2URLs/url_for_ec2_resource (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestFnCacheContext", "TestRouter_DialWindowsDesktop (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client/webclient::TestParse/example.com:4433", "github.com/gravitational/teleport/lib/release::TestListReleases", "github.com/gravitational/teleport/lib/backend::TestKeyPrependKey/base_with_leadinng_separators", "TestValidateSigstorePolic", "TestLoginFlow", "github.com/gravitational/teleport/lib/services::TestPresetRolesDumped", "TestSPIFFESVIDOutput_CheckAndSetD", "TestMinVerWithoutPreRelease/compare_", "TestMakeD", "TestJoinServiceGRPCServer_RegisterUsi", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabasesFromDDocumentDBCluster/primary-only", "TestEvents/sftp_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_nomatch_match_unset}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenSource_GetIDTokeen/tagged/value_present", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationTunnelService_CCheckAndSetDefaults/listen_not_url", "TestIssueAndVerifyJoinState/invalid_count (0", "TestSessionWriter/SetsEventDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/moderation::TestSessionAccessStart/succceedDiscardPolicySet", "github.com/gravitational/teleport/lib/backend::TestSanitize//namespaces/./params", "TestConfig_Check", "Test_parseRedisURI/IP_address_passes (", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//upsert_no_update_access", "TestGetAllowedLoginsForRe", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_nomatch_match}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/no_curly_bracket__suffix", "github.com/gravitational/teleport/lib/backend::TestWatcherCreationGracePeriod", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/NotRequired/verbs=[]", "TestDefaultTags/iam_tags (0.00s)\\n\"}", "TestIsSSHDeviceVerified/nok:_mi", "Test_parseRedisURI/inco", "TestEvents/db.session.postgres.stateme", "github.com/gravitational/teleport/lib/utils::TestShuffleVisit", "github.com/gravitational/teleport/lib/services::TestValidateAccessRequestClusterNNames/remote_cluster_is_requested", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/when_role_max_duration_is_not_set:_requestedMaxDuration_is_ignored_if_>_deefaultSessionTTL", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/whitespace_ttrim", "TestServiceAccess/CreateDatabaseObj", "github.com/gravitational/teleport/lib/cryptosuites/internal/rsa::TestPrecomputeMoode", "TestReconciler/new_non-m", "TestApplyTraits/impersonate_roles (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/defaullt", "FuzzParseDisplay/seed#5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestResourceMatchersToTypes/multiiple_elements", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/RandomState", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync", "TestAuthConfig/GCP_IAM_Auth (0.80s)\\n\"}", "TestChallengeValidator_Vali", "TestClient_DialCluster (0.01s)\\n\"}", "TestAccessRequestWatcher (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAssertAccessRequestImplementsRessourceWithLabels", "TestParseDestination/missing_path_wi", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:NotRequired,verbs:[]", "github.com/gravitational/teleport/lib/utils/aws::TestIsRoleARN/valid_partial_arn", "TestMCPToolMatcher/deny_literal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_match_unset}", "TestKeyPrefix/prefix=/teleport (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//failure_ipv6->ipv4_downgrade,_pseudo_source_address_does_not_match_signed_iipv6", "Test_basic", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_computeRolloutStatte/one_group_done", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/codes.Cannceled_error", "TestSearchEventsLimiterConfig/valid_config (0.00s", "TestMux/ProxyLines/PROXY_protocol_v1 (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/ECS_Tags/missing_one_of_the_labels_should_return_false", "TestAuthPreferenceValidate/sta", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/events::TestEvents/user.update_OneOf", "github.com/gravitational/teleport/lib/events::TestEvents/github.updated_OneOf", "TestServiceAccess/GetAutoUpdateConfig/allowed_admin_states/MFAVeri", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/implicit_alllow", "TestDraftExternalAuditSt", "github.com/gravitational/teleport/lib/events::TestEvents/plugin.create_OneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_match_match_match}", "TestConvertUsageEvent/disco", "github.com/gravitational/teleport/api::TestSemVersion", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_sso", "TestNewDatabaseFromAzureSQL", "TestIsEnabled/truthy_value_returns_true (", "TestCheckAzureIdentities/no_access_role (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/allow_wildcard_request_when_deny_is_not_matched", "FuzzParseRedisAddress/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenSource_GetIDTokeen/untagged", "TestIsKnownRegion (0.00s)\\n\"}", "TestProjectIDFromServiceAccoun", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_hardware_key_touch_and_pin,_MFA_verified", "TestProtoStreamer/small_load_test", "github.com/gravitational/teleport/lib/events::TestEvents/kube.update_OneOf", "github.com/gravitational/teleport/lib/client/escape::TestBufferOverflow", "TestVerifyPassword/password_just_right (0.00s)\\n\"}", "TestPostgresRecording/queries_with_errors (0.00", "TestGKEFetcher (0.00s)\\n\"}", "TestRDSFetchers/fetch_all (0.01s)\\n\"}", "TestPoll/NoVmsFeats (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/jwt::TestKeyIDHasDistinctOutputForDifferinggInputs/ECDSAP256", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/non-v2_version", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{nomatch_unset_unset_match}", "Test_userLockedError_IsUserLocked (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/access_to_create_discovery_configs", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt/missing_EC2Address", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher/fetch_all", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertAuthPreference/oss_hardware_key_policy", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialAssertionn_Validate/assertion_without_challenge", "FuzzParserEvalBoolPredicate/seed#40 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestMySQLFlexClient/List/All", "FuzzParseDisplay/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::Test_basicHTTTPMaintenanceClient_Get", "TestConversionF", "TestUpdateAppU", "TestServiceAccess/UpsertAutoUpdateAgentRollout/a", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/NotRequired/verbs=[create]", "TestMemory/Mirror (3.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_unset_unset_unset}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_computeRolloutStatte/every_group_done", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##39", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthenticate", "TestEvents/db.session.end_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/utils::TestParse", "TestConnNetTest/FirstConnSync/ReadTimeout (0.0", "TestLabelExpressions/label_inequality (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#35 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/update_success", "github.com/gravitational/teleport/lib/accesslists::TestAccessListValidateWithMembbers", "TestMemory/Items/ascending_order", "FuzzParserEvalBoolPredicate/seed#22 (0.00s)\\n\"}", "TestServiceAccess (0.07s)\\n\"}", "TestFunc (0.00s)\\n\"}", "TestIsALPN", "TestAccessMonitoringRuleCRUD/denied_access_to_read_Acce", "TestParseShortcut/db_services (0.00s)\\n\"}", "TestRotateCertAuthority/success (0.00s)\\n\"}", "TestIsRoleARN/invalid_value (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRequest/resiign_azure_JWT/NOK_signed_by_unknown_key", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups_different_days,_hour_diff_==_wait_hours", "TestTunnelAddr (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/ui::TestMakeAppTypeFromSAMLApp", "github.com/gravitational/teleport/lib/utils/proxy::TestDialProxy/http", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/error_in_mappiing_traits", "TestSortedLabels/Server_with_gcp_labe", "github.com/gravitational/teleport/lib/itertools/stream::TestSkip", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/verify_coverage/UpsertUserTask", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/exists()", "TestComputeMinRolloutTime/two_groups,_same_day,_different_start_hou", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_unset_nomatch}", "TestLoginFlow_Finish_errors/NOK_empty_resp", "TestEvents/cluster_networking_config.updat", "FuzzProxyLine_Bytes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/segment_with_trrailing_symbol", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime/two_groups_different_days", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__CREATE_DB", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/upsert", "FuzzReadProxyLineV1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_unset_nomatch_match}", "FuzzParsePacket/seed#21 (0.00s)\\n\"}", "TestMarshalNotificationRoundTrip (0.00s)\\n\"}", "TestCheckAccessToServer/MFA_an", "github.com/gravitational/teleport/lib/services::TestReconciler/new_matching_resouurce_should_be_registered", "TestPolicyAndResourceScope/simple_root_resou", "TestFormatResult (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyHasSuffix", "github.com/gravitational/teleport/api/internalutils/stream::TestMergeStreams", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/utils::TestNewCircularBuffer", "github.com/gravitational/teleport/lib/auth/crownjewel::TestValidateCrownJewel/MisssingMatchers", "TestHandler_getToken/base_case (0.00s)\\n\"}", "TestCollectPages/error-case (0.00s)\\n\"}", "TestMatchResourceByFilters_Helper (0.01s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#32 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/autoupdate::TestInstallFlagsYAML/extra", "TestAuditMarshaling (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_match_match}", "github.com/gravitational/teleport/lib/utils/aws/iamutils::TestNewFromConfig/fips", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsRemoteUser/loccal_user", "TestWatcherWithDynamicFetchers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/missing_user_before_@", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/filenamme_with_timestamp", "TestEnsureSCIMEndpoint/non_ht", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/invalid_keyyset", "github.com/gravitational/teleport/lib/events::TestEvents/sftp_summary_EventFieldss", "github.com/gravitational/teleport/lib/backend::TestReporterTopRequestsLimit", "github.com/gravitational/teleport/lib/services::TestKubeResourcesMatcher", "TestOIDCAuthRequest_Check (0.00s)\\n\"}", "TestNewDialBackground (3.03s)\\n\"}", "TestFileReader (0.01s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestMemberFrommProtoNils/spec", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_match_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check/TTL_ignnored_without_cert", "TestGenerateHostCert/success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/Unauthorized/verbs=[list]", "TestEKSIAMConfigOutput (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestHasDeviceTrustExtenssions/nok:_missing_AssetTag", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/different_name", "github.com/gravitational/teleport/api/client/proxy::TestClusterCredentials/no_tlss_auth_info", "TestRedisClient (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.directory.share__EventFields", "Test_canStartHaltOnError/s", "TestWriteClusterSSHConfig/legacy_OpenSSH (0", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestElastiCacheFFetcher/skip_unsupported", "TestWindowsDesktopGroups (0.00s)\\n\"}", "Test_transport_with_integration (0.01s)\\n\"}", "TestConvertIAMv2Error/resource_already_exis", "TestSendSSHPublicKeyRequest/mis", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/databases/resource_iterator/descending", "TestCertificateVerification/server_n", "TestValidateDatabase (2.67s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAccessCheckerWorkloadIdentityy/labels_role,_labels_wi", "TestCheckAccessToUserGroups/deny_labels", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.opensearch.reequest_OneOf", "TestServiceAccess/UpsertAutoUpdateAgentRollout/allow", "TestHeapBasics (0.00s)\\n\"}", "TestServiceAccess/UpsertVnetConfig/allowed_admin_states/NotR", "TestEvents/privilege_token.create_EventFields", "TestCheckKubeGroupsAndUsers/prod_limited_a", "TestEvaluateCondition/does", "TestIdentityCenterAccountAssignm", "TestIsPermanentEmitError/agg_badP", "github.com/gravitational/teleport/lib/services::TestParseShortcut/auth_server", "github.com/gravitational/teleport/api/internalutils/stream::TestOnceFunc", "TestRouter_DialHost/failure_looking_up_cluster", "TestCheckAccoun", "TestDialResponseOKEncoding (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Registering", "github.com/gravitational/teleport/lib/msgraph::TestIterateUsers_Empty", "github.com/gravitational/teleport/lib/cloud/aws::TestGetPolicyVersions/PolicyMatcchLabels", "github.com/gravitational/teleport/lib/services::TestParseShortcut/semaphore", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.clipboard.send_OOneOf", "TestCheckAccessToDatabaseService (0.00s)\\n\"}", "TestCheckSPIFFESVID/explicit_deny_-_id_path (0", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/queries_wiith_line_spacing", "TestRDSDBProxyFetcher/f", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#8", "github.com/gravitational/teleport/lib/services::TestValidateRole/invalid_role_conndition_login_syntax", "github.com/gravitational/teleport/lib/inventory::TestInstanceHeartbeat_Disabled", "Test_s", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateClusterNetworkingConfig", "github.com/gravitational/teleport/lib/devicetrust/authz::TestHasDeviceTrustExtenssions/nok:_missing_CredentialID", "TestAuthorizedKey (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestLockWatcherStale", "TestGlobMatch/exclusive_child_glob_mismatch", "TestRoles/FindRoleByARN/not_found (0.00s)\\n\"}", "TestSet/remove/from_populated_set_(present) (0.00", "github.com/gravitational/teleport/lib/kube/token::TestGetTokenAudiences/broken_tooken", "github.com/gravitational/teleport/api/client::TestEventEqual/empty_not_equal", "github.com/gravitational/teleport/lib/cloud/azure::TestGetScaleSetVirtualMachine//client_error", "TestCredentialBackupFlags/register (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestSliceMatchesRegex", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags", "TestAccessMonitoringRuleCRUD/allowed_read_access_to_Ac", "TestIDTokenValidator_ValidateWithJWKS", "TestSelectNextReviewDate/one_month,_l", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query,_fallback_to_full_range_after_not_enough_results_in_5_calls,_desc", "TestKeyCompare/empty_key_is_always_less (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/typical::TestParser/binary_function_wwith_map_lookups", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_443,_portName:_https", "github.com/gravitational/teleport/lib/jwt::TestExpiry/ECDSAP256", "TestMarshalPolicyDocument (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.start_OneOf", "github.com/gravitational/teleport/lib/events::TestEvents/lock.deleted_EventFieldss", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_states/Unau", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_match_unset}", "TestParseRegionFromOCID/ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.cassandra.reggister_EventFields", "github.com/gravitational/teleport/lib/services::TestValidateRole/unsupported_funcction_in_actions", "github.com/gravitational/teleport/lib/services::TestNewEnumerationResultFromEntitties", "TestInvalidDecompressPayloadSize (0.00s)\\n", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Include_and_Exclude_-_exclude_wins", "github.com/gravitational/teleport/lib/services::TestCanCopyFiles/true_and_false", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_match_unset}", "TestVarValidation/variable_not_found (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/github", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerified/verbs=[read_lisst]", "TestParsePacket/COM_STMT_FETCH (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[read]]", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/duration_too_long", "TestSessionAccessJoin/failRole/k8s (0.00s)\\n\"}", "TestParseShortcut/user_groups (0.00s)\\n\"}", "TestEvents/saml.deleted_OneOf (0.00s)\\n\"}", "TestMatch/not_a_boolean_variable (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestNew/fail_to_dial_with_no_addresss_or_dialer.", "github.com/gravitational/teleport/lib/services::TestMarshalUserTaskRoundTrip", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/NotRequired/verbs=[]", "TestIsRDSInstanceSupported/suppor", "TestRequestFilterMatching (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/reset_password_token.creeate_EventFields", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/pop_unknown_iid/mcp.RequestId", "TestEvents/plugin.update_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequired/upgraade_not_required_(other_handshake_error)", "TestAttachPolicy/AttachToRole (0.00s)\\n\"}", "TestMatch/no_curly_bracket_suffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericCRUD", "github.com/gravitational/teleport/lib/utils::TestOverwriteFile", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_match_unset_unset}", "TestSt", "github.com/gravitational/teleport/lib/services::TestCompareResources", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/invalid-dataabase-assume-role-arn-account-id-mismatch", "TestValidateSigstorePolicy/invalid_kind (0.00s)\\n\"", "Test_newUnstartedWorker/enabled (0.00s)\\n\"}", "TestSlogTextHandlerComponentPadding/", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureRedisFeetchers", "TestFilterSAMLEntityDescriptor/binding_fi", "TestNewDatabaseFromAzureSQLS", "TestSanitize//namespaces/../params (0.00s)\\n\"}", "FuzzNewExpression/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/ui::TestMakeGitServer", "TestKernelVersion/4.19.72-25.58.amzn2.x86_64 (0.", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/NotRequired", "TestResumption/mux/plain_SSH (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestSanitize/0", "TestEvents/okta.user.sync_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_request.uppdate", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay/seed#11", "TestMultiIntervalReset (2.01s)\\n\"}", "TestRegister_rollback (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbName/returns_leaaf_cluster_db_name", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfigReqDeefaults/missing_integration_role", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/partial_match_is_no_match:_search", "TestAccessRequest (0.50s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_match_match}", "github.com/gravitational/teleport/lib/utils/typical::TestParser/unknown_variable", "TestCLIPrompt/OK_webauthn_with_per-sessio", "github.com/gravitational/teleport/lib/events::TestConcurrentStreaming", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[]", "TestEvaluate_Err", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/normaal_request", "TestServiceAccess/UpdateAutoUpdateVersion/disallowed_admin_states/Unaut", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsKube", "TestCollectedEventsMetadataMerge (0.00s)\\n\"}", "TestNewS3V2FileWriter (0.01s)\\n\"}", "TestAccessChec", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/fielld_with_a_dot_in_its_name", "FuzzTraitsExpressionParser/seed#7 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestComputeMiinRolloutTime", "TestDestinationFromURI/kubernetes-", "github.com/gravitational/teleport/lib/services::TestRoleMap", "FuzzParsePacket/seed#6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/session.rejected", "TestEndpoints/without_fips (0.00s)\\n\"}", "TestVariableDurationScaling/sta", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestGetInstanceInfo/all_fields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/query_on_tiime_range_DESC_with_keyset", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_unset_match}", "TestEKSURLs/url_for_eks_agent_not_connecting", "TestHasDeviceTrustExtensions/n", "TestPrivateKey/valid_file (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/sftp_summary_OneOf", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_create_node_event", "TestParse/example.com (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust::TestHandleUnimplemented/trace..NotImplemented", "TestRetry/non-retriable (0.00s)\\n\"}", "TestDatabasePermission (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/duration_too_short", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/missing_ssm_document", "TestProxy (0.06s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/no_loginss_means_no_access", "TestMarshalPolicyDocument/marshal_wit", "TestHostUsers_HostSudoers (0.00s)\\n\"}", "TestIsEnabled/falsy_value_returns_false (", "TestParseReviewFrequency/6_m (0.00s)\\n\"}", "TestStdioHelpers/client_initialize (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerINFO", "TestProxyJumpParsing/\\\"bob@host\\\" (0.00s)\\n\"}", "FuzzParseRefs/seed#7 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/remmote_app,_redirect_to_app_public_addr,_preserve_query_params", "github.com/gravitational/teleport/lib/resumption::TestResumption/mux/expecting_SSSH_version_identifier", "github.com/gravitational/teleport/lib/utils::TestProxyJumpParsing", "TestClusterExternalAuditStorage", "TestNewAppV3/aws_app_CLI_only (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/IAM_Tags", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/Unauthorized/verbs=[]", "TestServiceAccess/CreateCrownJewel/allowed_admin_states/NotRequired", "TestVerifyAttestation/O", "TestDestinationFromURI/file://host/abso", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_CheckAndSeetDefaults/stable/cloud_and_default_set", "TestRolesForResourceRequest (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/skip_danngerous_lowercase", "TestCreateSigned", "github.com/gravitational/teleport/lib/healthcheck::Test_newUnstartedWorker/disablled", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin/NOK:_Origgin_without_host", "TestCheckAzureIdentities/readonly_ro", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/ccluster_name_must_match", "github.com/gravitational/teleport/lib/events::TestEvents/auth_OneOf", "github.com/gravitational/teleport/api/internalutils/stream::TestRateLimitFailure//limiter-graceful", "TestCheckAccessWi", "TestEvents/auto_update_config.delete_EventF", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/mattches_all_user_traits", "TestServiceAccess/", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/UpsertAutoUpdateAgentRollout", "github.com/gravitational/teleport/lib/client/mcp/claude::TestFileConfig_fileNotExxists", "TestGetMode/config_enables,_version", "TestCredentialCreation_Validate/", "TestBundleSet_Equal/bundle_set_2_equal", "TestAWSSignerHandler/DynamoDB_", "TestUpdateClusterNetwo", "TestEvents/windows.desktop.session.end_OneOf (0", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/equals(health.status,_\\", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[delete]", "FuzzProxyLine_Bytes/seed#3 (0.00s)\\n\"}", "TestKeyAppendKey/empty_key_is_appended (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.debug_EEventFields", "TestAddRoleDefaults/nothing_added (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/invalidd_GCP_IP_Type/check", "github.com/gravitational/teleport/lib/config/openssh::TestWriteSSHConfig", "TestRBAC/get_no_access (0.03s)\\n\"}", "TestGetAWSPolicyDocument/aws-rds-proxy (0.", "github.com/gravitational/teleport/lib/services::TestParserHostCertContext/simple", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetClusterURI//clusteers/cluster.sh", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsTLSDeviceVerified//nok:_missing_AssetTag", "github.com/gravitational/teleport/lib/web/ui::TestMakeDatabaseConnectOptions/namees_wildcard", "TestResourceARN/role (0.00s)\\n\"}", "TestServiceAccess/ListDatabaseObjects/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/utils::TestSet/iteration/with_populated_sett", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_match_nomatch_match}", "Test_isJSONCompact/not_compact (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#39 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[update]", "TestPostgresRecording/queries_with_line_s", "TestParser/unary_variadic_function (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestListServers/list_PostgreSQQL_servers_in_a_resource_group", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/poiinter_to_non-empty_struct", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states", "github.com/gravitational/teleport/lib/utils::TestSet/add", "TestServiceAccess/UpdateAutoUpdateConfig/allowed_admin_states/NotRe", "TestNewScanner/skip_test_dir_keys (0.03s)\\", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/update/nonn-okta_service_updating_an_okta_user_is_an_error", "TestMajorSemver/incorrect_version_is_rejected (", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/spec", "github.com/gravitational/teleport/lib/auth/webauthn::TestPasswordlessFlow_Finish__errors/NOK_response_without_UserID", "TestListEC2/pagination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_match_match}", "TestPostgresRecording/skip_unexpect", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/allowed_list_access_to_AccessMonitoringRulles", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/list_field", "github.com/gravitational/teleport/lib/hardwarekey::TestHardwareKeyAgent_Server", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_BeginFinish", "github.com/gravitational/teleport/lib/utils::TestContainsExpansion/escaping_is_hoonored#02", "TestListVirtualMachines (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/int_or_string_enum", "TestRegistrationFlow_credProps (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/ui::TestMakeUserGroups", "TestGetTokenAudience", "TestCheckAccessToAzureCloud/full_access_role", "github.com/gravitational/teleport/lib/services::TestParseShortcut/user_group", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors//NOK_empty_resp", "TestReconciler/non-matching", "TestDefaultPrompt_Prom", "TestRegistrationFlow_Begin_excludeList/MFA", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/one_nil,_one_non-nil", "github.com/gravitational/teleport/lib/auth/keygen::TestGenerateKeypairEmptyPass", "TestStaticHostUserCRUD/list (0", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/vallid_for_listing_instances_with_a_vpc_filter", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_unset_unset}", "TestAuthConfig/missing_GCP_connectio", "github.com/gravitational/teleport/lib/services::TestDatabaseMarshal", "TestHeadlessTable (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestFunc", "TestRolesForResourceRequest/no_allowed_roles", "TestNewAWSNodeFromEC2Instance (0.00s)\\n\"}", "TestVerifyTLSUser (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp/partial_conversionns_are_supported#01", "TestBotConfig_InsecureWithCAPath (0.00s)\\n\"}", "TestEvents/saml.updated_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.update_EventFields", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage", "TestTe", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestRepporter", "TestLimiter_StreamServerInterceptor (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel", "github.com/gravitational/teleport/lib/scopes::TestCompare/simple_ancestor", "github.com/gravitational/teleport/lib/events::TestEvents/lock.deleted_OneOf", "TestGetInstanceInfo/request_error (0.00s)\\n\"}", "Test_zipStreams_Process (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestJSON/MySQL_statement_prepare", "TestApplyTraits/AWS_role_ARN_substit", "github.com/gravitational/teleport/lib/utils::TestByteCount/1_byte", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestDatabasePermmissionMatch/mismatch:_object_without_labels", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_nomatch_match}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertSessionRecordingConfig/access_prevented", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstCalculateDatabaseNameFilter", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/codes.Unaavailable_error#01", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestParseMetadataClientErrror/non-JSON_response", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher//account_glob_nonmatch", "github.com/gravitational/teleport/lib/utils::FuzzParseProxyJump", "github.com/gravitational/teleport/lib/itertools/stream::TestMergeStreams", "TestNewAWSNodeFro", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/ap-southeast-1", "TestParsePacket/OK_HEADER (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestCaptureNBytesWriter", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/primary", "TestEvents/print_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode/config_enabbles,_no_version", "TestBootstrapInfra/ap-southeast", "github.com/gravitational/teleport/lib/autoupdate::TestInstallFlagsYAML/both", "TestEvents/user_task.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerified", "TestAddRoleDefaul", "github.com/gravitational/teleport/lib/services::TestWindowsDesktopGroups/one_grouup_denied", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_match_nomatch}", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLine", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_nomatch_unset}", "TestEvents/db.session.mysql.state", "github.com/gravitational/teleport/lib/services::TestReasonRequired/role_request:__do_not_require_reason_when__all__roles_do_not_require_reason_for__all__roles", "TestKeyPrependKey/base_with_leading_separato", "TestAccessCheckerKu", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents", "TestExhaustiveNonEmptyStruct/ign", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=/telepport/no_leading_separator_in_key", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query_should_not_be_triggered_if_time_between_ketset_and_end_of_range_is_\\u0003c_24h,_asc", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequiredByEnv//upgraded_not_required_(no_addr_match)", "github.com/gravitational/teleport/api/client::TestDynamicIdentityFileCreds", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[update_crreate]", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/equals(labels[\\", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject/empty_template_is_rejected", "github.com/gravitational/teleport/lib/services::TestMatchAndFilterKubeClusters", "github.com/gravitational/teleport/lib/services::TestThresholdReviewFilter", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/proxy.exammple.com:443", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFESVIDOutput_CheckAndSSetDefaults/missing_path", "TestMemory/Items/ascending_order (0.00s)\\n\"}", "TestParsePacket/not_enough_data_fo", "TestForceGroupsDone/no_groups_in_rollou", "TestEvents/desktop.clipboard.receive_OneOf (0.00s", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV8:__cluster-level_MFA_denies_unverified_MFA", "github.com/gravitational/teleport/lib/srv/server::TestSSMInstaller/ssm_run_failedd_in_run_shell_script", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialSite/failure_to_dial__local_site", "TestValidateAccessMonitoringRule/in", "TestServiceAccess/UpsertAutoUpdateAgentReport/allowed_admin_states/NotR", "TestRemoveCredentialProcessByComment/matching_comment_but_no_profil", "github.com/gravitational/teleport/lib/events/athena::TestCollectedEventsMetadataMMerge", "FuzzNewExpression/seed#1 (0.00s)\\n\"}", "TestLoginFlow_scopeAndReuse/", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/UpsertAutoUpdateConfig", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.elastiicsearch.request", "github.com/gravitational/teleport/lib/utils::TestSet/union/populated_union_empty", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/non_https_scheme", "TestOktaCRUD/delete (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt/missing_region", "TestDynamicKnownType (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin/sseed#1", "github.com/gravitational/teleport/api/types/accessgraph::TestPrivateKey/invalid_ppublic_key_ode", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.bulk_execute_OneOf", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/apps/resource_iterator/ascending", "github.com/gravitational/teleport/lib/utils::TestMinVerWithoutPreRelease", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'different__expand_groups_can_be_referred'", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check/ConnecttorSpec_with_SSOTestFlow_works", "TestRoleParsing/test_case_'1' (0.00s)\\n\"}", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_attributesTToRolesParser_Set/one_set_of_correct_args", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestString//clusters/teleeport.sh/dbs/dbhost1", "TestStringOr", "github.com/gravitational/teleport/lib/services::TestValidateDatabase", "TestEncodeDecodeRequireMFAType", "TestIDTokenValidator_Validate/mismatche", "TestIDTokenSource_GetIDToken (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestSanitize//namespaces/.params", "TestValidateAsssignment/basic#01 (0.00s)\\n\"}", "TestOrdering (0.69s)\\n\"}", "TestIDTokenSource_GetIDToken/tagged (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstValidateDatabaseObjectImportRule/valid_rule", "TestAutho", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.drop_dbb_EventFields", "github.com/gravitational/teleport/lib/web/app::TestHasName/OK_-_adds_paths_with_aampersands", "TestApplyTraits/values_are_expanded_in", "TestReporter/pre-assert_error (0.02s)\\n\"}", "TestNewIdPIAM", "TestFormatLabels/sorts_labels (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestWeakValidate", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states/NotRequired/verbs=[]", "TestLoginFlow_userVerification/v", "TestUsageReporterDiscard (0.00s)\\n\"}", "TestServiceAccess/ListDatabaseObjects/allowed_admin_states/Unauthoriz", "TestDateExporterResume/randomFlake=true (0.92", "github.com/gravitational/teleport/lib/services::TestApplyTraits/database_name/useer/role_internal_vars_in_allow_rule", "TestServiceAccess/UpsertVnetConfig_with_existing/allowed_ad", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_unknown_command_error/help_command", "TestDocumentSequenceInsertMultipleP", "TestMarshalUnmarshalAuditQuery (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestRemoveFromSlice/remove_a", "TestExhaustiveNonEmptyStruct/igno", "github.com/gravitational/teleport/lib/services::TestProxyWatcher", "TestRoleMap/test_case_'partial_match' (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/backwards_compat_wwith_https://goteleport.com/docs/enroll-resources/machine-id/access-guides/databaases/_-_tls", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestLogin/uv_discouraged,,_attachment_auto", "TestReadProxyLineV2/empty_line (0.00s)\\n\"}", "TestEvents/db.session.end_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/unauthenticated_pass_case", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/unmarshal/erroor_invalid_json", "github.com/gravitational/teleport/lib/services::TestUserLastSeenNotificationStateeRoundTrip", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestForceGroupsDone/grooup_already_done", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_match_nomatch_match}", "TestServiceAccess/UpsertAutoUpdateVersion/allowed_admin_states/Not", "TestHostUsers_getGroups/multiple_role", "github.com/gravitational/teleport/lib/srv/app/gcp::TestHandler_getToken/timeout", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/wrongly_signed_index", "TestVerifyAttestation/NOK_denied_devic", "TestGenerateReport_FailedCheck (0.05s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGitServer", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertSessionRecordingConfig/no_admin_action", "TestConfig_Endpoint/file_exporte", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers//fetch_all_with_assume_role", "TestCollectPages/basic-depagination (0.00s", "TestTrackingReaderEOF (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/desktops/resource_iterator/descending", "TestPruneRequestRoles/db_request (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/missing_integration_name", "github.com/gravitational/teleport/lib/utils/parse::TestMatchers/prefix/suffix_mattcher_positive", "github.com/gravitational/teleport/lib/proxy::TestCheckedPrefixWriter/success", "TestFilterItem", "github.com/gravitational/teleport/lib/utils/sortmap::TestWrites", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/invalid_file_returns_an_error", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_nomatch_nomatch_nomatch}", "TestNonceParallelism (0.05s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode/config_susppends,_version_disables", "TestMergeStreams/interlaced_streams (0.00s)\\n\"", "TestFilterItems/Filter_by_Name (0.00s)\\n\"", "TestDeduplicateKey/EmptySlice (0.00s)\\n\"}", "TestConfig_SetFromURL (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/cloud/azure::TestManagedSQLListWithinGroup//empty_list", "github.com/gravitational/teleport/lib/utils/parse::TestMatchers/regexp_matcher_neegative", "github.com/gravitational/teleport/lib/services::TestExtractConditionForIdentifierr", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/role_max_duration_is_respected_when_requestedMaxDuration_is_not_set", "TestEvents/aws_identity_cen", "TestConfig_SetFrom", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/bad_regexp", "TestRBAC/get_no_secrets (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestUpsertCertAuthorityy/create_ca", "TestEventField_Schemas/integer (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#15", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/label_equaliity", "TestIdPIAMConfigReqDe", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/first_group_done,_second_should_activate,_third_should_not_progress,_witth_reports", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields", "TestIteration/single_element (0.00s)\\n\"}", "TestNewAppV3/aws_app_using_integration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse", "TestBackfillFeatures (0.00s)\\n\"}", "TestIsHTTP/Accept_PUT (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_unset_match}", "github.com/gravitational/teleport/lib/events::TestEvents/integration.create_OneOff", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateAuthPreference/unauthorized", "TestConversion/os.ErrNotExist (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMaxVersions/client_newer_than_maax_version", "Test_parseRedisURI/correct_host:port (", "github.com/gravitational/teleport/lib/ui::TestMakeLabels/Single_map_single_label__case", "github.com/gravitational/teleport/lib/utils/pagination::TestPageRequestToken", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_foormat=packed_self-attestation", "TestServiceAccess/UpdateAutoUpdateConfig/allowed_adm", "TestCheckAccountI", "github.com/gravitational/teleport/lib/auth/webauthncli::TestToTouchIDCredentialPiicker/picks_middle_credential", "TestValidateSAMLIdPACSURLAndRelayStateInputs", "TestPruneRequestRoles/root_login_unavailable", "TestEvents/session.disk_EventFields (0.00s)\\n\"}", "TestParseShortcut/connectors (0.00s)\\n\"}", "TestNewScanner/invalid_keys (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/services::TestValidateWorkloadIdentity", "github.com/gravitational/teleport/lib/tbot/config::TestConfigFile", "TestIdentityOutput_CheckAndS", "github.com/gravitational/teleport/lib/events::TestEvents/contact.create_OneOf", "TestRBAC/get (0.00s)\\n\"}", "TestOIDCGetRedirectURL/eu.proxy.example.co", "github.com/gravitational/teleport/lib/utils::TestEquivalence", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey//use_RequireResidentKey_required_if_ResidentKey_empty", "TestManager/unsupported_target_reso", "TestNewDatabasesFromDocument", "TestFixed (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/user.login", "TestExtraElastiCacheLabels/no_reso", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/string_helpeers", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check/normal__request", "TestCheckKubeGr", "TestIPv6Fix/ipv4 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestReconncileResults/NoNewResults", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/iinvalid_instance_ID", "TestOutput/text/warn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/NotRequired", "TestRateLimitFailure/simultaneous (0.00s)\\n\"", "TestWindowsDesktopGroups/allow_expression (0.00s", "github.com/gravitational/teleport/lib/services::TestParseShortcut/kube_cluster", "TestServiceAccess/v", "FuzzReadAndRewriteXAuthPacket/seed#1 (0.00s)\\n\"}", "TestStringOrMap/unmarshal/wildc", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed", "github.com/gravitational/teleport/lib/events/athena::TestPublisherConsumer/large__via_s3", "github.com/gravitational/teleport/lib/utils::TestSet/add/to_empty_set", "TestCreateSession/check_defaults", "TestKubeResourceCo", "github.com/gravitational/teleport/lib/utils/log::TestValidateFields/valid_keys", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_unstarted_->_active", "TestCheckAccessWithLab", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#14", "TestValidateSigstorePolicy/invalid_version (0.0", "TestGetVirtualMachine/invalid_resource_ID (0.", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestRemoveCredentialProccessByComment/matching_comment_but_no_profile_using_credential_process", "TestServiceAccess/UpdateVnetConfig/allowed_admin_states/MFAVerif", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/root-like_segmeent", "TestUserPreferencesGet (0.00s)\\n\"}", "TestRouteScoring/ambiguous_ip_dial (0.00s)\\n\"}", "TestGuessesIPAddress/ignores_IPv6 (0.00s)\\n\"}", "TestConversionFromProto_ni", "TestSSHProxyHostPort/TLS", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_regex_expression_deny_and_applies_to_all_pods", "github.com/gravitational/teleport/lib/services::TestOktaImportRuleUnmarshal", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_unset_nomatch}", "github.com/gravitational/teleport/lib/events::TestSessionWriter", "TestEvents/health_check_config.create_OneOf (0.0", "TestCLIPrompt/OK_empty_challenge (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParse//clusters/foo", "github.com/gravitational/teleport/lib/services::TestAzureIdentityMatcher_Match/deeny_matches_wildcard", "TestSQLManagedS", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_command_help/help_flag", "TestReplaceRegexp/partial_conversions_", "TestConvertAuditEvent/DatabaseUserC", "TestIsRoleARN/invalid_partial_arn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestOIDCCheckAndSetDefaults/invallid_claims_to_roles", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfig/account_does_not_match_expected_account", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/\\", "TestValidateSigstorePolicy/empty_keyles", "TestRouter_DialWindowsDesktop/dial_success (0.00s)", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/botth_sets_are_empty", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/number_field", "TestNewResourceExpression/fail_to_parse/\\u0", "TestAccessMonitoringRuleCRUD/access_to_delete_AccessMonitorin", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states", "TestDeleteAllAccessLists (0.04s)\\n\"}", "TestJSON/rejected_port_forward (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/redis/connection::FuzzParseRedisAddrress/seed#0", "TestEvents/lock.deleted_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.mysql..statements.execute", "github.com/gravitational/teleport/lib/utils/log::TestOutput/json/warn", "TestEvaluateCondition/both_sets_are_empt", "TestRotateExternalCertA", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheConfigurationEndpointNameOverride/via_teleport.dev/database_name", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewMatcher/seed#1", "github.com/gravitational/teleport/lib/events/athena::Test_consumer_sqsMessagesColllector/verify_if_collector_finishes_execution_(via_closing_channel)_upon_ctx.Canncel", "TestGetKubeResources/labels_expression_allow", "TestMemory/WatchersClose (0.00s)\\n\"}", "TestCLIPrompt/OK_webauthn_with_PIN (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_nomatch_unset}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Cluster", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[]", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/apps/resource_iterator", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestDatabasePermmissionMatch/object_with_some_labels", "TestKeyIDCompatibility/ECDSA (0.00s)\\n\"}", "TestAddCredential", "TestKubeResourceMatc", "github.com/gravitational/teleport/lib/devicetrust/authn::TestCeremony_Run/macOS_ook", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/valid_role_arn", "TestSetEnvs (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_ValidateWithJWWKS/wrong_issuer", "TestCeremony_Run/linux_device_succeeds (0", "TestAtomicWriteSuite/NonConflicting (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestElastiCacheFFetcher/skip_unavailable_with_assume_role", "TestJoinServic", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__requires_MFA_and_MFA_verified#01", "TestSignAndVerify/RSA2048 (0.61s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestNewSliceErrors", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/sqlserver/default_endpoint", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/empty_reevision", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.delete_EvventFields", "github.com/gravitational/teleport/lib/versioncontrol/endpoint::Test_exportEndpoinnt/endpoint_value_already_configured", "TestEC2SSMIAMConfigReqDefaults/m", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay/seed#8", "github.com/gravitational/teleport/lib/services::TestOktaAssignmentWatcher", "TestAppPortsValidation/uri_specifies_port (0.00s)\\n", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSubnets/no_vppc_id", "github.com/gravitational/teleport/lib/authz::TestConnectionMetadata", "TestParseShortcut/cas (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGetServicePortss/One_supported_port,_one_unsupported_port", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey//discouraged_and_rrk=true", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenSource_GetIDToken", "TestFetchOraclePrincipalClaims (0.01s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/error_bbelow_limit_remain_in_standby", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateClusterNetworkingConfig/creation_prevented_when_proxy_peering_is_set_in_open__source", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_nomatch_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_nomatch_unset}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerifiedWithReuse/verbs==[list]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_nomatch_unset}", "TestGetServi", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_unset_unset}", "TestSlogTextHandlerRawComponent (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGenerateHostCert/suuccess", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/skip_danngerous_with_whitespace", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/verify_coverage/ListCrownJewels", "TestEvaluate_Errors/", "TestGetConfigIntegration/cached/wi", "TestParse//clusters/foo/leaves/bar/k", "Test_computeRolloutState/one_group_act", "TestSAMLAuthRequest_Check/TTL_ignored_w", "TestParseSignatureAlgorithmSuite/\\\"\\\" (0.00s)\\n\"}", "TestListEC2ICE/valid_but_ID_nee", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_Name/two_triggers", "TestAzureWatcher/filter_by_location (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceRequuest/fill_defaults", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftCluster/success_with_name_override_viaTeleportDatabaseName", "TestDatabasePermissi", "TestPageRequestToken (0.00s)\\n\"}", "TestEvents/db.create_OneOf (0.00s)\\n\"}", "TestAtomicWriteShim/Locking (0.30s)\\n\"}", "github.com/gravitational/teleport/lib/utils/typical::TestCachedParser", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/session.end", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/empty_agent_config", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/NotRequired/verbs=[]", "TestValidateReverseTunnel/empty_dial_address", "FuzzParsePacket/seed#9 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityJWTServicee_CheckAndSetDefaults/too_many_selectors", "TestKeyHasPrefix/equivalent_keys_are_prefix (0.", "github.com/gravitational/teleport/lib/observability/tracing::TestNewExporter/succcessful_http_exporter", "github.com/gravitational/teleport/lib/events/dynamoevents::TestEndpoints/fips_witth_env_skip", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialAssertionResponse_empty", "github.com/gravitational/teleport/lib/events::TestEvents/session.rejected_EventFiields", "TestRegistra", "TestMatchValidAzureIdentity/invalid_format_", "TestDatabaseFromMemoryDBClusterNam", "TestSessionAccessJoin/success (0.00s)\\n\"}", "TestCheckAccessWithLa", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_Endpoint//without_a_scheme", "FuzzParserEvalBoolPredicate/seed#18 (0.00s)\\n\"}", "TestAtomicWriteShim/KeepAlive (0.00s)\\n\"}", "TestConversionFro", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/events::TestEvents/access_graph.crown_jewell.create_EventFields", "github.com/gravitational/teleport/lib/events::TestEvents/okta.applications.updatee_OneOf", "github.com/gravitational/teleport/lib/integrations/externalauditstorage::TestBoottstrapInfra/ap-south-1", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/multicast_adddress#01", "TestEvents/db.session.user.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_match_unset}", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/OSS_and_nil_config", "TestRoundtrip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#9", "TestEvents/recovery_code.used_EventFields (0.00s)\\", "github.com/gravitational/teleport/lib/utils/typical::TestParser", "TestValidateRole/unsupported_s", "TestAtomicWriteShim/FetchLimit (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyPrependKey/base_without_leaading_separators", "github.com/gravitational/teleport/lib/events/athena::TestIntegrationAthenaSearchSSessionEventsBySessionID", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/wworks_with_roles_with_multiple_labels_that_role_shouldn't_access#01", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//create_ok", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenValidator_Validate//expired", "TestServiceAccess/UpdateAutoUpdateAgentReport/a", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestS", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_nomatch_nomatch}", "TestToGRPC_statusError (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/Azure_AAD_Auth/ApplyToPoolConfigs", "Test_zipStreams_Process/additional_leader (0", "TestEvaluateCondition/matc", "github.com/gravitational/teleport/lib/web/ui::TestCreateGitServerRequest_Check/miissing-github-spec", "github.com/gravitational/teleport/lib/services::TestCompareResources/cmp_equal_wiith_equal_IneligibleStatus", "github.com/gravitational/teleport/lib/utils::TestMajorSemver/ignores_suffix", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/literal_expresssion", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/traits_with_prrefix_and_suffix", "TestCheckAccessToDatabaseUser/(case-insensitive_db)", "github.com/gravitational/teleport/lib/proxy::TestGetServers/match_by_uuid", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/invalid_region", "TestAssertionInfo_RoundTrip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestIdentityOutput_CheckAndSettDefaults", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#16", "github.com/gravitational/teleport/lib/cloud/azure::TestManagedSQLListWithinGroup", "github.com/gravitational/teleport/lib/services::TestKubeResourcesMatcher/user_reqquests_a_valid_subset_of_pods_for_defaultRole", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/disallowed_admin_states", "github.com/gravitational/teleport/lib/jwt::TestKey_SignAndVerifyPROXY/ECDSAP256", "github.com/gravitational/teleport/lib/services::TestGetAllowedSearchAsRoles_WithAAllowedKubernetesResourceKindFilter/multi_match", "TestServiceAccess/GetAutoUpdateC", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_unset_unset_unset}", "TestIdentityCenterAccountMatcher (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/lib/credentials::TestCheckExpiredCCredentials/Valid_and_invalid_credential", "TestLogin_credentialPicker/unknown_u", "TestIsLeaf/root_cluster_resource_URI (0.00s)\\", "TestValidateTokenWithJWKS/no_issued_at (0.00s)\\n\"", "github.com/gravitational/teleport/lib/devicetrust/config::TestGetEnforcementMode//dt.Mode_empty", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/auth_error", "github.com/gravitational/teleport/lib/events::TestEvents/cert.create_EventFields", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialCreation.PublicKey_slice_elements_nil", "TestHandleAcce", "TestEvaluate_SigstorePol", "TestConversionFromProto_nil", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_unset_match}", "TestAuthorizeWithLocksForBuiltinRole/Auth (0.10s)\\n", "github.com/gravitational/teleport/lib/itertools/stream::TestRateLimit", "TestValidateToken/success (0.00s)\\n\"}", "TestNormalizeECSResourceName (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/auditor_(defaault_rules_match_preset_rules)", "TestUnifiedResourceCacheIte", "TestAppIsAWSConsole/Region_based_not_suppo", "TestStreams/Stream/Flaky=false,", "TestTrimToMaxSize/access_request.create (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/inventory/internal/delay::TestFixed", "TestEC2IsInstanceMetadataAvailable/", "github.com/gravitational/teleport/lib/observability/tracing::TestRotatingFileClieent/small_limit_forces_rotations", "github.com/gravitational/teleport/lib/services::TestOIDCUnmarshal/basic_connectorr", "github.com/gravitational/teleport/lib/backend::TestKeyTrimSuffix/empty_trim_trimss_nothing", "TestRouter_DialSite/unknown_cluster (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_match_match_unset}", "TestWorkloadIdentityMarshaling/normal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToAzureCloud/full__access_role", "Test_transport_rew", "TestUnmarshalAccessGraphSettings (0.00s", "TestValidateRole/missing_kind (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetAllowedSearchAsRoles_WithAAllowedKubernetesResourceKindFilter/wildcard_allow", "TestEvents/recovery_token.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestManagedSQLListWithinGroup//servers", "github.com/gravitational/teleport/lib/services::TestKubeServerWatcher", "TestEvents/db.session.mysql.drop_db_EventFie", "TestLogin_credentialPicker/MFA", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpdateUserTask", "TestGetConfigIntegration/", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationChheckpoint", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.sqlserver.rpcc_request_OneOf", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpdateDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[upddate]", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/literal", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServicesRequest", "github.com/gravitational/teleport/lib/utils::TestMinVerWithoutPreRelease/compare__lower_minor_versions", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDBService/rrecreate_everything", "TestEvents/cert.generation_mismatch_EventFie", "FuzzParsePacket/seed#16 (0.00s)\\n\"}", "TestMySQLFlexClient/List/All (0.00s)\\n\"}", "TestListDatabases/valid_for_listi", "TestEvents/kube.update_OneOf (0.00s)\\n\"}", "TestMakeDatabaseSupportsInteractive/unsuppor", "TestDatabaseFromRDSV2Instance (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerForCluster/valid", "TestEvents/spiffe.federation.delete_EventFie", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_nomatch_unset_match}", "TestValidateDatabase/invalid-database-CA-cer", "github.com/gravitational/teleport/lib/web/app::TestMakeAppRedirectURL/OK_-_add_rooot_path", "github.com/gravitational/teleport/lib/sshutils/sftp::TestHTTPUpload", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnrollEKSClusterss", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Cluster/primary", "TestEvaluate_Traits (0.00s)\\n\"}", "TestValidateResourceRequestSizeLimits (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestALPNDialer_getTLSConfig", "TestListServers/list_Postgr", "TestEvents/app.session.dynamodb.request_", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/all_fields_equal", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix", "TestGetKubeClientGetter/test#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/ui::TestCreateGitServerRequest_Check/fiield-too-long", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/invalid_characterrs", "TestParseDestination/no_login,_'@'", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate/empty_user_name", "TestGuessesIPAddress/prefers_10.0.0.0/8 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestIdentityOutput_CheckAndSettDefaults/ssh_config_mode_defaults", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::Test__copyAtMost/n_<_len(src)", "FuzzParseSigV4/seed#0 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[create]", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//upsert_no_create_access", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationOutput_CheckAnddSetDefaults/missing_destination", "TestCheckSPIFFESVID/explicit_deny_-_id_p", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestCloudProhibited/Clooud_prohibits_being_a_leaf_cluster_(CreateTrustedCluster)", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/MFAVerifiedWithReuse/veerbs=[create]", "TestFindMatchingProxyDNS/Exact_match (0.00s)\\n\"}", "TestParseReviewDayOfMonth/unknown (0.00s)\\n\"}", "TestParseRoleARN/valid_service_role_arn (0.00s)\\n", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestIsTracingSuppported/unsupported", "TestRenewableIdentity (0.00s)\\n\"}", "TestSQLListWithinGroup/servers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/inventory::TestGoodbye/goodbye_soft-reload", "TestDestinationFromURI/kubernetes", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsLocalOrRemoteUUser/local_user", "TestNewWebClientHTTPPr", "github.com/gravitational/teleport/lib/services::TestApplyTraits", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/auth_error/auth_error_auth", "TestEvents/okta.groups.update_OneOf (0.00s)\\n\"}", "Test_isJSONCompact (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestChain", "github.com/gravitational/teleport/api/internalutils/stream::TestRateLimitFailure//limiter-only", "TestRegistrationFlow_F", "FuzzParseWebLinks/seed#4 (0.00s)\\n\"}", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/1-leevel_object", "TestTrustedClusterRBAC/create_ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestGetLabelEngineVerrsion/missing_labels", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC", "TestVariable/non_existing_function (0.00s)\\n\"}", "TestGetLabelEngineVersion/ma", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/access_list_member_delete_event", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2/valid_forr_listing_instances", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/unauthenticated_pass_case/unauthenticated_pass_case_proxy", "TestCredentialRPID/register_writes", "TestToGRPC_statusError/wrapped_status (0.00s)\\n\"}", "Test_transport_rewriteR", "github.com/gravitational/teleport/lib/proxy/peer::TestInvalidFirstFrame", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams/StreamManyPParts/Flaky=false,ForceFlush=false", "TestKu", "TestEvents/github.created_OneOf (0.00s)\\n\"}", "TestParseAdvertiseAddr/ok_host_and_port (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/healthcheck::TestTarget_checkAndSetDefaultss/valid_target", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion", "TestParseReviewDayOfMonth/FiRSt (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client/proxy/transport/transportv1::TestCliient_DialHost/connection_successfully_established_with_agent_forwarding", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-dynamoodb-without-uri", "TestKeyPrefix/prefix=/tel", "github.com/gravitational/teleport/lib/scopes::TestCompare/simple_equivalence", "TestParser/equality_lhs_dynamic (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/challenge_response_error", "github.com/gravitational/teleport/lib/utils/parse::TestMatchers", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=apple_simple_check", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/primary#01", "TestPortRangesContains/15 (0.00s)\\n\"}", "TestDis", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_Endpoint", "TestSigstoreAttestorConfig_CheckAndSetDefaults/additional_r", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredPropsConversionns/CredentialCreation", "TestMatchers/prefix/suffix_matcher_positive", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[delete]", "github.com/gravitational/teleport/lib/events::TestEvents/device.enroll_EventFieldds", "TestWindowTrigger_", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestRollbackGroups", "TestGetDbName/returns_leaf_cluster_db_n", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:Unauthorized,verbs:[read]", "github.com/gravitational/teleport/lib/tlsca::TestKubeExtensions", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestValidateSServerSideAgentConfig/cloud_should_allow_long_rollouts_with_entitlement", "TestChainHTTPMiddlewares (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/default_port", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions/(exists(labels.env)_||_exists(labels.os))_&&_labels..os_!=_\\", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/&&", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/create/deny_rbac", "github.com/gravitational/teleport/lib/healthcheck::Test_dialEndpoints", "Test_setGroupStates/same_groups,_sa", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#10", "TestUnifiedResourceWatcher (0.07s)\\n\"}", "TestOpenTunnelRequest/missing_EC2Addr", "TestPruneRequestRoles/windows_request (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/health_check_config.creaate_EventFields", "github.com/gravitational/teleport/lib/services::TestCheckAccessToAWSConsole", "TestEvents/mfa.add_EventFields (0.00s)\\n\"}", "TestEvaluateCondition/matches_al", "TestAccessMonitoringRuleCRUD/access_to_upsert_AccessMonitorin", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[uppdate]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_match_nomatch}", "TestNewScanner/unencrypted_keys (0.06s)\\n\"}", "FuzzTraitsExpressionParser/seed#12 (0.00s)\\n\"}", "TestParser/indexing_non-map (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/invalid_profile_arn", "TestParseLegacyDynamoAttributes/null", "TestValidateGCPResourceName (0.00s)\\", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/no_alllowed_roles", "TestTimeout/good_proxy_client (0.02s)\\n\"}", "TestBasic (0.24s)\\n\"}", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestSetEnvs", "TestVariableDurationScaling (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/jwt::TestKeyIDCompatibility/ECDSA", "TestGithubAuthRequest_Che", "FuzzParserEvalBoolPredicate/seed#24 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestListServers/list_all_MySQLL_servers", "TestConfig_SetFromURL/complete_initiato", "Test_Channel_GetVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/resumption::TestResumption/mux/SSH_through__resumable_conn", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:MFAVerifiedWithReuse,verbs:[readd_list]", "github.com/gravitational/teleport/lib/events::TestEvents/auth_EventFields", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error/resource_aalready_exists#02", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille/reconciliation_has_nothing_to_do,_should_exit", "github.com/gravitational/teleport/api/trail::TestToGRPC_statusError", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_match_nomatch}", "TestCachingResolver (0.00s)\\n\"}", "TestHostUsers_CanCr", "github.com/gravitational/teleport/lib/services::TestReviewThresholds", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#7", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParse//clusters/foo/lleaves/bar", "github.com/gravitational/teleport/lib/services::TestCheckGCPServiceAccounts/denyiing_an_uppercase_role_works", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_unknown_command_error/help_flag", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/scope_too_long", "TestKeyTrimPrefix/non-matching_trim_trims", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbName/returns_emppty_string_when_given_root_cluster_URI", "TestEvents/app.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnmarshalPluginUnknownField/uunknown_field_in_plugin_spec", "Test_transport_rewriteRedirect (0.00s)\\n\"}", "TestValidateCrownJewel/NilCrownJewel (0.00s)\\n", "TestEvents/db.delete_OneOf (0.00s)\\n\"}", "TestTLSIdentity_roundtrip/nil-to-nil (0.00s)\\n\"}", "TestParser/negation_of_literal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_Name", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/muulti_user,_multi_credential,_explicit_user_(1)", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/NotRequired", "TestCredentialAssertion_Validate/ok (0.00s)\\", "TestEvents/trusted_cluster_token.create_OneOf", "TestCalculatePend", "TestStatic", "TestValidateGlob/valid_exclusive_child_glob (0.0", "TestDefaultTags/roles_anywhere_tags (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstCalculateDatabaseNameFilter/no_matching_rules/testdb", "github.com/gravitational/teleport/lib/events::TestEvents/db.delete_OneOf", "github.com/gravitational/teleport/lib/services::TestCheckOIDCIdP", "TestGlobIsSubjectToPolicyResourc", "Test_copyAtMost/n_<_len", "github.com/gravitational/teleport/lib/utils::TestGlobToRegexp/special_chars_are_qquoted", "TestGener", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/nil_errorr", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSDBProxyFeetcher/fetch_vpc1", "TestGetServicePorts/Empty_input (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/server::TestNewEC2InstanceFetcherTags/wwith_no_glob_key", "TestGetChartUrl (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/allow_namespace_request_when_deny_is_not_matched", "TestIDTokenValidator_Validate (0.18s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/bot.delete_EventFields", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeResourceNamesppace/returns_empty_string_when_given_leaf_cluster_URI", "github.com/gravitational/teleport/lib/services::TestApplyTraits/values_are_expandded_in_database_labels", "TestCreateSignedRequest (0.00s)\\n\"}", "TestKeyAppendKey/empty_append_is_noop (0.00s)\\n\"}", "TestNewDatabaseObje", "TestMatchResourceByHealthStatus (0.00s)\\n\"}", "TestRewriteRequest (0.00s)\\n\"}", "TestReplaceRegexp/regexp_wildcard_replac", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{unset_unset_match_unset}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/disallowed_admin_states", "TestRegisterDatabase/Tool (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestUpsertUser", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/no__region", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_two_roles,_1_exact_match,_one_can_create", "Test_propertyTable (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/non-okta_servicee_updating_okta_resource_is_an_error", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/valid_role_arn__in_different_account", "TestParser/integer_equality_(true) (0.00s)\\n\"}", "TestParseDestination/invali", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_empty_map_value", "github.com/gravitational/teleport/lib/multiplexer::FuzzProxyLine_Bytes/seed#0", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestIsInstanceMetadataAvaillable/on_mocked_gcp", "TestEnsureSCIMEndpoin", "TestNewResourceExpression/non_matching_expr", "TestAccessRequestCacheExpiryFiltering (0.00s)\\n\"}", "TestCertPoolFromCertAuthorities/ca2_with_", "github.com/gravitational/teleport/lib/srv/db/cassandra/protocol::FuzzReadPacket", "TestSet/remove/from_populated_set_(not_presen", "TestEvaluateCondition/match_at_least", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/not_a_boolean_expresssion", "TestMakeDatabaseConnectOptions (0.00s)\\n\"}", "TestGetCreateDatabaseCreateMode (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//notification_or_automatic_review_required", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/queries_wiith_errors", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_nomatch_nomatch}", "TestParser/expression_as_argument (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_GetUserMetadata/user_meetadata_for_bot", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/CreateUserTask/verbs=[create]", "TestSSHAccessLockTargets (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics/empty_slice", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestPPodmanAttestorConfig_CheckAndSetDefaults/unix_socket", "github.com/gravitational/teleport/lib/backend::TestKeyAppendKey/empty_key_is_appeended", "TestCheckAccessToSA", "github.com/gravitational/teleport/lib/httplib::TestOriginLocalRedirectURI/empty", "TestUnmarshalAccessGraphSetting", "github.com/gravitational/teleport/lib/events::TestProtoStreamer/no_events", "TestFindAllEmptyStruct/struct_with_n", "TestWaitForConnectionReady (0.11s)\\n\"}", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/us-west-2_fips", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/MFAVerified/verbs=[]", "TestGetMode/unknown_mode (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/vallid_for_listing_clusters", "github.com/gravitational/teleport/lib/tpm::TestPrintQuery/ekcert_debug", "github.com/gravitational/teleport/lib/tpm::TestEncryptedCredentialProto", "TestChallengeValida", "TestValidate_RequestedMaxDuration/role_max_duration_is_respected_whe", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/DeleteUserTask", "TestServiceAccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/No", "github.com/gravitational/teleport/api/client/proxy::TestNewDialerForGRPCClient/Chheck_that_PROXYHeaderGetter_if_present_sends_PROXY_header_as_first_bytes_on_the_cconnection", "FuzzParserEvalBoolPredicate/seed#0 (0.00s)\\n\"}", "TestConvertUsageEvent (0.00s)\\n\"}", "TestRedisEnterpriseClient/List/ListALL (0.00s)\\n", "TestEvents/saml.idp.auth_EventFields (0.00s)\\n\"}", "TestMatch/raw_regexp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/app.update_OneOf", "TestBytesToSessionPrintEvents (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestQuery/with_commmand_in_the_middle", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_match_unset}", "TestNewExporter/invalid_config (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestJSON/session_join", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//wrong_CA_cert", "TestReconcileResults/", "TestOIDCCheckAndSetDefaults/basic_spec", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_match_unset}", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct", "TestInventoryControlStreamPipe (0.00s)\\n\"}", "TestParser/binary_function_with_map_looku", "TestSortCachePagination/ascending (0.00s)\\n\"}", "TestRateLimitFailure (0.00s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateAgentReport/disallowed_admin_stat", "TestKey_SignAndVerifyAWSOIDC (0.43s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#12", "github.com/gravitational/teleport/lib/sshutils/sftp::TestHomeDirExpansion/path_wiith_tilde-slash", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestClose", "Test_dialEndpoints (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV8:__per-session_MFA_allows_verified_MFA", "TestOpDelete (0.00s)\\n\"}", "TestParser/wrong_result_type (0.00s)\\n\"}", "TestUserAssignedIdentitiesClient (0.00s)\\n\"}", "TestCheckSAMLIDPCA/valid_CA (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/integration_enroll_step_success_event", "github.com/gravitational/teleport/api/types::TestDatabaseElastiCacheEndpoint", "TestEventField_Schemas (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_cant_create_when_create_host_user_is_nil", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/NotRequired", "TestTLSIdentity_roundtrip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/githubactions::TestValidateTokenWithJWKS/noot_yet_valid", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/empty_filters", "TestUnifiedResourceCac", "github.com/gravitational/teleport/lib/backend::TestSanitize//a-b/c:d/.e_f/02", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/role_name_with__invalid_account_id_length", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.directory.read_EEventFields", "github.com/gravitational/teleport/lib/services::TestAccessCheckerWorkloadIdentityy/wildcard_role,_labels_wi", "github.com/gravitational/teleport/lib/events::TestEvents/role.deleted_OneOf", "TestSet/remove/from_empty_set (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestListVirtualMachines/nonexiistant_resource_group", "TestApplyTraits/", "github.com/gravitational/teleport/lib/scopes::TestCompare/multi-level_ancestor", "github.com/gravitational/teleport/lib/events::TestEvents/spiffe.federation.deletee_OneOf", "TestValidate_WithAllowReque", "TestParseShortcut/proxies (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/normal_hostname", "github.com/gravitational/teleport/lib/services::TestValidateResourceRequestSizeLiimits", "TestCeremony_RunAdmi", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/disallowed_admin_states", "TestDatabasePermission/valid_permissions (0.00s)\\n\"}", "TestParseSignatureAlgorithmSuite/\\\"hsm-v1\\\" (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_match_match}", "TestListVPCs (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSInnstanceNameOverride", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestIsInstanceMetadataAvaillable/not_available", "TestAccessG", "github.com/gravitational/teleport/lib/multiplexer::TestMux/NextProto", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSubnet/no__name_tag", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_afterExecution//failed_execution_with_out_tripping", "TestConcurrentFanout (0.28s)\\n\"}", "TestOpMsgDocumentSequence (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGetKubeClientGettter/test#3", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_80,_portName:_http", "github.com/gravitational/teleport/lib/config/openssh::TestWriteClusterSSHConfig", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/nodes", "TestServiceAccess/DeleteDatabaseObjectImportRule/allowed_admin_s", "Test_reconcile", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_unset_match}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/delete", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation/kubernettes_app_https", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups", "FuzzTraitsExpressionParser/seed#42 (0.00s)\\n\"}", "TestGlobMatch/inline_root_glob_match_multipar", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialAssertionn_Validate/nil_assertion", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertClusterNetworkingConfig/access_prevented", "TestRequireResidentKey/sup", "TestUpdateAppUsag", "TestCalculateDatabaseNameFilter/accept_", "github.com/gravitational/teleport/lib/events::TestEvents/user.login_EventFields", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/valid_role_arn__in_correct_account_and_default_partition", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/name_&", "TestTriggerGroups/unsupported_schedule (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_unset_match}", "FuzzParseDisplay/seed#12 (0.00s)\\n\"}", "TestParseRoleARN/service_role_arn_", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestCalculatePerrmissions/no_permissions", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/prepared_sstatements_with_multiple_portal_bindings", "FuzzParsePacket/seed#22 (0.00s)\\n\"}", "TestConvertUsageEvent/discover_", "Test_Channels_DefaultChannel/nil_channe", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/vaalid:_requested_ttl_==_access_expiry", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/NotRequired", "TestClientState (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestForceGroupsDone/unssupported_schedule", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestGCPIPType/#00", "TestIsEnabled/invalid_value_returns_fal", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestIsInstanceMetadataAvaillable/not_on_gcp", "github.com/gravitational/teleport/lib/events::TestEvents/unknown_OneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/no_roless", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_forrmat=android-key_simple_check", "TestGlobMatch/exclusive_child_glob_mism", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Items/ascending__order/prefix_range_fetch", "TestEncodeDecodeRequireMFAType (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_isJSONCompact/not_ccompact", "TestStringOrMap/unmarshal/empty_map (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestClone", "TestEvents/device.authenticate.confirm_Ev", "TestIsFIPSEnabled/FIPS_binary_with_", "github.com/gravitational/teleport/api/trail::TestConversion/CompareFailed", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL", "TestReadProxyLineV2 (0.00s)\\n\"}", "TestListDatabases", "github.com/gravitational/teleport/api/types/accesslist::TestSelectNextReviewDate", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnrollEKSClusterss/private_cluster_not_in_cloud_is_enrolled", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetDEBUG-1", "TestVariable/invalid_arg_type (0.00s)\\n\"}", "FuzzParseRedisAddress/seed#0 (0.00s)\\n\"}", "TestValidateAsssignment/missing_kind (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/circleci::TestValidateToken/another_org", "TestKeyPrependKey/base_without_leading_se", "TestExhaustiveNonEmptyStruct/str", "TestGetScaleSetVirtualMachine/vm_with", "FuzzTraitsExpressionParser/seed#36 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/too_many_selectors", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/base_case", "TestEvents/app.session.start_EventFields (0.00s)\\n\"", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/missing_profile_arn", "TestParseReviewFrequency/6_month (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/api/trail::TestFromEOF", "TestJoinServiceGRPCServer_RegisterUsingTPMMethod/challenge_resp", "TestSafeEnvAddFull/whitespace_trim (0.00s)\\n\"}", "TestNewExporter/successful_", "TestIDTokenValidator_Validate/future (0.00s)\\n\"", "TestCompare/simple_equivalence (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#29 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/segment_with_reeserved_symbol", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils", "TestUpsertPolicy/PolicyCreateError (0.00s)\\n\"}", "TestKeyHasPrefix/default_key_is_prefix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_ToFromSubject/user_typee:_local", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__with_wildcard_labels_matches_cluster_without_labels", "FuzzParserEvalBoolPredicate/seed#4 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_match_nomatch}", "TestCloning/*types.RemoteClusterV3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestMux/DisableTLS", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/NOK_webauthn_and__SSO_not_supported", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod", "github.com/gravitational/teleport/lib/authz::TestGetDisconnectExpiredCertFromIdenntity/expires_returned_when_mfa_unset", "github.com/gravitational/teleport/lib/services::TestDatabaseServiceUnmarshal", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.delete_all_OneOf", "TestServiceAccess/RollbackAutoUpdateAgentGroup/allow", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbName", "TestDestinationFromURI/memory:// (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerERROR", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_unset_unset}", "github.com/gravitational/teleport/lib/services::TestApplyTraits/explicitly_allow__internal_traits_referenced_via_external_namespace", "github.com/gravitational/teleport/lib/backend::TestKeyCompare/less", "github.com/gravitational/teleport/lib/client/db/postgres/repl::FuzzCommands", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/bad_regexp", "github.com/gravitational/teleport/lib/events/filesessions::TestUploadPart", "TestCheckSPIFFESVID/implicit_deny_-_no_", "github.com/gravitational/teleport/lib/backend::TestKeyHasSuffix/default_key_has_nno_suffixes", "TestDat", "TestStringOrMap/marshal/wildcard_", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:NotRequired,verbs:[read_list]", "FuzzFetchMySQLVersion/seed#9 (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdateAgentRollout/allowed", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_match_nomatch}", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationTunnelService_CCheckAndSetDefaults/missing_listen", "github.com/gravitational/teleport/lib/services::TestValidateReverseTunnel", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestEKSFetcher", "TestForwarder_getToken_cache (0.00s)\\n\"}", "Test_propertyTable/one_scalar (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/invalid_LimiterBurst_and_LimiterRefillAmount_combination", "github.com/gravitational/teleport/lib/services::TestOIDCCheckAndSetDefaults", "TestRedshiftFetcher/skip_unavailable", "Test_isJSONCompact/empty_object (0.00s)\\n\"}", "TestConvertAuditEvent/Validate", "github.com/gravitational/teleport/lib/backend::TestKeyTrimSuffix/all_trimmed_on_eexact_match", "TestListDatabases/empty_engines_list (0.0", "github.com/gravitational/teleport/lib/events::TestEvents/upgradewindowstart.updatte_OneOf", "github.com/gravitational/teleport/lib/jwt::TestKeyIDCompatibility/RSA", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestElastiCacheFFetcher/fetch_all_with_assume_role", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/missing_integration_name", "TestEnsureSCIMEndpoint/invalid_", "github.com/gravitational/teleport/lib/utils/typical::TestParser/unary_func_with_eenv_wrong_type", "TestIsSSHDeviceVerified/nok:_empty_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_unset_unset}", "TestCircuitBreaker_failure/fa", "TestCheckAccessToSAMLIdP/roleV7:_no_idp_opt", "TestAuthorizeWithLocksForBuiltinRole/Discovery", "TestEvents/session.end_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestGetServers/git_server_not_found", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteSuite", "TestHostU", "FuzzTraitsExpressionParser/seed#5 (0.00s)\\n\"}", "TestEvents/db.session.result_EventFields (0.00s)\\n\"", "TestOIDCGetRedirectURL/proxy.example.com:443", "TestKeyTrimPrefix/suffix_trim_trims_nothing (0.", "TestValidateSegment/segment_with_leading_sym", "TestLogin_cre", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabasesFromDDocumentDBCluster/with-reader", "TestServiceAccess/UpdateAutoUpdateAgentRollout/disallowed_admin_st", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/okta_service_upddating_okta_resource_is_allowed", "github.com/gravitational/teleport/api/types/accessgraph::TestAuthorizedKey/valid", "TestConnNetTest/FirstConnSync/PastTimeout (0.0", "github.com/gravitational/teleport/lib/utils/log::TestOutput/text/trace", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_inWindow", "TestValidateConfigAg", "TestServiceAccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/NotR", "TestVariable/missing_args (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAccessListMarshal", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##5", "TestValidateToken/expired (0.00s)\\n\"}", "TestMe", "TestContext_GetAccessState/mfa:_local_user (0.00s)", "TestStatefulSetVersionUpdater_unblockStatefulSetRollout/", "TestIDTokenSource (0.01s)\\n\"}", "TestTraitsToRoleMatchers (0.00s)\\n\"}", "TestEvents/okta.sync.failure_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_unset_nomatch}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:NotRequired,verbs:[list]", "TestEC2SSMIAMConfigReqDefaults/set", "TestRoleMap/test_case_'glob_capture_match' (0.0", "github.com/gravitational/teleport/lib/services::TestRoleParse/validation_error,_nno_version", "github.com/gravitational/teleport/lib/services::TestNodeWatcher", "TestApplicationOutput_Che", "TestStaticHostUser", "TestAWSIAMPollSAMLProviders (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/devices", "TestEvents/db.session.result_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialSite/successfully_diaal_local_site", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/get/deny_mfa", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/databases/IterateUnifiedResources", "TestLoginFlow_scopeAnd", "github.com/gravitational/teleport/lib/config/openssh::TestWriteMuxedSSHConfig", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_match_unset}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse", "TestWatcher (0.00s)\\n\"}", "TestSPIFFEWorkloadAPIService_Che", "Test_newUnstartedWorker (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGKEFetcher/listt_everything_with_specified_values", "TestServiceAccess/DeleteAuto", "TestPrintQuery/ekcert_debug (0.00s)\\n\"}", "TestProtocolString (0.00s)\\n\"}", "TestNewUserListEntry/malformed_sso (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCanCopyFiles", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig", "TestCheckSPIFFESVID/explicit_deny_-_dns_san (0", "github.com/gravitational/teleport/lib/services::TestAzureIdentityMatcher_Match/alllow_ignores_wildcard", "TestNewResourc", "FuzzFetchMySQLVersion (0.00s)\\n\"}", "TestCheckAnnotationFlag (0.00s)\\n", "TestDatabaseFromR", "TestIsValidHostname/invalid_characters (0.00s)\\n\"}", "TestEvents/privilege_token.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/ssubject_must_match", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#0", "Test_dialEndpoints/resolved_multiple", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/unnknown_user_requested", "TestSendSSHPublicKeyRequest/no_fields (0", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/disallowed_admin_states", "TestFilterMapUnique/no_elements (0.00s)\\n\"}", "TestDatabaseFromAzureRedis (0.00s)\\n\"}", "TestRotateExternalCertAuthority/N", "github.com/gravitational/teleport/lib/utils/mcputils::TestStdioHelpers/reader_cloosed_by_closing_stdin", "github.com/gravitational/teleport/lib/services::TestCanCopyFiles/nil_and_true", "TestVerifyAttestation/OK_f", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS", "TestIDTokenValidator_Validate/success (0.00s)\\", "github.com/gravitational/teleport/lib/client/db/opensearch::TestConfigTLS", "TestALPNDialer_getTLSConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/user_task.create_EventFiields", "TestDeduplicateKey/NoStringDuplicates (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestNewEnumerationResultFromEntitties/no_wildcard", "TestConcurrentTermination (0.00s)\\n\"}", "TestServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerified,v", "github.com/gravitational/teleport/lib/utils/aws::TestNewS3V2FileWriter/on_failuree_from_upload,_error_is_propagated", "TestValidateCrownJewel/ValidCrownJe", "TestDefaultConfigGroup/no_CMC (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed/ccompressed_OP_UPDATE", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestPollAWWSRDS", "github.com/gravitational/teleport/lib/events::TestEvents/kube.create_EventFields", "TestConvertResource/handles_unexpec", "TestListEC2/valid_but_all_inst", "github.com/gravitational/teleport/lib/msgraph::TestUnmarshalGraphError", "TestNewAuthPreference_secondFactor", "TestReviewTh", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDBService/nnothing_exists_in_aws_account", "TestIDTokenValidator_Validate/invalid_", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached", "TestServiceAccess/RollbackAutoUpdateAgentGroup", "TestSessionAccessStart/success (0.00s)\\n\"}", "TestCeremony/ok_(TPM) (0.00s)\\n\"}", "TestValidateSigstorePolicy/no_authority (0.00s)\\n\"", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate/mapped_traits", "TestClickableURL/original_URL_is_OK (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/mcputils::TestStdioHelpers/verify_couunters", "TestCalcul", "TestMakeIntegration/aws-oidc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestPolicyAndResourceScope", "TestGithubAuthRequest_Check", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/waited_too_long", "github.com/gravitational/teleport/api/client::TestLoadKeyPair", "TestConvertUsageEvent/when_discover_has_resources_count_and_its_val", "github.com/gravitational/teleport/lib/proxy/peer::TestCAChange", "TestEvents/lock.deleted_EventFields (0.00s)\\n\"}", "TestPlainFileOpsReservations (0.00s)\\n\"}", "TestParseShortcut/locks (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateSessionRecordingConfig/updated", "TestRollbackGroups (0.00s)\\n\"}", "TestParseShortcut/login_rule (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/utils::TestSet/intersection", "TestKeyHasSuffix/default_key_has_no_suffixes (", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRedshiftServverlessFetcher/fetch_prod_with_assume_role", "TestPoorlyFormedFilt", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDBService/ccluster_does_not_have_the_required_capacity_provider", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_otp", "github.com/gravitational/teleport/lib/services::TestRoleParse/full_valid_role", "TestEvents/port_OneOf (0.00s)\\n\"}", "TestParseSignatureAlgorithmSuite/4/json (0.00s)\\n\"", "TestGetRequestableRoles (0.01s)\\n\"}", "FuzzParseDisplay/seed#9 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss", "github.com/gravitational/teleport/lib/reversetunnelclient::TestCachingResolver", "github.com/gravitational/teleport/lib/srv/discovery/common::TestIsRDSInstanceSuppported/supported_version", "FuzzMongoRead/seed#13 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics/nil_pointer", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenValidator_Validaate/future", "github.com/gravitational/teleport/lib/backend::TestSanitize//.params", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/iinvalid_count", "TestDescendingSegments/leading_empty_segment (0", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/empty_address", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_nomatch_match}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_failure/failuree_in_standby_causes_tripping", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasksByIntegration", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:Unauthorized,verbs:[read_list]", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/file:////absolute/dir", "TestStaticResolver/valid_addres", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig/cloud_tunnel_strategy_type", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_isJSONCompact/emptyy_object", "TestAcc", "TestInterpolate/regexp_replacement_", "TestNew/synchro", "github.com/gravitational/teleport/lib/services::TestFilterSAMLEntityDescriptor/noo_filtering", "TestLogin_findsCor", "TestExh", "github.com/gravitational/teleport/lib/multiplexer::TestMux", "github.com/gravitational/teleport/lib/web/app::TestMatchHealthy", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName/contains_underscore", "github.com/gravitational/teleport/lib/cloud/aws::TestTagsToLabels/rds", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstNewDatabaseObjectImportRule/valid_rule", "TestValidateSigstorePolicy/no_metadata (0.00s)\\n\"}", "TestGetReadiness/Closed (0.00s)\\n\"}", "TestComputeMinRolloutTime/nil_gro", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/unauthenticated_-_faked_metadata_ignored", "github.com/gravitational/teleport/lib/devicetrust/authz::TestVerifySSHUser", "github.com/gravitational/teleport/lib/services::TestParseShortcut/networking", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/!search(\\", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_computeRolloutStatte/one_group_rolledback", "TestRemoveFromSlice/remove_b (0.00s)\\n\"}", "TestUnifiedResourceCacheIt", "TestTake/empty_stream (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzReadAndRewriteXAuthPackett/seed#0", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSubnets/validd_for_listing_subnets", "TestWorkloadIdentityX509RevocationMars", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/DeleteDynamicWindowsDesktop,allowed:MFAVerified,verbs:[delete]", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/MFA_and_ddevice_required,_fails_device", "TestErrorCounter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_computeRolloutStatte", "TestSSHPortForwarding/legacy_allow (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/kube/token::Test_kubernetesSupportsBoundTokkens/Token_support", "FuzzTraitsExpressionParser/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestFnCache_New", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpdateDynamicWindowsDesktop,allowed:NotRequired,verbs:[]", "TestFindAllEmptyStruct/struct_with_nil_m", "TestRetry/retriable,_with_retry-after (0.00s)\\n\"}", "TestGetDisconnectExpiredCertFromIdentity/expiry_returned_when_checke", "TestDeployServiceRequest/no_deploy", "github.com/gravitational/teleport/lib/web/app::TestHealthCheckAppServer/no_match", "TestTrimToMaxSize/exec (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate/nil_cc", "TestCheckDatabaseNamesAndUsers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/access_to_update_discovery_config", "github.com/gravitational/teleport/lib/events/export::TestExporterBasics/case=sparrse,randomFlake=true", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRequest/resiign_azure_JWT/OK_signed_by_client_key", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin", "github.com/gravitational/teleport/lib/services::TestPluginDataFilterMatching", "FuzzFetchMySQLVersion/seed#7 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel", "TestServiceAccess/ListDatabaseObjects/allowed_admin_states/Unaut", "github.com/gravitational/teleport/lib/healthcheck::Test_newUnstartedWorker/enableed", "TestListServers/list_MySQL_serve", "github.com/gravitational/teleport/lib/services::TestLockWatcher", "TestOpKillCursors (0.00s)\\n\"}", "TestGetMembersFor_FlattensAndStopsOnCycles (", "github.com/gravitational/teleport/lib/client/db/postgres::TestConnString/databasee_set", "TestRedisClient/List (0.00s)\\n\"}", "TestGenericListResourcesWithMul", "TestServiceAccess/CreateAutoUpdateConfig/allowed_admin_states", "github.com/gravitational/teleport/lib/events::TestEvents/print_EventFields", "github.com/gravitational/teleport/api/types::TestGetMCPServerTransportType/stdio", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/ECS_Tags", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[update]", "github.com/gravitational/teleport/lib/cloud/azure::TestUserAssignedIdentitiesClieent", "TestConvertEC2InstancesToServerInfos (0.00s)\\n\"}", "TestEKSFetcher/filter_not_found (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/app.create_OneOf", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/search_keywords_hostname_match", "github.com/gravitational/teleport/lib/srv/db/common/kerberos::TestConnectorKInitCClient/keytab_from_cached_data", "github.com/gravitational/teleport/lib/secretsscanner/scanner::TestNewScanner/encrrypted_keys", "TestIssueAndVerifyJoinState/cluste", "TestFilterItems (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_match_unset}", "github.com/gravitational/teleport/lib/proxy::TestGetServers/git_server", "github.com/gravitational/teleport/lib/services::TestOktaAssignmentMarshal", "TestIsResponseSuccessful/error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/locks", "github.com/gravitational/teleport/lib/services::TestMCPToolMatcher", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/iam_tags", "TestEvents/user.update_EventFields (0.00s)\\n\"}", "TestParser/incorrect_runtime_type (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tpm::TestPrintQuery/ekcert", "TestAuthorizeWithLocksForBuiltinRole/Proxy (0.10s)", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/desktops/IterateUnifiedResources", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_nomatch_unset}", "TestRDSFetcher", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/MFAVerifiedWithReuse/verbs=[read_list]]", "TestAtomicWriteValidation/empty_put (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/user_login.invalid_accesss_list_OneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestCreateUser", "Test_progressGroupsTimeBased (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/OSType/OS_TTYPE_LINUX", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[create]", "github.com/gravitational/teleport/api/client/webclient::TestNewWebClientHTTPProxyy", "TestServiceAccess/DeleteAutoUpdateAgentRollout", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults/valid_config", "TestSessionAccessJoin/successGlobJoin/ssh", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/prepared_sstatements_mixed_name_and_unnamed_portals", "TestStrongValidate/dangling_separator_rejecte", "github.com/gravitational/teleport/lib/backend::TestSanitize//Malformed_∩┐╜∩┐╜(∩┐╜╜_UTF9", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/aws_identity_centter.resource_sync.success", "github.com/gravitational/teleport/lib/scopes::TestJoin/trailing_empty_segment_preeserved", "TestServiceAccess/DeleteCrownJewel/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/untrusted_double_signed__index", "github.com/gravitational/teleport/lib/utils::FuzzParseProxyJump/seed#0", "github.com/gravitational/teleport/lib/services::TestParseShortcut/tokens", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_match_unset}", "TestParseDestination/missing_host (0.00s)\\n\"}", "Test_copyAtMost/n_>_len", "TestHandleUnimplemented (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.authenticaate.confirm", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/oktta_service_creating_non-okta_user_is_an_error", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/conflictingg_roles:_allow_all_with_local_deny", "TestSet/union/populated_union_populated (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/MFAVerifiedWithReuse/veerbs=[]", "TestCollectedEventsMetadataMerge/", "TestUnifiedResourceCacheIteration", "github.com/gravitational/teleport/lib/services::TestValidateRole/unsupported_funcction_in_slice_fields", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/MFAVerified/verbs=[]", "TestMaxVersions/client_same_as_max_version (0.00s)", "github.com/gravitational/teleport/api/client/proxy::TestClient_DialHost", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/list/deny_mfa", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/CRUD", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/Unauthorized/verbs=[list]", "TestStringOrMap/unmarshal/single_", "TestIDTokenValidator_Validate/success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_ToFromSubject/aws_credeential_process_credentials_on_app", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#3", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetRootClusterURI/triims_root_cluster_resource_URI", "github.com/gravitational/teleport/lib/events::TestEvents/app.session.end_OneOf", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_AddSignature/misssing_cert", "github.com/gravitational/teleport/lib/selinux::TestFileContextTemplate", "github.com/gravitational/teleport/lib/services::TestParseShortcut/db_server", "TestCheckAccessWithLabelExpressions/app (0.06s)\\n\"", "TestProjectIDFromServiceAccountName/mi", "Test_newHealthCheckConfig/copies_all_sett", "TestLockWatcherStale (2.00s)\\n\"}", "github.com/gravitational/teleport/lib/httplib::TestReadJSON_ContentType", "github.com/gravitational/teleport/lib/utils/gcp::TestGetServiceAccountFromCredenttialsJSON/unknown_credentials", "TestApplicationOutput_CheckA", "github.com/gravitational/teleport/api/client/webclient::TestPlainHttpFallback", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/[]bool", "github.com/gravitational/teleport/lib/srv/discovery/common::TestGetLabelEngineVerrsion/mariadb_returns_nothing", "TestRolesForResourceRequest/basic_case (0.00s)\\n\"}", "TestSessionTTL/greater_than_c", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/backwards_compat_wwith_https://goteleport.com/docs/enroll-resources/machine-id_-_host-certificate", "TestDecodeAccessRequestData (0.00s)\\n\"}", "TestMatch/unknown_function (0.00s)\\n\"}", "TestAtomicWriteShim/Items/pagination/", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingAzureMethod/challenge_response_error/challenge_response_error_proxy", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_match_unset}", "TestEnrollEKSClusters (0.00s)\\n\"}", "TestGetServers/case-insensitive_match (1.34s)\\n\"}", "TestJSONRPCRequest (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/moderation::TestSessionAccessStart/succcessStartTestCasePause", "TestValidateGlob/glob_with_mildly_invalid_", "github.com/gravitational/teleport/lib/authz::TestContextLockTargets/Proxy", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_match_nomatch_unset}", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/queries", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/allowed_credentials_last_(3)", "Test_attributesToRolesParser_Set (0.00s)", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/crredential_picker_returns_bad_pointer", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient/Listt", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/okta_service_creeating_non-okta_resource_is_an_error", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/single_signed_PROXY_header_from_IPv4_to_IPv6_should_fail_to_downgrade_dst_addreess", "github.com/gravitational/teleport/lib/events::TestEvents/trusted_cluster.delete_EEventFields", "TestIsAvailable/ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiter/emitting_evvents_happen_without_any_limiting", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV7:__per-session_MFA_allows_verified_MFA", "github.com/gravitational/teleport/lib/client/tncon::TestBufferedChannelPipeWrite", "TestGetInstanceInfo/with_resource_ID (0.00s)\\", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/member_count", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/delete_no_acceess", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/zero_acttion", "TestCeremony_RunWeb/ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/disallowed_admin_states/Unauthorized", "TestLogin_noCredent", "TestGlobIsSubjectToPolicyResourceScope (0.00s)\\n\"}", "TestIsUserARN/invalid_arn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerified,verbs:[create_updatte]", "github.com/gravitational/teleport/lib/services::TestParseShortcut/win_service", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_match_match}", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamManyParts/Flaky=true,ForceFlush=true", "TestMatch/regexp.not_match_call (0.00s)\\n\"}", "TestAccessGraphAWSIAMConfig/", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_GetUserMetadata/user_meetadata", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_nomatch_match_match}", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/empty__map", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_match_match}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/OK_reuse_not_requested_but_allowed", "github.com/gravitational/teleport/lib/events::TestEvents/recovery_code.used_OneOff", "TestEndpoints/fips_with_env_skip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/upsert_withoutt_update", "TestEC2SSMIAMConfigReqDefault", "Test_Channels_Chec", "TestAddC", "TestLogLimiter/logs_that_ma", "FuzzTraitsExpressionParser/seed#17 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/app.session.requeest", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/delete_verb_not_allowed", "TestUpsertSess", "TestValidateAccessMoni", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__mismatch_empty_root", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbName/returns_rooot_cluster_db_name", "TestServiceAccess/UpsertAutoUpdateAgentReport/allowed_admin_st", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig/no_admin_action", "github.com/gravitational/teleport/lib/utils::TestByteCount/1tb", "TestDatabaseFromRDSV2Cluster (0.00s)\\n\"}", "TestCollectPages (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestEventEqual/empty_equal", "TestGenericListResourcesReturnNex", "TestReconciler_Reconcile/reconciliation", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/different_healthyThreshold", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstDatabaseObjectImportMatch/empty_clause_matches_no_objects", "TestRateLimitFailure/limiter-graceful (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsTLSDeviceVerified//nok:_missing_CredentialID", "TestCreateSess", "TestServiceAccess/GetAutoUpdateVersion/allowed_admin_states/NotRe", "TestAWSSignerHandl", "TestIssueAndVerifyJoinState/invalid_joi", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestDialResponseOKEncodingg", "github.com/gravitational/teleport/lib/scopes::TestGlobIsSubjectToPolicyResourceSccope/equivalent_children", "FuzzMSSQLLogin (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[delete]", "TestAccessRequestFilter/user_wants_all_reques", "github.com/gravitational/teleport/lib/services::TestWindowsDesktopGroups/irrelevaant_deny", "TestParser/literal_string_equality (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[updatee_create]", "github.com/gravitational/teleport/lib/services::TestParseShortcut/sems", "TestStaticHostUserCRUD", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/reject_if_kinds_don't_match_even_though_search_as_roles_allows_wwildcard_access", "TestValidateTokenWithJWKS/signed_by_", "github.com/gravitational/teleport/lib/proxy/peer::TestSplitServerID", "TestKubeResourceCouldMatchRules (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestSliceMatchesRegex/foo", "TestRegistrationFlow_Begin_errors (0.00s)\\n\"}", "TestConvertUsageEvent", "github.com/gravitational/teleport/lib/web/ui::TestCreateGitServerRequest_Check/vaalid-github", "TestRotateExternalCertAuthori", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/GetDynamicWindowsDesktop,allowed:Unauthorized,verbs:[read]", "github.com/gravitational/teleport/gen/go/eventschema::TestAllAthenaSchemas", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSDBProxyFeetcher/fetch_all", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSecurityGrroup/inbound_rule_allows_SSH,_outbound_allows_everything", "TestDefaultAddresses (0.00s)\\n\"}", "TestHandleAccessRequest/test", "TestRemoveFromSlice/remove_from_empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/nodes/IterateUnifiedResources", "TestTrimToMaxSize/db.session.elasticsearc", "github.com/gravitational/teleport/lib/events/athena::TestIntegrationAthenaLargeEvvents", "TestKubeResourceCouldMat", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setVersionMetric/ssame_version,_expired", "TestIdentity_ToFromSubject (0.00s)\\n\"}", "TestNewAppV3/mcp_with_command (0.00s)\\n\"}", "TestKeyIDHasConsistentOutputForAnInput/ECDSAP2", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/invalid_LocationS3", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenSource_GetIDToken/vallue_missing", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level_calleer", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureDBServeerFetchers/skip_group_not_found_errors", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestSSigstoreAttestor_Attest_Caching", "TestValidateRole/missing_scope (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/NotRequired/verbs=[update_create]", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/invalid_table_name", "github.com/gravitational/teleport/lib/utils/parse::TestMatch", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/delete_success", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-mongoddb", "TestMergeS3Protos/Poli", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerified/verbs=[update]", "TestTransformCommandLabels (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust::TestHandleUnimplemented/wrappeed_status_with_codes.Unimplemented", "TestAuthorizer_Authorize_", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityJWTServicee_CheckAndSetDefaults", "TestServiceAccess/UpdateCrownJewel/allowed_admin_states/MFAVerif", "TestGuessIfAccessIsPossible/session_write", "TestP", "github.com/gravitational/teleport/lib/utils/aws::TestCreateBucketConfiguration/sppecial_region", "github.com/gravitational/teleport/lib/autoupdate::TestInstallFlagsYAML/order", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_BEST_EFFORT_DROP/YAML", "TestValidate_RequestedMaxDuration/when_ro", "Test_consum", "TestEvents/stable_unix_user.create_OneOf (0.00s)\\n\"", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_active_->_done", "TestCheckAccessWithLabelExpressions/db_serv", "Test_propertyTable/repeate", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser", "TestPolicyAndResourceScope/simple_root (0.00s)\\n\"}", "TestApplicationUnmarshal (0.00s)\\n\"}", "TestGitHubIdentity/with_github_identity", "TestCredentia", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay/seed#10", "TestComputeMinRoll", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestCount", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstApplyDatabaseObjectImportRules/database_labels_are_matched_by_the_rules", "TestTrustedClusterRBAC/upsert_no_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/CreateAutoUpdateAgentRollout", "TestConversion/LimitExceeded (0.00s)\\n\"}", "TestEvaluate (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/pgevents::TestBuildSchema", "github.com/gravitational/teleport/lib/srv/app/common::TestHeaderRewriter/http,_poort_specified", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestSendSSHPublicKeyRRequest/missing_login_user", "TestCredPropsConversions (0.00s)\\n\"}", "TestEventField_Schemas/boolean (0.00s)\\n\"}", "TestApplyTrai", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/CreateUserTask/verbs=[]", "github.com/gravitational/teleport/lib/secretsscanner/reporter::TestReporter", "TestEvents/db.session.mysql.create_db_OneOf (0.0", "TestIsAutoUsersEnabled (0.00s)\\n\"}", "TestIsTLSDeviceVerified/nok:_empty_", "github.com/gravitational/teleport/lib/utils::TestOpenFileLinks/unsafe-hardlinkFilleOpenDenied", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/ECS_Tags/one_of_the_labels_has_a_different_value,_should_returrn_false", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAM", "github.com/gravitational/teleport/lib/services::TestParseShortcut/oidc", "github.com/gravitational/teleport/lib/services/suite::TestServerLabels", "TestGetSingleHeader/SingleValue (0.00s)\\n\"}", "TestServiceAccess/ListDatabaseObjec", "TestServiceAccess/UpsertCrownJewel/allowed_admin_states/MFAV", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/roles", "github.com/gravitational/teleport/lib/services::TestParseShortcut/usergroups", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/iam_arn_is_not__a_role", "TestServiceAccess/GetAutoUpdateConfig/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateAuthPreference/oss_hardware_key_policy", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromMemorryDBCluster", "github.com/gravitational/teleport/api/client::TestLoadProfile", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_unset_match}", "TestSliceMatchesRegex/foo (0.00s)\\n\"}", "TestParser/literal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin/sseed#5", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/non_existing_funcction", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_match_unset}", "TestIsValidHostname/normal_hostname (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestRegistrationFlow_Begin_eexcludeList/passwordless", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiterConfig/emptyy_burst_in_config", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_match_nomatch}", "TestInvalidPayloadSize/exceede", "TestIsRoot/root_cluster_URI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilterForScale/pageSize=3,prop=84", "TestTimedMemoize_Get/fresh_cache (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseNamesAndUsers/siingle_role", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::Test_basicHTTTPMaintenanceClient_Get/all_good_-_maintenance", "TestGetServers/no_matches_for_hostname (0.08s)\\n\"}", "github.com/gravitational/teleport/lib/healthcheck::TestNewManager/missing_HealthCCheckConfigReader", "github.com/gravitational/teleport/lib/autoupdate::TestInstallFlagsYAML/fips", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTryReconcile", "TestResetAuthPreference/reset (0.0", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/transittion_from_tripped_to_recovering#01", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/emptyy_kube_labels_should_returns_all_kube_users/groups", "TestServiceAccess/UpsertAutoUpdateAgentReport/all", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Instance/with_name_override_via_teleport.dev/database_name", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Items/ascending__order/pagination", "TestParserForIdentifierSubcondition (0.03s)\\n\"}", "TestServiceAccess/DeleteDatabaseObject/allowed_admin_state", "TestEvents/saml.updated_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/verify_coverage/CreateVnetConfig", "TestServiceAccess/CreateVnetConfig/allowed_admin_states/MFAVerif", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRedshiftFetccher/fetch_all", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenValidator_Validaate/invalid_audience", "TestRoleMap/test_case_'wildcard_mat", "TestFakeStreams/UploadDownload (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/network_restricctions", "github.com/gravitational/teleport/lib/events::TestEvents/stable_unix_user.create__OneOf", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#13", "github.com/gravitational/teleport/integrations/lib/plugindata::TestBackoff", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestEvents/stable_unix_user.create_EventField", "github.com/gravitational/teleport/lib/backend::TestKeyHasPrefix/equivalent_keys_aare_prefix", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/PROXY_header_signed_by_non_local_cluster_get_an_error", "TestServiceAccess/CreateCrownJewel/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/multii_allowed_roles_with_denial", "TestCircuitBreaker_Execute (0.00s)\\n\"}", "TestValidateAssumeStartTime/before_cre", "TestParseReviewFrequency/6months (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/config/openssh::TestWriteClusterSSHConfig/mmodern_OpenSSH", "TestFailoverTrigger_Name/one_tri", "github.com/gravitational/teleport/lib/cloud/azure::TestListSubscriptionIDs/clientt_lists_all_subscriptions", "github.com/gravitational/teleport/lib/events::TestEvents/session.network_OneOf", "TestEvents/saml.idp.service.prov", "TestParseAdvertiseAddr/ok_address_and_bad_port", "TestParseGatewayTargetURI//clusters/foo (0", "TestMockBackendLister_List (0.00s)\\n\"}", "TestSessionAccessStart/failFilter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::TestSQLBatch", "github.com/gravitational/teleport/lib/utils::TestParseHTTP", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[delete]]", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states", "github.com/gravitational/teleport/api/trail::TestNil", "TestAccessMonitoringRuleCRUD/access_to_update_AccessMonitorin", "TestEvents/kube.update_EventFields (0.00s)\\n\"}", "Test_propertyTable/repeated_pro", "TestIDTokenValidator_Validate/invalid_issuer", "Test_basicH", "Test_canUpdateToday/Malformed_day (0.00s)\\n\"}", "TestEvents/db.session.mysql.debug_EventFields", "TestSafeEnvAdd/double_add (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseNamesAndUsers", "TestParseSignatureAlgorithmSuite/3/json (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/keylesss_invalid_trusted_roots", "TestAuthorizer_Authorize", "TestApplicationMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_nomatch_unset_match}", "TestParsePacket/ERR_HEADER (0.00s)\\n\"}", "TestExhaustiveNonEmptyStruct/s", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_Name/empty", "TestEscapeDisconnect (0.00s)\\n\"}", "TestMigrate/real_world_1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/kube/token::TestGetIDToken/TestGetIDToken", "TestDatabaseUnmarshal/tls_mode_ (0.00s)\\n\"}", "TestAtomicWriteValidation/too_big (0.00s)\\n\"}", "FuzzReadPacket (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestHandleAccessReequest", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch/just_db_name", "TestHealthCheckConfig_equivalent/", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.create_EvventFields", "TestIsAvailable (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/v3_roole_with_empty_deny.kubernetes_labels", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/auth_error/auth_error_proxy", "github.com/gravitational/teleport/lib/services::TestParseShortcut/saml_sps", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/verify_coverage/UpdateUserTask", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenValidator_Validate", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-spanneer-with-uri", "TestLabelExpressions/string_helpers (0.00s)\\n\"}", "TestParseReviewFrequency/1y (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/state::TestHasDNSNames", "TestUnhealthyWork", "github.com/gravitational/teleport/lib/services::TestValidateSAMLIdPACSURLAndRelayyStateInputs/https://sp.com/", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.update_OnneOf", "TestRunWithMinInterval (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/device_EventFields", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/DeleteUserTask/verbs=[]", "TestCheckRuleSorting (0.00s)\\n\"}", "TestServiceAccess/UpdateDatabaseObject/allowed_admin_states/MFAVeri", "github.com/gravitational/teleport/lib/labels::TestSync", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestSendSSHPublicKeyRRequest/no_fields", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_doesn't_match_kind_allow", "github.com/gravitational/teleport/lib/utils::FuzzReadYAML/seed#2", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults/timeout_defaults_to_DefaultExporterDialTimeout", "github.com/gravitational/teleport/lib/utils::TestKernelVersion/4.19.94", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet_CheckAndSetDefaults/valid", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilterForScale/pageSize=2,prop=31", "TestGetTokenAudiences/no_token (0.00s)\\n\"}", "TestIsResponseSuccessful (0.00s)\\n\"}", "TestServiceAccess/UpsertAuto", "github.com/gravitational/teleport/integrations/lib/credentials::TestCheckExpiredCCredentials/Empty_credentials_(no_certs)", "TestEvents/desktop.clipboard.send_OneOf (0.00s)\\n\"}", "TestCompareResources/IsEqual_not_equal (0.00s)\\n\"}", "TestGetInstanceID/with_old_ID_format (0.00s)\\n\"", "github.com/gravitational/teleport/lib/inventory::TestStoreAccess", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states", "TestValidateWorkloadIdentity/maxim", "TestMemoryDBFetcher (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/contact.create_EventFiellds", "TestAsyncEmitter/Slow (0.00s)\\n\"}", "Test_isPodUnhealthy/no_data (0", "TestGCPIPType/psc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestReadCorruptedRecording", "TestIterateGroupMembers (0.00s)\\n\"}", "TestServerConversion/postgres_unavailable (0.", "github.com/gravitational/teleport/lib/cloud/provisioning::TestOperationCheckAndSeetDefaults/valid_config", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2ICE/valid__but_ID_needs_URL_encoding", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerFromPublicAddress/vallid_host:port_with_path", "TestServiceAccess/GetDatabaseObjectImportRule/", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/emppty_struct", "TestExtraFields/text/level_timestamp (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestDatabaseOracleRDS", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphIAMConnfigReqDefaults/missing_account_id_is_ok", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestIdPIAMConfigReqDeefaults/missing_proxy_public_address", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/javascript://sptest.iamshowcase.com/acs", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/complexx_login", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/invalid_characteers", "github.com/gravitational/teleport/lib/cloud/aws::TestGetIdentity/assumed_role_ideentity", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/set_unionn", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/successfullly_read_proxy_v2_line_with_TLV_that_has_empty_value", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin/sseed#2", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureManagedSQLServer", "github.com/gravitational/teleport/lib/utils::TestByteCount/2_byte2", "github.com/gravitational/teleport/lib/services::TestValidateRole/unsupported_synttax_in_kubernetes_resources", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/destination_with_eempty_config_type", "TestSSHMultiplexerSer", "TestGetActiveDirectorySID (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/nodes/IterateUnifiedResources/descending", "github.com/gravitational/teleport/api/types/accessgraph::TestAuthorizedKey", "github.com/gravitational/teleport/lib/events::TestEvents/cert.generation_mismatchh_OneOf", "github.com/gravitational/teleport/lib/events::TestEvents/db.update_EventFields", "FuzzReadPacket/seed#0 (0.00s)\\n\"}", "TestNewEnumerationResultFromEntities", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestLogin/uv_preferred,_aattachment_cross-platform", "github.com/gravitational/teleport/lib/utils::TestClickableURL/unspecified_IPV4", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/missing_private_key", "TestEvaluateTraitsMap/bad_regexp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/real_world_5", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV8:__unmatched_labels_denies_access,_idp_enabled_is_not_applied", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftCluster/success", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/nodes/resource_iterator", "github.com/gravitational/teleport/lib/multiplexer::FuzzReadProxyLineV1", "github.com/gravitational/teleport/lib/auth/webauthn::TestCredentialRPID/login_isssues_challenges_for_unknown_credential_RPID", "TestServerLabels (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/denied_access_to_read_AccessMonitoringRulees", "github.com/gravitational/teleport/lib/events::TestEvents/session.data_OneOf", "TestGetServers/match_by_ec2_id (1.34s)\\n\"}", "github.com/gravitational/teleport/lib/client/debug::TestCollectProfile/invalid_prrofile", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher//multiple_account_assignments_match", "github.com/gravitational/teleport/api/client::ExampleIsALPNConnUpgradeRequired", "TestRoles/FindRoleByARN (0.00s)\\n\"}", "TestValidateRoles/role_templates (1.32s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUserGroupMarshal", "TestAccessListHierarchyCircularRefsCheck (0.00", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/owner_grants", "Test_EmitAuditEvent (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEC2SSMIAMConfigReeqDefaults/missing_integration_role", "github.com/gravitational/teleport/lib/proxy/peer::TestClientCredentials/valid_connnection", "TestOperationCheckAndSetDefaults/v", "github.com/gravitational/teleport/lib/utils/parse::TestMatchers/prefix/suffix_mattcher_negative", "TestOktaAssignmentUnmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.result_EventFFields", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//NOK_local_user_invalid_mfa", "github.com/gravitational/teleport/lib/reversetunnelclient::TestStaticResolver", "TestAccessListReviewUnmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestGCPIPType/psc", "TestParseReviewFrequency/1m (0.00s)\\n\"}", "TestConvertRequestFailureError/StatusBadR", "github.com/gravitational/teleport/lib/utils::FuzzParseWebLinks/seed#3", "TestOriginLocalRedirectURI/ftp_scheme (0.00s)\\n\"}", "TestCeremony_RunAdmin (0.00s)\\n\"}", "TestCheckAccessToAzureCloud (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestJSON/resize_event", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerified/verbs=[create_update]", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasks/verbs=[read]", "github.com/gravitational/teleport/lib/vnet/diag::TestGenerateReport_SkipCommands", "TestCircuitBreaker_Execute/tr", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/wworks_with_user_with_full_access", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/basicc_case", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate", "github.com/gravitational/teleport/lib/events::TestEvents/app.session.start_EventFFields", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher", "TestMatch/regexp.match_simple_call (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestValidateAssumeStartTime/start_tiime_too_far_in_the_future", "TestValidateFields/valid_keys (0.00s)\\n\"}", "TestClient_DialHost (0.01s)\\n\"}", "TestParseLegacyDynamoAttributes/list", "github.com/gravitational/teleport/api/types::TestCloning/*types.RemoteClusterV3", "TestKeyComponents/single_value_key_has_a", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__mismatch_root", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher/skip_unsupported_with_assume_role", "TestAtomicWriteShim/", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cluster", "github.com/gravitational/teleport/lib/web/app::TestHandlerAuthenticate", "TestGetLabelEngineVersion/azure-my", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredPropsConversionns/CredentialCreationResponse", "TestDescendingSegments/empty (0.00s)\\n\"}", "TestGCPServiceAccountMatcher_", "github.com/gravitational/teleport/lib/cloud/azure::TestListVirtualMachines", "FuzzMSSQLLogin/seed#1 (0.00s)\\n\"}", "TestSlogTextHandler (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states", "TestApplyTraits/inval", "github.com/gravitational/teleport/lib/joinserver::TestTimeout/good_auth_client", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_match_nomatch}", "TestStatusError_Is/same_statuses_are_", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/memory:://foo/bar", "TestKeyHasPrefix/empty_prefix (0.00s)\\n\"}", "TestTunnelAddr", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbName/returns_emppty_string_when_given_leaf_cluster_non-db_resource_URI", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzurePostgreesFlexFetchers", "github.com/gravitational/teleport/lib/scopes/cache::TestCursorPagination/basic_rooot", "TestParser/unknown_variable (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/get_no_secretss", "TestUpdateAppUsageTem", "TestServiceAccess/GetDatabaseObjectIm", "TestParser/integer_inequality_(false) (0.00s)\\n", "TestEvents/app.session.end_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/scalar_and_array_of_scalars", "TestAppPortsValidation/end_port_smaller_tha", "TestEvents/app.delete_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMarshalMapConsistency", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpKillCursors", "TestManagedSQLListAll/empty_list (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/subsystem", "TestParseDBURI//clusters/foo/kubes/kube (0", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/OSType/OS_TTYPE_WINDOWS", "TestMarshalGlobalNotificationRoundTrip (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequired/upgraade_required_(unadvertised_ALPN_error)/direct", "github.com/gravitational/teleport/lib/services::TestSessionRecordingMode/strict_ddefault_multiple_roles", "github.com/gravitational/teleport/lib/backend::TestRangeEnd//∩┐╜", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//OK_admin_impersonating_local_user", "github.com/gravitational/teleport/lib/itertools/stream::TestCollectPages/single-eelement-case", "github.com/gravitational/teleport/lib/utils/sortcache::TestNextKey", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/iam_role_arn_iss_missing_role_name_section", "TestApplyTraits/GCP_service_a", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/missingg_state_token", "TestIdentity_GetUserMetadata/user_metadata (0.00s)", "TestGetConfigIntegration/uncached/w", "FuzzParseProxyJump/seed#0 (0.00s)\\n\"}", "TestNewAppV3/app_with_no_CORS_policy (0.00s)\\n\"}", "TestComputeMinRolloutTime/singl", "TestGetDisconnectExp", "TestNewAppServerForAWSOIDC", "ExampleIsALPNConnUpgradeRequired (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/app_seerver", "Test_rec", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=/telepport/leading_separator_in_key", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/first_unsigned_then_signed_PROXY_headers", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[]", "TestAuthorizeWithLocksForBuiltinRole/MDM (0.10s)\\n\"}", "TestEvents/session.network_OneOf (0.00s)\\n\"}", "TestParser/unary_function_expression (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket", "TestServiceAccess/CreateAuto", "github.com/gravitational/teleport/lib/events::TestEvents", "TestFai", "Test_canUpdateToday/Matching_day (0.00s)\\n\"}", "TestParseAdvertiseAddr/ok_address_and_port (0.00s)", "TestThirdpartyStreams/StreamEmpty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#19", "FuzzReadPacket/seed#1 (0.00s)\\n\"}", "TestParseShortcut/rcs (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestHostUsers_getGroups", "TestRoleSe", "github.com/gravitational/teleport/lib/integrations/awsoidc/credprovider::TestCreddentialsCache/CachedCredsArePreservedOnError", "github.com/gravitational/teleport/api/client::TestGetResources/ApplicationServer", "github.com/gravitational/teleport/lib/utils/fanoutbuffer::TestConcurrentFanout", "TestRouteScoring/dial_by_hostname (0.00s)\\n\"}", "TestConfig_CheckAndSetDefaults/missin", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_match_match}", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError/agg_badParrameter_and_accessDenied", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestDefaultConfigGroup//CMC_with_weekdays", "TestHealthCheckConfig_equivalent/differ", "Test_makeGroupsStatus/multiple", "github.com/gravitational/teleport/lib/utils/spreadwork::TestApplyOverTime", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//success", "TestSliceOrString/unmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelEC2", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGitServer/wildcaard_deny", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##17", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/reviewer_(entterprise)", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/tlsca::TestKeyUsage/RSA", "github.com/gravitational/teleport/lib/events::TestEvents/session.rejected_OneOf", "github.com/gravitational/teleport/lib/auth/webauthn::TestCredentialRPID/login_wriites_credential_RPID", "TestKubeResourceMatchesRegex (0.00s)\\n\"}", "TestEvaluateTraitsMap/dict_index (0.00s)\\n\"}", "TestBuildRoleARN/role_name_in_c", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject/simple_templates", "TestGetResources/DatabaseServer (0.33s)\\n\"}", "TestStreams/StreamManyParts (0.72s)\\n\"}", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestIsTracingSuppported", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/not_configuured", "github.com/gravitational/teleport/lib/web/ui::TestMakeCAKeySet", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/nonn-okta_service_removing_okta_origin_is_an_error", "TestGetKubeResourceNamespace/returns_empty_string_when_g", "Test_canStartHaltOnError (0.00s)\\n\"}", "TestEvents/resize_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse/verbs=[[]", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestGetTags/denied_access_tto_instance", "TestOktaCR", "github.com/gravitational/teleport/lib/events::TestEvents/bot.create_OneOf", "github.com/gravitational/teleport/lib/utils::TestClickableURL/unspecified_IPV6", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestRewriter/set_x-reeal-ip", "TestRewriter/set_x-real-ip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/device.update_EventFieldds", "TestUnifiedResource", "TestKeyAppendKey/prefix_without_leading_", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestCRUUD", "github.com/gravitational/teleport/lib/web/ui::TestSortedLabels/Server_with_aws_laabels_pushed_to_back", "TestHandleUnimplemented/trace.NotImplement", "TestKeyString/noend_key (0.00s)\\n\"}", "TestApplyTraits/kube_user_interpolat", "TestAzureDBServerFetchers (0.00s)\\n\"}", "FuzzProxyLine_Bytes/seed#5 (0.00s)\\n\"}", "TestUserEventRequest_CheckAndSet (0.00s)\\n\"}", "TestParseDestination/no_login_and_'@'_i", "github.com/gravitational/teleport/lib/config/openssh::TestWriteMuxedSSHConfig/moddern_OpenSSH_-_single_cluster", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerified/verbs=[create_update]", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/too_short__line", "github.com/gravitational/teleport/api/types::TestIsAutoUsersEnabled/unsupported_pprotocol", "TestEvents/role.updated_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateStaticHostUser/no_speec", "TestGetDbServerName (0.00s)\\n\"}", "TestExporterBasics/case=sparse,random", "TestVerifyAttestation/NOK_x5c_cert", "TestNewEnumerationResultFromEntities (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/marshal", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/verify_coverage", "FuzzTraitsExpressionParser/seed#0 (0.00s)\\n\"}", "TestGKEFetcher/list_stg_cluste", "TestNewEnumerationResultFromEntities/no_w", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertAuthPreference", "Test_progressGroupsHaltOnError/first_group_done,_second_shoul", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//allow_notifications_to_be_nil", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_unset_nomatch_match}", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestRewriter/trust_x--real-ip_and_guess_port_from_schema", "github.com/gravitational/teleport/lib/auth/userloginstate/userloginstatev1::TestDDeleteAllAccessLists", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/Db", "TestConversionFromP", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_nomatch_match}", "github.com/gravitational/teleport/lib/events::TestEvents/user_task.delete_EventFiields", "github.com/gravitational/teleport/lib/healthcheck::TestHealthCheckConfig_equivaleent/both_nil", "TestRangeEnd//foo/bar (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/wildcaard_but_at_least_one_entry", "TestNewDatabaseFromAzureMa", "github.com/gravitational/teleport/lib/events::TestEvents/integration.update_EventtFields", "TestEvents/db.session.query.failed_EventField", "github.com/gravitational/teleport/lib/services::TestBoolOptions", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//2", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/multiple_roles_with_different_max_durations_assigned", "TestSlogTextHandlerComponentPadding (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy/peer::TestClientConn", "TestAccessListReviewMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_8080,_portName:_", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/missing_ec2_private_dns_name", "TestRBAC (0.04s)\\n\"}", "TestAuthorizedKey/missing_user (0.00s)\\n\"}", "TestCheckAccessToK", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenValidator_Validate/innvalid_audience", "github.com/gravitational/teleport/lib/services::TestCertPoolFromCertAuthorities/cca2_with_2_certs", "github.com/gravitational/teleport/lib/services::TestSessionTTL/greater_than_certiificate_duration_not_allowed", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/invallid_format_#_5", "TestWeakValidatedSubAssignments (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/500", "TestStringOrMap/marshal/nil_input (0.00s)\\n\"}", "TestServiceAccess/GetUserTask", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/DeleteDatabaseObject/allowed_admin_states/MFAVerified/verbs=[delete]", "TestSearchEvents/invalid_keyset (0.00s)\\n\"}", "TestRoleParse/validation_error,_bad_version (0", "TestValidateAssumeStartTime (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_match_match_match}", "github.com/gravitational/teleport/lib/utils::TestMinVerWithoutPreRelease/compare__greater_minor_versions", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_unset_nomatch}", "TestKeyTrimSuffix/partial_trim (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/trusted_clusterr", "TestGetTokenAudiences/broken_token (0.00s)\\n\"}", "TestDatabaseFromRedshiftServerle", "github.com/gravitational/teleport/lib/services::TestMaxLength", "TestConvertSubnet/no_name_tag (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseDBURI//clusters//foo/leaves/bar", "TestCheckDatabaseRoles/co", "TestExporterBasics/case=dense,randomFl", "TestLock (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestSSigstoreAttestorConfig_CheckAndSetDefaults/additional_registries.host_is_empty", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestReconncileResults", "TestServiceAccess/CreateAutoUpdateVersion/allowed_admin_states/Not", "github.com/gravitational/teleport/lib/usertasks::TestRDSURLs", "TestCollectProfile/profile (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestLogin/uv_required,_atttachment_platform", "TestWriteMuxedSSHConfig/lega", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenValidator_Validate/exxpired", "github.com/gravitational/teleport/lib/versioncontrol/github::TestVisit", "TestDestinationKubernetesSecret (0.00s)\\n\"}", "TestGlobIsSubjectToPolicyResourceScope/", "TestCheckAcc", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#1", "TestStringOrMap/u", "TestValidateSQLServerDatabaseURI/0.0.0.0:143", "TestCreateSignedSTSIdentityRequest/us-we", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_4242,_portName:_https", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_session+hardware_key,_MFA_verified", "github.com/gravitational/teleport/lib/services::TestFilterSAMLEntityDescriptor/alll_invalid", "TestCheckAccessToUserGroups/no_roles,_no_a", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource", "TestReg", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeResourceNamesppace/returns_leaf_cluster_namespace_name", "TestUpsertAuthP", "TestUnifiedResourceCacheIteration/git (0.31s)\\n\"}", "TestConvertResource/handles_unexpe", "Test_cosignKeyValidator_ValidateAndResolveDigest/signed_manif", "TestOpenSearchFetcher/f", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas", "github.com/gravitational/teleport/lib/events::TestEvents/okta.access_list.sync_EvventFields", "TestPostgresRecording (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetINFO+1", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__match", "TestListResources/ApplicationServer (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_nomatch_match_match}", "TestCheckKubeGroups", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte/success_with_ghes", "TestStrongValidate/multi-segment_invalid", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestEC2IsInstanceMetadataAvvailable/mistake_some_other_service_for_instance_metadata", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/events/export::TestDateExporterBasics", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_exact_match,_one_role,_can_create", "TestConversionFr", "TestAccess", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsRoot/gateway_URI", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/reversetunnel/track::TestBasic", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestHandleAccessReequest/test_approved_user_for_unapproved_role", "TestApplicationOutput_CheckAndSetDefaul", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/Lambda_acccess", "TestRolesForResourceRequest/explicit_ro", "github.com/gravitational/teleport/lib/services::TestApplyTraits/GCP_service_accouunt_substitute_in_allow_rule", "github.com/gravitational/teleport/lib/backend::TestRemoveRedundantPrefixes", "TestIsResponseSuccessful/codes.Unavailable", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/WindowsDesktop", "TestVariable/internal_with_spaces_removed (0.", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/loccal_app,_redirect", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialHost/dial_success_to__agentless_node", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_foormat=none", "TestParseReviewFrequency/12_month (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/db/postgres::TestConnString/user_andd_database_set", "TestAccessListIsMember_RequirementsAndExpi", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/multipple_entities_but_only_one_of_them_is_wildcard", "TestUpdateClusterNetworkingCon", "TestGetCertAuthority/ca_found_with_se", "github.com/gravitational/teleport/lib/automaticupgrades/cache::TestTimedMemoize_GGet/fresh_cache", "TestValidateTokenWithJWKS/expired (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/when_discover_has_resources_count_and_its_values_is_negative:_bad_parameter_eerror", "TestAccessCheckerWorkloadIdent", "Test_consumer_sqsMessagesCollector/verify_if_collecto", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey//ResidentKey_preferred_result_in_false", "Test_getWorkloadVersion/OK_regular_podSpec,_semver_tag_no_digest (0.00s", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/zero_conndition", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp/no_match_returns_eexplicit_not_found_error", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/!equals(labels.undefined,_\\", "github.com/gravitational/teleport/lib/events::TestEvents/print_OneOf", "FuzzReadAndRewriteXAuthPacket/seed#0 (0.00s)\\n\"}", "TestMakeCAKeySet/SSH_keys (0.00s)\\n\"}", "TestApplyTraits/kube_group_substitute_", "TestFromProtoNils/audit (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestGetServers/ambiguous_match_returrns_most_recent", "github.com/gravitational/teleport/lib/release::TestListReleases/OK_response", "TestEventField_Schemas/array(string) (0.00s)\\n\"", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//1y", "github.com/gravitational/teleport/lib/utils::TestWebLinks", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/OSS_and_Mode=off", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/unsigned_manifest", "TestServiceAccess/UpsertAutoUpdateVersion/allowed_adm", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_nomatch_nomatch_match}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/NotRequired", "TestParseReviewFrequency/6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/incomplete_variabbles_are_not_allowed", "github.com/gravitational/teleport/lib/defaults::TestDefaultAddresses", "TestStaticHostUserCRUD (0.02s)\\n\"}", "TestParseShortcut/accesslists (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/db", "TestRedisEnterpriseClient/List (0.00s)\\n\"}", "TestTrustedClusterRBAC/upsert_no_access", "github.com/gravitational/teleport/lib/services::TestApplyTraits/GitHub_permissionns_in_deny_rule", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/prefers_newer_credential_(llama)", "TestTryReconcile (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/api/client::TestGetResources/KubeServer", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/terraform_proovider_(bugfix_of_the_missing_resources)", "Test_getWorkloadVersion (0.00s)\\", "github.com/gravitational/teleport/lib/automaticupgrades::TestIsEnabled/truthy_vallue_returns_true", "TestParseSignatureAlgorithmSuite/2/yaml (0.00s)\\n\"", "github.com/gravitational/teleport/lib/backend::TestKeyCompare/empty_keys_are_equaal", "TestEvaluateCondition/does_not_match", "github.com/gravitational/teleport/lib/resumption::TestConnDesync", "github.com/gravitational/teleport/api/client/webclient::TestSSHProxyHostPort/TLS__routing_enabled,_web_listen_addr", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestDocumentDBFeetcher/skip_unavailable_databases_with_assume_role", "TestServiceAccess/ListDatabaseObjectImpo", "github.com/gravitational/teleport/api/breaker::TestRoundTripper_RoundTrip/error_wwhen_tripped", "TestProxyLine_Bytes (0.00s)\\n\"}", "TestOutput/text/debug (0.00s)\\n\"}", "TestEvents/integration.update_EventFields (0.00s)\\", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/disallowed_admin_states", "TestGetKubeClientGetter/test#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetAuthPreference/config_file_origin_prevents_reset", "TestConvertRequestFailureError/StatusConfli", "TestVerifyTLSUser/OSS_mode=off (0.00s)\\n\"}", "TestValidateHeadlessAuthentication (0.00s)\\n\"}", "TestValidateRoleARNAndExtractRoleName/succe", "github.com/gravitational/teleport/lib/client/db/postgres::TestConnString/user_sett", "TestEvents/app.update_EventFields (0.00s)\\n\"}", "TestCLIPrompt/NOK_no_webauthn_response (0.10s)\\n\"", "Test_rolloutChangedInWind", "github.com/gravitational/teleport/lib/utils/aws::TestIsRoleARN/invalid_arn", "TestDesktopDirectorySh", "TestListener/accept_failure (0.00s)\\n\"}", "TestDatabaseRDSEndpoint/aurora_instance (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/connect_too_prod_database,_get_reader_permissions", "github.com/gravitational/teleport/lib/srv/db/cassandra/protocol::FuzzReadPacket/sseed#2", "TestEvents/db.session.mysql.statements.", "github.com/gravitational/teleport/lib/events::TestEvents/secreports.report.run_EvventFields", "github.com/gravitational/teleport/lib/githubactions::TestIDTokenValidator_Validatte", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_unset_match}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsTLSDeviceVerified", "github.com/gravitational/teleport/lib/services::TestValidateReverseTunnel/empty_ccluster_name", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_match_match}", "TestExporterBasics/case=dense,randomF", "TestAccessMonitorin", "TestEvents/kube.request_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/request_missiing_ID_not_tracked", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphIAMConnfigReqDefaults/set_defaults", "FuzzParserEvalBoolPredicate/seed#13 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckGCPServiceAccounts/no_acccess_role", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/MFAVerified", "TestReasonRequired/resource_request:_require_reason_when__", "github.com/gravitational/teleport/lib/services::TestRoleParsing/test_case_'4'", "github.com/gravitational/teleport/lib/observability/tracing::TestTraceProvider/noot_sampling_prevents_exporting", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_match_match}", "TestGetIDToken/TestGetIDToken#01 (0.00s)\\n\"}", "TestRoleSetEnumerateDatabaseUsersAndNames (0.00s", "github.com/gravitational/teleport/lib/events/athena::TestPublisherConsumer", "github.com/gravitational/teleport/lib/cloud/azure::TestGetVirtualMachine/vm_with__only_user_managed_identities", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports", "github.com/gravitational/teleport/api/client::TestEventEqual", "github.com/gravitational/teleport/api/types::TestAppPortsValidation", "TestFilterItems/Filter_by_ID (0.00s)\\n\"}", "TestValidateSegment/segment_with_reserved_s", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_nomatch_unset}", "github.com/gravitational/teleport/lib/utils/gcp::TestGetServiceAccountFromCredenttialsJSON/bad_json", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_last_resource", "TestConnAndSessLimits (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/player::TestClose", "github.com/gravitational/teleport/lib/events::TestProtoStreamLargeEvent/large_unttrimmable_event_returns_error", "FuzzParseRedisAddress (0.00s)\\n\"}", "TestEvents/session.rejected_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestOktaAssignmentUnmarshal", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check/above_mmax_CertTTL", "TestWorkloadIdentityAPIService", "github.com/gravitational/teleport/lib/services::TestGetKubeClusterDomain/service11_dns_resolution", "TestCheckAccessToUserGroups/labels_e", "github.com/gravitational/teleport/lib/proxy/peer::TestClientCredentials", "TestAuthorizeWithLocksForBuiltinRole/A", "TestCheckOwnership (0.00s)\\n\"}", "TestRouter_DialWindowsDes", "TestUpsertAuthPreference/u", "TestAppPortsValidation/invalid_uri (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.query_OneOf", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##4", "TestEvents/session.command_EventFields (0.00s)\\n\"}", "TestMeetsMaxVersion_emptyOrInvalid (0.00s)\\n\"}", "TestCompare/empty_root_in_descendant_case (0.00s)\\", "github.com/gravitational/teleport/lib/cloud/azure::TestManagedSQLListWithinGroup//auth_error", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'glob_captuure_match'", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_active_->_active", "TestServiceAccess/list_resource_d", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewDayOfMonthh/1", "TestProtoResourceRoundtrip/new (0.00s)\\n\"}", "TestForEachResource_AdaptPageTokenLister (0.00s)\\n\"}", "TestWorkloadIde", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states", "TestServiceAccess/upsert_success (0.00s", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states", "github.com/gravitational/teleport/api/client::TestNew/successfully_dial_tcp_addreess.", "TestCheckSAMLIDPCA/no_active_keys (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestProtoStreamLargeEvent", "TestServiceAccess/DeleteAutoUpdateAgentRollout/allowed_", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestIsSSHDeviceVerified/all_extensions (0.", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/CreateGitHubAuthRequest_resource_not_allowed", "github.com/gravitational/teleport/lib/services::TestKubeResourcesMatcher/user_reqquests_a_role_with_wrong_regex", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/govcloud_fips", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query,_1h_extended_range_returns_enough_results,_asc", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestBasicFunctionality/errror_translation", "github.com/gravitational/teleport/lib/srv/server::TestToEC2Instances", "TestEvents/lock.created_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestStreamerCompleteEmpty", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity", "github.com/gravitational/teleport/lib/services::TestCompareResources/cmp_equal_wiith_different_IneligibleStatus", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_Endpoint//file_exporter", "Test_transport_rewriteRedirect/local_app", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/OSS_and_default_config", "TestMakeLabels/Multiple_maps_with_internal_lab", "TestAzureWatcher (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/sortcache::TestBasics", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin/sseed#3", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA/unparseable_ceert", "TestServiceAccess/UpsertAutoUpdateVersion/al", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_unset_match}", "github.com/gravitational/teleport/lib/player::TestUseDatabaseTranslator/SupporteddProtocols", "github.com/gravitational/teleport/lib/healthcheck::TestManager/duplicate_target_iis_an_error", "TestConvertIAMv2Error/unauthorized (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateConfig/allowed_admin_states/MFAVerified/verbs=[]", "TestNewAppV3/aws_app_console (0.00s)\\n\"}", "FuzzMSSQLLogin/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[update]", "TestFilterItems/Inclu", "TestAWSSecretsManager/Delete (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#13 (0.00s)\\n\"}", "TestValidateLocalAuthSecrets_deviceTypes (0.00s)\\", "github.com/gravitational/teleport/lib/events::TestJSON/session_print_event", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstCalculateDatabaseNameFilter/accept_any_database/random-name-902dc8d7-a39d-447a--be35-c1b98ff51c34", "TestConvertUsageE", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenValidator_Validate/innvalid_issuer", "github.com/gravitational/teleport/lib/utils/slices::TestFilterMapUnique/no_elemennts", "TestParseReviewFrequency/12_m (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpDelete", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV7:__cluster-level_MFA_allows_verified_MFA", "TestAuthorizer_AuthorizeAdminAction/OK_admin (0.", "TestSSMInstaller/ssm_run_failed_in_d", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_glob_match", "github.com/gravitational/teleport/api/client::TestNewDialBackground", "github.com/gravitational/teleport/lib/events::TestEvents/trusted_cluster_token.crreate_EventFields", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/access_list_review_delete_event", "TestTryRe", "TestParseShortcut/clusters (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/user_groups", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/duplicatte_allowed", "TestAuthPreferenceValidate/second_factors (0.00s", "TestResolveViaWebClient/va", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeName", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##40", "TestDatabaseFromRDSProxy/mysql (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/billing.create_card_EvenntFields", "TestResourceMatchersToTypes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/doees_not_match_all_requested_roles", "TestCheckAccessToKubernetes/on", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/no_erroors_remain_in_standby", "TestEvents/session.disk_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_matches_single_resource_with_wildcard_verb#01", "TestReconciler/resource", "github.com/gravitational/teleport/lib/itertools/stream::TestCollectPages/empty-caase", "TestGetConfigIntegration/cached/with_", "FuzzParseRefs/seed#14 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/.", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationDirectory_Lock", "github.com/gravitational/teleport/lib/services::TestAccessCheckerWorkloadIdentityy/wildcard_role,_no_labels_wi", "TestConvertUsageEvent/when_discover_has_resources_co", "TestEvents/db.session.mysql.stat", "TestNextKey (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#41 (0.00s)\\n\"}", "TestLogLevel/SetTRACE (0.00s)\\n\"}", "TestAccessListValidateWithMembers (0.00s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateAgentReport/allowed_admin_st", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthenticated/u", "TestAddRoleDefaults/access_(only_missing_l", "TestAWSAppAccessConfig/", "TestConfig_SetFromURL/fips_disabled_v", "TestGuessIfAccessIsPossible/own_", "TestAddRoleDefaults/reviewer_(e", "github.com/gravitational/teleport/lib/itertools/stream::TestMapErr", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceEnrolllStatus/DEVICE_ENROLL_STATUS_UNSPECIFIED", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestUpdateRemoveCycle", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/Create", "TestServiceAccess/CreateAutoUpdateAgentReport/allowed", "TestValidateHealthCheck", "github.com/gravitational/teleport/lib/events::TestDynamicKnownType", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_has_no_matchers", "TestCheckAccessToKubern", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilterForScale/pageSize=1,prop=47", "TestTunnelAddr/should", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbName/returns_emppty_string_when_given_root_cluster_non-db_resource_URI", "TestServiceAccess/DeleteCrownJewel/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServices", "TestParser/binary_variadic_function (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC", "TestCheckAccessToUserGroups (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/denying__a_role_works", "TestAddRoleDefaults", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/tampered_with_exp", "TestClientMap/create_client_succeed (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestListServers", "TestConsumerRunContinuouslyOnSingleAuth (0.09", "TestCheckAccessToGCP/empty_role_set (0.00s)\\n\"}", "TestIssueAndVerifyJoinState/success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleParsing/test_case_'3'", "github.com/gravitational/teleport/lib/services::TestCommandLabels", "github.com/gravitational/teleport/lib/services::TestParseShortcut/login_rules", "TestJoinServiceClient_RegisterUsingOracleMet", "github.com/gravitational/teleport/api/types::TestAlertSorting", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_nomatch_unset}", "github.com/gravitational/teleport/integrations/lib/plugindata::TestModifyFailed", "github.com/gravitational/teleport/lib/cryptosuites::TestSuites", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_root_glob_matcch_multipart", "Test_computeRolloutState/one_group", "TestGetServers/match_by_ip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/update", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2ICE/paginaation", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/no_keyyless_identity_issuer", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#17", "github.com/gravitational/teleport/lib/vnet/dns::TestServer", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/OK_reuse_requested_and_allowed", "TestIsEnabled/no_env_var_returns_false (0.", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestVallidateGCPResourceName/longer_than_63_character", "TestValidateOrigin/NOK:_Origin_without_ho", "github.com/gravitational/teleport/lib/msgraph::TestRetry/non-retriable", "TestBasicFunctionality/successful_dial (0.01", "github.com/gravitational/teleport/lib/utils::TestSet/contains/on_empty_set", "TestParseGatewayTarg", "github.com/gravitational/teleport/lib/services::TestApplyTraits/invalid_windows_llogin", "TestJoinServiceGRP", "TestIsInstanceMetadataAvailable (0.00s)\\n\"}", "TestCircuitBreaker_aft", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_unset_unset}", "TestAccessListDefaults (0.00s)\\n\"}", "TestServiceAccess/UpsertAutoUpdateAgentRollout", "TestParseShortcut/usergroup (0.00s)\\n\"}", "TestCheckAccess", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/ssuccess_with_alternate_signer", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/ok_address_annd_bad_port", "TestSanitize//../params (0.00s)\\n\"}", "TestUpsertCluster", "github.com/gravitational/teleport/lib/events::TestEvents/plugin.create_EventFieldds", "github.com/gravitational/teleport/lib/devicetrust/native::TestStatusError_Is", "TestFindMatchingProxyDNS (0.00s)\\n\"}", "TestMakeTracingHandler (0.00s)\\n\"}", "TestNewResourceExpression/fail_to_parse/! (0.00s", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/iinformational_parameters_can_be_modified", "TestHTTPUpload (0.01s)\\n\"}", "TestDatabaseFromRDSClusterNameOv", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/conflictingg_roles:_allow_all_with_legacy_deny", "TestParseReviewFrequency/1_year (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceEnrolllStatus/DEVICE_ENROLL_STATUS_ENROLLED", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings/off", "TestKeyAppendKey/all_without_leading_separa", "TestEvents/plugin.create_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAccessListReviewMarshal", "TestElastiCacheFetcher/skip_unava", "TestVarValidation/no_validation (0.00s)\\n\"}", "TestOpCompressed (0.00s)\\n\"}", "FuzzParseRefs/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/eu-central-1", "TestValidateRole/unsupported_function_in_", "TestDateExporterBasics/randomFlake", "TestOpenTunnelRequest/fill_defaults (0.00s", "TestDatabaseTunnelServic", "TestSliceMatchesRegex/test|staging (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestAWSIAMMPollSAMLProviders", "TestEvents/db.session.mysql.statements.cl", "TestExtraFields/text/level_componen", "TestParsePacket/unrecognized_type (0.00s)\\n", "TestIsPermanentEmitError/add_acce", "github.com/gravitational/teleport/lib/services::TestUnmarshalBackwards", "TestFromProtoNils (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNewAppServerForAWSOIDCIntegratioon/valid", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGKEFetcher/listt_stg_clusters_from_central", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestRepporterMachineWorkloadIdentityActivity", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{unset_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/keylesss_identity_subject_regex_invalid", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingIAMMethod/pass_case/pass_case_proxy", "github.com/gravitational/teleport/lib/limiter::TestRateLimiter", "TestMergeS3Protos (0.00s)\\n\"}", "Test_consumer_sqsMessagesCollector/verify", "TestEmitEditorChangeEvent/Ro", "github.com/gravitational/teleport/lib/utils/typical::TestParser/unary_function_wrrong_type", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/non-okta_servicee_deleting_okta_resource_is_allowed", "TestIsLeaf/gateway_URI (0.00s)\\n\"}", "TestHeaderRewriter (0.00s)\\n\"}", "TestGetKnownRegions/hand_picked (0.00s)\\n\"}", "TestValidateConfig", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeResourceNamesppace/returns_empty_string_when_given_leaf_cluster_non-kube_resource_namespace_URII", "TestEvents/unknown_OneOf (0.00s)\\n\"}", "TestInvalidDesktopName (0.00s)\\n\"}", "TestParseReviewFrequency/3month (0.00s)\\n\"}", "TestNormalizeECSResourceName/cloud_f", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestAutoEnroll_disableddByEnv", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/glob_match", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/MFFA_multiple_credentials_(1)", "github.com/gravitational/teleport/lib/githubactions::TestValidateTokenWithJWKS/vaalid_token", "Test_newUnstartedWorker/disabled (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams/StreamManyPParts", "TestDestinationFromURI//absolute/dir (0.00s)\\n\"}", "TestTraceProvider/spans_exported_w", "TestFnCacheConcurrentReads (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_unset_unset}", "github.com/gravitational/teleport/lib/multiplexer::TestPROXYEnabledListener_Acceppt/PROXY_v1_header", "github.com/gravitational/teleport/lib/events::TestEvents/bot.update_OneOf", "TestJoin/middle_empty_segment_preserved (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestGetUser", "github.com/gravitational/teleport/lib/events::TestEvents/health_check_config.updaate_EventFields", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states", "TestParseShortcut/tc (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/legacy_alloow", "github.com/gravitational/teleport/lib/utils::TestRemoveFromSlice", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[]", "TestGetByPurpose/nil_ref (0.00s)\\n\"}", "TestCLIPrompt/NOK_prefer_otp_with_per-", "TestEvents/device_EventFields (0.00s)\\n\"}", "TestConfig_Write (0.00s)\\n\"}", "TestWeakValidatedAssignableScopes (0.00s)\\n\"}", "TestEvents/bot.join_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/defaults::TestReadableDatabaseProtocol", "github.com/gravitational/teleport/lib/web/app::TestMatchApplicationServers", "TestParseAdvertiseAddr/multicast_address#01 (0.00", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/empty", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII", "github.com/gravitational/teleport/lib/services::TestCheckAccessToWindowsDesktop/nno_roles,_no_access", "TestExhaustiveNonEmptyStruct/empty_struct", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialCreation_empty", "TestSearchEvents/cost_optimized_query_", "TestMarshalUnmarshalSecurityReport (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestSubbmitOnce", "TestVariable/invalid_variable_syntax (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.elasticsearchh.request_EventFields", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequiredByEnv", "github.com/gravitational/teleport/lib/utils/proxy::TestDialProxy", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/arraay(string)", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstDatabaseObjectImportMatch/match_table_name", "TestParseShortcut/access_list (0.00s)\\n\"}", "TestRoundTripper_RoundTrip (0.01s)\\n\"}", "FuzzCommands/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[update]]", "github.com/gravitational/teleport/lib/events::TestEvents/desktop.directory.share__OneOf", "github.com/gravitational/teleport/lib/services::TestCheckAccessToWindowsDesktop/eempty_label,_no_access", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/NotRequired/verbs=[creaate]", "TestDatabaseFromRDSClusterNameO", "TestSendSSHPublicKeyToEC2 (0.00s)\\n\"}", "TestListResources/Node (0.03s)\\n\"}", "FuzzTraitsExpressionParser/seed#15 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/upsert", "github.com/gravitational/teleport/lib/services::TestCheckGCPServiceAccounts/readoonly_role,_override_TTL", "FuzzFetchMySQLVersion/seed#17 (0.00s)\\n\"}", "TestFindAllEmptyStruct/empty_struct (0.00s)\\n\"}", "TestThirdpart", "TestClient_SSHConfig (0.00s)\\n\"}", "TestEvents/auth_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/pagination::TestPageRequestToken/zeroo_value_is_valid", "github.com/gravitational/teleport/lib/proxy::TestGetServers/no_matches_for_ec2_idd", "TestPruneRequestRoles (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query,_1h_extended_range_returns_enough_results,_desc", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/vallid_custom", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_nomatch_match}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/MFA_explicit_user", "TestCheckSAMLIDPCA/empty_key (0.00s)\\n\"}", "TestIsRDSInstanceSupported/mi", "TestRoleParsing/test_case_'3' (0.00s)\\n\"}", "TestCheckAzureIdentities/empty_role_set (0.00s)\\n\"", "TestSliceOrString/unmarshal/error_int (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_RunAdmin", "github.com/gravitational/teleport/lib/services::TestValidateStaticHostUser", "TestAppPortsValidation/valid_overlapping_rang", "github.com/gravitational/teleport/lib/resumption::TestResumption/tunnel", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestDeleteCertAuthorityy/ca_not_found", "TestIsUserFunctions/IsLocalOrRemoteUser/r", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##27", "github.com/gravitational/teleport/lib/services::TestUserTokenUnmarshal", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[create]]", "TestEvents/recovery_code.used_OneOf (0.00s)\\n\"}", "Test", "Test_basicHTTPMaintenanceCl", "TestEvents/session.network_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/imds/oracle::TestGetTags", "github.com/gravitational/teleport/lib/multiplexer::TestMux/PostgresProxy", "TestSet/subtract/empty_minus_populated (0.00s)\\n\"}", "TestResetAuthPreference/una", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level_timesstamp", "TestKernelVersion/5.0.0-1028-gcp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteSuite/Concurrrent", "TestJSONRPCResponse (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialSite/failure_to_dial__remote_site", "TestFnCacheCancellation (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#31 (0.00s)\\n\"}", "TestMatchHealthy/WithIntegrationApp (0.00s)\\n\"}", "TestUpsertAuthPreferen", "github.com/gravitational/teleport/lib/sshutils/x11::TestReadAndRewriteXAuthPackett/match_and_replace_xauth_packet", "github.com/gravitational/teleport/lib/services::TestReconciler/resources_that_equual_don't_overwrite_each_other_", "TestTriggerGroups/unsupported_desire", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestGetInstanceInfo/all_ffields", "TestValidateTokenWithJWKS (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialHost/dial_failure", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_client,_must_check_for_AWS_integration_subkind", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams/Stream/Flaaky=false,ForceFlush=true", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewExpression/seed#2", "TestConfiguratorIsUsed (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/user.create", "github.com/gravitational/teleport/lib/auth/webauthn::TestPasswordlessFlow_backfilllResidentKey", "github.com/gravitational/teleport/lib/services::TestApplyTraits/kube_group_substiitute_in_allow_rule", "TestUpdateSessi", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setVersionMetric", "Test_inWindow/inside_window,_wrong_hour", "Test_app", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_unset_nomatch_unset}", "github.com/gravitational/teleport/lib/utils/typical::TestUnknownIdentifier", "TestTunnelAddr/should_use_WebListenAddr_with_default_https_port_i", "github.com/gravitational/teleport/api/trail::TestToGRPCKeepCode", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//OK_admin", "TestCal", "github.com/gravitational/teleport/api/mfa::TestMFACeremony/NOK_prompt_mfa_fail", "TestCalculatePendingRequestTTL/valid:_no_TTL_request_defaults_", "TestValidateAsssignment/basic (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToRemoteCluster", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_nomatch_unset}", "TestValidateRole/unsupported_fu", "TestCheckAccessToWindows", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/disallowed_admin_states", "TestLogLevel/SetDEBUG-1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestConnectionErroor", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError", "TestTarget_checkAndSetDefaults/missing_", "TestDeleteUserLoginState (0.04s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/cassandra/protocol::FuzzReadPacket/sseed#0", "github.com/gravitational/teleport/lib/utils/concurrentqueue::TestOrdering", "TestAtomicWriteShim/Items/desc", "Test_cosignKeyValidator_ValidateAndResolveDigest/untrusted_do", "TestEvents/role.created_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/NotFirstConnSynnc", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/GetAutoUpdateAgentRollout", "github.com/gravitational/teleport/api/client::Test_websocketALPNClientConn", "github.com/gravitational/teleport/lib/srv/server::TestNewEC2InstanceFetcherTags", "TestExtraFields/text/not_configured (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/Node", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestGetInstanceID", "TestOpenSearchFetcher/prod_default (0.", "TestServiceAccess/Upser", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/okta.access_list..sync", "TestChallengeValidator_ValidateChalle", "github.com/gravitational/teleport/lib/services::TestValidateSAMLIdPACSURLAndRelayyStateInputs/https://sp.com/acs!", "TestEvents/access_request.update_EventFields (0", "TestConfig_Endpoint/with_http_scheme (0.", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/GCP_IAMM_Auth/ApplyToPoolConfigs", "TestGetAuthPreference (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestDesktopClipboard/multiple_connflicting_roles,_disable_wins", "TestParseReviewFrequency/3_month (0.00s)\\n\"}", "TestUseDatabaseTranslator/SupportedProtocols (0", "TestTemplate_ParseError (0.00s", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_unset_match}", "github.com/gravitational/teleport/lib/services::TestNodeWatcherFallback", "github.com/gravitational/teleport/lib/tpm::TestPrintQuery/ekpub", "TestValidate_RequestedMaxDuration/requestedMaxDuration_is_", "TestParseShortcut/oktaimportrule (0.00s)\\n\"}", "TestPodma", "TestAzureDBServerFe", "github.com/gravitational/teleport/lib/services::TestApplyTraits/database_name/useer/role_internal_vars_in_deny_rule", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/without_an_integration_client,_must_return_missing_credential_provider_errror", "TestServiceAccess/DeleteAutoUpdateAgentRollout/allow", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListVPCs", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings", "github.com/gravitational/teleport/api/types::TestIsAutoUsersEnabled/postgres_withhout_admin_user", "TestResumption/mux/expecting_SSH_ver", "TestMigrationCheckpoint/failure_after_150_calls_(from_2nd_expor", "github.com/gravitational/teleport/lib/utils/typical::TestParser/unary_function_exxpression", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/missiing_bound_pod_claim", "github.com/gravitational/teleport/api/types::TestAssertionInfo_RoundTrip", "github.com/gravitational/teleport/lib/services::TestParseShortcut/proxies", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/expliicit_roles_request", "github.com/gravitational/teleport/lib/client/mcp/claude::TestConfig_Write", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/NOK_rotate_local_ca", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_match_match}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseGatewayTargetURII//clusters/foo/leaves/bar/kubes/kube", "TestSortedGCPServiceAccount", "github.com/gravitational/teleport/api/trail::TestConversion", "TestWriteConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestRollbackGroups/valiid_transition", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/FindRoleByARN/found", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_unset_unset}", "TestDisplay/invalid_characters (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/unknown_prrepared_statements", "TestSearchSessionRange/invalid_to (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws::TestFilterAWSRoles", "github.com/gravitational/teleport/lib/events/export::TestDateExporterResume", "TestUpdat", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/NotRequired/verbs=[update]", "TestGetServicePorts (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/terraformcloud::TestIDTokenValidator_Validaate/invalid_issuer", "TestProxyLine_AddSignature (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/gcp::TestGetServiceAccountFromCredenttialsJSON/external_account_credentials_with_sa_impersonation", "TestMakeServersHiddenLabels/Si", "TestWriteCmd/Teleport_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/player::TestUseDatabaseTranslator", "TestServiceAccess/UpsertAutoUpdateAgentReport/disallowed_admin_stat", "github.com/gravitational/teleport/api/types::TestAllDeviceEnumsMapped/DeviceEnrolllStatus/DEVICE_ENROLL_STATUS_NOT_ENROLLED", "TestDatabasePermissionMat", "TestTrimToMaxSize/desktop.directory.write (0.00s)\\", "TestCheckAccessToKub", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[create]", "FuzzParsePacket/seed#25 (0.00s)\\n\"}", "TestBasicFunctionality/ping (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/localhost", "github.com/gravitational/teleport/lib/scopes::TestJoin/middle_empty_segment_preseerved", "TestServiceAccess/CreateAutoUpdateAgentReport/disallowed_admin_stat", "Test_transport_rewri", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseOutput_CheckAndSettDefaults/valid", "TestClickableURL/hostname (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error/no_error", "TestUseOrCreateCredentials (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[uppdate_create]", "FuzzParserEvalBoolPredicate/seed#28 (0.00s)\\n\"}", "TestParseDBURI//clusters/foo/leaves", "TestServiceAccess/UpdateAuto", "TestSortedGCPServiceAccounts/invalid_accoun", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_unset_nomatch}", "TestServiceAccess/UpsertDatabaseObject/allowed_admi", "TestDatabaseO", "TestConversionFromProto_nils", "TestParseShortcut/github (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_match_nomatch}", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestBasicFunctionality/pinng", "TestGetResources/KubeServer (0.34s)\\n\"}", "TestEvents/sigstore_policy.delete_EventFields", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/AssumeRolle_success_(shorter_identity_duration)", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSecurityGrroup", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//OK_local_user_reused_mfa_with_reuse_allowed", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/some_ip_address", "TestIDTokenValidator_Validate/invalid_i", "TestServiceAccess/GetAutoUpdateAgentRollout/allowed_admin_s", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/GetUserTask/verbs=[]", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/invalid_sqs_queue_url", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewMatcher/seed#3", "TestEvents/client.disconnect_EventFields (0.00s)\\n\"", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_GetUserMetadata/device__metadata", "TestConsumerWriteToS3 (0.01s)\\n\"}", "TestNewResourceExpression/fail_to_parse/#00 (0", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/ERR__HEADER_protocol_4.1", "TestGetClientUserIsSSO (0.00s)\\n\"}", "TestEvents/mfa_auth_challenge.validate_OneOf (0", "TestIsFIPSEnabled/non-FIPS_binary (0.00s)", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_claimsToRollesParser_Set/two_sets_of_correct_args", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestForceGroupsDone", "TestWorkloadIdentityMarshaling (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestCompare/empty_lhs_root_in_equivvalence_case", "TestGetEnforcementMode/OSS_default (0.00s)\\n\"", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.statemeents.close_EventFields", "FuzzMongoRead/seed#17 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpMsgDocumentSSequence", "TestEvaluateTraitsMap/string_helpers (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestNewAppV3/non-cloud_app", "github.com/gravitational/teleport/api/types::TestDeviceConversions_toAndFrom", "TestDeduplicateKey/EmptyStringSlice (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/kerberos::TestConnectorKInitCClient/kinit_invalid_certificate", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestGetKubeClientGettter/test#4", "TestLabelParse (0.00s)\\n\"}", "TestOpenFileLinks/unsafe-symlinkFileOpenDenied", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetAuthPreference/reset", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_match_match}", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull/normal_aadd", "github.com/gravitational/teleport/lib/gcp::TestIDTokenValidator_Validate", "github.com/gravitational/teleport/api/internalutils/stream::TestMergeStreams/streeam_B_empty", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/services::TestCompareResources/IsEqual_equaal", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_PublicAddr_and_TunnelListenAddr", "TestGetReadiness/Not_found (0.00s)\\n\"}", "TestValidateCrownJewel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/device.enroll_OneOf", "github.com/gravitational/teleport/api/client/webclient::TestParse/tcp://example.ccom:443", "github.com/gravitational/teleport/api/types::TestRotationZero", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_match_unset}", "github.com/gravitational/teleport/lib/utils/slices::TestDeduplicateKey/NoStructDuuplicates", "github.com/gravitational/teleport/lib/srv/server::TestAzureWatcher/filter_by_resoource_group", "Test_databa", "github.com/gravitational/teleport/lib/web/ui::TestMakeAppTypeFromSAMLApp/saml_serrvice_provider_with_preset", "github.com/gravitational/teleport/lib/jwt::TestKeyIDHasConsistentOutputForAnInputt/ECDSAP256", "TestParseSignatureAlgorithmSuite/3/yaml (0.01s)\\n\"", "TestCursorBadState (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsTLSDeviceVerified//nok:_missing_DeviceID", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureSQLServer/complete_server", "github.com/gravitational/teleport/lib/services::TestParseShortcut/accesslists", "github.com/gravitational/teleport/lib/healthcheck::Test_newHealthCheckConfig/appllies_defaults", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/label_too_long", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/query_with__event_types", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/string_field", "TestMajorSemver/simple_semver (0.00s)\\n\"}", "TestIDTracker (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestCollectPages/error-caase", "TestEvents/db.session.query.failed_OneOf (0.00s)\\n\"", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/disallowed_admin_states/Unauthorized", "TestDisplay/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestInterpolate", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/discover_create_discovery_config_event", "TestGetAgentVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMatchResourceByHealthStatus", "TestEqualStatement/different_actions (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMarshalYAML/list_of_pointers_to__yaml_docs", "TestServiceAccess/UpdateAutoU", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_three_roles,_2_exact_match,_both_can_create", "TestAWSSecretsManager/bad_key (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__with_wildcard_labels_matches_cluster_with_labels", "TestGetVirtualMachine (0.00s)\\n\"}", "github.com/gravitational/teleport/api/mfa::TestMFACeremony_SSO", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/NotRequired/verbs=[]", "TestGetConfigIntegration/cached (0.00s)\\n\"}", "TestJSON/session_command_event (0.00s)\\n\"}", "TestConvertRequestFailureError/StatusNotFou", "TestGithubAuthRequest_Check/above_max_CertTT", "github.com/gravitational/teleport/lib/utils/aws::TestCreateBucketConfiguration/unnknown_region", "TestListDatabases/pagination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/discovery_config.delete__all_EventFields", "TestRoleMap/test_case_'direct_matc", "github.com/gravitational/teleport/lib/backend::TestSanitize//..params", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/NotRequired/verbs=[updaate]", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin/OK:_Origiin_without_port", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/databases/resource_iterator/ascending", "TestGetReadiness/Success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/User_is_removed_from_the_editor_role_but_still_has_other_roles", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestMergeRResources", "github.com/gravitational/teleport/lib/events::TestEvents/sigstore_policy.delete_EEventFields", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate", "TestCheckSPIFFESVID/regex_success (0.00s)\\n\"}", "TestTunnelAddr/s", "github.com/gravitational/teleport/lib/cloud/azure::TestListServers/list_all_PostggreSQL_servers", "TestSignAndVerify/ECDSAP256 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/CrownJewelCreateEvent", "TestValidate_WithAllowRequestKubernetesResources/reject_whe", "TestVerifyAttestation/NOK_format_not_s", "TestAWSSignerHandler (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestTimeout", "TestNewResourceEx", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee", "github.com/gravitational/teleport/lib/backend::TestKeyTrimSuffix/prefix_trim_trimms_nothing", "TestOutput/json/error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/reviewer_(nott_enterprise)", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/untrusted_double_signed_manifest", "TestDatabaseTunnelService_CheckAndSetDefa", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//NOK_local_user_mfa_verified_private_key_policy", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/update", "TestParsePacket/COM_CHANGE_USER (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille/reconciliation_faces_conflict_on_first_try,_should_retry_and_see_that_there's__nothing_left_to_do", "github.com/gravitational/teleport/lib/services::TestValidateRoles/missing_role", "github.com/gravitational/teleport/lib/services::TestGuessIfAccessIsPossible/globaal_session_list/read_allowed", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_4242,_portName:_http", "TestClusterExternalAud", "TestParseShortcut/recconfig (0.00s)\\n\"}", "TestParseShortcut/installer (0.00s)\\n\"}", "TestAccessMonitoringRuleCRUD/no_access_to_upsert_AccessMon", "TestC", "github.com/gravitational/teleport/lib/tbot/workloadidentity/attrs::TestWorkloadAtttrs", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/backend::TestKeyAppendKey/suffix_with_no_leeading_separators", "TestRolesForResourceRequest/mu", "TestDraftExternalAuditStorage (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstCalculateDatabaseNameFilter/accept_any_database", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/name_|", "github.com/gravitational/teleport/lib/services::TestParseShortcut/net_config", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstMatchPattern", "TestTrimToMaxSize/db.session.user.deactivate (0", "TestRegexMatchesAny/glob_must_match_full_stri", "Test_progressGro", "Test_computeRolloutState/all_group", "github.com/gravitational/teleport/api/types::TestAppPortsValidation/end_port_smalller_than_port", "TestConvertUsageEvent/disc", "TestCircuitBreaker_afterExecution/gener", "github.com/gravitational/teleport/lib/events::TestEvents/mfa_auth_challenge.creatte_OneOf", "TestRegexMatchesAny/regexp_match (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/jwt::TestKey_SignAndVerifyAWSOIDC", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerRANDOM", "github.com/gravitational/teleport/lib/events/memsessions::TestStreams/StreamManyPParts/Flaky=false,ForceFlush=true", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams/Stream/Flaaky=false,ForceFlush=false", "github.com/gravitational/teleport/lib/services::TestParseShortcut/token", "TestValidate_RequestedMaxDuration/role_max_dur", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/non_mattching_expressions/exists(labels.undefined)", "TestEvents/discovery_config.delete_all_OneOf (0", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureDBServeerFetchers/skip_access_denied_errors", "TestCheckAccessToWindowsDe", "TestSet/subtract/populated_minus_empty (0.00s)\\n\"}", "TestTel", "TestEvents/auto_update_config.create_EventF", "github.com/gravitational/teleport/lib/utils/typical::TestParser/or_literals", "TestIsALPNConnUpg", "github.com/gravitational/teleport/lib/auth/webauthncli::TestDefaultPrompt_PromptCCredential/credential_by_number_(2)", "TestMarshalUserTaskRoundTrip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestResourceRequesst", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRequest/resiign_azure_JWT/OK_signed_by_web_session_key", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/backend::TestSanitize//a-b/c:d/.e_f/01", "FuzzParseRefs/seed#0 (0.00s)\\n\"}", "TestParse//clusters/foo/dbs/db (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/singlee_entity_without_entries_but_is_wildcard", "FuzzParseRefs/seed#9 (0.00s)\\n\"}", "TestTrustedClusterRBAC (0.00s)\\n\"}", "FuzzParseRefs/seed#13 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws::FuzzParseSigV4/seed#1", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse", "TestHandler_getToken/timeout (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/missingg_path_with_IPv6_addr", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/sqs_queue_url_is_set_but_not_cloudtrail_bucket", "Test_setVersionMetric (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[]", "TestVal", "TestMalformedOpMsg/empty_$db_key (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_unset_match_nomatch}", "github.com/gravitational/teleport/lib/backend::TestKeyTrimPrefix/suffix_trim_trimms_nothing", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/arn_fails_to_paarse", "github.com/gravitational/teleport/lib/services::TestMatchGCPServiceAccount/allow__exact_match", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment/segment_with_leeading_symbol", "TestIsUserFunctions/IsRemoteUser/remote_user (0.", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_unset_nomatch}", "TestLogin_noCredentials_failsWitho", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAddCredentialProcesssToSection/error_when_default_profile_exists_and_has_other_fields", "Test_zipStreams_Process/no_leaders (0.00s)\\n\"}", "TestDesktopDirectoryS", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/real_world_2", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_nomatch_match}", "TestServiceAccess/UpsertAutoUpdateConfig/allowed_admin", "TestUploa", "TestSSHPortForwarding (0.00s)\\n\"}", "TestParseSignatureAlgorithmSuite/\\\"fips-v1\\\"", "TestJoinServiceGRPCServer_RegisterUsingTPMMethod/missing_join_request/m", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericWrapperCCRUD", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//update_no_access", "github.com/gravitational/teleport/lib/events/export::TestExporterBasics/case=emptty,randomFlake=false", "TestTrimToMaxSize/okta.user.sync (0.00s)\\n\"}", "TestNonceBasics (0.00s)\\n\"}", "TestKey_SignAndVerifyAWSOIDC/ECDSAP256 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestReconciler_Reconcille/reconciliation_faces_conflict_on_first_try,_should_retry_and_update_a_second_ttime", "TestCheckDatabaseNamesAndUsers/ttl_doesn'", "TestLogLevel/SetLowerINVALID (0.00s)\\n\"}", "TestStreams/Stream/Flaky=true,For", "TestWrapPayload/recording_", "TestLoadIdentityFile (0.01s)\\n\"}", "TestVerifyAttestation (0.02s)\\n\"}", "TestDatabaseServiceMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/Unauthorized/verbs=[read]", "TestEvents/app.session.chunk_OneOf (0.00s)\\n\"}", "TestGetConfigIntegration/uncached/with_an_i", "github.com/gravitational/teleport/lib/itertools/stream::TestFlatten", "github.com/gravitational/teleport/lib/srv/discovery/common::TestExtraElastiCacheLLabels", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#18", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/siingle_user,_multi_credential,_empty_user", "TestValidateStaticHostUser/inval", "TestGetConfigIntegration/cached/with_an_integration_credenti", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_reconciler_computeeStatus/status_is_reset_if_strategy_changes", "TestParseShortcut/nodes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin/OK:_Origiin_is_a_subdomain_of_RPID", "TestUpsertUserLoginStates (0.01s)\\n\"", "github.com/gravitational/teleport/lib/cloud/provisioning::TestWriteOperationPlan", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/empty", "TestOktaCRUD/upda", "FuzzMSSQLLogin/seed#5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestHostUsers_HostSudoers/test_exxact_match,_one_sudoer_entry,_one_role", "TestDatabaseObjectImp", "FuzzParsePacket/seed#17 (0.00s)\\n\"}", "TestRolesForResourceRequest/deny_request (0.00s)\\", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredPropsConversionns", "TestEvaluate_Errors (0.00s)\\n\"}", "TestGlobMatch/exclusive_child_glob_m", "TestVerifyAttestation/NOK_format=none (0.00s)\\n", "github.com/gravitational/teleport/lib/utils/typical::TestParser/and_with_wrong_tyype", "TestKub", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix/ipv6_zonee", "TestCi", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/challenge_response_error/challenge_response_errror_proxy", "TestEvaluateCondition/doe", "FuzzTraitsExpressionParser/seed#9 (0.00s)\\n\"}", "TestApplicationTunnelService_Che", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseOutput_CheckAndSettDefaults/missing_service", "TestAKSFetcher/list_everything (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_prefer_webauthhn_with_authenticator_attachment_requested", "github.com/gravitational/teleport/lib/backend/pgbk/common::Test_makeGCPCloudSQLAuuthOptionsForServiceAccount/using_default_credentials", "TestGoodbye/goodbye_termination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/typical::TestParser/empty_expression", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/disallowed_admin_states/Unauthorized", "TestParseRoleARN/valid_sso_role_arn (0.00s)\\n\"}", "TestGetDbName/retur", "TestAuthorizedKey/missing_HostID#01 (0.00s)\\n", "TestServiceAccess/DeleteAutoUpdateAgentReport/allowed_admin_states/MFAV", "github.com/gravitational/teleport/lib/cloud/aws::TestParsePolicyDocument", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestDatabasePermmissionMatch/mismatch:_no_labels", "github.com/gravitational/teleport/lib/backend::TestSanitize//xyz", "TestAccessMonitoringRuleCRUD/no_access_to_update_AccessMon", "github.com/gravitational/teleport/lib/integrations/awsoidc/credprovider::TestCreddentialsCache/WindowedErrors", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestGCPIPType/public", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app", "TestEvents/db.session.sqlserver.rpc_", "TestVerifyAttestation/NOK_x5c_invalid_cert", "TestFailoverTrigger_Name/two_tr", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestGetTags/ok", "TestApplyTraits/Azure_identity_sub", "TestTrimToMaxSize/session.command (0.00s)\\n\"}", "Test_claimsToRolesParser_Set (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestGetTeleportUser/event_with_userr_metadata", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/scalar_and_object", "TestChallengeValidato", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts", "github.com/gravitational/teleport/lib/srv/app/aws::TestURLForResolvedEndpoint/repplaced_host_and_scheme", "TestWindowsDesktopGroups/option_denied (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/slices::TestDeduplicateKey/StringDupllicates", "github.com/gravitational/teleport/lib/cloud/aws::TestMarshalPolicyDocument", "FuzzTraitsExpressionParser/seed#32 (0.00s)\\n\"}", "TestAppServerBasics (1.50s)\\n\"}", "TestValidate_RequestedPendingTTLAndMaxDurat", "TestNewCacheKey (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/user_task.update_OneOf", "TestHealthCheckAppServer/no_match (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_unset_unset}", "TestAuroraMySQLVersion/5.6.mysq", "TestOIDCGetRedirectURL/other.example.com:80 (0", "TestEnsureSCIMEndpoint/non-v2_v", "TestConnectorKInitClient/ke", "TestMatchValidAzureIdentity (0.00s)\\n\"}", "TestValidateCrownJewel/ValidCrownJewel (0.00", "github.com/gravitational/teleport/lib/events::TestEvents/kube.delete_EventFields", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters/db_serrver", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__requires_device_trust,_device_verified", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSV22Cluster/DB_Cluster_uses_network_information_from_DB_Instance_when_available", "TestStdioHelpers (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_CheckAndSettDefaults/all_set_(invalid)", "TestGetCertAuthorities/ca_found_wit", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//1.0/json", "TestServiceAccess/update_success (0.00s", "TestRegistrationFlow_Begin_excludeList (0.00s)", "TestReconciler_Reconcile/reconciliation_meets_a_hard_", "FuzzParserEvalBoolPredicate/seed#14 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/ccan_return_multiple_logins_from_same_role", "github.com/gravitational/teleport/lib/events::TestEvents/billing.create_card_OneOOf", "TestKubernetesServerBasics (1.62s)\\n\"}", "TestCertificateVerification/success (0.05s)\\n\"}", "TestServiceAccess/GetDatabaseObject/allowed_admin_states/Unauthorized/v", "TestCheckAccessToWindowsDesktop (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/NOK_x55c_cert_with_wrong_type", "github.com/gravitational/teleport/lib/services::TestCertPoolFromCertAuthorities/cca1_+_ca2_with_3_certs_total", "TestConv", "TestApplyTraits/full_deny_kub", "github.com/gravitational/teleport/lib/services::TestGetRequestableRoles", "TestEvents/secreports.report.run_OneOf (0.00s)\\n\"}", "TestSafeEnvAddFull/normal_add (0.00s)\\n\"}", "TestSet/create/populated (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#37 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_CheckAndSettDefaults/empty_(invalid)", "TestFanoutV2StreamFiltering (0.00s)\\n\"}", "TestKeyPrefix/prefix=/teleport/ (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_rrevocation.update_EventFields", "TestLogLevel/SetLowerTRACE (0.00s)\\n\"}", "TestKubeResourceCouldMatchRules/input_has_name", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestAutoEnrollCeremony__Run/macOS_device", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/v5_roole_with_wildcard_deny.kubernetes_labels", "TestValidateSigstorePolicy (0.01s)\\n\"}", "TestEvents/sftp_summary_EventFields (0.00s)\\n\"}", "TestFetchOraclePrincipalClaims/ok (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestDesktopDirectorySharing/singlle_role,_unspecified,_defaults_true", "TestSignatureAlgorithmSuiteRoundtrip (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyHasPrefix/valid_multi_compoonent_prefix", "TestCalculatePe", "github.com/gravitational/teleport/lib/utils::TestOpenFileLinks/unsafe-symlinkFileeOpenDenied", "TestIDTokenSource_GetIDToken/value_present (0.", "github.com/gravitational/teleport/lib/utils::TestNewCertPoolFromPath", "TestOIDCAuthRequest_Check/above_max_CertTTL (0", "TestIsAutoUsersEnabled/postgres_without_ad", "github.com/gravitational/teleport/lib/backend::TestKeyScan/empty_string_key", "TestEvents/device.create_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::Test_GetTcpAddr", "TestMigrate/real_world_6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/okta.sync.failuree", "TestIssuerFromPublicAddress/valid_ip", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__STMT_FETCH", "github.com/gravitational/teleport/lib/services::TestDatabaseServiceMarshal", "TestListDeployedDatabaseServices (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/multicast_adddress", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//wrong_signature_(source_address)", "TestHomeDirExpansion/~user_path (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/duplicatte_keys", "TestRegister (0.00s)\\n\"}", "TestRewriter (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdate", "TestServiceAccess/GetAutoUpdateAgentReport/allowed_admin_states/M", "TestServersCompare (0.00s)\\n\"}", "TestValidateRoleARNAndExtractRol", "TestEvents/instance.join_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestResourceWatcher_Backoff", "TestParseShortcut/user_group (0.00s)\\n\"}", "TestPublicOnlyVerifyAzure (0.92s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse", "TestBackground (0.20s)\\n\"}", "TestCheckA", "github.com/gravitational/teleport/lib/scopes/cache::TestCursorScenarios", "TestContextLockTargets/Kube (0.00s)\\n\"}", "TestAtomicWriteValidation (0.00s)\\n\"}", "TestResourceARN/policy (0.00s)\\n\"}", "TestAccessChecker_EnumerateMCPTools/allow_wildcard,_deny_speci", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/Unauthorized/verbs=[read]", "FuzzReadAndRewriteXAuthPacket/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_attributesTToRolesParser_Set/two_sets_of_correct_args", "TestCertPoolFromCertAuthorities/ca1_with_1", "TestSQLManagedServerFetcher (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestPoll", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp/wildcard_replaces__empty_string_to_predefined_value", "TestValidateHeadlessAuthentication/", "github.com/gravitational/teleport/lib/client/mcp/claude::Test_isJSONCompact/bad_JJSON", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpdateDatabaseObject/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialHost", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/role_name_in_deefault_partition_and_account", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_webauthn", "github.com/gravitational/teleport/lib/scopes::TestValidateSegment", "TestReviewThresholds (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestSanitize", "TestGlobMatch/inline_glob_simple_mismatch (0.00s)\\", "TestCalculatePendingR", "github.com/gravitational/teleport/lib/cloud/aws::TestEqualStatement", "TestMergeS3Protos/B", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#30", "TestEvents/login_rule.create_EventFields (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGitServer/wildcaard_allow", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/verify_coverage/CreateCrownJewel", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/threshold_ommission_check", "github.com/gravitational/teleport/lib/services::TestConvertResource/converts_legaacy_to_RFD_153_resource", "TestAccessListUnmarshal (0.01s)\\n\"}", "TestValidate_RequestedMaxDuration/w", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode/config_enabbles,_version_suspends", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[update]", "TestExtraElastiCacheLabels (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/root_literal", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/NotRequired", "TestPlainHttpFallba", "TestSSHPortForwarding/allow_remote_and_local", "TestAddRoleDefaults/reviewer_(not_enterprise", "TestMapWhile (0.00s)\\n\"}", "TestGenericListResourcesWithFilte", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/authz::TestGetDisconnectExpiredCertFromIdenntity/expiry_returned_when_checker_nil_and_disconnectExpiredCert_true", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy", "TestDatabaseRDSProxyEndpoint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestReasonRequired/role_request:__handle_wildcard", "TestParseReviewFrequency/1 (0.00s)\\n\"}", "TestCreateSession/check_def", "github.com/gravitational/teleport/lib/services::TestValidateWorkloadIdentity/invaalid_expression", "TestCheckGCPServiceAccounts (0.01s)\\n\"}", "TestIsRoleARN/valid_partial_arn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'all_empty''", "TestAWSSecretsManager (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cap", "FuzzParserEvalBoolPredicate/seed#23 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/grants", "TestSearchSessionRange/base_case (0.00s)\\n\"}", "FuzzReadAndRewriteXAuthPacket/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA/no_active_keyss", "Test_isPodUnhealthy/stuc", "github.com/gravitational/teleport/lib/events::TestEvents/user.create_EventFields", "TestMatchPattern (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.mysql..drop_db", "TestParser/error_evaluating_dynamic_key (0.00", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error/resource_aalready_exists", "TestIdentityCenterAccountAssignmen", "github.com/gravitational/teleport/lib/events::TestEvents/auth_preference.update_EEventFields", "FuzzMongoRead/seed#10 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGitServer/no_rolles", "github.com/gravitational/teleport/lib/utils/typical::TestParser/integer_equality__(false)", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstDatabaseObjectImportMatch", "github.com/gravitational/teleport/lib/services::TestValidateAccessRequestClusterNNames/local_cluster_is_requested", "TestNewS3V2FileWriter/write", "TestUnhealthyWorkloadTrigger_CanStart/deployment_(replicated_OK) (0.01", "TestApply/migration_failed (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/MFAVerified", "TestExtractCredFromAuthHeader (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestGetDisconnectExpiredCertFromIdenntity/mfa_overrides_expires_when_set", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/no_curly_bracket_sufffix", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/singletoon", "Test_exportEndpoin", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/SESSIION_AND_HARDWARE_KEY/encode", "TestDatabaseTunnelService_CheckAndS", "github.com/gravitational/teleport/lib/events::TestEvents/mfa_auth_challenge.validdate_EventFields", "TestUpsertAuthPreferenc", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#38", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level_compoonent_caller", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/tampered_with_subject", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/auth_error/auth_error_proxy", "TestSSHIdentityConversion (0.00s)\\n\"}", "TestNewAWSNodeFromEC2Instance/mis", "github.com/gravitational/teleport/api/client::TestKeyPair", "TestValid", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestEC2IsInstanceMetadataAvvailable/response_with_new_id_format", "TestDatabaseResourceURI/generated_uri (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_nomatch_unset_unset}", "TestServiceAccess/delete_verb_", "TestParserHostCertContext/complex/negative (0.0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_nomatch_unset}", "github.com/gravitational/teleport/api/types::TestNewAppV3/aws_app_console", "TestCheckDatabaseRol", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/NOK_nonexistent_ca", "github.com/gravitational/teleport/lib/events::TestJSON/success_port_forward", "TestUnifiedResourceCa", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSInnstance", "github.com/gravitational/teleport/lib/automaticupgrades/version::TestFailoverGettter_GetVersion", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.sqlserver.rpcc_request_EventFields", "TestUpsertCl", "TestFilterRulesForDatabase (0.00s", "github.com/gravitational/teleport/lib/utils/diagnostics/latency::TestMonitor", "TestServiceAccess/DeleteCrownJewel/allowed_admin_states/MFAVerif", "TestVisitorBasics (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/vnet/dns::TestServer/no_domain", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/exists(labels.env)_&&_labels[\\", "TestEmitEditorChangeEvent (0.00s)\\n\"}", "TestServiceAccess/ListDatabaseObjectImp", "TestParser/error_evaluating_argument (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_match_unset_unset}", "TestTrimToMaxSize/access_list.member.delete (0.0", "TestCanCopyFiles/true_and_false (0.00s)\\n\"}", "TestServiceAccess/list_verb_not_", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/invalid_random_id_-_contains_URL", "TestCursorPagination/high_depth (0.00s)\\n\"}", "TestMeetsMinVersion_emptyOrInvalid (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckGCPServiceAccounts/denyiing_a_role_works", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/sshca::TestIdentityConversion", "github.com/gravitational/teleport/lib/services::TestConvertResource/converts_legaacy_to_legacy", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_match_unset}", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/caller", "TestAccessListHierarchyDepthCheck (0.00s)\\n\"}", "TestPoll/WithoutResults (0.00s)\\n\"}", "TestUploadMetadata (0.00s)\\n\"}", "TestEvents/desktop.directory.share_EventField", "TestServiceAccess/DeleteUserTask (0.00s", "TestDeduplicateKey (0.00s)\\n\"}", "TestAddRoleDefaults/requester_(enterprise) (0.0", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiterConfig/validd_config", "Test_cosignKeyValidator_ValidateAndResolveDigest", "TestSortingExportFile/equality_check,_less_data_then_maxSize,_", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_VerifySignature//success_ipv6->ipv4_downgrade", "TestEvents/health_check_config.update_Even", "TestPublisherConsumer/large_via_s3 (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_OPTIONS", "github.com/gravitational/teleport/lib/services::TestRoleSetEnumerateDatabaseUserssAndNames/there_may_be_users_disallowed_from_all_users", "TestAppPortsValidation/end_port_bigger_than", "TestGCPServiceAccountMatcher_Matc", "TestListSecurityGroups/no_vpc_id (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#34 (0.00s)\\n\"}", "TestMemoryListenerServer (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/imds/aws::TestGetInstanceID", "TestDefaultConfigGroup/CMC_with_no_w", "TestConversionFrom", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/Unauthorized/verbs=[read]", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestStart", "github.com/gravitational/teleport/lib/auth/webauthncli::TestDefaultPrompt_PromptCCredential/loops_until_correct", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGKEFetcher/listt_everything_with_wildcard_project", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/hasPrefix(name)", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestRegister/with_UV_prefferred_and_platform", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_match_match}", "github.com/gravitational/teleport/lib/utils::TestIsValidHostname/one_component", "TestIssueAndVerifyJoinState/", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/simple_successs", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestInvalidPayloaddSize", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_app_help/help_command", "TestAWSSignerHandle", "TestAllDeviceEnumsMapped", "TestClientCredentials/invalid_identity (0.00s)\\n\"", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states", "github.com/gravitational/teleport/lib/httplib::TestConvertResponse/url_error", "TestStart (0.11s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestContext_GetAccessState/builtin_rrole", "github.com/gravitational/teleport/lib/srv/db/redis/connection::FuzzParseRedisAddrress/seed#3", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{unset_unset_unset_match}", "TestUnifiedResou", "TestCloneBreaksEquality (0.00s)\\n\"}", "TestGetCreateDatabaseCreateMod", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Begin_errors", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenValidator_Validate", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestSortingExpoortFile/sorting_1MB_of_data_by_loading_max_200KB_into_memory", "TestInstallFlagsYAML/order (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/||", "TestIsRoleARN/valid_user_arn (0.00s)\\n\"}", "Test_setVersionMetric/old_non-exp", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError/SStatusForbidden", "TestValidateOrigin/NOK:_Origin_has_", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr", "TestParseShortcut/cap (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_nomatch_nomatch_unset}", "TestSliceOrString/unmarshal/slice (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/ui::TestMakeLabels", "github.com/gravitational/teleport/lib/autoupdate::TestInstallFlagsYAML", "TestKeyTrimPrefix/partial_trim (0.00s)\\n\"}", "TestReporter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConvertSubnet/witth_name_tag", "github.com/gravitational/teleport/lib/backend/memory::TestMemory", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors//NOK_nil_resp", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/skip_unexppected_command_results", "TestCeremony_RunWeb (0.01s)\\n\"}", "TestOk", "github.com/gravitational/teleport/lib/backend::TestRangeEnd//foo/bar", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError/agg_badParrameter_with_wrap", "github.com/gravitational/teleport/lib/cloud/azure::TestClientMap/get_credentials__failed", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestIsRoot/leaf_cluster_rresource_URI", "TestEvents/user_task.create_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/session.end_EventFields", "github.com/gravitational/teleport/lib/utils::FuzzParseWebLinks/seed#0", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[crreate]", "TestServiceAccess/GetDynamicWindowsDesktop,allowed:NotRequired,verbs:[", "TestNewDialerForGRPCClient/Check_that_PROXYHead", "TestReplaceRegexp/empty_value_is_no_match (0.00s)\\n", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_AddSignature/exiisting_signature_on_proxy_line", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/success_case", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/unix_socket_with__screen_number", "TestIDTokenSource_GetIDToken/value_missing (0.", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityJWTServicee_CheckAndSetDefaults/valid", "TestGetCreateDatabaseCreateMode/disabled (0.00s)\\", "TestNewId", "TestTrimToMaxSize/access_list.create (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelEC2/connnect_over_websocket", "github.com/gravitational/teleport/lib/utils::TestKernelVersion/4.19.0-6-cloud-amdd64", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject", "github.com/gravitational/teleport/lib/inventory::TestGoodbye", "github.com/gravitational/teleport/lib/limiter::TestConnectionsLimiter", "github.com/gravitational/teleport/lib/utils/aws::TestExtractCredFromAuthHeader", "github.com/gravitational/teleport/lib/scopes/roles::TestValidateAsssignment", "Test_Channels_DefaultChannel/defaul", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetKubeName/returns_eempty_string_when_given_root_cluster_non-kube_resource_URI", "github.com/gravitational/teleport/lib/utils/interval::TestVariableDurationIncDec", "TestTrimToMaxSize/db.session.mysql.sta", "TestSkip (0.00s)\\n\"}", "TestServiceAccess/GetDatabaseObjectImportRule/allowed_admin_states", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/missing_trust_anchor_arn", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/okta_service_creeating_okta_resource_is_allowed", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/search()", "TestEvents/trusted_cluster.create_OneOf (0.00s)\\n\"}", "Test_isInclusionAllowed/Single-item_matching_annotation (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_Run", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/nuumber_of_credentials_is_correct", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/reviewer_(entterprise,_created_by_user)", "TestDeployServiceRequest (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_CheckAndSettDefaults", "TestFailove", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateConfig/allowed_admin_states", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_UNSPECIFIED/JSON", "TestHasDeviceTrustExtensio", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_unset_match}", "TestEvaluateTraitsMap/choose (0.00s)\\n\"}", "TestSendSSHPublicKeyRequest/mi", "TestCheckDatabaseNamesAndUsers/single_role (0.0", "github.com/gravitational/teleport/lib/utils::TestMinVersions/client_newer_than_miin_version", "TestLogLevel/SetLowerWARN (0.00s)\\n\"}", "TestRoleSetForBuiltinRoles (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/requested__role_denied", "TestSearchEvents/query_on_time_range_", "github.com/gravitational/teleport/lib/events::TestEvents/bot.delete_OneOf", "TestServiceAccess/Creat", "github.com/gravitational/teleport/lib/services::TestFillSAMLSigningKeyFromExistinng", "TestAccessGraphAWSIAMConfig/invalid", "TestParseReviewFrequency/1_y (0.00s)\\n\"}", "TestServiceAccess/UpsertAutoUpdateConfig/allowed_admin_states/NotRe", "TestUserGroupMarshal (0.00s)\\n\"}", "TestEvents/billing.create_card_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query,_fallback_to_full_range_after_not_enough_results_in_5_calls,_asc", "github.com/gravitational/teleport/lib/services::TestCheckAccessToWindowsDesktop/ssingle_role_allows_a_single_login", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_nomatch_nomatch_nomatch}", "TestAccessMonitoringRule (0.50s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestRessourcePresenceReportSplitting", "TestSQLListWithinGroup (0.00s)\\n\"}", "FuzzParseRedisAddress/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestConversionFromProtoo_nils/CredentialAssertionResponse_nil", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/second__failed_execution_recovering_transitions_to_tripped", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/Unauthorized", "TestGetAccessRequestMonthlyUsage (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState/iissued_too_early", "TestCheckAccessToKubernet", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestThumbprint", "github.com/gravitational/teleport/lib/utils/gcp::TestSortedGCPServiceAccounts", "TestApplyTraits/full_kubernetes_re", "github.com/gravitational/teleport/lib/proxy::TestGetServers", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/empty_linee", "TestWorkloadIdentityAPIService_Check", "TestHostUsers_HostSudoers/line_deny (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#16 (0.00s)\\n\"}", "TestRBAC/get_current_users_when_no_acc", "github.com/gravitational/teleport/lib/backend::TestKeyScan/populated_byte_slice_kkey", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults", "TestPROXYEnabledListe", "TestCheckAccessToUserGroups/no_m", "TestConvertSecurityGroup/no_rules (0.00s)\\n\"", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/MFAVerifiedWithReuse", "TestEvents/session.command_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_match_unset}", "TestIsTLSDeviceVerified/nok:_mi", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#47", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/utils::TestRemoveFromSlice/remove_only_elemment", "TestTrimToMaxSize/desktop.recording (0.00s)\\n\"}", "TestDatabaseServiceUnmarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/invaliid_version", "github.com/gravitational/teleport/lib/events/athena::TestIntegrationAthenaEventPaagination", "TestValidateDatabase/invalid-snowflake (0.00s)\\n\"}", "TestCircuitBreaker_Exec", "TestSearchEventsLimiter/", "TestTarget_checkAndSetDefaults/valid_target", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'multiple_mmatches_yield_different_results'", "TestGetVirtualMachine/vm_wit", "TestEvaluateTraitsMap/no_rules (0.00s)\\n\"}", "TestHealthCheckConfigCRUD/UpdateHealthCheckConfig_is_not_allowed (0.01s", "TestListReleases/access_denied (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/config/openssh::TestWriteSSHConfig/modern_OOpenSSH_-_single_cluster", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode/config_and__version_equal", "TestTriggerGroups (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport", "TestStreams/StreamManyPa", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/azuresync::TestPoll//PollErrors", "github.com/gravitational/teleport/lib/auth/okta::TestCheckOrigin/resources_createed_by_okta_service_with_origin_supplied_is_allowed_", "TestLo", "github.com/gravitational/teleport/lib/services::TestOptions", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Items/ascending__order/range_match", "github.com/gravitational/teleport/lib/httplib::TestRewritePaths", "TestParserHostCertContext/complex (0.00s)\\n\"}", "TestStaticHostUserCR", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/invaliid_kind", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAWSRAServiice_CheckAndSetDefaults/missing_role_arn", "github.com/gravitational/teleport/lib/services::TestValidateSQLServerDatabaseURI//mssql://", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Reject_\\", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestIdPIAMConfigReqDeefaults/missing_integration_name", "TestSAMLAuthRequest_Check/Con", "TestEvents/desktop.directory.read_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_unset_unset}", "TestRedshiftFetcher/fetch_all (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyAppendKey/prefix_without_leeading_separators", "github.com/gravitational/teleport/lib/services::TestGetRequestableRoles/filter_byy_resources", "TestContextLockTargets/Proxy (0.00s)\\n\"}", "TestUnmarshalDevice (0.00s)\\n\"}", "TestFailoverTrigger_CanStart (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationOutput_CheckAnddSetDefaults/valid", "FuzzMongoRead/seed#16 (0.00s)\\n\"}", "TestProjectIDFromServiceAccount", "TestTake/drain_stream_of_size_<_n", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/MFAVerified", "TestUpdateAuthPreferenc", "TestEvents/db.session.cassandra.prepare_OneOf", "TestServiceAccess/DeleteAutoUpdateAgentRollout/allowed_admin_", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParse", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployServiceRequuest/invalid_deployment_mode", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/Unauthorized/verbs=[read_list]", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/arraay(object)", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_credential_provider_assuming_a_role,_must_limit_role_cchain_length", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRedshiftFetccher", "TestParseDestination/missing_path (0.00s)\\n\"}", "TestWriteCmd (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/Unauthorized/verbs=[]", "TestApplyTraits/values_are_expanded_in_a", "TestStaticResolver (0.00s)\\n\"}", "TestTryReconcile/", "github.com/gravitational/teleport/lib/itertools/stream::TestSlice", "TestRoundRobinSequential/multi-item (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accessmonitoring::TestEvaluateCondition/mattches_all_requested_roles", "github.com/gravitational/teleport/lib/utils::TestMarshalYAML/list_of_yaml_documennts", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.update_OneOf", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateVersion/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/web/ui::TestMakeCAKeySet/multiple_keys", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/No_Filters", "TestStartKeyBackCompat (0.00s)\\n\"}", "TestApplyTrait", "TestGetKubeResourceNamespace (0.00s)\\n\"}", "TestIntegrationAthenaSessionEventsCRUD (0.00s)", "github.com/gravitational/teleport/lib/services::TestRoleParse/v3_role_with_no_speec_gets_v3_defaults", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseDBURI//clusters//foo/dbs/db", "github.com/gravitational/teleport/lib/services::TestParseShortcut", "TestParseShortcut/ns (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tlsca::TestKeyUsage/ECDSA", "TestParseShortcut/sem (0.00s)\\n\"}", "TestRoleSet_GetAcc", "github.com/gravitational/teleport/lib/utils/aws/endpoint::TestCreateURI/empty_enddpoint", "TestRemoveRedundantPrefixes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/NotRequired/verbs=[delete]", "TestListDatabases/pagination/with", "TestMakeAppRedirectURL (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestPruneRequestRoles/multiple_noodes", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationChheckpoint/failure_after_150_calls_(from_2nd_export_file),_reuse_checkpoint", "TestGetKubeName (0.00s)\\n\"}", "TestReadProxyLineV2/wrong_PROXY_v2_si", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/no_autthority", "TestBasics (0.00s)\\n\"}", "TestGetConfigIntegration/uncached (0.00s)\\n\"}", "TestFilterMapUnique/not_inclu", "github.com/gravitational/teleport/lib/services::TestParseShortcut/rec_config", "TestNewAuthPreference_secondFactors", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/correct_host:port", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_empty_slice_element", "TestServiceAccess/ListDatabaseObje", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/NotRequired/verbs=[delete]", "TestValidate_RequestedMaxDuration/whe", "github.com/gravitational/teleport/api/internalutils/stream::TestMapErr", "github.com/gravitational/teleport/api/internalutils/stream::TestTake/full_stream", "TestUseDatabaseTranslator (0.00s)\\n\"}", "TestIsHTTP/Accept_DELETE (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestGetScaleSetVirtualMachine//vm_without_identity", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/error", "TestCeremony_RunWeb/sanity_checks (0.00s)\\n\"}", "Test_p", "github.com/gravitational/teleport/lib/services::TestAccessChecker_EnumerateMCPToools", "TestEvents/db.session.mysql.stateme", "TestAccessLists/access_", "github.com/gravitational/teleport/lib/events/athena::TestConfig_SetFromURL", "TestHasName/OK_-_adds_root_path (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults/invalid_exporter_url", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestCommands/?", "TestMergeStreams/stream_A_empty (0.00s)\\n\"}", "TestRoleMap/test_case_'direct_match_and_", "TestConvertResource/converts_legac", "github.com/gravitational/teleport/lib/utils/log::TestOutput/text/info", "TestCircuitBreaker_Execute/error_remain_tri", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfig/valiid", "TestIssueAndVerifyJoinState/untrusted_sig", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSInnstanceNameOverride/via_teleport.dev/database_name", "github.com/gravitational/teleport/lib/cloud/azure::TestSQLListAll", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestCertificateVerificatioon/client_not_a_proxy", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states", "TestOktaCRUD/u", "github.com/gravitational/teleport/lib/itertools/stream::TestMergeStreams/stream_AA_empty", "TestUpsertClus", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_nomatch_unset}", "TestAuthConfig/Azure_AD_Auth/check (0.00s)\\n", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#36", "github.com/gravitational/teleport/lib/services::TestShouldDeleteServerHeartbeatsOOnShutdown", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequired/upgraade_required_(handshake_success)/direct", "TestDatabaseFromE", "TestWithOwnersIneligibleStatusField", "github.com/gravitational/teleport/lib/services::TestRoleSetEnumerateDatabaseUserssAndNames", "TestDefaultConfigGroup/CMC_wit", "github.com/gravitational/teleport/lib/services::TestHostUsers_getGroups/test_exacct_match,_one_group,_one_role", "TestEncodeDecode", "TestAccessCheckerKubeResources/dev_cluster (0.0", "FuzzMongoRead/seed#5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/addittional_follower_-_no_calls", "github.com/gravitational/teleport/lib/release::TestListReleases/empty_response", "TestUpdateClus", "github.com/gravitational/teleport/lib/auth/join/oracle::TestParseRegionFromOCID", "github.com/gravitational/teleport/lib/events::TestEvents/exec_EventFields", "TestCreateAWSConfigForIntegrati", "github.com/gravitational/teleport/lib/sshutils/sftp::TestHomeDirExpansion", "github.com/gravitational/teleport/lib/services::TestCheckSAMLEntityDescriptor/witthout_certificate_padding", "TestTimedMemoize_Get (0.00s)\\n\"}", "TestMigrate/destination_with_unsup", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//6", "TestMigrationDryRunV", "TestParseShortcut/devices (0.00s)\\n\"}", "TestDeployServiceIA", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/get_with_secreets_no_access", "TestDeleteDocuments/commit_success (0.58s)\\n\"}", "github.com/gravitational/teleport/lib/player::TestAppliesTiming", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/MFAVerified", "TestKubernetesOutput_Check", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasks", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/device.update", "TestParseShortcut/cert_authority (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestGetIdentity", "Test_progressGroupsTime", "github.com/gravitational/teleport/lib/inventory::TestAppServerBasics", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerified,verbs:[]", "TestGetServerUUID/returns_leaf_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_PublicAddr_and_SSHProxyTunnelListenPort", "github.com/gravitational/teleport/lib/devicetrust/config::TestGetEnforcementMode//Enterprise_default", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetAuthPreference/no_admin_action", "TestClientCredentials/valid_connection (0.00s)\\n\"", "TestAccessCheckerWorkloadIdentity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2/malformed__PROXY_v2_header", "github.com/gravitational/teleport/lib/services::TestParseShortcut/recording_confiig", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/update/oktta_service_updating_a_non-existent_user_is_an_error", "github.com/gravitational/teleport/lib/utils::FuzzReadYAML", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/MCPSessionStart", "TestNewResourceExpression/matching_expressions/ex", "TestEvaluat", "TestRouteScoring/indirect_ip_resolve (0.00s)\\n\"}", "TestConfig_SetFromURL", "TestMakeUserGroups/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust::TestHandleUnimplemented/statuss_with_codes.Unimplemented", "TestToEC2Instances/with_name (0.00s)\\n\"}", "TestParseShortcut/okta_import_rule (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_empty_embed", "TestLogin_credentialPicker", "TestIsUserFunctions/IsLocalOrRemoteUser/lo", "TestAzureDBServerFetchers/match_la", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/OK_reuse_requested_and_allowed_for_user_session", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync/CConcurrentMethods", "TestEvents/windows.desktop.session.start_OneO", "TestDeduplicateKey/StringDuplicatesWeird", "TestMajorSemver/empty_version_is_rejected (0.00s)\\n", "TestEvents/access_request.search_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestFnCacheConcurrentReads", "TestDefaultConfigGroup/CMC_with_weekday", "TestMux/PostgresProxy (0.01s)\\n\"}", "TestL", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_HEAD", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpQuery", "github.com/gravitational/teleport/lib/scopes/cache::TestCacheOperations", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress/falls_back_to_iipv4_loopback", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation/addr_witth_numbers_in_the_host", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/dangling_separattor_rejected", "Test_setGroupStates (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestRangeEnd//∩┐╜∩┐╜∩┐╜", "TestAuthConfig/GCP_IAM_Auth_with_IP_ty", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/int", "TestGetDbName (0.00s)\\n\"}", "TestTrimToMaxSize/session.rejected (0.00s)\\n\"}", "TestCollectProfile (0.00s)\\n\"}", "TestTemplate_Success/", "TestAppPortsValidation/valid_ranges_and_", "TestSafeEnvAdd/skip_dangerous_exact (0.00s)\\n\"}", "TestAppPublicAddrValidation (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/role_requuires_trusted_device_for_specific_label,_device_not_verified", "TestValidateSigstorePolicy/no_public_key (0.00s)\\", "github.com/gravitational/teleport/lib/services::TestReconciler/resource_that's_noo_longer_present_should_be_removed", "TestDatabaseFromRedshiftCluster (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestHasDeviceTrustExtenssions", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_match_unset_match}", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/v5_roole_empty_deny.kubernetes_labels", "TestExtraElastiCacheLabels/all_tags (0.00s", "TestCheckDynamicLabelsInDenyRules (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/UpsertUserTask/verbs=[update]", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Events", "TestServiceAccess/UpdateDynamicWindowsDesktop,allowed:MFAV", "github.com/gravitational/teleport/api/profile::TestAppPath", "TestRoleSetEnumerateDatabaseUsersAndNames/role_sales_does_not_match", "github.com/gravitational/teleport/lib/usagereporter/teleport/aggregating::TestLocck", "github.com/gravitational/teleport/lib/auth/keygen::TestUserCertCompatibility", "TestParseShortcut/users (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestWatcher", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnrollEKSClusterss/cluster_with_CONFIG_MAP_authentication_mode_is_not_enrolled", "TestCheckDatabaseRoles/database_doesn't_matc", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_rrevocation.update_OneOf", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/databases/resource_iterator", "TestHos", "TestPoorlyFormedFiltersAreAn", "TestVariable/extra_args (0.00s)\\n\"}", "TestDefaultTags/ssm_tags (0.00s)\\n\"}", "TestSSHPortForwarding/allow_all (0.00s)\\n\"}", "Test_websocketALPNClientConn (0.00s)\\n\"}", "TestIteration/empty_with_start_key (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/aws-sync::TestPollAWWSRDS/poll_rds_databases", "github.com/gravitational/teleport/lib/utils/sortcache::TestSortCachePagination", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_unset_unset}", "TestEvents/oidc.created_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.auth_OneOf", "TestServiceAccess/UpdateCrownJewel/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_match_nomatch}", "TestProxyLine_VerifySignature/non_local", "github.com/gravitational/teleport/lib/services::TestCheckSAMLIDPCA/unparseable_keey", "github.com/gravitational/teleport/lib/services::TestValidateSQLServerDatabaseURI", "TestAccessGraphSettings (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestProxyConn", "TestEvents/db.session.permissions.updat", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#15", "TestAWSSignerHandler/s3_access_with_int", "TestDeployDBService/recreate_everythin", "github.com/gravitational/teleport/lib/services::TestValidateLocalAuthSecrets_emptty", "TestHasName/NOK_-_invalid_host (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws/iamutils::TestNewFromConfig/fips__disabled_by_env", "TestBotConfig_InsecureWithCAPins (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingBoundKeypairMethodSimple/challenge_response_error/challenge_response_errror_auth", "TestValidate_WithAllowRequestKube", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/netwwork_error", "github.com/gravitational/teleport/lib/utils::TestSet/remove/from_empty_set", "TestEqualStatement/different_conditions (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/invallid_format_#_6", "TestServiceAccess/UpsertCrownJewel/allowed_admin_states/NotR", "github.com/gravitational/teleport/lib/backend::TestKeyAppendKey/all_without_leadiing_separators", "github.com/gravitational/teleport/api/client/webclient::TestTunnelAddr/should_usee_PublicAddr_with_custom_port_if_TLSRoutingEnabled_was_enabled", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/invalid_trust_anchor", "github.com/gravitational/teleport/api/types::TestAppIsAWSConsole/AWS_China", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject/add_prefix", "TestOperation", "TestServiceAccess/CreateAutoUpdateAgentRollout", "TestParseShortcut/cluster_authenticat", "TestHasName/OK_-_adds_paths_with_ampersands (0.", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseTunnelService_ChecckAndSetDefaults/missing_username", "TestEvents/aws_identity_center.res", "TestCreateSignedSTSIdentityRequest/govclo", "TestParseDestination/full_sp", "TestExporterBasics (2.83s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject", "TestThirdpartyStreams (0.48s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/middle_emptyy_segment", "TestPruneRequestRoles/kube_request (0.00s)\\n\"}", "TestNewDefaultChannel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestOnceFunc", "github.com/gravitational/teleport/lib/utils/sortcache::TestOpenBounds", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/siingle_user,_single_credential,_empty_user", "TestSanitize//..params (0.00s)\\n\"}", "TestMemory/ConditionalUpdate (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/list_verb_not_allowed", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_match_nomatch}", "TestConfigNoTLS (0.00s)\\n\"}", "TestUnifiedResourceCacheIteration/saml (0.23s)\\n\"}", "TestHealthCheckConfigCRUD/UpsertHealthCheckConfig_is_not_allowed (0.00s", "github.com/gravitational/teleport/api/client/webclient::TestSSHProxyHostPort/TLS__routing_disabled,_web_public_addr", "github.com/gravitational/teleport/lib/services::TestMarshalPluginWithStatus", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/double_add", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful", "TestEmpty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#14", "TestIdentity_GetUserMetadata (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Equal//bundle_set_3_equal", "github.com/gravitational/teleport/lib/githubactions::TestValidateTokenWithJWKS/siigned_by_wrong_signer", "github.com/gravitational/teleport/lib/cloud/imds/gcp::TestGetTags/not_on_gcp", "TestGetServiceP", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/CRUD", "github.com/gravitational/teleport/lib/proxy::TestCheckedPrefixWriter", "github.com/gravitational/teleport/lib/services::TestValidateRoles/valid_roles", "TestParseDBURI//clusters/foo/leaves/bar (0", "TestInstanceHeartbeat (0.76s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNormalizeECSResouurceName/other_special_chars", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfig", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/dev_aaccesses_should_allow_system:masters_roles", "TestDestinationKubernetesSecr", "github.com/gravitational/teleport/lib/decision::TestTLSIdentity_roundtrip/zero_tllsca.Identity", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/no_logiin_and_'@'_in_path", "github.com/gravitational/teleport/lib/events::TestExport", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestSAMMLIdPBuildScriptCheckAndSetDefaults", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_CheckAndSSetDefaults/network_address_defaults_to_grpc", "TestSQLManage", "TestLoginFlow_scopeAndReuse (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/stable_unix_user.create__EventFields", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/regexp_must_matcch_full_string", "TestNewDialerForGRPCClient (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGetKubeResources/irrelevant_ddeny", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisClient/GetToken", "TestServiceAccess/update_verb_", "TestGlobIsSubjectToPolicyResourceScop", "TestProxyLine_VerifySignature/w", "TestRegexMatchesAny/bad_regexp (0.00s)\\n\"}", "TestMalformedOpMsg (0.00s)\\n\"}", "TestRBAC/upsert_without_create (0.00s)\\n\"}", "TestLoginFlow_Finish_errors/NOK_empty_user", "TestWriteCmd/float (0.00s)\\n\"}", "TestDescendingSegments (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/web/app::Test_transport_rewriteRedirect/loccal_app,_no_redirect", "TestNewIdPIAMConfigureClient (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServices/ignores_ECS_Services_without_containers", "github.com/gravitational/teleport/lib/accesslists::TestAccessListHierarchyDepthChheck", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/account_does_not_match_expected_account", "github.com/gravitational/teleport/api/internalutils/stream::TestPageFunc", "TestCheckAzureIdentities/denying_wildcard_", "TestAccessListHierarchyIsOwner (0.00s)\\n\"}", "TestParseDestination", "TestApplyOverTime (0.05s)\\n\"}", "TestServiceAccess/DeleteDatabaseObjectImportRule", "TestSanitize//a-b/c:d/.e_f/02 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/user.delete_OneOf", "TestEvents/device.authenticate_OneOf (0.00s)\\n\"}", "TestClientCredentials/invalid_role (0.00s)\\n\"}", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthentica", "TestKeyHasPrefix/valid_multi_component_prefix", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/ok_address", "TestCreateSignedSTSIdentityRequest/eu", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_BEST_EFFORT_DROP", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp/regexp_wildcard_reeplaces_to_itself", "TestConnNetTest/NotFirstConnSync/CloseTime", "FuzzFetchMySQLVersion/seed#20 (0.00s)\\n\"}", "TestMigrate/destination_with_indetermin", "TestHandler_getToken (0.00s)\\n\"}", "TestUploadFromPath (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{match_match_match_nomatch}", "TestStatefulSetVersionUpdater_unbl", "TestDefaultPrompt_PromptCredential (0.00s)\\n\"}", "TestWorkloadAttrs (0.00s)\\n\"}", "TestParseShortcut/accessrequests (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_match_unset}", "TestTimeout/bad_auth_client (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestJSON/session_data_event", "TestCheckDatabaseRoles/requested_role_denied", "TestCreateEC2ICERequest/no_fields (0.00s)\\n\"", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/untrusted_wrongly_signed_index", "TestMux/DisableSSH (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/storage_error", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAM/vvalid", "TestGuessIfAccessIsPossible/session_l", "TestDatabaseOracleRDS (0.00s)\\n\"}", "TestApplyTraits/invalid", "github.com/gravitational/teleport/api/types/accesslist::TestDeduplicateOwners", "TestStdioHelpers/reader_closed_b", "TestBackend_Get (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/too_early", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/no_access_to_delete_AccessMonitoringRule", "TestModifyFailed (0.00s)\\n\"}", "TestSearchEvents/cost_optimized_query,_fallback_to_full_range_", "TestConvertAuditEvent/Databas", "TestGetCertAuthorities (0.12s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateConfig/allowed_admin_states/MFAVe", "TestPruneRequestRoles/multiple_nodes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/access_list", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheConfigurationEndpointNameOverride/via_TeleportDatabaseName", "TestCalculatePendingRequestTTL (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCreateEC2ICERequeest/missing_subnet_id", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetDEBUG", "TestServiceAccess/GetDynamicWindowsDesktop,allowed:Unauthorized,v", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/single-segmeent", "github.com/gravitational/teleport/lib/client/escape::TestReadError", "TestValidateDatabase/uri-without-sch", "github.com/gravitational/teleport/lib/services::TestApplyTraits/kube_user_interpoolation_in_allow_rule", "TestAzureWatcher/filter_by_tag (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestForceGroupsDone/no__groups_in_rollout", "TestMatchPattern/plain_tex", "TestElastiCacheFetcher/", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/allows_default_config_without_activity_center", "TestServiceAccess/Updat", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamEmpty", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/emptyy", "TestValidateSigstorePolicy/keyles", "TestDefaultTags", "github.com/gravitational/teleport/lib/web/ui::TestMakeCAKeySet/empty", "github.com/gravitational/teleport/lib/services::TestIdentityCenterAccountMatcher//simple_account_nonmatch", "Test_canUpdateToday/Wildcard (0.00s)\\n\"}", "TestGlobIsSubjectToPolicyResource", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout", "TestCursorPagination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_client,_must_return_token_generation_errors", "Test_progressGroupsHaltOnError/first_g", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/update_nonexistent_resource", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/instance.join", "TestKeyIDHasConsistentOutputForAnInput/RSA2048 (", "TestServiceAccess (0.00s)\\n\"}", "TestConnString/user_set (0.00s)\\n\"}", "TestCompare/simple_ancestor (0.00s)\\n\"}", "TestParseLegacyDynamoAttributes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/lib/utils/aws::TestRoles/FindRolesByName/found__zero", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/get_authoritiees_with_secrets", "github.com/gravitational/teleport/api/types::TestValidateAssumeStartTime/valid_sttart_time", "TestServiceAccess/UpdateUserTa", "TestConvertAuditEvent/DatabaseSes", "TestFormatErrors/relogin_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSCllusterNameOverride/custom_endpoints", "TestUpsertClu", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[update]", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_base_config", "TestNormalizeECSResourceName/valid (0.00s)\\", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/windows.desktop.ssession.end", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#0", "TestRBAC/get_authorities_no_access (0.00s)\\n\"", "github.com/gravitational/teleport/api/client::TestLoadProfile/normal_profile", "TestAppPublicAddrValidati", "github.com/gravitational/teleport/lib/events::TestEvents/auto_update_config.updatte_EventFields", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/DeleteUserTask/verbs=[delete]", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__match_root_multipart", "TestInvalidFirstFrame (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation/public_aaddress_with_internal_kube_ServerName_prefix", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Limit", "github.com/gravitational/teleport/lib/utils/typical::TestParser/error_evaluating__dynamic_key", "github.com/gravitational/teleport/lib/healthcheck::TestTarget_checkAndSetDefaultss/missing_resolver", "TestFilterAWSRoles (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestWeakValidate/explicitly_disalloowed_character_is_disallowed", "github.com/gravitational/teleport/lib/usertasks::TestEC2URLs", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##35", "TestWorkloadId", "TestValidateRole/missing_version (0.00s)\\n\"}", "TestIPv6Fix/ipv6_small (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateStaticHostUser/ok", "github.com/gravitational/teleport/lib/observability/tracing::TestNewClient", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstDatabaseObjectImportMatch/empty", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "TestEvents/session.connect_EventFields (0.00s)\\n\"}", "Test_parseRedisURI/default_port (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_hardware_key_touch,_MFA_verified", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/error_when_discover_has_stepStatus=ERROR_but_no_error_message", "TestChallengeValidator_Valida", "TestSPIFFESVIDOutpu", "TestServic", "TestIdentityFileBasics (0.00s)\\n\"}", "TestMatchHealthy/WithUnhealthyOktaApp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::TestFailoverrTrigger_CanStart/first_trigger_skipped,_second_getter_skipped", "TestSAMLIdPServiceProviderUnmarshal (0.00s)\\n\"}", "TestClientCredentials/invalid_peer_id (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/device.authenticate.conffirm_EventFields", "TestResolveViaWebClient", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_unset_match}", "github.com/gravitational/teleport/lib/events::TestEvents/windows.desktop.session..end_EventFields", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/unknownn_mode/check", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/access_to_update_AccessMonitoringRule", "github.com/gravitational/teleport/lib/utils/sortcache::TestOverlap", "TestLogin_credent", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_nomatch_unset_unset}", "TestIsALPNConnU", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_prefer_otp_wheen_specified", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstApplyDatabaseObjectImportRules/rule_priorities_are_applied", "TestValidate_WithAllowRequestKubernetesRes", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/session_ennd", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/equals(labels.env)", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/role_name_with__prefix_in_default_partition_and_account", "TestParse/tcp://example.com:443 (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/access/common/auth::TestRotatedAcccessTokenProvider/Init", "github.com/gravitational/teleport/lib/resumption::TestConnResume/Sync", "FuzzTraitsExpressionParser/seed#26 (0.00s)\\n\"}", "TestUpdateSessionR", "TestCapture_SaveAsText (0.01s)\\n\"}", "TestTrimToMaxSize/user.update (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/migration::TestApply/migration_failed", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#5", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/paath_style_addressing_enabled_via_url", "TestCheckAccessToGitServer/explicit_allow (0.00s", "github.com/gravitational/teleport/lib/jwt::TestKeyIDHasConsistentOutputForAnInputt/RSA2048", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithMultiplePrefixes", "TestMemory/Items (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//3/json", "github.com/gravitational/teleport/api/types::TestDatabaseRDSEndpoint", "github.com/gravitational/teleport/lib/services::TestLockTargetsFromTLSIdentity", "TestIPv6Fix/ipv6 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/labels_matchhing_name", "TestNewRe", "TestAuroraMySQLVersion/5.6.my", "github.com/gravitational/teleport/lib/multiplexer::TestMux/ProxyLines", "TestStringOrMap/marshal (0.00s)\\n\"}", "TestExtraFields/text/component (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzFetchMySQLVersioon/seed#14", "github.com/gravitational/teleport/lib/player::TestRewind", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::TestPPodmanAttestorConfig_CheckAndSetDefaults/attestor_disabled", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/DeleteAutoUpdateVersion", "github.com/gravitational/teleport/api/client::TestALPNConnUpgradeDialer", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRedshiftServverlessFetcher/fetch_all", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_Validate/invallid_issuer", "TestConvertIAMv2Error/no_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/debug::TestSetLogLevel/Failure", "TestRBAC/get_no_access (0.00s)\\n\"}", "TestConvertUsage", "github.com/gravitational/teleport/api/client::TestWaitForConnectionReady", "github.com/gravitational/teleport/lib/services::TestParseShortcut/users", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericValidatiion", "TestTriggerGroups/group_already_done (0.00s", "TestGetAllowedLogins", "TestTrimToMaxSize/session.disk (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#28 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/authz::TestHasDeviceTrustExtenssions/nok:_nil_extensions", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/validd_transition,_with_reports", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAMWiithPresetPolicy/with_PolicyPresetAWSIdentityCenter", "TestRequireResidentKey/discourag", "github.com/gravitational/teleport/lib/services::TestValidateReverseTunnel/empty_ddial_address", "github.com/gravitational/teleport/api/types::TestIsAutoUsersEnabled/postgres_withh_admin_user", "TestFilterMapUnique (0.00s)\\n\"}", "TestCredentialCreation_Validate/ni", "github.com/gravitational/teleport/lib/srv/server::TestSSMInstaller/ssm_with_custoom_steps", "github.com/gravitational/teleport/lib/events::TestWriterEmitter", "TestMux/PostgresProxy/with_proxy_line (0.00s)\\n\"}", "TestHostUsers_Can", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.create__db_EventFields", "TestCheckAccessWithL", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/ListUserTasksByIntegration/verbs=[list]", "TestGetInstanceID (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_unset_match_match}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_applyMappingToObject/invalid_namespace_is_rejected", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2ICE/no_reggion_id", "TestUserNotificationStateRoundTrip (0.00s)\\n\"}", "TestVerifyPassword (0.00s)\\n\"}", "TestIssueAndVerifyJoinState/issued_too_ea", "TestJSON/MySQL_statement_bulk_execute (0.00s)\\n\"}", "TestParseDestination/filename_with_times", "github.com/gravitational/teleport/lib/client/debug::TestCollectProfile", "TestOpenTunnelRequest/missing_instan", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Exclude_by_ID", "TestParseShortcut/auth (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/evvents_with_trimmable_event_exceeding_>_MaxEventBytesInResponse", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/auth/webauthncli::TestDefaultPrompt_PromptCCredential/NOK_empty_credentials_errors", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAMOuutput", "TestCertificateVerification/bad_", "TestNewFromConfig/false_does_not_ch", "TestOpenBounds (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/missing_join_request", "TestRun/success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_ToFromSubject", "github.com/gravitational/teleport/lib/inventory/internal/delay::TestMultiVariablee", "github.com/gravitational/teleport/lib/utils::TestByteCount/1.6_kb", "TestAccessCheckerWorkloadIde", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/./relattive/dir", "github.com/gravitational/teleport/lib/utils::TestGlobToRegexp", "TestALPNConnUpgradeDialer/connect", "github.com/gravitational/teleport/lib/scopes::TestCompare/empty_rhs_root_in_equivvalence_case", "TestKubeResourceMat", "github.com/gravitational/teleport/lib/events::TestEvents/session_recording_configg.update_OneOf", "github.com/gravitational/teleport/lib/kube/token::TestValidateTokenWithJWKS/validd", "github.com/gravitational/teleport/lib/cryptosuites::TestSuites/SIGNATURE_ALGORITHHM_SUITE_FIPS_V1", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_GetVersion//version_too_high", "TestServiceAccess/ListDynamicWindowsDesktops,allow", "TestIntegrationAthenaSearchSessio", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/upsert_withoutt_update", "github.com/gravitational/teleport/lib/secretsscanner/proxy::TestProxy", "TestAccessCheckerWorkloadId", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsSSHDeviceVerified//nok:_missing_DeviceID", "github.com/gravitational/teleport/lib/events::TestEvents/device.delete_EventFieldds", "github.com/gravitational/teleport/api/types::TestNewAppV3/non-cloud_app_#2", "TestIsHTTP/Accept_OPTIONS (0.00s)\\n\"}", "TestCheckAcce", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestGettClusterName", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/readonlyy_role,_override_TTL", "TestRotateExternalCertAuthor", "github.com/gravitational/teleport/lib/events::TestEvents/app.session.dynamodb.reqquest_EventFields", "github.com/gravitational/teleport/lib/limiter::TestListener/accept_failure", "github.com/gravitational/teleport/lib/secretsscanner/scanner::TestNewScanner", "github.com/gravitational/teleport/lib/tbot/config::TestSPIFFESVIDOutput_CheckAndSSetDefaults/path_missing_leading_slash", "TestVariable/regexp_replace_constant_ex", "TestCheckAccessToGitServer/wildcard_deny (0.00s)\\", "TestConfiguratorIsUsed/not_cloud", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[create]", "TestSafeEnvAdd/duplicate_allowed (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/invalid_profile", "github.com/gravitational/teleport/lib/services::TestSignatureAlgorithmSuiteRoundttrip/#00", "TestEvents/access_request.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationDrryRunValidation/event_with_wrong_uuid", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/cost_optimiized_query_should_not_be_triggered_if_time_between_ketset_and_end_of_range_is_\\u0003c_24h,_desc", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerINVALID", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_nomatch_nomatch_match}", "TestIsValidHostname/one_component (0.00s)\\n\"}", "TestCloning/*types.ServerV2 (0.00s)\\n\"}", "Test_exportEndpoint (0.00s)\\n\"}", "Test_claimsToRolesPa", "github.com/gravitational/teleport/api/client::TestNew", "TestAtomicWriteShim/It", "github.com/gravitational/teleport/lib/multiplexer::TestProxyLine_Bytes/with_TLV", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/trying_to_appprove_a_request_with_assumeStartTime_past_expiry", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_match_nomatch}", "github.com/gravitational/teleport/api/types::TestAppPublicAddrValidation/kubernettes_app_public_addr_without_port", "github.com/gravitational/teleport/api/internalutils/stream::TestTake/empty_streamm", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetByPurppose/backend_issue", "TestMFACeremony/OK_ceremony_success_prompt (0.00s)\\n", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestRequireResidentKey", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert/nonn-okta_service_updating_an_okta_user_is_an_error", "github.com/gravitational/teleport/lib/services::TestCanCopyFiles/nil", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertClusterNetworkingConfig", "TestWatcherCreationGracePeriod (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAddFull", "TestSPIFFEWorkloadAPIService_CheckAndS", "github.com/gravitational/teleport/lib/utils/proxy::TestDialProxy/unknown", "github.com/gravitational/teleport/lib/devicetrust/authz::TestHasDeviceTrustExtenssions/all_extensions", "TestSafeEnvAdd/whitespace_trim (0.00s)\\n\"}", "TestStrongValidate/scope_too_long (0.00s)\\n\"}", "TestServiceAccess/UpsertDatabaseObject/allowed_admin_state", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.malformed_paccket_EventFields", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_three_roles,_3_exact_match,_one_off", "github.com/gravitational/teleport/lib/utils::FuzzParseWebLinks", "TestMakeClusterHiddenLabels (0.00s)\\n\"}", "TestCompare/multi-level_ancestor (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestALPNDialer_getTLSConfig/no_updaate", "TestMemory/Items/ascending_order/paginat", "github.com/gravitational/teleport/lib/kube/utils::TestGetAgentVersion", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__match_root", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/empty_string", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'direct_mattch_and_wildcard'", "TestExtraElastiCacheLabels/no_subn", "github.com/gravitational/teleport/lib/services::TestValidateStaticHostUser/valid__wildcard_labels", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[deelete]", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetClusterNetworkingConfig/no_admin_action", "Test_parseRedisURI/empty_address (0.00s)\\n", "TestSearchSessionRange/from_after_to (0.00s)\\n\"}", "TestRoleSetEnumerateDatabaseUsersAndNames/developer_allowed_o", "TestChallengeVali", "TestJoin/leading_empty_segment_preserved (0.00s)\\n\"", "github.com/gravitational/teleport/lib/services::TestCertAuthorityWatcher", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[create_uppdate]", "TestVariable/variable_with_prefix_and_suff", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequired", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Role_remains_the_same", "TestCredentialsCache (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[]", "TestListEC2ICE/no_region_id (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestMux/Timeout", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_credential_provider,_but_no_credential_source", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNormalizeECSResouurceName/with_dots", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_AuthorizeAdminAction//NOK_local_user_no_mfa", "TestEvents/exec_OneOf (0.00s)\\n\"}", "TestEvents/role.created_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt/invalid_port_(only_22_and_3389_are_allowed)", "TestAuthorizer_Authoriz", "Test_setResourceName/ov", "github.com/gravitational/teleport/api/internalutils/stream::TestRateLimitFailure//simultaneous", "TestServiceAccess/UpdateDynamicWindowsDesktop,allowed:MFAVeri", "github.com/gravitational/teleport/lib/resumption::TestResumption/tunnel/plain_SSHH", "TestU", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/global_and_role_modes_disabled", "github.com/gravitational/teleport/lib/utils::TestForEachResource", "github.com/gravitational/teleport/lib/utils::TestObeyIdleTimeout", "TestMarshalYAML/list_of_pointers_to_yaml_docs (", "github.com/gravitational/teleport/lib/services::TestCertAuthorityUTCUnmarshal", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertRequestFailureError", "github.com/gravitational/teleport/tool/tctl/sso/configure/flags::Test_attributesTToRolesParser_Set", "github.com/gravitational/teleport/lib/cloud/aws::TestEqualStatement/different_ressource_values", "TestLogin_credentialPicker/credential", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##16", "TestUpdateUser (0.01s)\\n\"}", "Test_canUpdateToday/No_matching_day (0.00s)\\", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/disallowed_admin_states", "TestVariable/empty_variable (0.00s)\\n\"}", "TestKeyCompare/equal_keys (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap/unmarshal/singlee_entity_with_single_entry", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseGatewayTargetURII//clusters/foo", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/NOK_no_webauthn_rresponse", "github.com/gravitational/teleport/lib/services::TestParseShortcut/node", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/MFAVerified/verbs=[]", "TestEvents/bot.create_OneOf (0.00s)\\n\"}", "TestReplaceRegexp/no_match_return", "TestDatabaseMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/DeleteAutoUpdateAgentRollout", "github.com/gravitational/teleport/lib/tpm::TestAttestationParametersProto", "TestMatchValidAzureIdentity/wildcard (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestLockWatcherSubscribeWithEmptyyTarget", "github.com/gravitational/teleport/api/breaker::TestIsResponseSuccessful/other_errror", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseTunnelService_ChecckAndSetDefaults", "TestParseSignatureAlgorithmSuite/\\\"legacy", "github.com/gravitational/teleport/api/types/accesslist::TestAccessListDefaults", "Test_windowRepr_i", "TestPrivateKey/missing_DeviceId (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_Validate/invallid_audience", "TestGetPolicyVersions/PolicyNotMatchingLabe", "TestJoinService", "github.com/gravitational/teleport/lib/devicetrust::TestPlatformParametersProto", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/nothing_addedd", "TestTryReconcile/exi", "TestOutput/json/debug (0.00s)\\n\"}", "TestToTouchIDCredentialPicker", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_glob_mismatch__due_to_leading_segment", "TestGetClusterURI//clusters", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[create]", "TestCredPropsConversions/Cre", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestWrapPayload//unsupported_returns_provided_payload", "Test_kubernetesSupportsBoundTokens/Toke", "TestParseShortcut/networking_config (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[update_create]", "TestServiceAccess/CreateAutoUpdateConfig/allowed_admin_states/NotRe", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_nomatch_nomatch}", "TestEvents/bot.join_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/Azure_AAD_Auth/check", "FuzzTraitsExpressionParser/seed#31 (0.00s)\\n\"}", "TestLoginFlow_Begin_errors (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'direct_mattch'", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/missing_LocationS3", "TestForwarder_getToken/base_case (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestBytesToSessionPrintEvents", "TestRedisEnterpriseClient/GetToken (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.postgrres.function", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setVersionMetric/ssame_version,_not_expired", "TestCheckSPIFFESVID/implicit_deny_-_no_match", "TestAutoProtocolDe", "TestSet/union/populated_union_empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/versioncontrol::TestVisitorRelative", "github.com/gravitational/teleport/lib/utils::TestFnCacheGet", "TestParseGatewayTargetURI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestProtoStreamLargeEvent/large_triimmable_event_is_trimmed", "github.com/gravitational/teleport/lib/services::TestValidateWorkloadIdentity/maxiimum_jwt_ttl_too_large", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt/fill_defaults", "TestMarshalUnmarshalSecurityReportState (0.00s)\\n\"", "TestCapture_SaveToPCAP (0.01s)\\n\"}", "TestDatabaseObjectImport", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/GetDynamicWindowsDesktop,allowed:NotRequired,verbs:[read]", "FuzzNewMatcher/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthncli::TestToTouchIDCredentialPiicker/picks_first_credential", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestRessetClusterNetworkingConfig/unauthorized", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/upsert_withoutt_create", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_Validate/succeess", "TestUnmarshalBackwards (0.00s)\\n\"}", "TestConfigureExternalAuditStorage (0.00s)\\n\"", "github.com/gravitational/teleport/lib/authz::TestGetDisconnectExpiredCertFromIdenntity/no_expiry_returned_when_checker_nil_and_disconnectExpiredCert_false", "TestCredentialsCacheRetrie", "TestAuthorizer_Auth", "TestParseReviewFrequency/3m (0.00s)\\n\"}", "TestRoleParse/v4_role_gets_v4_defaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetDbName/returns_emppty_string_when_given_leaf_cluster_URI", "TestParseShortcut/cluster_auth_preference (0.00s", "TestCheckAccessToDat", "TestOptionFile (0.00s)\\n\"}", "TestGetResources/WindowsDesktop (0.34s)\\n\"}", "github.com/gravitational/teleport/lib/loglimit::TestLogLimiter", "github.com/gravitational/teleport/api/types/accesslist::TestSelectNextReviewDate//one_month,_first_day", "github.com/gravitational/teleport/lib/utils::TestRegexMatchesAny/regexp_match", "FuzzTraitsExpressionParser/seed#4 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/static_host_user.update__EventFields", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpddateClusterNetworkingConfig/updated", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/string_literal", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestConflictingRulles", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisClient/GetToken/succeeed", "TestJoinServiceGRPCServer_RegisterUsingBoundKeyp", "TestBufferedChannelPipeWrite (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabases/lissting_instances_returns_all_valid_instances_and_ignores_the_others", "TestNewResourceExpression/fail_to_parse/na", "TestTrimToMaxSize/db.session.start (0.00s)\\n\"}", "TestExporterBasics/case=empty,randomFl", "TestSetIndexContentSecurityPolicy (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestTrustedClusterRBAC//upsert_ok", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/services::TestSignatureAlgorithmSuiteRoundttrip/balanced-v1", "TestHandleAc", "TestSignAndVerify/RSA2048 (0.15s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.mysql.drop_dbb_OneOf", "TestServiceCounter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/matchinng_expressions/search(\\", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_match_unset}", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewExpression", "TestConvertResource/converts_legacy_to_legac", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/create_resource_twice", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/missing_domain", "TestNew", "TestTimedMemoize_Get/expired_cache (0.00", "TestAuthConfig/static_auth/check (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist/convert/v1::TestFromProtoNNils/notifications", "github.com/gravitational/teleport/lib/services::TestRolesForResourceRequest/deny__request_without_resources", "TestCompareResources (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestMakeDiscoverySufffix/databases/no_suffix_made_without_extra_parts", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/invalid_LimiterRefillAmount_and_LimiterBurst_combination", "TestSliceOrString/marshal/nil_slice (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/missing_certificate", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_unset_match}", "TestEqualStatement (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/recconfig", "github.com/gravitational/teleport/lib/services::TestWindowsDesktopGroups/allow_exxpression", "github.com/gravitational/teleport/lib/events::TestEvents/role.deleted_EventFieldss", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent/ValidateMFAAuthResponse", "TestAtomicWriteShim/DeleteRange (0.00s)\\n\"}", "TestCreateClusterNetworkingCon", "TestKubeServerWatcher (0.01s)\\n\"}", "TestIsSSHDeviceVerified (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__requires_device_trust,_device_not_verified", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_match_nomatch_unset}", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/create_verb_not_allowed", "TestGlobMatch/root_literal_exact_match (0.00s)\\n\"}", "github.com/gravitational/teleport/integrations/access/common/auth::TestRotatedAcccessTokenProvider/InitFail", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::Test_basicHTTTPMaintenanceClient_Get/non-200_response", "github.com/gravitational/teleport/lib/scopes::TestGlobIsSubjectToPolicyResourceSccope/inline_glob_in_child", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig/allowed_admin_states/MFAVerified/verbs=[update]", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_rrevocation.create_EventFields", "github.com/gravitational/teleport/lib/events/dynamoevents::TestStartKeyBackCompatt", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_match_unset_unset}", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/upsert_success", "TestEvents/trusted_cluster.delete_EventFields", "TestGetCreateDatabaseCreateMo", "TestUnmarshalDevice/success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/ListDynamicWindowsDesktops,allowed:NotRequired,verbs:[]", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix/prefix=telepoort/leading_separator_in_key", "TestParseReviewFrequency/6m (0.00s)\\n\"}", "T", "TestAttachPolicy/AttachToUser (0.00s)\\n\"}", "TestCheckAccessToDataba", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertAuditEveent", "TestTLSIdentity_roundtrip/zero-to-zero (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_match_unset}", "github.com/gravitational/teleport/lib/services::FuzzParseRefs", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetRootClusterURI", "TestWriteSSHConfig/modern_OpenSSH", "github.com/gravitational/teleport/lib/utils::TestSet/union", "TestUserLastSeenNotificationStateRoundTrip (0.0", "github.com/gravitational/teleport/integrations/lib/backoff::TestDecorr", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/disallowed_admin_states", "github.com/gravitational/teleport/lib/services::TestParseShortcut/access_request", "TestNewDatabaseOb", "TestGetAllowedLoginsForResource", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_evaluate/name.toomanyfield", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/requester_(ennterprise,_created_by_user)", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[creeate_update]", "github.com/gravitational/teleport/lib/jwt::TestSignAndVerify", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestDeployDatabaseSerrviceRequest_CheckAndSetDefaults/missing_region", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/utils::TestMinVerWithoutPreRelease/ignores__beta", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/missingg_GCP_connection_name", "TestServiceAccess/UpdateCrownJewel", "TestDatabaseElastiCacheEndpoint/valid_URI (0.00s)\\n", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiter", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/error_in_expr", "FuzzTraitsExpressionParser/seed#16 (0.00s)\\n\"}", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings/enabled", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/disallowed_admin_states", "TestTemplate_Success", "TestAtomicWriteShim/CRUD (0.00s)\\n\"}", "TestGetKubeClusterDomain/servi", "github.com/gravitational/teleport/lib/tbot/config::TestBotConfig_YAML/minimal_connfig", "github.com/gravitational/teleport/lib/utils/aws::TestBuildRoleARN/role_name_with__invalid_account_characters", "Test_ba", "github.com/gravitational/teleport/lib/utils::FuzzReadYAML/seed#3", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states", "github.com/gravitational/teleport/api/client/webclient::TestSSHProxyHostPort/TLS__routing_enabled,_web_public_addr", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestMalformedOpMsgg/invalid_$db_value", "TestAuthConfig/GCP_IAM_Auth_with", "TestWebClientClosesIdleConnections (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess", "github.com/gravitational/teleport/api/types::TestDatabaseRDSProxyEndpoint", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_nomatch_unset}", "TestDialProxy/https (0.00s)\\n\"}", "TestKubeAppFetc", "TestServiceAccess/CreateDatabaseObject/allowed_admin_state", "TestDatabaseFromRDSClu", "TestMemberFromProtoNils/accesslist (", "github.com/gravitational/teleport/lib/cloud/aws::TestSliceOrString/unmarshal/slicce", "github.com/gravitational/teleport/lib/utils::TestMajorSemver/empty_version_is_rejjected", "TestIsHTTP/Accept_POST (0.00s)\\n\"}", "github.com/gravitational/teleport/api/internalutils/stream::TestTake", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#29", "github.com/gravitational/teleport/lib/events/s3sessions::TestThirdpartyStreams/SttreamWithPadding", "TestServiceAcce", "TestFailedAccessCheck (0.01s)\\n\"}", "TestJSON/failed_auth_attempt (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGuessProxyHostAndVersion", "TestCertificateVerification/unknown_clie", "github.com/gravitational/teleport/lib/authz::TestRoleSetForBuiltinRoles", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//6months", "github.com/gravitational/teleport/lib/utils/aws::TestValidateRoleARNAndExtractRolleName/invalid_partition", "TestGetAWSPolicyDocumentForAs", "TestIdentity_GetUserMetadata/device_metadata (0.", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/eu.proxy.eexample.com", "github.com/gravitational/teleport/lib/services::TestWindowsDesktopGroups/option_ddenied", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsTLSDeviceVerified//nok:_nil_extensions", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/OK_rotate_external_ca", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/delete/allow", "TestSQLListAll/empty_list (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{nomatch_match_unset_unset}", "TestUnhea", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV7:__no_idp_option", "TestBasicFunctionality/error_translation (", "TestBundleSet_Equal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/semaphores", "TestParsePacket/COM_QUIT (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_makeGroupsStatus/nno_groups_in_schedule", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate/empty_user_display_name", "TestEvents/user.update_OneOf (0.00s)\\n\"}", "TestTrimToMaxSize/windows.desktop.session.end", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects", "TestCheckpointOutsideOfWindow (0.00s)\\n\"}", "github.com/gravitational/teleport/api/observability/tracing::TestUploadTraces", "github.com/gravitational/teleport/lib/auth/userloginstate/userloginstatev1::TestUUpsertUserLoginStates", "FuzzMongoRead/seed#11 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMarshalGlobalNotificationRounndTrip", "TestAWSAppAccessCon", "TestReco", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/get_resource_denied", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestRewriter", "TestEvents/db.create_EventFields (0.00s)\\n\"}", "TestMemberFromProtoNils (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/unmatched_}}", "github.com/gravitational/teleport/lib/services::TestParserForIdentifierSubconditiion/simple_condition,_with_identifier_#1", "TestAuthPreferenceValidate/stabl", "TestServiceAccess/create_success (0.00s", "TestVarValidation (0.00s)\\n\"}", "TestIssueAndVerifyJoinState/subject_mus", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states", "github.com/gravitational/teleport/lib/versioncontrol::TestSecurityPatchAlts", "TestResolveViaWebClient (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_unset_match_unset}", "github.com/gravitational/teleport/lib/observability/tracing::TestNewExporter/succcessful_explicit_grpc_exporter", "github.com/gravitational/teleport/lib/services::TestMCPToolMatcher/deny_empty", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/upsert", "TestEmitEditorChang", "github.com/gravitational/teleport/lib/events::TestUploadCompleterEmitsSessionEnd", "TestServiceAccess/CreateCrownJewel/allowed_admin_states/MFAVerif", "TestListEC2/no_region (0.00s)\\n\"}", "TestIDTokenValidator_Validate/invalid_issu", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTryReconcile/versioon_exist,_no_existing_rollout_nor_config", "TestStringOrMap/unmarshal/singl", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/ok_address_annd_port", "TestJSON/successful_user.login_event (0.00s)\\n\"}", "TestParseShortcut/role (0.00s)\\n\"}", "Test_exportEndpoint/e", "TestSQLListAll/servers (0.00s)\\n\"}", "TestGetConfigIntegration/cached/with_an_integration_client,_must", "github.com/gravitational/teleport/lib/utils/typical::TestParser/inequality_unsuppported_operand_type", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCreateEC2ICE_erroor_quota_reached", "TestConvertAuditEvent (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/exists(labels.env,_\\", "TestExhaustiveNonEmptyStru", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSecurityGroupps/no_vpc_id", "github.com/gravitational/teleport/lib/scopes/roles::TestValidateRole/basic", "github.com/gravitational/teleport/lib/utils::TestFnCacheExpiry", "TestParseSignatureAlgorithmSuite/1.0/json (0.00s", "TestTrimToMaxSize/db.session.postgres.functio", "TestDisplay/invalid_ip_address (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestOktaImportRuleMarshal", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/file:///host/absolute/dir", "TestSet/iteration/with_empty_set (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws/region::TestGetKnownRegions/IsVallidRegion", "TestNewDatabaseObject/valid_object", "Test_Channel_GetVersion/normal_version (0.", "TestAllDeviceEnumsMapped/OSType/OS_TYPE_U", "TestStaticHostUserCRUD/updat", "TestDisplay/some_ip_address (0.00s)\\n\"}", "Test_Channels_", "github.com/gravitational/teleport/lib/events::TestJSON/session_start_event", "github.com/gravitational/teleport/lib/events::TestAsyncEmitter", "github.com/gravitational/teleport/lib/events/export::TestDateExporterBasics/randoomFlake=false_batch=true", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureExternallAuditStorage/bad_uri", "TestGenericValidation (0.00s)\\n\"}", "TestMemory/Items/descending_o", "TestIDTokenValidator_Validate (0.33s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::Test__copyAtMost/n_==_len(src)", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/query_on_tiime_range_order_DESC", "github.com/gravitational/teleport/lib/jwt::TestPublicOnlyVerifyAzure/ECDSAP256", "TestValidateSPIFFEFederation (0.00s)\\n\"}", "TestManagedSQLListWithinGroup/empty_list (0.00", "github.com/gravitational/teleport/lib/services::Test_ValidateSAMLConnector", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_root_glob_matcch", "TestVariable/external_with_no_brackets (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/&", "github.com/gravitational/teleport/lib/observability/tracing::TestNewExporter/succcessful_inferred_grpc_exporter", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServices/pagination", "Test_Channel_CheckAndSetDefa", "github.com/gravitational/teleport/lib/events::TestEvents/okta.access_list.sync_OnneOf", "github.com/gravitational/teleport/lib/utils/log::TestOutput/text", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumentt/aws-rds", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[createe]", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_unset_nomatch_match}", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/regexp.match_call", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/ok_host_and_pport", "TestRBAC/create (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestChConn", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/us-west-2_fips_with_region_from_imdsv2", "github.com/gravitational/teleport/lib/utils/aws::TestValidateRoleARNAndExtractRolleName/invalid_arn", "github.com/gravitational/teleport/lib/cloud/provisioning::TestNewAction", "github.com/gravitational/teleport/api/internalutils/stream::TestEmpty", "github.com/gravitational/teleport/lib/services::TestValidateSigstorePolicy/requirred_attestation_empty_predicate", "github.com/gravitational/teleport/api/client/webclient::TestWebClientClosesIdleCoonnections", "github.com/gravitational/teleport/lib/services::TestAccessCheckerWorkloadIdentityy/labels_role,_no_labels_wi", "github.com/gravitational/teleport/lib/utils::TestParseEmptyPort", "Test_ku", "github.com/gravitational/teleport/api/mfa::TestMFACeremony/OK_ceremony_success_prrompt", "TestValidateDatabaseObject/val", "TestUnifiedR", "TestIsALPNCo", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/MFAVerified", "TestParsePacket/COM_STMT_SEND_LONG_DA", "TestJSON/MySQL_statement_execute (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::FuzzParseWebLinks/seed#4", "TestIDTokenValidator_Validate/expired (0.00s)\\n\"}", "TestServiceAccess/CreateAutoUpdateAgentReport/a", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_glob_match_mulltipart", "Test_formatJSON/auto_pretty (0.00s)\\n\"}", "TestKeyTrimSuffix/empty_key_trims_nothing (0.00s)", "TestContainsExpansion/expansion_with_brackets (", "github.com/gravitational/teleport/lib/cryptosuites::TestSuites/SIGNATURE_ALGORITHHM_SUITE_UNSPECIFIED", "TestFilterSAMLEntityDescriptor/scheme_filt", "TestAuthConfig/unknown_mode/check (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestStringOrMap", "TestParseShortcut/roles (0.00s)\\n\"}", "TestNewDefaultInstaller (0.00s)\\n\"}", "TestLogLevel/SetERROR (0.00s)\\n\"}", "TestUserNotificationsCache (0.91s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestServerConversion/postgres__unavailable", "TestDocumentDBFetcher/fetch_all (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestWindowsDesktopGroups", "TestSQLListAll/auth_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/allow_all", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/verify_coverage", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/DeleteDynamicWindowsDesktop,allowed:NotRequired,verbs:[]", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/okta_service_delleting_non-okta_resource_is_an_error", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/allowed_credentials_last_(1)", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite", "github.com/gravitational/teleport/lib/services::TestParseFromMetadata", "TestAttachPolicy/AttachError (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestAuroraMySQLVersioon/5.6.10a", "FuzzParsePacket/seed#1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/missingg_GCP_connection_name/check", "github.com/gravitational/teleport/lib/utils/oidc::TestIssuerForCluster/valid_withh_subpath", "github.com/gravitational/teleport/lib/services::TestValidate_WithAllowRequestKubeernetesResources/allow_when_requested_role_matches_requested_kinds", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/Azure_AAD_Auth", "TestLegacyCompat (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/scopes::TestCompare/simple_descendant", "TestValidateAsssignment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/config/openssh::TestWriteSSHConfig/modern_OOpenSSH_-_single_cluster_with_username_and_custom_port", "TestServiceAccess/CreateVnetConfig", "TestServiceAccess/DeleteAutoUpdateAgentRollout/disallowed_admin_st", "github.com/gravitational/teleport/lib/backend::TestKeyScan/invalid_type_int", "github.com/gravitational/teleport/lib/loglimit::TestLogLimiter/logs_that_match_loog_substrings_are_deduplicated", "TestAccessList_setInitialR", "TestUpser", "TestSignatureAlgorithmSuiteRoundtrip/bala", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#6", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[update]", "github.com/gravitational/teleport/lib/asciitable::TestFullTable", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_match_unset}", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/session_id", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/CreateAutoUpdateVersion", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//1/yaml", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/allowed_admin_states", "TestLogin/uv_discouraged (0.00s)\\n\"}", "TestSignatureAlgorithmSuiteRoundtrip/fips-v1", "Test_isPodUnhealthy/ready (0.00s", "github.com/gravitational/teleport/lib/accesslists::TestGetOwners", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestCreateEC2ICE_succcess_multiple", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentRollout/allowed_admin_states/NotRequired/verbs=[createe]", "github.com/gravitational/teleport/lib/utils::TestKubeResourceMatchesRegex", "TestCreateSession (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialCreation__Validate", "github.com/gravitational/teleport/lib/utils/typical::TestParser/map.key_syntax", "TestListResources/KubeServer (0.05s)\\n\"}", "TestRedisEnterpriseClient/List/ListWithi", "github.com/gravitational/teleport/lib/utils/aws::TestCreateBucketConfiguration/reegular_region", "TestEvents/login_rule.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_nomatch_unset}", "github.com/gravitational/teleport/lib/automaticupgrades/maintenance::Test_basicHTTTPMaintenanceClient_Get/all_good_-_no_maintenance", "TestRollbackGroups/valid_transition (0.00s)\\", "github.com/gravitational/teleport/lib/utils::TestLockWithBlocking", "FuzzParserEvalBoolPredicate/seed#7 (0.00s)\\n\"}", "TestAtomicWriteShim/I", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateCertAuthorityy/success", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/allow_remotte_and_local", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed/ccompressed_OP_MSG", "TestRolesForResourceRequest/multi_allowed_", "github.com/gravitational/teleport/lib/events::TestEvents/access_graph.crown_jewell.create_OneOf", "github.com/gravitational/teleport/lib/services::TestKubeResourcesMatcher/user_reqquests_a_valid_and_invalid_pod_for_role_defaultRole", "TestParseShortcut/access_request (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_client,_must_return_integration_fetch_error", "github.com/gravitational/teleport/lib/services::TestNewAccessGraph", "github.com/gravitational/teleport/lib/services::TestAccessCheckerKubeResources/acccess_dev_cluster_with_kube_cluster<prodCluster>_and_kube_pod<devCCluster>_resource_access_request", "github.com/gravitational/teleport/lib/backend::TestBuildKeyLabel", "TestParseReviewFrequency/1months (0.00s)\\n\"}", "TestServiceAccess/ListUserTasks", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiterConfig/emptyy_logger", "TestJoinServiceGRPCServer_RegisterU", "TestNewResourceExpression/fail_to_par", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsTimeeBased/unstarted_->_unstarted", "TestCheckAzureIdentities/denying_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/disallowed_admin_states/Unauthorized", "TestSliceOrString/unmarshal/error_invalid_", "TestEvents/billing.update_card_OneOf (0.00s)\\n\"}", "TestConfig_CheckAndSetDefaults/miss", "github.com/gravitational/teleport/lib/expression::TestEvaluateTraitsMap/no_rules", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_unset_unset_match}", "TestDynamicUnknownType (0.00s)\\n\"}", "TestGetConfigIntegration/cached/with_an_integration_client,_must_re", "TestApplyAzureDatabaseNameSuffix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerified,verbs:[update]", "FuzzTraitsExpressionParser/seed#3 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/upsert/deny_rbac", "TestIsValidHostname/mixed_upper_case_fails (0.00s)", "TestRedshiftFetcher/fetch_prod (0.00s)\\n\"}", "TestResolveViaWebClient/i", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_nomatch_unset_match}", "TestRequireKubeLocalProxy (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestRoleSetEnumerateDatabaseUserssAndNames/role_sales_does_not_match_the_resource_and_should_be_skipped", "github.com/gravitational/teleport/lib/services::TestAccessListUnmarshal", "TestTunnelAddr/should_use_WebListenAddr_with_custom_ProxyWebPort", "TestMakeAppTypeFromSAMLApp (0.00s)\\n\"}", "TestIntervalReset (2.01s)\\n\"}", "github.com/gravitational/teleport/lib/client/db/mcp::TestRegisterDatabase", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForLocalUser", "TestMakeCAKeySet/multiple_keys (0.00s)\\n\"}", "TestOutput/text/trace (0.00s)\\n\"}", "TestMigrationCheckpoint (1.18s)\\n\"}", "TestValidateHealthCheckConfig/valid_custom (0.0", "github.com/gravitational/teleport/lib/utils::TestFnCacheReloadOnErr", "TestNewAppServerForAWSOIDCIntegration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/first_group_rolledback,_second_is_active_and_should_become_done,_third_sshould_not_progress", "TestIsALPNConnUpgrade", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:NotRequired,verbs:[update]", "TestIsDifferentTCPVersion (0.00s)\\n\"}", "TestConnString/database_set (0.00s)\\n\"}", "TestServiceAccess/UpdateAutoUpdateAgentRollout/allowed_", "TestBuildRoleARN/role_name_wit", "TestServiceAccess/ListUserT", "github.com/gravitational/teleport/api/trail::TestTraces", "TestTrimToMaxSize/device.webtoken.create (0.00s)\\n\"", "github.com/gravitational/teleport/lib/events/athena::Test_consumer_sqsMessagesColllector/verify_if_events_are_sent_over_channel", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationChheckpoint/checkpoint_from_export1_is_not_reused_on_export2", "TestStatefulSetVersionUpdater_unblockStatefulSetRoll", "github.com/gravitational/teleport/lib/healthcheck::TestTarget_checkAndSetDefaultss/missing_resource_getter", "TestCheckAccessToServer/role_", "TestDatabaseServerBasics (1.61s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestLabelExpressions/labels_matchhing_glob", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerified/verbs=[update_create]", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/podutils::TTest_isPodUnhealthy/no_data", "TestParseReviewFrequency/3_m (0.00s)\\n\"}", "TestMatchAndFilterKubeClusters (0.04s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/cluster_networkinng_config.update", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseNamesAndUsers/emmpty_role", "github.com/gravitational/teleport/api/internalutils/stream::TestCollectPages/singgle-element-case", "TestCheckedPrefixWriter/success/two_writes (0.00s)", "github.com/gravitational/teleport/lib/services::TestWorkloadIdentityMarshaling", "TestCircuitBreaker_Execute", "FuzzTraitsExpressionParser/seed#10 (0.00s)\\n\"}", "TestKernelVersion/4.19.0-6-cloud-amd64 (0.00s)\\n\"}", "FuzzTraitsExpressionParser/seed#25 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/NotRequired", "TestOpenTunn", "TestAppIsAzureCloud/Azure_Cloud (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws::FuzzParseSigV4/seed#0", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/saml/resource_iterator", "TestResourceMatchersToTypes/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityX509Servicce_CheckAndSetDefaults", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#11", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/NOK_scope_not_specified", "Test_splitExpression/unmat", "Test_querier_fetchResults/", "TestNewResourceExpression/ma", "github.com/gravitational/teleport/lib/vnet/diag::TestRouteConflictDiag", "github.com/gravitational/teleport/lib/events::TestJSON/session_end_event", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_can_create_when_create_host_user_mode_is_keep", "TestParseShortcut/namespaces (0.00s)\\n\"}", "TestConnectorKInitClient (0.02s)\\n\"}", "TestFailoverTrigge", "TestHandler_getToken_cache (0.00s)\\n\"}", "TestIDTokenValidator_Validate/invalid", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/wrongly_signed_manifest", "github.com/gravitational/teleport/lib/utils::TestKernelVersion", "github.com/gravitational/teleport/lib/devicetrust::TestAttestationParametersProtoo", "TestValidateStaticHostUser/invalid_node_lab", "TestMux/DisabledProxy (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialHost/dial_success_to__agentless_node_using_EC2_Instance_Connect_Endpoint", "TestGetResources/Node (0.39s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGenerateHostCert", "TestValidateStaticHostUser/nil_user (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestDesktopDirectorySharing", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/auth_error", "github.com/gravitational/teleport/lib/utils::TestEscapeControl", "TestRoleParse/no_input,_should_not_parse (0.00s)\\", "TestParseShortcut/oktaimportrules (0.00s)\\n\"}", "TestDescendingSegments/trailing_empty_segment", "TestEC2SSMIAMConfigReqDefa", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureDBServeerFetchers", "github.com/gravitational/teleport/lib/events::TestJSON", "TestSliceOrString/unmarshal/single_string (0.00", "TestWrites/basic_multi-operation (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseOutput_CheckAndSettDefaults", "TestFilterItems/Exclude_by_NameRege", "github.com/gravitational/teleport/lib/tbot/config::TestLoadTokenFromFile", "TestConnectorKInitClient/", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/MFAVerifiedWithReuse/veerbs=[update]", "github.com/gravitational/teleport/lib/decision::TestTLSIdentityToTLSCA_zeroTimesttamp", "github.com/gravitational/teleport/lib/services::TestApplyTraits/all_values_are_exxpanded_for_label_values", "TestGlobMatch/exclusive_child_glob_match_", "github.com/gravitational/teleport/lib/utils::TestSet/add/to_populated_set", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_CheckAndSeetDefaults/stable/cloud_set_but_not_default", "TestValidateSQLServerDatabaseURI/comput", "github.com/gravitational/teleport/api/types::TestDatabaseMemoryDBEndpoint", "github.com/gravitational/teleport/lib/events::TestEvents/app.session.chunk_EventFFields", "github.com/gravitational/teleport/lib/events::TestEvents/session_recording_configg.update_EventFields", "TestAtomicWriteSuite/Other (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/regexp.match_simple__call", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/unknownn_mode", "github.com/gravitational/teleport/lib/healthcheck::TestNewManager/success_with_miissing_clock_applies_default", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/SESSIION_AND_HARDWARE_KEY", "Test_setGroupStates/same_group", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthority", "github.com/gravitational/teleport/lib/sshutils/x11::FuzzParseDisplay/seed#12", "github.com/gravitational/teleport/lib/services/local/generic::TestGenericListResoourcesWithFilter", "TestPollAWSRDS/poll_rds_databases", "TestReadJSON_ContentType/empty_value (0.00s)\\n\"}", "TestAuthorizedKey/missing_fingerprint (0.00", "TestAllDeviceEnumsMapped/OSType (0.00s)\\n\"}", "TestUpsertClusterNetw", "TestIsValidHostname/empty (0.00s)\\n\"}", "TestAzureWatcher/all_vms (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRBAC/get_with_secreets", "TestSSHPortForwarding/implicit_allow (0.00s)\\n\"}", "TestGetByPurpose/too_many_creds_", "github.com/gravitational/teleport/lib/kube/token::TestGetTokenAudiences", "TestEC2SSMIAMConfig/integr", "github.com/gravitational/teleport/lib/integrations/awsra/createsession::TestCreatteSession/check_defaults/valid", "github.com/gravitational/teleport/lib/services::TestReasonRequired/resource_requeest:_require_reason_when__any__role_with_reason.required_matches__any__resource", "Te", "github.com/gravitational/teleport/lib/boundkeypair::TestChallengeValidator_ValidaateChallengeResponse/tampered_with_iat", "github.com/gravitational/teleport/lib/services::TestVerifyPassword/password_just__right", "TestEvents/oidc.deleted_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/verify_coverage/GetUserTask", "TestURLForResolvedEndpoint/replaced", "TestUpsertSessi", "TestReviewThresholds/threshol", "TestMakeCAKeySet/TLS_keys (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestConvertUsageEveent/access_list_member_create_event", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/track_last_5", "github.com/gravitational/teleport/lib/tbot/config::TestSSHMultiplexerService_ChecckAndSetDefaults/valid", "TestIsUserARN/valid_partial_arn (0.00s)\\n\"}", "TestServiceAccess/ListDatabaseObject", "github.com/gravitational/teleport/lib/services::TestValidateAccessMonitoringRule//allow_desired_state_to_be_empty", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewKubeClusterFroomGCPGKE", "TestAppliesTiming/normal_speed (0.00s)\\n\"}", "TestLogin_c", "TestGetConfigIntegration/cached/without_an_integration", "TestReviewThr", "github.com/gravitational/teleport/lib/spacelift::TestIDTokenValidator_Validate/innvalid_issuer", "TestNewAppV3/invalid_cloud_identifier (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/privilege_token.create_EEventFields", "github.com/gravitational/teleport/lib/devicetrust/native::TestStatusError_Is/samee_statuses_are_equal", "github.com/gravitational/teleport/lib/services::TestHostUsers_CanCreateHostUser/ttest_cant_create_when_create_host_user_mode_is_off", "TestOpenIDConfigurationForIssuer (0.00s)\\n\"}", "TestTrimToMaxSize/client.disconnect (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationTunnelService_CCheckAndSetDefaults/valid", "TestEncodeDecodeRequireMFAType/SESSIO", "TestServiceAccess/GetVne", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_unset_match}", "TestSanitize//namespaces/..params (0.00s)\\n\"}", "TestValidateSQLServerDatabaseURI/mssql:// (0.00s", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/ListDatabaseObjects/disallowed_admin_states", "TestGetLabelEngineVersion/missing_lab", "github.com/gravitational/teleport/lib/services::TestEncodeDecodeCreateDatabaseUseerMode/DB_USER_MODE_OFF", "TestCreateEC2ICE_success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings/on", "github.com/gravitational/teleport/lib/utils::TestUnmarshal", "TestCLIPrompt/NOK_no_otp_response (0.10s)\\n\"}", "TestGetDbName/returns_root_cluster_db_n", "TestDefaultTags/ecs_tags (0.00s)\\n\"}", "TestMemory/FetchLimit (0.00s)\\n\"}", "TestSearchSessionRange (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_nomatch_nomatch_match}", "TestRBAC/delete (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/subsystem_OneOf", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors//NOK_assertion_signed_by_unknown_device", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.dynamoodb.request", "TestDestinationKubernetesSecret_String (0.00s)\\n", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel", "TestReconciler_Reconcile/reconciliation_faces_conflic", "github.com/gravitational/teleport/lib/utils::TestFnCache_New/valid_ttl", "TestServiceAccess/CreateAutoUpdateConfig/allowed_admin_sta", "TestMarshalJWK/ECDSAP256 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate::TestInstallFlagsYAML/empty", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstMatchPattern/plain_text_mismatch", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_nomatch_nomatch_unset}", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/access_to_upsert_AccessMonitoringRule", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/level_compoonent_timestamp", "TestMinVerWithoutPreRelease/ignores_dev (0.00s)\\n\"}", "TestTrimToMaxSize/secreports.audit.query.run (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_nomatch_nomatch}", "TestAddRoleDefaults/requeste", "TestRegexMatchesAny/glob_match (0.00s)\\n\"}", "TestMatchHealthy/WithUnhealthyApp (0.00s)\\n\"}", "TestServiceAccess/DeleteDynamicWindowsDesktop,allowe", "TestConvertUsageEven", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsTimeeBased/unstarted_->_unstarted,_with_reports", "TestMySQLFlexClient/List/WithinGroup (0.00s)\\n\"}", "TestEvents/x11-forward_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_ToFromSubject/device_exxtensions", "TestUploadTraces/no_spans_to_upload (0.00", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse", "TestEncodeDecodeCreateDatabaseUse", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient/Listt/ListWithinGroup", "github.com/gravitational/teleport/lib/srv/debug::TestLogLevel/SetLowerINFO+1", "github.com/gravitational/teleport/lib/cloud/imds/oracle::TestIsAvailable", "github.com/gravitational/teleport/lib/srv/alpnproxy/auth::TestDialLocalAuthServerrAvailableServers", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint", "github.com/gravitational/teleport/lib/azuredevops::TestIDTokenValidator_Validate//invalid_audience", "TestVariable/no_args (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/s3_bucket_is_set_but_not_sqs_queue_url", "TestParseShortcut/windows_desktop_service (0.00s", "github.com/gravitational/teleport/lib/events::TestEvents/aws_identity_center.resoource_sync.success_OneOf", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Updating", "TestAWSSignerHandler/Lambda_access (0.04s)\\n\"}", "TestParsePacket (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/bitbucket::TestIDTokenValidator_Validate/exxpired", "TestCheckAccessToWindowsDesktop/emp", "github.com/gravitational/teleport/lib/services::TestWorkloadIdentityX509RevocatioonMarshaling", "github.com/gravitational/teleport/lib/services::TestOIDCAuthRequest_Check/ConnecttorSpec_with_SSOTestFlow_works", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/ListCrownJewels/allowed_admin_states/NotRequired/verbs=[list]", "github.com/gravitational/teleport/lib/versioncontrol/endpoint::Test_exportEndpoinnt/write_value", "TestFromProtoNils/grants (0.00s)\\n\"}", "TestParseShortcut/oktaassignment (0.00s)\\n\"}", "TestValidateDatabase/invalid-redis-incor", "TestAppPortsValidation (0.00s)\\n\"}", "TestCachedReleases (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestPackageLogger", "github.com/gravitational/teleport/lib/services::TestFilterSAMLEntityDescriptor/sccheme_filtering", "TestValidateAccessMonito", "TestParseMetadataClientError/ok (0.00s)\\n\"}", "TestMatch/bad_regexp (0.00s)\\n\"}", "TestLogin_findsCorrectCrede", "TestMemory/Items/ascending_o", "github.com/gravitational/teleport/lib/cloud/imds/azure::TestGetInstanceInfo", "github.com/gravitational/teleport/lib/services::TestCertPoolFromCertAuthorities/cca1_with_1_cert", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/databases/IterateUnifiedResources/ascending", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheConfigurationEndpointNameOverride", "github.com/gravitational/teleport/lib/utils::TestRoundRobinSequential/multi-item", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/one_role__is_more_permissive_than_another", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_unset_match_match}", "TestValidateCrownJewel/EmptyAWSMatcherK", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/access_list.membeer.update", "TestUploadTraces/error_uploading_spans", "TestServiceAccess/UpsertDynamicWindowsDesktop,allowed:NotRequired,v", "TestValidateConfigAgains", "FuzzParsePacket/seed#19 (0.00s)\\n\"}", "TestAtomicWriteValidation/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/db/postgres::TestConnString/user_witth_special_characters", "TestCompare/simple_descendant (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Unrecognized", "TestLogin_findsCorr", "TestMake", "github.com/gravitational/teleport/lib/auth/migration::TestApply", "TestServiceAccess", "TestClickableURL/specified_IPV4 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/IPv6_adddress_and_filename_with_IPv6_address", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteShim/WatcherrsClose", "TestProjectIDFromServiceAccountName (0.00s)\\n\"}", "TestAuditUnmarshaling/without_next_a", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisEnterpriseClient/GetTToken/access_denied", "github.com/gravitational/teleport/lib/auth/webauthn::TestPasswordlessFlow_Finish__errors", "TestRBAC/update_no_access (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestIdentityOutput_CheckAndSettDefaults/valid", "TestMakeTableWithTruncatedColumn/column3 (0.00s", "TestKubernetesOutput_CheckAndSetDefaults (0.00", "TestServiceAccess/ListDatabaseObjects/allowed_admin_stat", "TestSet/subtract/populated_minus_populated (0.00s)", "github.com/gravitational/teleport/lib/tbot/workloadidentity::TestBundleSet_Clone", "TestTemp", "TestCheckAccessToSAMLIdP/no_roles (0.00s)\\n\"}", "TestListener/invalid_remote_address (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig", "github.com/gravitational/teleport/lib/utils::TestSet/remove/from_populated_set_(nnot_present)", "TestValidateSAMLIdPACSURL", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_prefer_sso_wheen_specified", "TestValidateDatabase/i", "TestVa", "github.com/gravitational/teleport/lib/srv/db/common/databaseobject::TestNewDatabaaseObject/valid_object", "github.com/gravitational/teleport/lib/services::TestCheckAccessToUserGroups/wild__card,_access", "TestDeleteDocuments (0.00s)\\n\"}", "TestIsRoleARN/invalid_arn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL", "TestParser/or_expressions (0.00s)\\n\"}", "Test_setGroupStates/less_groups (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/regexp_function_ccall_not_allowed", "TestAtomicWriteShim", "github.com/gravitational/teleport/lib/events/athena::TestRunWithMinInterval/functtion_returns_earlier_than_minInterval,_wait_should_happen", "github.com/gravitational/teleport/lib/auth/moderation::TestSessionAccessStart/succcess_with_spec", "TestGetKubeResources/one_denied (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureSQLServer", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV8:__cluster-level_MFA_allows_verified_MFA", "TestMux/signed_PROXYv2_", "TestGetScaleSetVirtualMachi", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthorities//ca_found_with_secrets", "TestIDTokenSource_GetIDToken (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/create", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/disallowed_admin_states", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest/govcloud", "TestMarshalYAML/list_of_maps (0.00s)\\n\"}", "TestGlobMatch/inline_glob_match (0.00s)\\n\"}", "TestValidateDatabase/valid-redis (0.00s)\\n\"}", "TestMigrate/real_world_5 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#2", "TestTriggerGroups/unsupported_strategy (0", "TestDBAuthorityUp (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/rc", "TestReasonRequired/role_request:_handle_w", "TestCheckDatabaseR", "TestDraftConfigurator (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setGroupStates/samme_groups,_different_states", "github.com/gravitational/teleport/lib/services::TestParseShortcut/connector", "TestKeyIDHasDistinctOutputForDifferingInputs (0.80", "TestHandleUnimplemented/status_", "github.com/gravitational/teleport/lib/inventory/internal/delay::TestVariable", "github.com/gravitational/teleport/lib/utils::TestGetSingleHeader/SingleValue", "github.com/gravitational/teleport/lib/utils::TestMockBackendLister_List", "TestRemoveFromSlice/remove_only_element (0.00s)\\n\"}", "TestHomeDirExpansion/just_tilde (0.00s)\\n\"}", "TestEvents/plugin.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_unset_match_nomatch}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSPrroxy/postgres/default_endpoint", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/User_is_granted_the_editor_role_but_had_other_roles", "TestTrimToMaxSize/cluster_networking_conf", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/allowed_read_access_to_AccessMonitoringRulles", "TestNewRes", "github.com/gravitational/teleport/lib/utils/aws::TestRoles", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseGatewayTargetURII", "github.com/gravitational/teleport/lib/backend::TestKeyPrependKey/all_with_leadingg_separators", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/CreateAutoUpdateConfig", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_unset_nomatch}", "github.com/gravitational/teleport/lib/web/app::TestAuthPOST/invalid_session", "TestSortedGCPServiceAccounts (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/errorrs_are_propagated", "TestAuthorizeWithLocksForLocalUser (0.30s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/desktop.directoryy.write", "github.com/gravitational/teleport/lib/ui::TestMakeLabels/Multiple_maps_with_hiddeen_labels", "TestAWSAppAccessConfig/valid (0.00s)\\n\"}", "TestDeduplicateKey/NoStructDuplicates (0.00s)\\n\"", "TestSelectVersion/more_recent_version (0.00s", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestForceGroupsDone/unssupported_strategy", "TestPendingTicks (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_match_match}", "TestPROXYEnabledListener_Accept (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_match_nomatch_nomatch}", "TestCount (0.00s)\\n\"}", "TestServiceAccess/GetUserTask (0.00s)\\n\"}", "TestEvents/bot.delete_EventFields (0.00s)\\n\"}", "TestMatchResourceByFilters_Helper/empty_fi", "github.com/gravitational/teleport/lib/inventory::TestGoodbye/goodbye_termination", "TestParseRegion/invalid_region (0.00s)\\n\"}", "TestServiceAccess/TriggerAutoUpdateAgentGroup/allowed_ad", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/empty", "TestValidateReverseTunnel/empty_cluster_name", "TestSAMLAuthRequest_Check/above_max_CertTTL (0", "TestInterpolate/missed_traits (0.00s)\\n\"}", "TestEKSIAMConfigReqDefaul", "TestGlobMatch/inline_root_glob_mismatch (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/sshutils/sftp::TestHomeDirExpansion/absolutte_path", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_databaseObjectScopeMatch/mismatch_db_name_and_schema", "TestEvents/integration.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestVerifyAttestation/OK_alllowed_device_series", "TestLogLimiter/logs_are_deduplicate", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_match_nomatch_match}", "github.com/gravitational/teleport/lib/web/app::TestMatchHealthy/WithIntegrationAppp", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestUpsertTask", "TestRBAC/list (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyScan/populated_string_key", "github.com/gravitational/teleport/lib/srv/db/cassandra/protocol::TestV5ReadSelfCoontained", "github.com/gravitational/teleport/lib/client/db/postgres::TestServiceFile", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_userVerificatiion/mfaDev_fails_mismatched_UserVerification", "TestResolveEndpoints/X-Forwarded-Host (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_nomatch_match}", "github.com/gravitational/teleport/api/client/webclient::TestParse/https://examplee.com:443", "Test_claimsToRolesP", "TestParseShortcut/unknown_type (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestGetMCPServerTransportType", "Test_makeGroupsStatus/one_group_in_s", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_match_unset_nomatch}", "TestConfig_SetFromURL/fips_enabled_via", "TestAuthConfig/Azure_AD_Auth (0.00s)\\n\"}", "TestParseReviewFrequency/1_m (0.00s)\\n\"}", "TestDefaultTags/resource_is_teleport_managed/IAM_", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestCountCatchAll/one_ggroup_miss", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/disallowed_admin_states", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnrollEKSClusterss/CreateAccessEntry_and_DeleteAccessEntry_are_called_if_there_wasn't_existing_enttry_for_Teleport", "Test_parseRedisURI (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestLoadIdentityFileFromString", "github.com/gravitational/teleport/lib/services::TestCheckKubeGroupsAndUsers/v3_roole_with_custom_deny.kubernetes_labels", "github.com/gravitational/teleport/lib/web/ui::TestMakeDatabaseConnectOptions/autoo-user_provisioning_at_database_but_disabled_on_role", "Test_progressGroup", "TestOIDCGetRedirectURL/eu.proxy.example.com (0", "github.com/gravitational/teleport/lib/srv/ingress::TestHTTPConnStateReporter", "TestHandleAccessMonitoringRule (0.00s)\\n\"}", "TestCountCatchAll (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tlsca::TestAzureExtensions", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureDBServeerFetchers/match_labels", "github.com/gravitational/teleport/lib/services::TestSignatureAlgorithmSuiteRoundttrip/fips-v1", "TestUpsertPolicy/AddPolicyVersion (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/interval::TestVariableDurationScalingg/inventory_presence_params", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_match_unset_unset}", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/readonlyy_role,_long_session", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/single_group_active_->_active_with_reports", "TestEvents/cert.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/api/client::TestEventEqual/regular_protobuf_oneeof_equal", "github.com/gravitational/teleport/lib/services::TestParseShortcut/role", "github.com/gravitational/teleport/lib/services::TestParseShortcut/usergroup", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/Discovery", "TestGetServers/git_server (0.00s)\\n\"}", "TestSanitize//namespaces/.. (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestApplyTraits/GCP_service_accouunt_substitute_in_deny_rule", "TestServiceAccess/GetDatabaseObjectImportRule/allowed_a", "TestServiceAccess/list_success (0.00s)\\n\"", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/update/deny_rbac", "TestAtomicWriteSuite/Max (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types/accesslist::TestParseReviewFrequency//6_m", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest", "github.com/gravitational/teleport/lib/services::TestApplyTraits/AWS_role_ARN_subsstitute_in_allow_rule", "TestRotateExternalCertAuth", "TestChallengeV", "TestApp", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/no_grroups_in_rollout", "github.com/gravitational/teleport/lib/authz::TestAuthorizeWithLocksForBuiltinRolee/Kube", "github.com/gravitational/teleport/api/profile::TestProfileBasics", "TestDefaultTags/ec2_tags (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestUpssertClusterNetworkingConfig/upserted", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/ccached/with_an_integration_client,_must_return_integration_fetch_error", "github.com/gravitational/teleport/api/types/accesslist::TestSelectNextReviewDate//six_months,_last_day", "github.com/gravitational/teleport/lib/proxy/peer::TestBackupClient", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/other.exammple.com:3080", "github.com/gravitational/teleport/lib/events::TestIsPermanentEmitError/agg_badParrameter_and_badParameter", "github.com/gravitational/teleport/lib/auth/integration/credentials::TestGetIntegrrationCertAuthorities/not-supported", "github.com/gravitational/teleport/lib/services::TestCheckAccessToUserGroups/no_rooles,_no_access", "TestOpenSearchFetcher/prod_custom (0.00", "github.com/gravitational/teleport/lib/services::TestParseSignatureAlgorithmSuite//4/json", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/ipv6_address", "github.com/gravitational/teleport/lib/events::TestEvents/db.create_OneOf", "github.com/gravitational/teleport/lib/utils::TestFnCacheCancellation", "github.com/gravitational/teleport/lib/multiplexer::TestPROXYEnabledListener_Acceppt/PROXY_v1_header,_unspecified_mode", "TestGetAl", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestAutoUpdatteConfigEvents", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix/ipv4", "github.com/gravitational/teleport/lib/sshutils/x11::TestDisplay/invalid_ip_addresss", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/no_access_to_upsert_discovery_config", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsSSHDeviceVerified//nok:_nil_extensions", "TestLogLevel/SetLowerERROR (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentRollout/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestMatchResourceLabels/selector__matches_label", "TestCLIPrompt/NOK_otp_with_per-session_MFA (0", "Test_windowRepr_inWindow (0.00", "github.com/gravitational/teleport/lib/accessmonitoring::TestAccessRequest", "github.com/gravitational/teleport/lib/jwt::TestKey_SignAndVerifyPROXY", "TestGetTags/denied_access_to_instance (0.00s)\\", "TestCheckImpersonate (0.00s)\\n\"}", "TestPublicOnlyVerify/ECDSAP256 (0.00s)\\n\"}", "TestListUsers (0.14s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/client.disconnectt", "TestTransport_DialContextNoServersAvailable (0.", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/utils/typical::TestParser/wrong_result_typee", "TestIDTokenValidator_Validate (0.20s)\\n\"}", "TestGetResourceDetails (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestGetIdentity/role_identity", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup", "Test_getWorkloadVersion/KO_regular_podSpec,_non-semver_tag_with_d", "github.com/gravitational/teleport/lib/services::TestOIDCGetRedirectURL/other.exammple.com:80", "TestResourceMatchersToTypes/multiple_element", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_match_match}", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/deny_all", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewDatabaseFromAzzureManagedSQLServer/empty_properties", "TestParseSignatureAlgorithmSuite (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_match_match}", "TestTrimToMaxSize/okta.sync.failure (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDeployedDatabbaseServices/returns_empty_list_when_the_ECS_Cluster_does_not_exist", "TestSubmitOnce (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/crredential_picker_error", "github.com/gravitational/teleport/lib/utils/slices::TestFilterMapUnique/multiple__strings,_all_match", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/verify_coverage/ListUserTasksByIntegration", "TestWeakValidate/explicitly_d", "github.com/gravitational/teleport/lib/services::TestRoleSetEnumerateDatabaseUserssAndNames/auto-user_provisioning_enabled", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/implicit_denyy_-_no_match_regex", "TestParseShortcut/SamL_IDP_sERVICe_proVidER (0", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/binary_set_field", "TestValidateRole/missing_name (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/missing_join_request/missing_join_request_auth", "TestReconcileResults/Com", "TestFailoverTrigger_Name/nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/memory::TestAtomicWriteSuite/Move", "github.com/gravitational/teleport/lib/devicetrust/config::TestValidateConfigAgainnstModules/Enterprise_and_Mode=off", "github.com/gravitational/teleport/api/internalutils/stream::TestCollectPages", "TestMatch/wildcard (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/invalidd_GCP_IP_Type", "TestMatch/regexp.match_call (0.00s)\\n\"}", "TestGetAllowedLo", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/scalar_and_status_with_conditions", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/valid_root", "TestGetConfigIntegration/uncached/with_an_integration_credentia", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/services::TestVerifyPassword/password_too_sshort", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV7:__idp_enabled_and_denying_label_and_verbs_does_not_deny_access", "TestDefaultTags/resource_is_teleport_managed/ECS_Tags/missing_on", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/kubernetes/resource_iterator/descending", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/conqueror_appproval_via_default_threshold", "TestRoleMap/test_case_'passthrough_match' (0.00s", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAPIServicee_CheckAndSetDefaults", "FuzzParserEvalBoolPredicate/seed#8 (0.00s)\\n\"}", "TestAllDeviceEnumsMapped/DeviceEnrollStatus (0.00", "TestCommands/? (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestAsyncEmitter/Slow", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/groupp_already_done", "TestSSHMultiplexerService_CheckAndSetDefa", "github.com/gravitational/teleport/api/client::Test_websocketALPNClientConn/Write", "TestAzureDBServerFetchers/match_labels_with_all_subscriptions", "TestEnsureSCI", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{match_match_unset_nomatch}", "TestSliceOrString/marshal/single_string (0.00s)\\n", "github.com/gravitational/teleport/lib/srv/db/endpoints::TestGetResolver/builder_eerror", "TestVariable/no_curly_bracket_suffix (0.00s)\\n\"}", "TestWriteCmd/multi-line_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestGetPolicyVersions/PolicyNotFFound", "github.com/gravitational/teleport/lib/events::TestEvents/cluster_networking_confiig.update_EventFields", "github.com/gravitational/teleport/lib/multiplexer::TestMux/HTTP", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#0", "github.com/gravitational/teleport/lib/services::TestAccessRequestMarshaling", "github.com/gravitational/teleport/lib/events::TestEvents/device.create_EventFieldds", "github.com/gravitational/teleport/lib/tlsca::TestPrincipals/FromCertAndSigner", "github.com/gravitational/teleport/lib/services::TestParseShortcut/db_service", "github.com/gravitational/teleport/lib/backend::TestWatcherClose", "TestParseReviewFrequency/3 (0.00s)\\n\"}", "TestMemory/Expiration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestCommands/q", "TestCheckOIDCIdP/valid_key_pair (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/httplib::TestOriginLocalRedirectURI", "TestApply/migrations_up_to_date (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAppIsAzureCloud/not_Azure_Cloud", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.cassandra.preepare_OneOf", "TestBufferedChannelPipeWrite/buffer=10", "github.com/gravitational/teleport/lib/services::TestAccessListMemberUnmarshal", "TestConfig_Ch", "TestListDatabases/no_region (0.00s)\\n\"}", "TestPruneRequestRoles/without_login_hint (0.00s)\\", "TestMemory/Limit (0.00s)\\n\"}", "TestAutoProtocol", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/services::TestDesktopRecordingEnabled", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/verify_coverage/UpdateCrownJewel", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/paath_style_addressing_disabled_via_url", "TestListVPCs/pagination (0.00s)\\n\"}", "TestParseShortcut/proxy (0.00s)\\n\"}", "TestReadProxyLine (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToGCP/empty_role_sset", "TestVerifyAttestation/OK_format=ap", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/services::TestAuthPreferenceValidate/stablee_unix_users/empty_range", "github.com/gravitational/teleport/lib/utils/typical::TestParser/unmatched_parens", "TestConfig_CheckAndSetDefaults/invali", "github.com/gravitational/teleport/api/types::TestAccessRequestFilter/user_wants_rrequests_theyve_reviewed", "TestConfig_Endpoint/without_a_scheme (0.", "TestE", "github.com/gravitational/teleport/lib/tlsca::TestGCPExtensions", "github.com/gravitational/teleport/lib/backend/pgbk/common::TestAuthConfig/GCP_IAMM_Auth/check", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/Create/nonn-okta_service_creating_an_okta_user_is_an_error", "github.com/gravitational/teleport/lib/backend::TestParams", "TestCompare/simple_orthogonal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestAWSConfigFilePath/AWWS_CONFIG_FILE_is_set", "TestListResources/DatabaseServer (0.04s)\\n\"}", "TestAtomicWriteValidation/duplicate_keys (0.00s)\\n", "TestNewResourceExpression/matching_expressions/", "Test_cosignKeyValidator_ValidateAndResolveDigestAut", "TestAuthorizer_AuthorizeAdminActi", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/glob_with_mildly_iinvalid_segment", "TestIsPermanentEmitError/badParameter_err (0.00s)\\", "github.com/gravitational/teleport/lib/services::TestClusterExternalAuditStorage/UUnmarshal_from_testdata_and_compare", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/recovery_code.useed", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_webauthn_with__PIN", "TestConvertSubnet/with_name_tag (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/FirstConnSync/CCloseTimeout", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/invalid_too", "github.com/gravitational/teleport/api/trail::TestConversion/BadParameter", "TestAWSAppAcces", "github.com/gravitational/teleport/lib/utils::TestSet/subtract", "Test_parseRedisURI/invalid_conne", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_match_match_nomatch}", "Test_attribute", "github.com/gravitational/teleport/api/types/accessgraph::TestPrivateKey/valid_derrived", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_RunAdmin/rregistered_device", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAPIServicee_CheckAndSetDefaults/missing_selectors", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestRBAC/get_no_access", "TestMatchPattern/glob_match (0.0", "TestContainsExpansion/escaping_is_honored#02 (0.", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationFromURI/kuberneetes-secret://my-secret", "Test_Channel_GetVersion/no_version (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.query.failed__EventFields", "TestNewKubeResource (0.00s)\\n\"}", "TestParsePacket/ERR_HEADER_protocol_4", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/disallowed_admin_states", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpsertDynamicWindowsDesktop,allowed:MFAVerifiedWithReuse,verbs:[creeate]", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_afterExecution", "TestCreateEC2ICE_error_quota_reached (0.0", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/services::TestCheckSAMLEntityDescriptor/misssing_IDPSSODescriptor", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_rrevocation.delete_EventFields", "TestMatchPattern/plain_", "github.com/gravitational/teleport/lib/services::TestReconciler/non-matching_updatted_resource_should_be_removed", "TestIsRoot (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestAsyncEmitter/Receive", "TestSortingExportFile (0.09s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_MFA_but_MFA_was_not_verified", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin/NOK:_Origgin_empty", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestGKEFetcher/listt_everything_but_one_project_misses_permissions", "TestServiceAccess/UpsertVnetConfig/allowed_admin_st", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingAzureMethod/challenge_response_error", "TestUnmarshalCrownJewel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/aws::TestGetPolicyVersions/PolicyFounnd", "TestKeyString/empty_key_produces_empty_string", "TestIsLeaf/root_cluster_URI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/explicit_denyy_-_ip_san", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/complexx_login,_IPv6_addr_and_':'_in_path", "TestBuildRoleARN/valid_role_arn_in", "TestGetIdentity/assumed_role_identity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{match_match_nomatch_nomatch}", "github.com/gravitational/teleport/lib/events/export::TestCursorBasics", "github.com/gravitational/teleport/lib/devicetrust/authz::TestIsTLSDeviceVerified//all_extensions", "TestAllDeviceEn", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/wrongly_signed_manifest", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstFilterRulesForDatabase/one_matching", "github.com/gravitational/teleport/lib/events::TestEvents/health_check_config.updaate_OneOf", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#15", "TestCompare/root_in_descendant_case (0.00s)\\n\"}", "TestMatchResourceByFilters_Helper/expre", "TestCollect_WithAdaptedLister (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP/Accept_PATCH", "TestEvents/role.updated_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{unset_nomatch_match_unset}", "TestExhaustiveNonEmptyBasics (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_match_unset_match}", "TestIDTokenValidator_ValidateWithJWKS/wro", "github.com/gravitational/teleport/lib/automaticupgrades/cache::TestTimedMemoize_GGet/expired_cache", "TestKubeResourceMatchesRegex/input_misses_verb", "TestConnWithSrcAddr/nil_clientSrcAddr (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/aws::TestIsUserARN/valid_partial_arn", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialHost/dial_success", "github.com/gravitational/teleport/integrations/operator/crdgen::Test_propertyTablle/property_with_only_object_type_and_no_fields", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestRewriter/trust_x--real-ip", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/search_keywords_public_addr_match", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/fiips_disabled_via_url", "github.com/gravitational/teleport/lib/events::TestSessionWriter/SetsEventDefaultss", "TestCLIPrompt/O", "TestRoleSet", "TestAddRoleDefaults/requester_", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/lib/devicetrust::TestHandleUnimplemented/unrelaated_status_error", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestWrapPayload//non-recording_spans_aren't_propagated", "TestHealthCheckConfig_equivalent/di", "TestToTouchIDCredentialPicker (0.00s)\\n\"}", "TestValidate_RequestedMaxDuration/role_ma", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/exclusive_child_glob__mismatch_orthogonal", "TestCircuitBreaker_failure/f", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/rrole_with_wildcard_get_its_logins", "github.com/gravitational/teleport/lib/services::TestMarshalPluginRoundTrip", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/missmatched_kind_is_invalid", "github.com/gravitational/teleport/lib/cloud/azure::TestServerConversion/mysql_avaailable_and_supported", "github.com/gravitational/teleport/lib/kube/token::Test_kubernetesSupportsBoundTokkens/No_token_support", "TestRoundRobinSequential (0.00s)\\n\"}", "TestAllDescriptions (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/no_leeaders", "TestConvertRequestFailureError/not_AWS_error", "github.com/gravitational/teleport/lib/utils/typical::TestParser/and_expressions", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestGetMode", "github.com/gravitational/teleport/lib/utils/aws/identitycenterutils::TestEnsureSCCIMEndpoint/invalid_region_-_with_a_domain", "TestAuthorizer_Authorize_deviceTrust (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#6", "TestServiceAccess/UpsertVnetConfig", "TestParseReviewFrequency/12 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/equals(invalidIdentifier)", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/backwards_compat_wwith_@teleport-actions/auth", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiig/valid", "github.com/gravitational/teleport/lib/events::TestEvents/saml.updated_OneOf", "TestConvertIAMv2Error/not_found (0.00s)\\n\"}", "TestSanitize//./params (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse/verbbs=[update]", "github.com/gravitational/teleport/lib/srv/db/sqlserver/protocol::FuzzMSSQLLogin/sseed#0", "github.com/gravitational/teleport/lib/healthcheck::Test_dialEndpoints/resolver_errror", "TestLabelExpressions/regexp.match (0.00s)\\n\"}", "TestStaticResolver/invalid_addr", "github.com/gravitational/teleport/lib/utils/aws::TestResourceARN", "github.com/gravitational/teleport/lib/observability/tracing::TestNewExporter/invaalid_config", "github.com/gravitational/teleport/lib/services::TestConnAndSessLimits", "TestTarget_checkAndSetDefaults/m", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/GetDynamicWindowsDesktop,allowed:Unauthorized,verbs:[]", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/GetDatabaseObject/allowed_admin_states/Unauthorized/verbs=[]", "Test_Version", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationChheckpoint/failure_after_50_calls,_reuse_checkpoint", "github.com/gravitational/teleport/lib/multiplexer::TestMux/signed_PROXYv2_headerss/first_signed_then_unsigned_PROXY_headers", "TestEvents/auth_preference.update_OneOf (0.00s)\\n\"}", "FuzzNewExpression (0.00s)\\n\"}", "TestTriggerGroups/group_already_active (0", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_match_nomatch_unset}", "TestStreamsDesktopEvents (0.09s)\\n\"}", "TestServiceAccess/CreateVnetConfig/allowed_admin_states/MFAVerified", "TestGetAllowedLoginsForResource (0.01s)\\n\"}", "FuzzMongoRead/seed#18 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport", "TestClient/server_does_not_sup", "github.com/gravitational/teleport/lib/services::TestCheckAzureIdentities/no_accesss_role", "TestParseSignatureAlgorithmSuite/4/yaml (0.00s)\\n\"", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/integration_role_does_not_exist", "github.com/gravitational/teleport/lib/tbot/config::TestSSHMultiplexerService_ChecckAndSetDefaults/missing_destination", "TestLoginFlow_userVerification/", "TestAWSAppAccessConfigReqDefaul", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListDatabasesIAMCConfigOutput", "FuzzParserEvalBoolPredicate/seed#29 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/inventory::TestInstanceHeartbeat", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_hardware_key_pin,_MFA_verified", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#4", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseTunnelService_ChecckAndSetDefaults/missing_database", "Test_dialEndpoints/res", "github.com/gravitational/teleport/lib/services::TestCheckRuleAccess", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_match_nomatch}", "TestRoundRobinConcurrent (0.00s)\\n\"}", "TestPresetRolesDumped (0.01s)\\n\"}", "Test_cosignKeyValidator_ValidateAndResolveDigestAuthent", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/NotFirstConnSynnc/WriteTimeout", "github.com/gravitational/teleport/lib/utils/aws::TestValidateRoleARNAndExtractRolleName", "github.com/gravitational/teleport/lib/events::TestEvents/access_request.create_OnneOf", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestRotateExternalCertAAuthority/NOK_unauthorized_user", "TestValidateStaticHostUser/no_spec (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Deleting", "TestLoginFlow_s", "github.com/gravitational/teleport/lib/services::TestSessionTTL/less_than_identityy_expiration_and_role_session_ttl_allowed", "TestWorkl", "TestThresholdReviewFilter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::FuzzReadProxyLineV2", "TestValidate_WithAllowRequestKubernetesResources/allow_when_requested_r", "TestWriteCmd/string (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParseGatewayTargetURII//clusters/foo/leaves/bar", "TestCredentialCreation_Validate/ok (0.00s)\\n\"", "github.com/gravitational/teleport/lib/healthcheck::TestManager/unsupported_targett_resource_is_an_error", "TestUnifiedReso", "github.com/gravitational/teleport/lib/events/export::TestDateExporterBasics/randoomFlake=true_batch=true", "TestAccessChecker", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseUser/devveloper_allowed_any_username_in_stage_database_except_superuser", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/Expiration", "TestNewDatabaseObjectImportR", "TestCircuitBreaker_afterE", "TestTrimToMaxSize/session.start (0.00s)\\n\"}", "FuzzFetchMySQLVersion/seed#8 (0.00s)\\n\"}", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestSortingExpoortFile/equality_check,_less_data_then_maxSize,_make_sure_it_is_stil_sorted", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/since_speccified", "TestEvents/app.create_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_has_name", "TestEvents/device_OneOf (0.00s)\\n\"}", "TestParseShortcut/connector (0.00s)\\n\"}", "TestTeleportOIDCConne", "TestEvents/oidc.deleted_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.update_OneOf", "Test_cosignKeyValidator_ValidateAndResolveDigest/untrusted_w", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{nomatch_match_unset_nomatch}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Creating", "TestAtomicWriteShim/CompareAndSwap (0.00s)\\n\"}", "TestCheckRuleAccess (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_GetUserMetadata", "github.com/gravitational/teleport/api/types::TestNewAppV3/mcp_with_command", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfig/accoount_does_not_match_expected_account", "github.com/gravitational/teleport/lib/scopes::TestCompare/simple_orthogonal", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_unset_nomatch_unset}", "TestPasswordlessFlow_BeginAndFinish (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestGetSingleHeader/DuplicateValue", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/invalid_variable__syntax", "github.com/gravitational/teleport/lib/web/ui::TestMakeServersHiddenLabels/Single__server_with_internal_label", "TestCheckAccessToAzureCloud/no_access_role (0.0", "TestBufferedChannelPipeWrite/buffer=10,", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestDefaultConfigGroup//CMC_with_no_weekdays", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#4", "TestGithubAuthRequest_Check/below_min_CertTT", "github.com/gravitational/teleport/lib/auth/discoveryconfig/discoveryconfigv1::TesstDiscoveryConfigCRUD/no_access_to_create_discovery_configs", "TestGetTeleportUser/event_without_user_metad", "github.com/gravitational/teleport/lib/tbot/config::TestBotConfig_Base64", "TestServiceAccess/upsert_verb_", "github.com/gravitational/teleport/lib/tpm::TestPrintQuery/ekpub_debug", "github.com/gravitational/teleport/lib/defaults::TestSearchSessionRange/from_afterr_to", "github.com/gravitational/teleport/lib/services::TestReconciler/resources_with_diffferent_origins_don't_overwrite_each_other_by_default", "github.com/gravitational/teleport/api/types::TestAccessRequestFilter/user_wants_rrequests_they_need_to_review", "TestPostgresRecording/prepared_statements (0.00", "github.com/gravitational/teleport/lib/authz::TestContextLockTargets/Auth", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/list_success", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestCloudProhibited/Clooud_prohibits_being_a_leaf_cluster_(UpdateTrustedCluster)", "github.com/gravitational/teleport/lib/services::TestNewUserACL", "github.com/gravitational/teleport/lib/events::TestEvents/trusted_cluster.delete_OOneOf", "github.com/gravitational/teleport/lib/srv/db/common/iam::TestGetAWSPolicyDocumentt/aws-memorydb", "github.com/gravitational/teleport/lib/utils::TestGetSingleHeader/NoValue", "TestSSMInstaller/ssm_with_custom_steps_but_without_listing_permis", "TestWriteClusterSSHConfig/modern_OpenSSH (0", "TestDynamicIdentityFileCreds (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckGCPServiceAccounts", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/UpdateAutoUpdateConfig", "github.com/gravitational/teleport/lib/events::TestEvents/aws_identity_center.resoource_sync.success_EventFields", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestDefaultConfigGroup//unexpected_error_getting_CMC", "github.com/gravitational/teleport/lib/expression::FuzzTraitsExpressionParser/seedd#37", "TestKeyAppendKey/all_with_leading_separators (", "github.com/gravitational/teleport/lib/services::TestParseShortcut/namespace", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestWrapPayload//empty_trace_context_is_not_propagated", "github.com/gravitational/teleport/lib/auth/join/iam::TestCreateSignedSTSIdentityRRequest", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/list", "github.com/gravitational/teleport/lib/auth/clusterconfig/clusterconfigv1::TestCreeateClusterNetworkingConfig/unauthorized_built_in_role", "github.com/gravitational/teleport/lib/utils::TestSlice", "TestParse//clusters/foo (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpsertVnetConfig_with_existing/allowed_admin_states/MFAVerifiedWithReuse", "TestParseGatewayTargetURI//clusters", "TestKubeAgentLabels (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_nil_map", "github.com/gravitational/teleport/lib/scopes::TestGlobMatch/inline_glob_simple_miismatch", "TestServiceAccess/UpdateVnetConfig/allowed_admin_states/NotRequired", "Test_kubernetesSupportsBoundTokens (0.00s)\\n\"}", "TestLoadProfile/normal_profile (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades::TestNewDefaultChannel", "github.com/gravitational/teleport/lib/utils/aws/stsutils::TestNewFromConfig", "github.com/gravitational/teleport/lib/player::TestSkipIdlePeriods", "TestEvents/desktop.directory.read_EventFields", "TestVerifyPassword/password_too_long (0.00s)\\n\"}", "TestNewFromConfig/1_disables_FIPS (0.00s)\\n\"}", "TestEnsureSCIMEndpoint/missing_", "TestCircuitBreaker_beforeReque", "TestOutput/text/info (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/typical::TestParser/unary_func_no_arggs", "TestConnNetTest/FirstConnSync/BasicIO (0.01s)\\n\"}", "TestCreateGitServerRequest_Check/valid-github", "TestRBAC/get_with_secrets (0.00s)\\n\"}", "TestFilterRulesForDat", "TestChain (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed/ccompressed_OP_GET_MORE", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyBasiics/non-empty_slice", "Test_dialEndpoints/resolved_one_healthy_ad", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/update/deny_mfa", "github.com/gravitational/teleport/lib/srv/server::TestAzureWatcher/location_wildccard", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/NotRequired", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ForceAutoUpdateAgentGroup/allowed_admin_states/NotRequired/verbs=[update]", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##41", "github.com/gravitational/teleport/lib/utils/log::TestConcurrentOutput", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/COM__SHUTDOWN", "github.com/gravitational/teleport/lib/authz::TestGetDisconnectExpiredCertFromIdenntity", "TestExtraFields/json/caller_component (0.00s)\\n\"}", "TestKubeResourceCouldMatchRules/inva", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewKubeClusterFroomAWSEKS", "TestLogLevel/SetWARN (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/db.delete_EventFields", "github.com/gravitational/teleport/lib/utils/testutils::TestFindAllEmptyStruct/strruct_with_nil_slice", "TestPingError (0.00s)\\n\"}", "TestIDTokenValidator_Validate/invalid_is", "github.com/gravitational/teleport/lib/utils/aws/region::TestGetKnownRegions/hand__picked", "github.com/gravitational/teleport/lib/reversetunnelclient::TestStaticResolver/vallid_address_yields_NetAddr", "github.com/gravitational/teleport/lib/tbot/config::TestDestinationKubernetesSecreet_String", "github.com/gravitational/teleport/lib/services::TestProtoResourceRoundtrip/depreccated", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_credential_provider_assuming_a_role,_must_return_asssumed_role_credentials", "TestRoleParsing/test_case_'2' (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/workloadidentity/workloadattest::Test__copyAtMost/n_>_len(src)", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_match_nomatch_match}", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/dial_by_hostname", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestOpenSearchFeetcher/prod_vpc", "github.com/gravitational/teleport/lib/secretsscanner/reporter::TestReporter/pre-rreconcile_error", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstFilterRulesForDatabase/all_matching", "TestVariable (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/trim_space", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion", "github.com/gravitational/teleport/lib/devicetrust/challenge::TestSignAndVerify/RSSA2048", "TestAccessCheckerKubeResources/", "github.com/gravitational/teleport/lib/utils/aws/endpoint::TestResolution", "github.com/gravitational/teleport/lib/utils::TestGuessesIPAddress/prefers_10.0.0..0/8", "TestRoleParsing/test_case_'0' (0.00s)\\n\"}", "TestServiceAccess/GetVnetConfig (0.00s", "TestAtomicWriteShim/Events (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCertAuthorityWatcher/Subscribbe_all", "github.com/gravitational/teleport/lib/cloud/aws::TestTagsToLabels/ec2", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/NotRequired/verbs=[]", "TestCommandExecution/execute (0.01s)\\n\"}", "TestCheckDatabas", "TestMatchGCPServiceAccount/allow_exact_match", "github.com/gravitational/teleport/lib/labels::TestCloudLabelsSync", "github.com/gravitational/teleport/lib/events::TestEvents/workload_identity_x509_rrevocation.delete_OneOf", "github.com/gravitational/teleport/lib/devicetrust/authz::TestVerifyTLSUser", "TestSSHAccessLockTargets/all_locks (0.00s)\\n\"}", "TestMux/signed", "github.com/gravitational/teleport/lib/services::TestParseShortcut/cluster_networkking_config", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetClusterURI//clusteers/cluster.sh/leaves/leaf.sh", "github.com/gravitational/teleport/lib/auth/webauthn::TestPasswordlessFlow_backfilllResidentKey/ok", "TestStableUNIXUsers (0.36s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{nomatch_match_nomatch_unset}", "TestWriteMuxedSSHConfig/m", "github.com/gravitational/teleport/lib/srv/db/common/permissions::TestCalculatePerrmissions/some_permissions_for_some_objects", "github.com/gravitational/teleport/lib/utils/slices::TestFilterMapUnique/structs", "github.com/gravitational/teleport/lib/events::TestEvents/plugin.update_EventFieldds", "TestDatabaseMemoryDBEndpoint/invalid_URI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{unset_unset_unset_match}", "TestCreateSessi", "github.com/gravitational/teleport/api/types::TestCloning/*types.AccessRequestV3", "github.com/gravitational/teleport/lib/services::TestApplyTraits/AWS_role_ARN_subsstitute_in_deny_rule", "TestWorkloadIdenti", "github.com/gravitational/teleport/api/client::TestIsALPNConnUpgradeRequired/upgraade_not_required_(other_handshake_error)/with_ProxyURL", "Test_EmitAuditEvent/should_succ", "TestEvents/static_host_user.update_EventField", "github.com/gravitational/teleport/lib/services::TestAddRoleDefaults/access_(only__missing_label)", "TestEvents/device.delete_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/sortcache::TestSortCachePagination/deescending", "TestReadAndRewriteXAuthPacket (0.00s)\\n\"}", "TestWrongData (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/invallid_format_#_1", "TestMatchGCPServiceAccount/deny_exact_match (0", "github.com/gravitational/teleport/lib/devicetrust/authn::TestCeremony_Run/linux_ook", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/update/oktta_service_updating_non-Okta_user_is_an_error", "TestLabelExpressions/email.local_error (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_Endpoint//with_http_scheme", "TestServiceAccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/MF", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{nomatch_unset_nomatch_nomatch}", "github.com/gravitational/teleport/lib/reversetunnel/track::TestUUIDHandling", "TestIsPermanentEmitErro", "github.com/gravitational/teleport/lib/services::TestNewAccessMonitoring/access_moonitoring_enabled", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_canUpdateToday/Mallformed_day", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/missing_ec2_vpc_id", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse", "TestEmptyDatabasesServer (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestParse//gateways/foo", "TestTimedMemoize_Get/valid_cache (0.00s)\\n", "TestDesktopDirectorySharing (0.00s)\\n\"}", "TestValidateDatabase/valid-spanner-with-uri (0", "github.com/gravitational/teleport/lib/services::TestParseShortcut/accessrequests", "TestGCPIPType/private (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/verify_coverage/DeleteAutoUpdateConfig", "github.com/gravitational/teleport/lib/utils::FuzzParseWebLinks/seed#1", "TestOpenTunnelEC2/connect_over_websoc", "TestOktaCRUD/Create (0.01s)\\n\"}", "github.com/gravitational/teleport/api/types::TestPortRangesContains/30", "github.com/gravitational/teleport/lib/backend::TestKeyTrimPrefix/empty_trim_trimss_nothing", "TestCheckSAMLEntityDescriptor/with_", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/MFAVerified/verbs=[delete]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_unset_nomatch_match}", "TestEvents/github.created_EventFields (0.00s)\\n\"}", "TestReconciler/reso", "TestTrimToMaxSize/access_list.review (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/userloginstate::TestAccessLists", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/fiips_enabled_via_url", "TestAppIsAWSConsole/AWS_GovCloud_(US) (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestMajorSemver/simple_semver", "github.com/gravitational/teleport/lib/services::TestRoleParse", "TestGetAccessGraphConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateAgentReport/allowed_admin_states/NotRequired", "TestDesktopRecordingEnabled (0.01s)\\n\"}", "TestCalculatePermissions/no_permi", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[]", "github.com/gravitational/teleport/api/types/accesslist::TestAccessListMemberDefauults/join_date_required_for_member", "TestNewFromConfig/env_not_set (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSDBProxyFeetcher/fetch_vpc1_with_assume_role", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateVersion/allowed_admin_states/MFAVerifiedWithReuse/verbs=[uppdate]", "github.com/gravitational/teleport/lib/multiplexer::TestMux/WebListener", "TestAtomicWriteValidation/zero_condition (0.00s)\\n", "TestValidateToken/another_org (0.00s)\\n\"}", "TestKeyPrefix/prefix=/telep", "github.com/gravitational/teleport/lib/utils/typical::TestParser/dynamic_map_lookuup", "TestNewResourceExpression/fail_", "TestIPv6Fix/ipv6_zone (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/server::TestAzureWatcher/filter_by_tag", "TestExtraFields/json (0.00s)\\n\"}", "TestMatchResourceLabels/one_of_m", "TestBotInstanceActivityRe", "github.com/gravitational/teleport/lib/srv/discovery/common::TestNewAWSNodeFromEC22Instance/missing_ec2_instance_id", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/2-leevel_object", "TestGetResources/ApplicationServer (0.42s)\\n\"}", "TestNewResou", "TestApplicationOutput_CheckAndSetDefaults (0.", "github.com/gravitational/teleport/lib/player::TestAppliesTiming/double_speed", "TestLogLevel/SetLowerINFO+1 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetRootClusterURI/nooop_on_root_cluster_URI", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/disallowed_admin_states", "github.com/gravitational/teleport/lib/services::TestOIDCCheckAndSetDefaults/basicc_spec_and_defaults", "TestCreateSession", "TestTempl", "github.com/gravitational/teleport/lib/proxy/peer/quic::TestCertificateVerificatioon", "github.com/gravitational/teleport/lib/scopes::TestValidateGlob/glob_with_very_invvalid_segment", "github.com/gravitational/teleport/lib/events/athena::TestConfig_CheckAndSetDefaullts/valid_config_with_limiter,_check_defaults_refillTime", "TestDatabaseRDSEndpoint (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/static_host_user.update__OneOf", "TestListEKSClusters/pagination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/usagereporter/teleport::TestEmitEditorChanggeEvent/Role_is_removed_from_user", "TestInterpolate/mapped_traits (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/desktops/resource_iterator/ascending", "TestIssueAndVerifyJoinState/invalid_in", "github.com/gravitational/teleport/lib/srv/discovery/common::TestExtraMemoryDBLabeels", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityJWTServicee_CheckAndSetDefaults/missing_selectors", "TestEvents/role.deleted_OneOf (0.00s)\\n\"}", "TestNewResourceExpression/non_matching_expressions/equals(re", "TestCheckAccessWit", "github.com/gravitational/teleport/lib/backend::TestSanitize//test+subaddr@examplee.com", "TestEvents/billing.update_info_OneOf (0.00s)\\n\"}", "TestEvents/session.start_EventFields (0.00s)\\n\"}", "TestVariable/regexp_replace_with_v", "TestAccessChe", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestRollbackGroups/no_ggroups_in_rollout", "TestPingPong (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/jwt::TestPublicOnlyVerifyAzure", "TestServiceAccess/RollbackAutoUpdateAgentGroup/allowed_admin_", "TestServiceAccess/CreateAutoUpdateVersion/allowed_admin_states/MFA", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/verify_coverage/CreateUserTask", "github.com/gravitational/teleport/lib/authz::TestContextLockTargets/Db", "TestKubeControllerDriver (0.00s)\\n\"}", "TestGKEFetcher/list_everything (0.00s)\\n\"}", "TestExhaustiveNonEmptyBasics/nil_slice (0.00", "TestFindAllEmptyStruct/pointer_t", "TestExhaustiveNonEmptyStruct (0.00s)\\n\"}", "TestAccessRequestFilter/user_wants_thei", "TestValidateTokenWithJWKS/not_yet_valid (0.00", "TestIdPIAMConfigReqDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateConfig/allowed_admin_states/NotRequired/verbs=[]", "TestEvents/session.leave_OneOf (0.00s)\\n\"}", "TestEvents/db.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules", "github.com/gravitational/teleport/lib/events::TestEvents/access_list.member.updatte_EventFields", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestTriggerGroups/groupp_already_active", "github.com/gravitational/teleport/lib/events::TestNewStreamErrors", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_GetVersion//no_version", "TestManagedSQLListWithinGroup (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestSPIFFEFederationMarshaling", "TestPlatformParametersProto (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestRedisClient", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[delete]]", "TestUserActivityReportSplitting", "github.com/gravitational/teleport/lib/utils::TestSelfSignedCert", "TestSet/union/empty_union_populated (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/usertasks/usertasksv1::TestServiceAcceess/verify_coverage/ListUserTasks", "github.com/gravitational/teleport/lib/tlsca::TestPrincipals", "TestEvents/access_list.update_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_nomatch_unset_nomatch}", "TestServiceAccess/UpdateDynamicWindowsDesktop,allowed:MFAVerified,v", "FuzzTraitsExpressionParser/seed#30 (0.00s)\\n\"}", "TestServiceAccess/GetDynamicWindowsDesktop,allowed:MFAVerified,verbs:[", "TestLoginFlow_scopeAndReuse/Finish (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/testutils::TestExhaustiveNonEmptyStruuct/struct_with_empty_slice", "github.com/gravitational/teleport/lib/utils/aws::TestParseRoleARN/sts_arn_is_not__iam", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/signed_manifest_needs_resolution", "TestCheckAzureIdentities/denying_a_role_work", "TestOpenSearchFetcher", "TestMarshalPluginStaticCredentialsRoundTrip (0", "github.com/gravitational/teleport/lib/events::TestUploadCompleterAcquiresSemaphorre", "TestGetCertAuthority (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestReplaceLocalhost", "TestServiceAccess/get_success (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestHandleAccessMoonitoringRule", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/get/allow", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceWatcher_DeleteeEvent", "TestApplyTraits/AWS_role_ARN_substitu", "TestApplyTraits/values_are_e", "github.com/gravitational/teleport/lib/events::TestEvents/github.updated_EventFiellds", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#1", "TestNewAppV3/non-cloud_app_#2 (0.00s)\\n\"}", "TestBuildRoleARN/role_name_with", "TestKeyTrimSuffix/non-matching_trim_trims", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateConfig/allowed_admin_states/MFAVerified", "TestAuthorizeWithLocksForBuiltinRole/Wind", "FuzzParserEvalBoolPredicate/seed#12 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/NotRequired/verbs=[read_lisst]", "github.com/gravitational/teleport/lib/backend::TestKeyTrimSuffix/partial_trim", "TestRemoveSecure_symlink (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/DeleteCrownJewel/allowed_admin_states/NotRequired", "Test_copyAtMost/n_==_len(src) (0", "TestListSecurityGroups/vali", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationDrryRunValidation/valid_events", "TestServiceAccess/Crea", "TestGenerateUserCert/github_identity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateVersion/allowed_admin_states/NotRequired/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{nomatch_match_unset_unset}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_noCredentials_failssWithoutUserInteraction/MFA_unknown_credential_IDs_(1)", "TestChunks (0.00s)\\n\"}", "TestEvents/user.password_change_OneOf (0.00s)\\n\"}", "TestWeakValidate/long_segment_passes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/app/gcp::TestHandler_getToken_cache", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/non-okta_servicee_creating_okta_resource_is_an_error", "TestOperationCheckAn", "TestJSON/desktop_session_start (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerified/verbs=[list]", "github.com/gravitational/teleport/lib/config/openssh::TestWriteSSHConfig/test_sheellQuote", "github.com/gravitational/teleport/lib/services::TestFanoutV2StreamFiltering", "TestConfig_CheckAndSetDef", "TestEvents/session.data_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGuessIfAccessIsPossible", "Test_ValidateSAMLConnector (1.90s)\\n\"}", "TestRedisEnterprise", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRedshiftServverlessFetcher/skip_unavailable", "TestLogin/uv_preferred,_attachme", "TestBackend_Exists (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_80,_portName:_", "TestOutput/json/info (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/app.delete_OneOf", "github.com/gravitational/teleport/lib/srv/db/common/kerberos::TestConnectorKInitCClient/kinit_from_cached_credentials", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestMalformedOpMsgg/multiple_$db_keys", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS/Exact_matchh", "github.com/gravitational/teleport/lib/sshutils/sftp::TestHomeDirExpansion/~user_ppath", "FuzzParserEvalBoolPredicate/seed#20 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestAzureDBServeerFetchers/skip_unsupported_and_unknown_database_versions", "github.com/gravitational/teleport/lib/utils/typical::TestParser/expression_as_arggument", "TestCeremony_RunAdmin/registered_device", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp/empty_value_is_no__match", "TestIsValidHostname/hostname_too_long (0.00s)\\n\"}", "TestNewResourceExpres", "TestAutoProtocolDet", "TestEvents/mfa.delete_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_unknown_command_error", "TestEvents/port_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/user_group/{unset_unset_unset_unset}", "github.com/gravitational/teleport/lib/healthcheck::TestNewManager", "github.com/gravitational/teleport/lib/auth/okta::TestCheckAccess/non-okta_servicee_deleting_non-okta_resource_is_allowed", "github.com/gravitational/teleport/lib/versioncontrol/endpoint::Test_exportEndpoinnt/create_endpoint_file_and_write_value", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_scopeAndReuse//Finish/NOK_scope_not_satisfied", "github.com/gravitational/teleport/api/types::TestAppIsAWSConsole/Region_based_nott_supported_yet", "TestServiceAcc", "github.com/gravitational/teleport/api/internalutils/stream::TestMergeStreams/comppare_always_favors_B", "github.com/gravitational/teleport/lib/services::TestMarshal", "TestIdentity_ToFromSubject/user_type:_local (0.00", "TestKeyScan/populated_byte_slice_key (0.00s)\\n\"}", "Test_propertyTable/scalar_a", "github.com/gravitational/teleport/lib/proxy::TestCheckedPrefixWriter/success/two__writes", "TestDoc", "github.com/gravitational/teleport/lib/boundkeypair::TestIssueAndVerifyJoinState", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_hardware_key_touch_and_pin,_MFA_not_verified", "github.com/gravitational/teleport/lib/utils::TestChainHTTPMiddlewares", "TestRotateExternalCertAuthority/NOK_no", "TestFilterItems/Exclude_by_ID (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestResourceParserLabelExpansion//contains(split(labels[\\", "FuzzFetchMySQLVersion/seed#2 (0.00s)\\n\"}", "TestFindAllEmptyStruct/non-empty_struct (0.", "TestMakeDatabaseHiddenLabels (0.00s)\\n\"}", "TestOriginLocalRedirectURI/simple_path (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/envutils::TestSafeEnvAdd/duplicate_alllowed", "github.com/gravitational/teleport/lib/jwt::TestExpiry/RSA2048", "TestUnified", "TestParser/inequality_unsupported_oper", "github.com/gravitational/teleport/lib/aws/identitycenter/filters::TestFilterItemss/Exclude_All", "TestRegister/with_UV_discouraged_and", "TestGetUserLoginState (0.04s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[]", "TestAddRoleDefaults/reviewer_(enterprise) (0.00s", "github.com/gravitational/teleport/lib/tbot/config::TestWorkloadIdentityAPIServicee_CheckAndSetDefaults/missing_listen", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/misssing_match_section_is_invalid", "TestEvents/desktop.clipboard.receive_EventF", "TestValidateConfigAgainstModul", "FuzzCommands/seed#1 (0.00s)\\n\"}", "TestEvents/oidc.updated_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{nomatch_nomatch_nomatch_nomatch}", "TestUnifiedResourceCacheIteration/databases (0", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/allowed_credentials_second", "github.com/gravitational/teleport/lib/aws/awsconfigfile::TestRemoveCredentialProccessByComment/removes_the_entire_profile_when_the_only_key_is_the_credential_proccess", "TestInstallFlagsYAML (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateStaticHostUser/invaliid_node_labels_expression", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/RollbackAutoUpdateAgentGroup/disallowed_admin_states", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.postgres.stattements.close_OneOf", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestDefaultConfigGroup//CMC_with_no_upgrade_window", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestElastiCacheFFetcher/fetch_all", "TestAllDevic", "TestAWSSecretsManager/KMS_change (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateHealthCheckConfig/misssing_metadata_is_invalid", "TestValidateDatabase/valid-mongodb-srv (2.55s)\\n\"}", "FuzzNewMatcher/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestPublisherConsumer/missinng_event_time", "github.com/gravitational/teleport/lib/utils::TestRoundRobinSequential/single-itemm", "github.com/gravitational/teleport/lib/cloud/azure::TestGetScaleSetVirtualMachine", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::TestParsePacket/ERR__HEADER", "github.com/gravitational/teleport/lib/utils/gcp::TestProjectIDFromServiceAccountNName/missing_@", "github.com/gravitational/teleport/lib/events::TestEvents/kube.delete_OneOf", "github.com/gravitational/teleport/lib/client/db/postgres/repl::TestQuery/query", "TestCheckExpiredCred", "github.com/gravitational/teleport/lib/client/mfa::TestCLIPrompt/OK_sso_with_per-ssession_MFA", "TestAtomicWriteShim/Items (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/utils/stream::Test_zipStreams_Process/alreaady_in_sync", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestMemoryDBFetccher/skip_unavailable", "github.com/gravitational/teleport/lib/client/escape::TestEscapeDisconnect", "TestDatabaseFromRedshiftCluster/success_with_name_override_viatelepor", "github.com/gravitational/teleport/lib/srv/db/mysql/protocol::FuzzParsePacket/seedd#23", "github.com/gravitational/teleport/lib/services::TestRequestFilterConversion", "TestGetResourcesWithFilters/KubeServer (0.22s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEKSIAMConfigReqDeefaults/missing_account_id_is_ok", "TestHeaderRewriter/http,_port_specified (0.0", "TestByteCount/2_byte2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/saml.idp.service.provideer.create_OneOf", "TestRPCClientRequestParam (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestKubeResourceCouldMatchRules/inpuut_misses_verb", "TestAccessMonitoringRuleCRUD/access_to_create_AccessMonitori", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestCountCatchAll/only__catch-all_group_hit", "TestSlogJSONHandler (0.00s)\\n\"}", "github.com/gravitational/teleport/api/observability/tracing/ssh::TestClient/serveer_does_not_support_tracing", "TestDatabaseFromRDSCluster/ba", "Test_newUnstartedWorker/invalid_target (0.00s)\\n", "github.com/gravitational/teleport/lib/services::TestGetRequestableRoles/no_resourrces_to_filter_by", "TestHasName/OK_-_adds_path (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestSSHPortForwarding/conflictingg_roles_implicit_allow_explicit_deny", "TestServiceAccess/UpsertVnetConfig/allowed_admin_states/MF", "TestCredentialLifetimeValidate (0.00s)\\n\"}", "TestSPIFFEFederationMarshaling (0.00s)\\n\"}", "Test_ap", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenSource_GetIDToken", "TestRBAC/upsert_without_update (0.00s)\\n\"}", "TestRoleSetEnumerateDatabaseUsersAndNames/developer_allowed_any_use", "TestCheckAccessToWindowsDesktop/no_rol", "TestReadProxyLineV2/LOCAL_command (0.00s)\\n\"}", "TestConvertUsageEvent/discovery_", "TestRegistrationFlow_Begin_exclud", "TestEvents/static_host_user.update_OneOf (0.00s)\\n\"", "TestListServers (0.00s)\\n\"}", "TestDatabasePermissio", "TestToTouchIDCredent", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/disallowed_admin_states/Unauthorized", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestGetClusterURI", "github.com/gravitational/teleport/lib/cryptosuites::TestSuites/SIGNATURE_ALGORITHHM_SUITE_HSM_V1", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestGetCertAuthorities//ca_type_does_not_exist", "TestAttestationParametersProto (0.00s)\\n\"}", "TestClose/closed_by_server (0.01s)\\n\"}", "TestALPNConnUpgradeDialer (0.00s)\\n\"}", "TestServiceAccess/GetAutoUpdateAgentRollout/allowed_admin_states", "TestEvaluateTraitsMap/strings.split (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt/missing_instance_id", "github.com/gravitational/teleport/lib/events/export::TestDateExporterBasics/randoomFlake=true_batch=false", "github.com/gravitational/teleport/lib/player/db::TestPostgresRecording/session_sttart", "TestIsPermanentEmitError/agg_badParamete", "Test_getWorkloadVersion/KO_regular_podSpec,_non-semver_tag_no_diges", "TestSearchEvents/cost_optimized_query_shoul", "TestProxyVersionClient (0.00s)\\n\"}", "TestApplyTraits/databa", "github.com/gravitational/teleport/lib/utils::TestMinVerWithoutPreRelease/compare__lower_major_versions", "github.com/gravitational/teleport/lib/events::TestEvents/access_graph.crown_jewell.delete_EventFields", "FuzzReadProxyLineV2/seed#2 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/authz::TestAuthorizer_Authorize_deviceTrustt/nok:_user_without_extensions_and_mode=required", "TestTele", "TestMatch/no_curly_bracket_prefix (0.00s)\\n\"}", "TestFromProtoNils/status (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestUnmarshalUserTask", "TestCaptureNBytesWriter (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_match_match_unset}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestOpenTunnelRequestt/missing_vpc_id", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/https://sptest.iamshowcase.com/acs<", "TestRateLimit (0.00s)\\n\"}", "TestKubeResourceCouldMatchRules/i", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/missing_join_request/missing_join_request_proxy", "TestEvaluateTraitsMap (0.01s)\\n\"}", "TestServiceAccess/ListDynamicWindowsDesktops,allowed:NotReq", "TestMux/ProxyLines (0.02s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::Tesst_splitExpression/unmatched_{{", "github.com/gravitational/teleport/lib/services::TestUnifiedResourceCacheIterationn/desktops/IterateUnifiedResources/ascending", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/MFAVerified/verbs=[update]]", "github.com/gravitational/teleport/lib/services::TestParseShortcut/tc", "TestWriteMuxedSSHConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/GetCrownJewel/allowed_admin_states/MFAVerified", "github.com/gravitational/teleport/lib/auth/accessmonitoringrules/accessmonitoringrulesv1::TestAccessMonitoringRuleCRUD/access_to_delete_AccessMonitoringRule", "TestServiceAccess/verify_coverage (0", "FuzzParserEvalBoolPredicate (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/multiplexer::FuzzProxyLine_Bytes/seed#3", "github.com/gravitational/teleport/api/types::TestPortRangesContains/20", "github.com/gravitational/teleport/lib/events/filesessions::TestStreams", "github.com/gravitational/teleport/lib/utils::TestSliceMatchesRegex/test-foo", "TestLogin_findsCorre", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/delete", "github.com/gravitational/teleport/lib/tlsca::TestIdentity_ToFromSubject/user_typee:_sso", "Test_AKSClient_ClusterCredentials (0.00s)\\n\"}", "TestIssuerForCluster/valid_with_subpath (0.00s)\\", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingToken/unauthenticated_-_faked_metadata_ignored/unauthenticated_-_faked_mmetadata_ignored_proxy", "TestCountCatchAll/only_catch-all_grou", "github.com/gravitational/teleport/lib/utils::TestFindMatchingProxyDNS", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestEnrollEKSClusterss/private_cluster_in_cloud_is_not_enrolled", "github.com/gravitational/teleport/lib/client/db/mcp::TestRegisterDatabase/Tool", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_match_unset}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_match_nomatch_match}", "github.com/gravitational/teleport/lib/services::TestValidateRole", "FuzzFetchMySQLVersion/seed#18 (0.00s)\\n\"}", "TestGetUserLoginState (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestEvents/join_token.create_OneOf", "TestR", "TestMFAPerRPCCredentials (0.03s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestMergeStreams/stream_BB_empty", "TestEvents/kube.delete_OneOf (0.00s)\\n\"}", "TestCheckAccessToServer", "TestNewResourceExp", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/get", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##29", "TestCirc", "github.com/gravitational/teleport/lib/services::TestMatchValidAzureIdentity/invallid_format_#_3", "github.com/gravitational/teleport/lib/scopes::TestStrongValidate/long_but_ok_segmment", "TestCheckAccessToGCP (0.00s)\\n\"}", "TestPrincipals/FromTLSCertificate (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::TestSearchEvents/query_on_tiime_range", "TestServiceAccess/DeleteDynamicWindowsDesktop,allowed:NotRequired,v", "github.com/gravitational/teleport/lib/auth/trust/trustv1::TestDeleteCertAuthorityy", "TestCreateSignedSTSIdentityRequest/", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/Unauthorized/verbs=[]", "Test_Channels_DefaultChannel (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestMFAVerificationInterval/Multiiple_roles_with_varying_MFA_requirements,_TTL_adjusted_to_smallest_interval", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/NotRequired", "TestAuditEventsEmitted (0.00s)\\n\"}", "TestServiceAccess/DeleteAutoUpdateAgentReport/disallowed_admin_stat", "github.com/gravitational/teleport/lib/teleterm/api/uri::TestString//clusters/teleeport.sh/apps/app1", "TestBuildSchema/postgres (0.00s)\\n\"}", "TestNewAppV3/app_with_required_apps_list (0.00s)\\n\"}", "TestAuthorizer_AuthorizeA", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Succeeded", "github.com/gravitational/teleport/lib/services::TestParseShortcut/nodes", "TestWriteCmd/[]bool (0.00s)\\n\"}", "Test_formatJSON (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRedshhiftServerlessWorkgroup", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestListUsers", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_match_nomatch}", "github.com/gravitational/teleport/api/breaker::TestRoundTripper_RoundTrip", "TestHealthCheckConfig", "github.com/gravitational/teleport/lib/auth/webauthn::TestLoginFlow_Finish_errors//NOK_assertion_with_invalid_signature", "github.com/gravitational/teleport/lib/tpm::TestStripSANExtensionsOIDs", "github.com/gravitational/teleport/lib/utils/typical::TestParser/integer_inequalitty_(true)", "github.com/gravitational/teleport/lib/scopes::TestJoin/root", "TestFindAllEmptyStruct/struc", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/UpdateVnetConfig", "TestEventEqual/gogo_oneof_not_equal (0.00s)\\n\"}", "TestCloudProhibited (0.00s)\\n\"}", "TestAuthPOST/invalid_session (0.01s)\\n\"}", "TestEvents/saml.idp.service.provider.d", "github.com/gravitational/teleport/lib/multiplexer::TestIsHTTP", "github.com/gravitational/teleport/api/types::TestValidateAssumeStartTime/expired__start_time", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestSQLManagedSeerverFetcher/NewDatabaseFromServer/Accepted", "TestCollectedEventsMet", "TestEvents/user.delete_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[]", "github.com/gravitational/teleport/lib/services::TestAccessListMemberMarshal", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphIAMConnfigReqDefaults", "TestServiceAccess/UpsertDynamicWindowsDesktop,allowe", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/delete/oktta_service_deleting_Okta_user_is_allowed", "TestValidateStaticHostUser (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/common/databaseobjectimportrule::TesstFilterRulesForDatabase", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/allowed_admin_states/NotRequired/verbs=[update]]", "github.com/gravitational/teleport/lib/services::TestFillSAMLSigningKeyFromExistinng/should_error_when_existing_connector_cert_is_not_matching", "github.com/gravitational/teleport/lib/services::TestCheckDatabaseRoles/no_auto-prrovision_roles_assigned", "github.com/gravitational/teleport/lib/utils/aws::TestIsRoleARN/valid_user_arn", "TestKeyHasPrefix/suffix_is_not_a_prefix (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP", "TestRouter_DialWindowsDesktop/failur", "github.com/gravitational/teleport/lib/backend::TestKeyHasPrefix/valid_single_compponent_prefix", "TestWrites/empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestKeyTrimSuffix/non-matching_triim_trims_nothing", "github.com/gravitational/teleport/lib/services::TestCheckAccessToDatabaseUser/dattabase_types_support_AWS_roles_and_regular_users", "github.com/gravitational/teleport/lib/events::TestEvents/billing.update_info_EvenntFields", "github.com/gravitational/teleport/lib/backend::TestSanitize//.", "github.com/gravitational/teleport/lib/services::TestCheckAccessToServer/cluster_rrequires_hardware_key_touch,_MFA_not_verified", "TestEvents/access_list.member.update_OneOf (0.00s", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{match_nomatch_match_match}", "github.com/gravitational/teleport/lib/web/app::TestHasName/OK_-_adds_root_path", "TestProxyLine_VerifySignature/success (0.00s)\\n\"}", "Test_parseRedisURI/rediss_sche", "github.com/gravitational/teleport/lib/events::TestEvents/app.session.chunk_OneOf", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpsertAutoUpdateAgentReport/disallowed_admin_states", "github.com/gravitational/teleport/lib/services::TestParseShortcut/remote_clusterss", "github.com/gravitational/teleport/lib/msgraph::TestUnmarshalGraphError/invalid", "TestCompareResources/cmp_eq", "github.com/gravitational/teleport/lib/backend/memory::TestIterateRange", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/podutils::TTest_isPodUnhealthy/ready", "github.com/gravitational/teleport/lib/utils/log::TestExtraFields/text/timestamp", "github.com/gravitational/teleport/lib/services::TestSAMLAuthRequest_Check/ConnecttorSpec_requires_SSOTestFlow", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_match_match}", "github.com/gravitational/teleport/lib/tbot/config::TestMigrate/destination_with_iindeterminate_type", "TestCreateGitServerRequest_Check/unsupp", "TestAccessCheckerKubeResources/prod_cluster (0", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_DefaultChaannel", "github.com/gravitational/teleport/lib/services::TestGCPServiceAccountMatcher_Matcch/allow_ignores_wildcard", "github.com/gravitational/teleport/lib/msgraph::TestGetApplication", "TestServiceAccess/GetDatabaseObjectImportRule/allowed_", "TestIntegrationAthenaEventPagination (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpsertCrownJewel/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{unset_unset_unset_match}", "TestCreateSignedSTSIdentityReq", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setGroupStates/no__groups", "github.com/gravitational/teleport/lib/utils/proxy::TestDialProxy/socks5", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channel_CheckAndSettDefaults/forward_URL_(valid)", "TestUserGroupUnmarshal (0.00s)\\n\"}", "TestHasDeviceTrustExtensions/nok", "TestServiceAccess/CreateAutoUpdateConfig/allowed_admin_states/MFAVe", "TestCheckAccess/no", "TestGetEnforcementMode/dt.Mode_set (0.00s)\\n\"", "github.com/gravitational/teleport/lib/events::TestEvents/app.create_EventFields", "github.com/gravitational/teleport/lib/backend/memory::TestMemory/CompareAndSwap", "github.com/gravitational/teleport/api/types::TestDeduplicateApps", "TestJoin/single_segment (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestFilterSAMLEntityDescriptor/biinding_filtering", "github.com/gravitational/teleport/api/client/webclient::TestParse/http://example..com:443", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_match_nomatch}", "github.com/gravitational/teleport/lib/events::TestNewStreamErrors/CreateAuditStreeam/CreateUploadError", "TestConnNetTest/FirstConnSync/CloseTimeout (0", "github.com/gravitational/teleport/lib/utils/parse::TestVarValidation/validate_nammespace_ok", "TestLabelCompatibility (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestOIDCUnmarshal/multiple_redireect_urls", "Test_makeGroupsStatus/nil_schedules (0.00s)\\", "TestNewStreamErrors/ResumeAuditStream (0.00s)\\n\"}", "TestLabelExpressions/wrong_type (0.00s)\\n\"}", "TestParseShortcut/saml_sps (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{unset_match_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestFanoutV2Init", "github.com/gravitational/teleport/lib/services::TestGetAllowedLoginsForResource/ccan_return_multiple_logins", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::TestOpCompressed/ccompressed_OP_REPLY", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiigReqDefaults/set_defaults", "github.com/gravitational/teleport/lib/utils/parse::TestVariable/empty_variable", "github.com/gravitational/teleport/lib/services::FuzzParseRefs/seed#7", "TestTrimToMaxSize/aws_identity_c", "github.com/gravitational/teleport/lib/utils/typical::TestParser/indexing_non-map", "TestServiceAccess/CreateDatabaseObject/allowed_admin_states/MFAVeri", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/role_max_duration_is_respected_and_sessionTTL_does_not_exceed_the_calculated_maax_duration", "TestEvents/mfa_auth_challenge.create_OneOf (0.00s", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAWSAppAccessConfiig", "TestListener/all_connections_allowed (0.00s)\\n\"}", "TestSSMInstaller (0.00s)\\n\"}", "TestEvents/db.session.user.deactivate_OneOf (0.0", "TestUnmarshalTLVs (0.00s)\\n\"}", "TestPasswordlessFlow_Finish_errors (0.00s)\\n\"}", "TestSortedGCPServiceAccounts/empty (0.00s)\\n\"}", "TestParsePacket/COM_STMT_CLOSE (0.00s)\\n\"}", "TestJoinServiceGRPCServer_RegisterUsingAzureMethod/challenge_", "github.com/gravitational/teleport/lib/httplib/reverseproxy::TestIPv6Fix/ipv6", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.spanneer.rpc", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_beforeRequest/sstandby_allows_execution", "TestCheckAccessToServer/o", "TestLoginFlow_scope", "github.com/gravitational/teleport/lib/tbot/config::TestDatabaseOutput_CheckAndSettDefaults/missing_destination", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/DeleteAutoUpdateAgentReport/allowed_admin_states/MFAVerified/verbs=[]", "TestIsInstanceMetadataAvailable/not_on_gc", "TestIDTokenValidator_Validate/success (0.00s)\\n", "TestIsSSHCert/opensesame@openssh.com (0.00s)\\n\"}", "TestGetPolicyVersions (0.00s)\\n\"}", "FuzzParserEvalBoolPredicate/seed#9 (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestNewIdPIAMConfigurreClient/aws_region_env_var_was_set,_success", "github.com/gravitational/teleport/lib/proxy::TestRouter_DialHost/failure_looking__up_cluster", "TestIDTokenValidator_Validate/expired (0.00s)\\n", "TestStaticHostUserCRUD/creat", "TestPreparerTimeBasedIndexCollisions (0.00s)\\n\"}", "TestCRUD (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop_service/{match_unset_match_nomatch}", "TestParseReviewFrequency/1_MoNtH (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/itertools/stream::TestMergeStreams/compare__always_favors_B", "TestNewAWSNodeFromEC2Ins", "github.com/gravitational/teleport/lib/utils::TestSet/subtract/empty_minus_empty", "TestServiceAccess/CreateUserTa", "github.com/gravitational/teleport/lib/events/dynamoevents::TestParseLegacyDynamoAAttributes/number_set_field", "github.com/gravitational/teleport/lib/autoupdate/rollout::TestCountCatchAll", "github.com/gravitational/teleport/lib/events/gcssessions::TestFakeStreams", "TestIsRoleARN/valid_full_arn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestGuessIfAccessIsPossible/sessiion_list/read_denied", "TestEvents/device.create_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/resumption::TestConnNetTest/NotFirstConnSynnc/PresentTimeout", "github.com/gravitational/teleport/lib/authz::TestIsUserFunctions/IsLocalOrRemoteUUser/remote_user", "TestExtraFields/json/caller_timestamp (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/spiffe.svid.issueed", "TestDeleteUserLoginState (0.00s)\\n\"}", "Test_Channels_CheckAndSetDefaults (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_app_help/help_flag", "TestEvents/contact.create_EventFields (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/integrations/samlidp/samlidpconfig::TestSAMMLIdPBuildScriptCheckAndSetDefaults/valid_organization_name", "github.com/gravitational/teleport/lib/events::TestEvents/device.create_OneOf", "TestOpenTunnelRequest/no_fields (0.00s)\\n\"}", "TestSPIFFESVIDOutput_Check", "TestInstallFlagsYAML/nil (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_findsCorrectCredenttial/allowed_credentials_last_(4)", "TestOpGetMore (0.00s)\\n\"}", "TestDefaultImplicitRules (0.00s)\\n\"}", "TestWrites/basic_sets_and_delete (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db/{nomatch_match_nomatch_unset}", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/session.command", "github.com/gravitational/teleport/lib/cloud/aws::TestUpsertPolicy", "TestCompare/root_equivalence (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/webauthn::TestValidateOrigin/NOK:_Origgin_has_different_host", "FuzzMongoRead/seed#4 (0.00s)\\n\"}", "TestWorkloadIdentityA", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_setGroupStates/samme_groups,_same_states", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/ListAutoUpdateAgentReports/allowed_admin_states/NotRequired/verbs=[read]", "TestSQLMana", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/delete", "TestReadProxyLineV2/too_short_line (0.00s)\\n\"}", "TestCheckDatabaseNamesAndUsers/combined_role", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_unset_nomatch}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/auth", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/verify_coverage/ListDatabaseObjects", "github.com/gravitational/teleport/lib/services::TestGetAppLabels", "TestAccessCheckerKub", "TestUpdateCl", "github.com/gravitational/teleport/lib/sshutils/sftp::TestParseDestination/IPv6_adddress_and_filename_with_IPv6_address_and_'@'s", "github.com/gravitational/teleport/lib/utils/oidc::TestOpenIDConfigurationForIssueer", "TestEvents/integration.delete_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_failure", "TestEvents/okta.access_list.sync_OneOf (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/observability/tracing::TestConfig_Endpoint//with_https_scheme", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{unset_nomatch_match_match}", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/DeleteVnetConfig/allowed_admin_states/MFAVerifiedWithReuse", "Test_Channels_DefaultChannel/con", "TestGetAllowedLoginsForR", "github.com/gravitational/teleport/lib/srv/db/redis/protocol::TestWriteCmd/string", "TestRegexMatchesAny/regexp_no_match (0.00s)\\n\"}", "TestNewAWSNodeFromEC2Instance/valid (0.00s", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_nomatch_nomatch_unset}", "TestToEC2Instances/without_name (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-cassanndra-without-uri", "github.com/gravitational/teleport/lib/utils/mcputils::TestIDTracker/request_trackked", "github.com/gravitational/teleport/lib/srv/app/aws::TestAWSSignerHandler/DynamoDB__access_with_different_region", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##7", "github.com/gravitational/teleport/lib/kube/token::TestGetTokenAudiences/legacy_tooken_with_no_audience", "TestEvents/db.session.sqlserver.rpc_reques", "FuzzParseDisplay/seed#4 (0.00s)\\n\"}", "TestValidate_WithAllowRequestKubernetes", "github.com/gravitational/teleport/lib/utils/aws/stsutils::TestNewFromConfig/\\", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/db_service/{match_unset_nomatch_match}", "TestEventField_Schemas/array(object) (0.00s)\\n\"", "TestGenericListResourcesWithFilter (0.00s", "github.com/gravitational/teleport/lib/auth/okta::TestCheckOrigin/resources_createed_by_non-okta_service_can_supply_non-okta_origin", "TestGlobMatch/inline_glob_mismat", "github.com/gravitational/teleport/lib/services::TestUserNotificationsCache/correcctly_fetches_sorted_notifications_for_usernameA_with_no_startKey", "github.com/gravitational/teleport/lib/autoupdate/rollout::Test_progressGroupsHalttOnError/first_group_done,_second_should_activate,_third_should_not_progress", "github.com/gravitational/teleport/api/types::TestAssertionInfo_RoundTrip/empty", "github.com/gravitational/teleport/lib/utils::TestReplaceRegexp", "TestServiceAccess/CreateDynamicWindowsDesktop,allowed:NotRequired,v", "github.com/gravitational/teleport/lib/cloud/aws/tags::TestDefaultTags/resource_iss_teleport_managed/IAM_Tags/one_of_the_labels_has_a_different_value,_should_returrn_false", "github.com/gravitational/teleport/lib/scopes::TestDescendingSegments/leading_emptty_segment", "github.com/gravitational/teleport/lib/auth/userprovisioning/userprovisioningv2::TTestStaticHostUserCRUD/upsert_with_create_permission_only", "github.com/gravitational/teleport/lib/accessmonitoring/review::TestInitializeCachhe", "github.com/gravitational/teleport/lib/utils::TestRemoveFromSlice/remove_duplicatee_elements", "TestConnNetTest/FirstConnSync/PresentTimeou", "github.com/gravitational/teleport/lib/events::TestEvents/db.session.query.failed__OneOf", "Test_querier_fetchResults/number_of_events_equals_limit_", "github.com/gravitational/teleport/lib/services::TestJoinSessionsACL", "TestValidateTokenWithJWKS/valid_token (0.00s)\\n", "TestLogin_findsCorrectCred", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/GetAutoUpdateVersion/allowed_admin_states/MFAVerified/verbs=[]", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/CreateDatabaseObject/allowed_admin_states/MFAVerified/verbs=[]", "TestSlogTextHandlerComponentPaddi", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{match_nomatch_unset_match}", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/TriggerAutoUpdateAgentGroup/allowed_admin_states/MFAVerifiedWithReuse/verbss=[update]", "github.com/gravitational/teleport/lib/utils::TestParseAdvertiseAddr/missing_host__", "TestGetMode/config_and_version_equal (0.00s", "TestAuthorizer_Aut", "TestVarValidation/variable_found (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/config::TestGetEnforcementMode", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialAssertionnResponse_json", "github.com/gravitational/teleport/lib/auth/webauthncli::TestToTouchIDCredentialPiicker/credentials_converted_correctly", "github.com/gravitational/teleport/lib/services::TestGetServiceFQDN", "TestMergeS3Protos", "github.com/gravitational/teleport/lib/utils::TestByteCount/1gb", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingIAMMethod/auth_error", "TestServiceAccess/DeleteAutoU", "github.com/gravitational/teleport/examples/dynamoathenamigration::TestMigrationChheckpoint/no_migration_checkpoint,_emit_every_event", "github.com/gravitational/teleport/lib/services::TestValidateDatabase/valid-snowfllake", "github.com/gravitational/teleport/lib/services::TestCheckAccessToKubernetes/role__requires_MFA_but_MFA_not_verified", "github.com/gravitational/teleport/lib/auth/gitserver/gitserverv1::TestServiceAcceess/create_success", "TestServiceAccess/UpsertAutoUpdateVersion/allowed_a", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListSubnets", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureExternallAuditStorage", "TestDatabaseMemoryDBEndpoint/valid_URI (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events::TestSearchEventsLimiterConfig/emptyy_rate_in_config", "TestNewAction/valid_config (0.00s)\\n\"}", "github.com/gravitational/teleport/api/breaker::TestCircuitBreaker_Execute/no_erroor_remain_tripped", "github.com/gravitational/teleport/lib/services::TestCheckAccessToWindowsDesktop/ssingle_role_with_allowed_labels", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.openseearch.request", "TestCacheConcurrency (1.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestParseShortcut/windows_desktopp_service", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestListEC2ICE/no_vpcc_id", "TestRotateExternalCertAuthority (0.04s)\\n\"}", "github.com/gravitational/teleport/lib/auth/users/usersv1::TestOktaCRUD/update/oktta_service_updating_okta_user_is_allowed", "github.com/gravitational/teleport/lib/events::TestSessionWriter/Session", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentRollout/allowed_admin_states/MFAVerifiedWithReuse", "TestSet/intersection/empty_intersection_empty (", "github.com/gravitational/teleport/lib/events::TestEvents/exec_OneOf", "TestJSON/success_port_forward (0.00s)\\n\"}", "TestDeviceConversions_toAndFrom (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration", "github.com/gravitational/teleport/lib/services::TestValidateAssertionConsumerServvicesEndpoint/https://sptest.iamshowcase.com/acs!", "TestLogin_findsCorrectCr", "github.com/gravitational/teleport/lib/auth/dbobject/dbobjectv1::TestServiceAccesss/UpsertDatabaseObject/allowed_admin_states/MFAVerified/verbs=[create]", "github.com/gravitational/teleport/lib/gitlab::TestIDTokenValidator_Validate/futurre", "TestAuthPreferenceValidate/second_fa", "github.com/gravitational/teleport/lib/services::TestPluginDataExpectations", "Test_splitExpression/literal (0", "TestCheckedPrefixWriter/missing_prefix/two_", "FuzzParseDisplay/seed#6 (0.00s)\\n\"}", "TestParsePacket/COM_CREATE_DB (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/redis/connection::Test_parseRedisURII/single_instance_explicit", "github.com/gravitational/teleport/lib/cloud/awsconfig::TestGetConfigIntegration/uuncached/with_an_integration_credential_provider_assuming_a_role,_must_limit_rolee_chain_length", "github.com/gravitational/teleport/lib/web/ui::TestMakeServersHiddenLabels", "TestForEachResource_StopIteration (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestSet/intersection/empty_intersecttion_empty", "TestDialProxy/http (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestSanitize//namespaces/..params", "github.com/gravitational/teleport/lib/services::TestCheckSPIFFESVID/explicit_denyy_-_id_path_regex", "TestValidateDatabase/valid-mongodb (0.00s)\\n\"}", "TestClusterCredentials/handshake_error (0.00s)\\", "github.com/gravitational/teleport/gen/go/eventschema::TestEventField_Schemas/striing", "github.com/gravitational/teleport/lib/auth/webauthntypes::TestCredentialAssertionn_Validate/ok", "github.com/gravitational/teleport/lib/utils::TestRemoveSecure", "TestPrivateKey/valid_derived (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/automaticupgrades::Test_Channels_DefaultChaannel/configured_channels", "github.com/gravitational/teleport/lib/events::TestProtoStreamer/get_a_part_per_meessage", "github.com/gravitational/teleport/api/client::TestEventEqual/gogo_oneof_equal", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/kube_cluster/{nomatch_unset_unset_match}", "TestNewAppServerForAWSOIDCIntegration/valid (0.00", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess", "TestEncodeDecodeCreateDatabaseUser", "TestDatabaseResourceURI/invalid_uri (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/s3sessions::TestConfig_SetFromURL/fiips_mode_enabled_by_default", "TestWindowTrig", "TestFakeStreams/DownloadNotFound (0.00s)\\n\"}", "TestKey_SignAndVerifyPROXY/RSA2048 (0.25s)\\n\"}", "TestSet/subtract/empty_minus_empty (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestValidateLocalAuthSecrets_passswordHash", "github.com/gravitational/teleport/lib/limiter::TestMakeMiddleware", "TestConfigureIdPIAMW", "github.com/gravitational/teleport/lib/services::TestMatchResourceByFilters_Helperr/no_search_match", "github.com/gravitational/teleport/api/trail::TestConversion/os.ErrNotExist", "github.com/gravitational/teleport/lib/services::TestCheckAccessToSAMLIdP/roleV8:__labels_matched,_idp_disabled_is_not_disable_access", "github.com/gravitational/teleport/lib/events/athena::TestSQSMessagesCollectorErroorsOnReceive", "github.com/gravitational/teleport/lib/multiplexer::FuzzReadProxyLineV1/seed#0", "TestLogLevel/SetLowerDEBUG-1 (0.00s)\\n\"}", "TestLogin_credentialPicker (0.00s)\\n\"}", "TestParse/https://exam", "TestRangeEnd//��� (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/db/mongodb/protocol::FuzzMongoRead/seedd#17", "github.com/gravitational/teleport/lib/srv/server::TestAzureWatcher", "TestEvents/access_list.create_EventFields (0.00s)\\", "TestCLIPrompt/OK_otp (0.00s)\\n\"}", "TestVerifyAttestation/NOK_fo", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/node/{nomatch_nomatch_match_nomatch}", "TestGetAppRewriteConfig (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{match_match_match_nomatch}", "TestLogLevel/SetLowerRANDOM (0.00s)\\n\"}", "TestMemory/Locking (0.30s)\\n\"}", "github.com/gravitational/teleport/lib/devicetrust/native::TestStatusError_Is/errSSecItemNotFound_is_the_same_as_ErrDeviceKeyNotFound", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/OFF/eencode", "github.com/gravitational/teleport/lib/services::TestNewResourceExpression/fail_too_parse/#00", "TestSliceMatchesRegex/staging (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils/log::TestOutput/json/trace", "TestCheckExpiredC", "TestDatabaseFr", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestAccessGraphAWSIAMMConfig/wrong_arn_set_in_s3_bucket", "github.com/gravitational/teleport/lib/events::TestTrimToMaxSize/db.session.cassanndra.register", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/UpdateCrownJewel/disallowed_admin_states/Unauthorized", "TestFindAllEmptyStruct/pointer_to_em", "FuzzParseDisplay (0.00s)\\n\"}", "TestMakeDatabaseConnectOptions/names_wildcard", "github.com/gravitational/teleport/lib/utils/parse::TestMatch/unknown_namespace", "github.com/gravitational/teleport/lib/services::TestRoleMap/test_case_'passthrouggh_match'", "TestValidateConfigAgainstMod", "TestIdentity_GetUserMetadata/user_metadata", "github.com/gravitational/teleport/lib/integrations/awsoidc::TestConfigureIdPIAMWiithPresetPolicy", "TestGetAllowedKub", "github.com/gravitational/teleport/lib/auth/crownjewel/crownjewelv1::TestServiceAcccess/CreateCrownJewel/disallowed_admin_states", "github.com/gravitational/teleport/lib/services::TestOIDCMapping", "TestRewriter/trust_x-r", "TestEvents/db.session.cassandra.registe", "github.com/gravitational/teleport/api/types::TestEncodeDecodeRequireMFAType/OFF", "TestFromProtoNils/member_count (0.00s)\\n", "TestMatchResourceLabels/sel", "Test_kubernetesSupportsBoundTokens/In", "TestAccessMonitoringRuleCRUD/no_access_to_delete_AccessMon", "TestFindMatchingProxyDNS/N", "TestGetMCPServerTransportType (0.00s)\\n\"}", "TestAccessListMarshal (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromElasttiCacheNodeGroups", "github.com/gravitational/teleport/lib/services::TestGithubAuthRequest_Check/abovee_max_CertTTL", "TestRBAC/create_no_access (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestGetScaleSetVirtualMachine//vm_with_valid_user_identities", "FuzzMongoRead/seed#6 (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestAppIsAWSConsole/AWS_GovCloud_(USS)", "github.com/gravitational/teleport/lib/srv/discovery/fetchers/db::TestRDSFetchers//Aurora_cluster_without_writer_with_assume_role", "TestFailoverTrigger_CanStart/empty", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/multi-role_rrequestor_approval_via_separate_threshold_matches", "github.com/gravitational/teleport/lib/multiplexer::TestReadProxyLineV2", "TestReserveUploadPart (0.00s)\\n\"}", "TestDatabaseElastiCacheEndpoint/invalid_URI (0.00", "github.com/gravitational/teleport/lib/srv/discovery/common::TestAzureTagsToLabelss", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigest/untrusted_double_signed_index", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/CreateAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse", "github.com/gravitational/teleport/api/types::TestNewAppV3/invalid_cloud_identifieer", "TestOktaCRUD", "github.com/gravitational/teleport/lib/backend::TestWatcherSimple", "TestCheckOIDCIdP/empty_private_key (0.00s)\\n\"}", "Test_zipStreams_Process/errors_are_propa", "TestListDatabasesIAMConfigOutput (0.00s)\\n\"}", "TestExtraFields/text/level_caller (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend::TestAtomicWriteValidation/max", "TestPoll (0.00s)\\n\"}", "TestStaticHos", "TestOIDCAuthRequest_Check/Con", "github.com/gravitational/teleport/integrations/kube-agent-updater/pkg/img::Test_ccosignKeyValidator_ValidateAndResolveDigestAuthenticated/untrusted_signed_index", "TestParseLegacyDynamoAttributes/nu", "TestMakeLabels/Single_map_multiple_labels_case (0", "github.com/gravitational/teleport/lib/events::TestEvents/mfa.add_EventFields", "TestMakeClusterHiddenLabels/Si", "TestLogLevel/SetINFO (0.00s)\\n\"}", "FuzzMongoRead (0.00s)\\n\"}", "TestEvents/device.enroll_EventFields (0.00s)\\n\"}", "TestGitServerWatcher (0.01s)\\n\"}", "github.com/gravitational/teleport/lib/cloud/azure::TestSQLListAll/servers", "TestFilterSAMLEntityDescriptor (0.00s)\\n\"}", "TestPreparerTimeBasedIndex (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/tbot/config::TestApplicationOutput_CheckAnddSetDefaults/missing_app_name", "github.com/gravitational/teleport/lib/utils/aws::TestCreateBucketConfiguration", "github.com/gravitational/teleport/lib/events::TestEvents/lock.created_EventFieldss", "github.com/gravitational/teleport/lib/srv/discovery/common::TestDatabaseFromRDSClluster/reader", "github.com/gravitational/teleport/lib/auth/dynamicwindows/dynamicwindowsv1::TestSServiceAccess/UpdateDynamicWindowsDesktop,allowed:MFAVerified,verbs:[]", "TestUnifiedRe", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/windows_desktop/{unset_nomatch_nomatch_unset}", "TestWeakValidate/short_segment_passes (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/backend/etcdbk::TestKeyPrefix", "TestValidateSQLServerData", "github.com/gravitational/teleport/lib/utils/parse::FuzzNewExpression/seed#1", "github.com/gravitational/teleport/lib/srv/discovery/fetchers::TestAutoProtocolDettection/portNumber:_4242,_portName:_", "github.com/gravitational/teleport/lib/utils::TestCipherSuites", "TestMatchResourceByFilters_Helper/no_labe", "TestNewDatabaseFromA", "github.com/gravitational/teleport/lib/itertools/stream::TestMergeStreams/interlacced_streams", "github.com/gravitational/teleport/lib/proxy::TestRouteScoring/ambiguous_ip_dial", "TestHealthCheckConfig_equivalent/all_", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/expectedSessionTTL_does_not_exceed_requestedMaxDuration", "TestParseShortcut/node (0.00s)\\n\"}", "TestPrivateKey/valid_protected (0.00s)\\n\"}", "github.com/gravitational/teleport/tool/tctl/common/clusterconfig::TestUnmarshalAcccessGraphSettings/disabled", "TestParsePolicyDocument/parse_without_pr", "TestAWSAppAccessConfig (0.00s)\\n\"}", "TestExtraFields/text/component_caller_tim", "TestCheckAccessToGitServer/wildcard_allow (0.00s", "github.com/gravitational/teleport/lib/release::TestListReleases/access_denied", "github.com/gravitational/teleport/lib/services::TestGetAllowedSearchAsRoles_WithAAllowedKubernetesResourceKindFilter/single_match", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/CreateVnetConfig/allowed_admin_states/NotRequired/verbs=[create]", "TestCalculatePendingRequestTTL/valid:_no_TTL_request_defa", "github.com/gravitational/teleport/lib/events/athena::Test_consumer_sqsMessagesColllector", "github.com/gravitational/teleport/lib/kube/utils::TestGetAgentVersion/ping_error", "TestAccessListMemberDefaults (0.00s)\\n\"}", "TestConnString/user_with_special_cha", "TestUnh", "TestSafeEnvAddFull/skip_dangerous_lowerc", "TestInstanceHeartbeat_Disabled (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/auth/touchid::TestLogin_credentialPicker/siingle_user,_single_credential,_explicit_user", "github.com/gravitational/teleport/lib/auth/autoupdate/autoupdatev1::TestServiceAcccess/UpdateAutoUpdateAgentReport/allowed_admin_states/MFAVerifiedWithReuse/verbss=[update]", "github.com/gravitational/teleport/lib/events::TestEvents/cert.create_OneOf", "TestServerConversion/mysql_available", "TestNormalReads (0.00s)\\n\"}", "TestKeyTrimPrefix/all_trimmed_on_exact_match (", "TestAzureWatcher/filter_by_resource_group (0.0", "TestVerifyAttestation/NOK_x5c_with_wron", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/app/{match_nomatch_nomatch_nomatch}", "github.com/gravitational/teleport/lib/auth/webauthnwin::TestRegister", "github.com/gravitational/teleport/lib/services::TestOIDCCheckAndSetDefaults/omit__prompt", "TestFromProtoNils/ownership-requir", "TestServiceAccess/TriggerAutoUpdateAgentGroup/a", "TestProtoStreamer/no_events (0.00s)\\n\"}", "github.com/gravitational/teleport/api/types::TestValidateAssumeStartTime", "TestServiceAccess/GetCrownJewel (0.00s", "TestKernelVersion/5.15.68.1-microsoft-sta", "github.com/gravitational/teleport/lib/devicetrust/enroll::TestCeremony_RunAdmin/nnon-existing_device", "TestSPIFFEW", "github.com/gravitational/teleport/lib/auth/vnetconfig/vnetconfigv1::TestServiceAcccess/GetVnetConfig/allowed_admin_states/MFAVerifiedWithReuse/verbs=[read]", "github.com/gravitational/teleport/lib/services::TestReviewThresholds/multi-role_rrequestor_denial_via_short-circuit_on_default", "TestCheckExpiredCredentials (0.00s)\\n\"}", "TestSSM", "TestJoinServiceGRPCServer_Reg", "TestKeyScan/populated_string_key (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/joinserver::TestJoinServiceGRPCServer_RegissterUsingTPMMethod/pass_case", "github.com/gravitational/teleport/lib/services::TestValidate_RequestedMaxDurationn/only_the_assigned_role_that_allows_the_requested_roles_are_considered_for_maxDuuration_#2", "TestValidateRole/unknown_sub_kind (0.00s)\\n\"}", "TestEqualStatement/empty_statement (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/srv/alpnproxy/auth::TestDialLocalAuthServerrNoServers", "github.com/gravitational/teleport/lib/services::TestCalculatePendingRequestTTL/vaalid:_requested_ttl_<_access_expiry", "TestLogLevel/SetINFO+1 (0.00s)\\n\"}", "TestTimeout/good_auth_client (0.00s)\\n\"}", "TestGetIdentity/user_identity (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::TestUpdateAppUsageTemplate/command_wwidth_aligned_for_app_help", "TestCLIPrompt/OK_webauthn (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/utils::FuzzReadYAML/seed#1", "github.com/gravitational/teleport/lib/services::FuzzParserEvalBoolPredicate/seed##25", "TestDatabaseFromRedshiftClust", "TestVerifyAttestation/OK_format", "github.com/gravitational/teleport/api/internalutils/stream::TestCollectPages/basiic-depagination", "github.com/gravitational/teleport/lib/services::TestCheckAccessWithLabelExpressioons/remote_cluster/{unset_nomatch_unset_unset}", "github.com/gravitational/teleport/lib/web/ui::TestMakeIntegration", "github.com/gravitational/teleport/lib/backend::TestKeyPrependKey/all_without_leadding_separators", "TestDeployServiceRequest/inva", "TestParseShortcut/login_rules (0.00s)\\n\"}", "github.com/gravitational/teleport/lib/events/athena::Test_querier_fetchResults/fiilter_events_based_on_condition", "Test_dialEndpoints/resolved_zero_addrs (0.00s)\\n", "github.com/gravitational/teleport/lib/cloud/aws::TestConvertIAMv2Error/invalid_poolicy_document", "github.com/gravitational/teleport/lib/integrations/awsoidc/credprovider::TestCreaateAWSConfigForIntegration/should_auto_init_credentials_during_retrieve_call" ]
starryzhang/sweb.eval.win.gravitational_1776_teleport-55616
gravitational/teleport
55937
gravitational__teleport-55937
Go
[ "54518" ]
3b3af7e4932ef3b68f2a4cc0f53891000d3f28e2
diff --git a/lib/config/configuration.go b/lib/config/configuration.go index 77eb094deb48c..29e5de7bc2cd3 100644 --- a/lib/config/configuration.go +++ b/lib/config/configuration.go @@ -2205,6 +2205,11 @@ func applyWindowsDesktopConfig(fc *FileConfig, cfg *servicecfg.Config) error { } } + locateServer := servicecfg.LocateServer{ + Enabled: fc.WindowsDesktop.LDAP.LocateServer.Enabled, + Site: fc.WindowsDesktop.LDAP.LocateServer.Site, + } + cfg.WindowsDesktop.LDAP = servicecfg.LDAPConfig{ Addr: fc.WindowsDesktop.LDAP.Addr, Username: fc.WindowsDesktop.LDAP.Username, @@ -2213,6 +2218,7 @@ func applyWindowsDesktopConfig(fc *FileConfig, cfg *servicecfg.Config) error { InsecureSkipVerify: fc.WindowsDesktop.LDAP.InsecureSkipVerify, ServerName: fc.WindowsDesktop.LDAP.ServerName, CA: cert, + LocateServer: locateServer, } cfg.WindowsDesktop.PKIDomain = fc.WindowsDesktop.PKIDomain diff --git a/lib/config/fileconf.go b/lib/config/fileconf.go index c77be7125e512..1be540c8628b1 100644 --- a/lib/config/fileconf.go +++ b/lib/config/fileconf.go @@ -2574,12 +2574,14 @@ func (wds *WindowsDesktopService) Check() error { return host.AD }) - if hasAD && wds.LDAP.Addr == "" { + ldapConfigOK := wds.LDAP.Domain != "" && (wds.LDAP.Addr != "" || wds.LDAP.LocateServer.Enabled) + + if hasAD && !ldapConfigOK { return trace.BadParameter("if Active Directory hosts are specified in the windows_desktop_service, " + "the ldap configuration must also be specified") } - if wds.Discovery.BaseDN != "" && wds.LDAP.Addr == "" { + if (wds.Discovery.BaseDN != "" || len(wds.DiscoveryConfigs) > 0) && !ldapConfigOK { return trace.BadParameter("if discovery is specified in the windows_desktop_service, " + "ldap configuration must also be specified") } @@ -2610,10 +2612,22 @@ type WindowsHost struct { AD bool `yaml:"ad"` } +// LocateServer contains parameters for locating LDAP servers +// from the AD Domain +type LocateServer struct { + // Enabled will automatically locate the LDAP server using DNS SRV records. + // When enabled, Domain must be set, Addr will be ignored + // https://ldap.com/dns-srv-records-for-ldap/ + Enabled bool `yaml:"enabled,omitempty"` + // Site is an LDAP site to locate servers from a specific logical site. + // https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/b645c125-a7da-4097-84a1-2fa7cea07714#gt_8abdc986-5679-42d9-ad76-b11eb5a0daba + Site string `yaml:"site,omitempty"` +} + // LDAPConfig is the LDAP connection parameters. type LDAPConfig struct { // Addr is the host:port of the LDAP server (typically port 389). - Addr string `yaml:"addr"` + Addr string `yaml:"addr,omitempty"` // Domain is the ActiveDirectory domain name. Domain string `yaml:"domain"` // Username for LDAP authentication. @@ -2628,6 +2642,8 @@ type LDAPConfig struct { DEREncodedCAFile string `yaml:"der_ca_file,omitempty"` // PEMEncodedCACert is an optional PEM encoded CA cert to be used for verification (if InsecureSkipVerify is set to false). PEMEncodedCACert string `yaml:"ldap_ca_cert,omitempty"` + // LocateServer is the config that enables LDAP server location using DNS SRV records. + LocateServer `yaml:"locate_server"` } // LDAPDiscoveryConfig is LDAP discovery configuration for windows desktop discovery service. diff --git a/lib/service/desktop.go b/lib/service/desktop.go index 5de085ca6665a..0fdc86faaa6a4 100644 --- a/lib/service/desktop.go +++ b/lib/service/desktop.go @@ -41,7 +41,6 @@ import ( "github.com/gravitational/teleport/lib/services" "github.com/gravitational/teleport/lib/srv/desktop" "github.com/gravitational/teleport/lib/utils" - "github.com/gravitational/teleport/lib/winpki" ) func (process *TeleportProcess) initWindowsDesktopService() { @@ -229,7 +228,7 @@ func (process *TeleportProcess) initWindowsDesktopServiceRegistered(logger *slog OnHeartbeat: process.OnHeartbeat(teleport.ComponentWindowsDesktop), }, ShowDesktopWallpaper: cfg.WindowsDesktop.ShowDesktopWallpaper, - LDAPConfig: winpki.LDAPConfig(cfg.WindowsDesktop.LDAP), + LDAPConfig: cfg.WindowsDesktop.LDAP, KDCAddr: cfg.WindowsDesktop.KDCAddr, PKIDomain: cfg.WindowsDesktop.PKIDomain, Discovery: cfg.WindowsDesktop.Discovery, diff --git a/lib/service/servicecfg/windows.go b/lib/service/servicecfg/windows.go index d1b5d5b990d02..2a6ec64123c4d 100644 --- a/lib/service/servicecfg/windows.go +++ b/lib/service/servicecfg/windows.go @@ -24,6 +24,8 @@ import ( "regexp" "time" + "github.com/gravitational/trace" + "github.com/gravitational/teleport/lib/limiter" "github.com/gravitational/teleport/lib/services" "github.com/gravitational/teleport/lib/utils" @@ -146,10 +148,22 @@ type HostLabelRule struct { Labels map[string]string } +type LocateServer struct { + // Enabled will automatically locate the LDAP server using DNS SRV records. + // When enabled, Domain must be set, Addr will be ignored + // https://ldap.com/dns-srv-records-for-ldap/ + Enabled bool + // Site is an LDAP site to locate servers from a specific logical site. + Site string +} + // LDAPConfig is the LDAP connection parameters. type LDAPConfig struct { // Addr is the address:port of the LDAP server (typically port 389). Addr string + // LocateServer automatically locates the LDAP server using DNS SRV records. + // https://ldap.com/dns-srv-records-for-ldap/ + LocateServer LocateServer // Domain is the ActiveDirectory domain name. Domain string // Username for LDAP authentication. @@ -163,3 +177,18 @@ type LDAPConfig struct { // CA is an optional CA cert to be used for verification if InsecureSkipVerify is set to false. CA *x509.Certificate } + +// CheckAndSetDefaults verifies this LDAPConfig +func (cfg *LDAPConfig) CheckAndSetDefaults() error { + if cfg.Addr == "" && !cfg.LocateServer.Enabled { + return trace.BadParameter("Addr is required if locate_server is false in LDAPConfig") + } + if cfg.Domain == "" { + return trace.BadParameter("missing Domain in LDAPConfig") + } + if cfg.Username == "" { + return trace.BadParameter("missing Username in LDAPConfig") + } + + return nil +} diff --git a/lib/srv/db/common/kerberos/kinit/ldap.go b/lib/srv/db/common/kerberos/kinit/ldap.go index 035994b0db99e..5a45da5c40704 100644 --- a/lib/srv/db/common/kerberos/kinit/ldap.go +++ b/lib/srv/db/common/kerberos/kinit/ldap.go @@ -20,13 +20,10 @@ import ( "context" "crypto/tls" "crypto/x509" - "fmt" "log/slog" - "net" "strings" "time" - "github.com/go-ldap/ldap/v3" "github.com/gravitational/trace" "github.com/gravitational/teleport/api/types" @@ -50,8 +47,6 @@ type ldapConnector struct { authClient winpki.AuthInterface ldapConfig ldapConnectionConfig - - dialLDAPServerFunc func(ctx context.Context) (ldap.Client, error) // only used in tests. } type LDAPConnector interface { @@ -101,51 +96,6 @@ func newLDAPConnector(logger *slog.Logger, authClient winpki.AuthInterface, adCo }, nil } -const ( - // ldapDialTimeout is the timeout for dialing the LDAP server - // when making an initial connection - ldapDialTimeout = 15 * time.Second - // ldapRequestTimeout is the timeout for making LDAP requests. - // It is larger than the dial timeout because LDAP queries in large - // Active Directory environments may take longer to complete. - ldapRequestTimeout = 45 * time.Second - - // attrSAMAccountName is the SAM Account name of an LDAP object. - attrSAMAccountName = "sAMAccountName" - // attrSAMAccountType is the SAM Account type for an LDAP object. - attrSAMAccountType = "sAMAccountType" - // AccountTypeUser is the SAM account type for user accounts. - // See https://learn.microsoft.com/en-us/windows/win32/adschema/a-samaccounttype - // (SAM_USER_OBJECT) - AccountTypeUser = "805306368" -) - -func (s *ldapConnector) dialLDAPServer(ctx context.Context, clusterName string) (ldap.Client, error) { - if s.dialLDAPServerFunc != nil { - return s.dialLDAPServerFunc(ctx) - } - - tc, err := s.tlsConfigForLDAP(ctx, clusterName) - if err != nil { - return nil, trace.Wrap(err) - } - - ldapURL := "ldaps://" + s.ldapConfig.address - s.logger.DebugContext(ctx, "Dialing LDAP server", "url", ldapURL) - - conn, err := ldap.DialURL( - ldapURL, - ldap.DialWithDialer(&net.Dialer{Timeout: ldapDialTimeout}), - ldap.DialWithTLSConfig(tc), - ) - if err != nil { - return nil, trace.Wrap(err) - } - conn.SetTimeout(ldapRequestTimeout) - - return conn, nil -} - // GetActiveDirectorySID queries LDAP to get SID of a given username. func (s *ldapConnector) GetActiveDirectorySID(ctx context.Context, username string) (sid string, err error) { clusterName, err := s.authClient.GetClusterName(ctx) @@ -153,39 +103,24 @@ func (s *ldapConnector) GetActiveDirectorySID(ctx context.Context, username stri return "", trace.Wrap(err) } - var activeDirectorySID string - // Find the user's SID - filter := winpki.CombineLDAPFilters([]string{ - fmt.Sprintf("(%s=%s)", attrSAMAccountType, AccountTypeUser), - fmt.Sprintf("(%s=%s)", attrSAMAccountName, username), - }) - - domainDN := winpki.DomainDN(s.ldapConfig.domain) - - s.logger.DebugContext(ctx, "Querying LDAP for objectSid of Windows user", "username", username, "filter", filter, "domain", domainDN) - - ldapConn, err := s.dialLDAPServer(ctx, clusterName.GetClusterName()) + tc, err := s.tlsConfigForLDAP(ctx, clusterName.GetClusterName()) if err != nil { return "", trace.Wrap(err) } - lc := winpki.NewLDAPClient(ldapConn) - - entries, err := lc.ReadWithFilter(domainDN, filter, []string{winpki.AttrObjectSid}) + s.logger.DebugContext(ctx, "Querying LDAP for objectSid of Windows user", "username", username) + client, err := winpki.DialLDAP(ctx, &winpki.LDAPConfig{ + Addr: s.ldapConfig.address, + Domain: s.ldapConfig.domain, + Logger: s.logger, + }, tc) if err != nil { return "", trace.Wrap(err) } - if len(entries) == 0 { - return "", trace.NotFound("could not find Windows account %q", username) - } else if len(entries) > 1 { - s.logger.WarnContext(ctx, "found multiple entries for user, taking the first", "username", username) - } - activeDirectorySID, err = winpki.ADSIDStringFromLDAPEntry(entries[0]) - if err != nil { - return "", trace.Wrap(err) - } - s.logger.DebugContext(ctx, "Found objectSid Windows user", "username", username, "sid", activeDirectorySID) - return activeDirectorySID, nil + + defer client.Close() + + return client.GetActiveDirectorySID(ctx, username) } func (s *ldapConnector) tlsConfigForLDAP(ctx context.Context, clusterName string) (*tls.Config, error) { diff --git a/lib/srv/desktop/discovery.go b/lib/srv/desktop/discovery.go index cab51b65f6a32..9f5e325eb3dc1 100644 --- a/lib/srv/desktop/discovery.go +++ b/lib/srv/desktop/discovery.go @@ -66,20 +66,9 @@ const ( // attrDNSHostName is the DNS Host name of an LDAP object. attrDNSHostName = "dNSHostName" // unusual capitalization is correct - - // attrSAMAccountName is the SAM Account name of an LDAP object. - attrSAMAccountName = "sAMAccountName" - - // attrSAMAccountType is the SAM Account type for an LDAP object. - attrSAMAccountType = "sAMAccountType" ) const ( - // AccountTypeUser is the SAM account type for user accounts. - // See https://learn.microsoft.com/en-us/windows/win32/adschema/a-samaccounttype - // (SAM_USER_OBJECT) - AccountTypeUser = "805306368" - // ClassComputer is the object class for computers in Active Directory. ClassComputer = "computer" @@ -149,15 +138,18 @@ func (s *WindowsService) ldapSearchFilter(additionalFilters []string) string { // getDesktopsFromLDAP discovers Windows hosts via LDAP func (s *WindowsService) getDesktopsFromLDAP() map[string]types.WindowsDesktop { - // Check whether we've ever successfully initialized our LDAP client. - s.mu.Lock() - if !s.ldapInitialized { - s.cfg.Logger.DebugContext(s.closeCtx, "LDAP not ready, skipping discovery and attempting to reconnect") - s.mu.Unlock() - s.initializeLDAP() + tc, err := s.tlsConfigForLDAP() + if err != nil { + s.cfg.Logger.WarnContext(s.closeCtx, "could not request TLS certificate for LDAP discovery", "error", err) return nil } - s.mu.Unlock() + + ldapClient, err := winpki.DialLDAP(s.closeCtx, s.getLDAPConfig(), tc) + if err != nil { + s.cfg.Logger.WarnContext(s.closeCtx, "could not dial LDAP server", "error", err) + return nil + } + defer ldapClient.Close() result := make(map[string]types.WindowsDesktop) for _, discoveryConfig := range s.cfg.Discovery { @@ -168,18 +160,8 @@ func (s *WindowsService) getDesktopsFromLDAP() map[string]types.WindowsDesktop { attrs = append(attrs, computerAttributes...) attrs = append(attrs, discoveryConfig.LabelAttributes...) - entries, err := s.lc.ReadWithFilter(discoveryConfig.BaseDN, filter, attrs) - if trace.IsConnectionProblem(err) { - // If the connection was broken, re-initialize the LDAP client so that it's - // ready for the next reconcile loop. Return the last known set of desktops - // in this case, so that the reconciler doesn't delete the desktops it already - // knows about. - s.cfg.Logger.InfoContext(s.closeCtx, "LDAP connection error when searching for desktops, reinitializing client") - if err := s.initializeLDAP(); err != nil { - s.cfg.Logger.ErrorContext(s.closeCtx, "failed to reinitialize LDAP client, will retry on next reconcile", "error", err) - } - return s.lastDiscoveryResults - } else if err != nil { + entries, err := ldapClient.ReadWithFilter(discoveryConfig.BaseDN, filter, attrs) + if err != nil { s.cfg.Logger.WarnContext(s.closeCtx, "could not discover Windows Desktops", "error", err) return nil } diff --git a/lib/srv/desktop/windows_server.go b/lib/srv/desktop/windows_server.go index c5c86ced625ef..89246a91438e9 100644 --- a/lib/srv/desktop/windows_server.go +++ b/lib/srv/desktop/windows_server.go @@ -31,7 +31,6 @@ import ( "os" "strconv" "strings" - "sync" "time" "github.com/go-ldap/ldap/v3" @@ -48,7 +47,6 @@ import ( libevents "github.com/gravitational/teleport/lib/events" "github.com/gravitational/teleport/lib/events/recorder" "github.com/gravitational/teleport/lib/limiter" - "github.com/gravitational/teleport/lib/modules" "github.com/gravitational/teleport/lib/reversetunnelclient" "github.com/gravitational/teleport/lib/service/servicecfg" "github.com/gravitational/teleport/lib/services" @@ -67,15 +65,6 @@ const ( // when resolving Windows Desktop hostnames dnsDialTimeout = 5 * time.Second - // ldapDialTimeout is the timeout for dialing the LDAP server - // when making an initial connection - ldapDialTimeout = 15 * time.Second - - // ldapRequestTimeout is the timeout for making LDAP requests. - // It is larger than the dial timeout because LDAP queries in large - // Active Directory environments may take longer to complete. - ldapRequestTimeout = 45 * time.Second - // windowsDesktopServiceCertTTL is the TTL for certificates issued to the // Windows Desktop Service in order to authenticate with the LDAP server. // It is set longer than the Windows certificates for users because it is @@ -88,15 +77,6 @@ const ( // so the TTL is deliberately set to a small value to give enough time to establish // a single session. windowsUserCertTTL = 5 * time.Minute - - // windowsDesktopServiceCertRetryInterval indicates how often to retry - // issuing an LDAP certificate if the operation fails. - windowsDesktopServiceCertRetryInterval = 10 * time.Minute - - // ldapTimeoutRetryInterval indicates how often to retry LDAP initialization - // if it times out. It is set lower than windowsDesktopServiceCertRetryInterval - // because LDAP timeouts may indicate a temporary issue. - ldapTimeoutRetryInterval = 10 * time.Second ) // computerAttributes are the attributes we fetch when discovering @@ -123,12 +103,6 @@ type WindowsService struct { middleware *authz.Middleware ca *winpki.CertificateStoreClient - lc *winpki.LDAPClient - - mu sync.Mutex // mu protects the fields that follow - ldapConfigured bool - ldapInitialized bool - ldapCertRenew *time.Timer // lastDisoveryResults stores the results of the most recent LDAP search // when desktop discovery is enabled. @@ -191,7 +165,7 @@ type WindowsServiceConfig struct { ShowDesktopWallpaper bool // LDAPConfig contains parameters for connecting to an LDAP server. // LDAP functionality is disabled if Addr is empty. - winpki.LDAPConfig + servicecfg.LDAPConfig // PKIDomain optionally configures a separate Active Directory domain // for PKI operations. If empty, the domain from the LDAP config is used. // This can be useful for cases where PKI is configured in a root domain @@ -279,8 +253,8 @@ func (cfg *WindowsServiceConfig) CheckAndSetDefaults() error { if err := cfg.Heartbeat.CheckAndSetDefaults(); err != nil { return trace.Wrap(err) } - if cfg.LDAPConfig.Addr != "" { - if err := cfg.LDAPConfig.Check(); err != nil { + if cfg.LDAPConfig.Addr != "" || cfg.LDAPConfig.LocateServer.Enabled { + if err := cfg.LDAPConfig.CheckAndSetDefaults(); err != nil { return trace.Wrap(err) } } @@ -291,6 +265,10 @@ func (cfg *WindowsServiceConfig) CheckAndSetDefaults() error { cfg.Logger = cmp.Or(cfg.Logger, slog.With(teleport.ComponentKey, teleport.ComponentWindowsDesktop)) cfg.Clock = cmp.Or(cfg.Clock, clockwork.NewRealClock()) + if !cfg.LocateServer.Enabled && cfg.LocateServer.Site != "" { + cfg.Logger.WarnContext(context.Background(), "site is set, but locate_server is false. site will be ignored.") + } + return nil } @@ -307,6 +285,17 @@ func (cfg *HeartbeatConfig) CheckAndSetDefaults() error { return nil } +func (s *WindowsService) getLDAPConfig() *winpki.LDAPConfig { + return &winpki.LDAPConfig{ + Logger: s.cfg.Logger, + Username: s.cfg.LDAPConfig.Username, + SID: s.cfg.LDAPConfig.SID, + Domain: s.cfg.LDAPConfig.Domain, + Addr: s.cfg.LDAPConfig.Addr, + LocateServer: winpki.LocateServer(s.cfg.LDAPConfig.LocateServer), + } +} + const insecureSkipVerifyWarning = "LDAP configuration specifies both a CA certificate and insecure_skip_verify. " + "TLS connections to the LDAP server will not be verified. If this is intentional, disregard this warning." @@ -363,7 +352,6 @@ func NewWindowsService(cfg WindowsServiceConfig) (*WindowsService, error) { AcceptedUsage: []string{teleport.UsageWindowsDesktopOnly}, }, dnsResolver: resolver, - lc: winpki.NewLDAPClient(nil), clusterName: clusterName.GetClusterName(), closeCtx: ctx, close: close, @@ -379,19 +367,9 @@ func NewWindowsService(cfg WindowsServiceConfig) (*WindowsService, error) { Domain: cmp.Or(s.cfg.PKIDomain, s.cfg.Domain), Logger: slog.Default(), ClusterName: s.clusterName, - LC: s.lc, + LC: s.getLDAPConfig(), }) - if s.cfg.LDAPConfig.Addr != "" { - s.ldapConfigured = true - // initialize LDAP - if this fails it will automatically schedule a retry. - // we don't want to return an error in this case, because failure to start - // the service brings down the entire Teleport process - if err := s.initializeLDAP(); err != nil { - s.cfg.Logger.ErrorContext(ctx, "initializing LDAP client, will retry", "error", err) - } - } - ok := false defer func() { if !ok { @@ -421,60 +399,10 @@ func NewWindowsService(cfg WindowsServiceConfig) (*WindowsService, error) { s.cfg.Logger.InfoContext(ctx, "desktop discovery via LDAP is disabled, set 'base_dn' to enable") } - // if LDAP-based discovery is not enabled, but we have configured LDAP - // then it's important that we periodically try to use the LDAP connection - // to detect connection closure - if s.ldapConfigured && len(s.cfg.Discovery) == 0 { - s.startLDAPConnectionCheck(ctx) - } - ok = true return s, nil } -// startLDAPConnectionCheck starts a background process that -// periodically reads from the LDAP connection in order to detect -// connection closure, and reconnects if necessary. -// This is useful when LDAP-based discovery is disabled, because without -// discovery the connection goes idle and may be closed by the server. -func (s *WindowsService) startLDAPConnectionCheck(ctx context.Context) { - s.cfg.Logger.DebugContext(ctx, "starting LDAP connection checker") - go func() { - t := s.cfg.Clock.NewTicker(5 * time.Minute) - defer t.Stop() - - for { - select { - case <-t.Chan(): - // First check if we have successfully initialized the LDAP client. - // If not, then do that now and return. - // (This mimics the check that is performed when LDAP discovery is enabled.) - s.mu.Lock() - if !s.ldapInitialized { - s.cfg.Logger.DebugContext(context.Background(), "LDAP not ready, attempting to reconnect") - s.mu.Unlock() - s.initializeLDAP() - return - } - s.mu.Unlock() - - // If we have initialized the LDAP client, then try to use it to make sure we're still connected - // by attempting to read CAs in the NTAuth store (we know we have permissions to do so). - ntAuthDN := "CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration," + winpki.DomainDN(s.cfg.LDAPConfig.Domain) - _, err := s.lc.Read(ntAuthDN, "certificationAuthority", []string{"cACertificate"}) - if trace.IsConnectionProblem(err) { - s.cfg.Logger.DebugContext(ctx, "detected broken LDAP connection, will reconnect") - if err := s.initializeLDAP(); err != nil { - s.cfg.Logger.WarnContext(ctx, "failed to reconnect to LDAP", "error", err) - } - } - case <-ctx.Done(): - return - } - } - }() -} - func (s *WindowsService) newSessionRecorder(recConfig types.SessionRecordingConfig, sessionID string) (libevents.SessionPreparerRecorder, error) { return recorder.New(recorder.Config{ SessionID: session.ID(sessionID), @@ -542,83 +470,14 @@ func (s *WindowsService) tlsConfigForLDAP() (*tls.Config, error) { return tc, nil } -// initializeLDAP requests a TLS certificate from the auth server to be used for -// authenticating with the LDAP server. If the certificate is obtained, and -// authentication with the LDAP server succeeds, it schedules a renewal to take -// place before the certificate expires. If we are unable to obtain a certificate -// and authenticate with the LDAP server, then the operation will be automatically -// retried. -// -// This method is safe for concurrent calls. -func (s *WindowsService) initializeLDAP() error { - tc, err := s.tlsConfigForLDAP() - if trace.IsAccessDenied(err) && modules.GetModules().BuildType() == modules.BuildEnterprise { - s.cfg.Logger.WarnContext(context.Background(), - "Could not generate certificate for LDAPS. Ensure that the auth server is licensed for desktop access.") - } - if err != nil { - s.mu.Lock() - s.ldapInitialized = false - // in the case where we're not licensed for desktop access, we retry less frequently, - // since this is likely not an intermittent error that will resolve itself quickly - s.scheduleNextLDAPCertRenewalLocked(windowsDesktopServiceCertRetryInterval * 3) - s.mu.Unlock() - return trace.Wrap(err) - } - - conn, err := ldap.DialURL( - "ldaps://"+s.cfg.Addr, - ldap.DialWithDialer(&net.Dialer{Timeout: ldapDialTimeout}), - ldap.DialWithTLSConfig(tc), - ) - if err != nil { - s.mu.Lock() - s.ldapInitialized = false - - // failures due to timeouts might be transient, so retry more frequently - retryAfter := windowsDesktopServiceCertRetryInterval - if errors.Is(err, context.DeadlineExceeded) { - retryAfter = ldapTimeoutRetryInterval - } - - s.scheduleNextLDAPCertRenewalLocked(retryAfter) - s.mu.Unlock() - return trace.Wrap(err, "dial") - } - - conn.SetTimeout(ldapRequestTimeout) - s.lc.SetClient(conn) - - if err := s.ca.Update(s.closeCtx); err != nil { - return trace.Wrap(err) - } - - s.mu.Lock() - s.ldapInitialized = true - s.scheduleNextLDAPCertRenewalLocked(windowsDesktopServiceCertTTL / 3) - s.mu.Unlock() +// Close instructs the server to stop accepting new connections and abort all +// established ones. Close does not wait for the connections to be finished. +func (s *WindowsService) Close() error { + s.close() return nil } -// scheduleNextLDAPCertRenewalLocked schedules a renewal of our LDAP credentials -// after some amount of time has elapsed. If an existing renewal is already -// scheduled, it is canceled and this new one takes its place. -// -// The lock on s.mu MUST be held. -func (s *WindowsService) scheduleNextLDAPCertRenewalLocked(after time.Duration) { - s.cfg.Logger.InfoContext(context.Background(), "scheduled next LDAP cert renewal", "duration", after) - if s.ldapCertRenew != nil { - s.ldapCertRenew.Reset(after) - } else { - s.ldapCertRenew = time.AfterFunc(after, func() { - if err := s.initializeLDAP(); err != nil { - s.cfg.Logger.ErrorContext(context.Background(), "couldn't renew certificate for LDAP auth", "error", err) - } - }) - } -} - func (s *WindowsService) startServiceHeartbeat() error { heartbeat, err := srv.NewHeartbeat(srv.HeartbeatConfig{ Context: s.closeCtx, @@ -684,20 +543,6 @@ func (s *WindowsService) startStaticHostHeartbeat(host servicecfg.WindowsHost) e return nil } -// Close instructs the server to stop accepting new connections and abort all -// established ones. Close does not wait for the connections to be finished. -func (s *WindowsService) Close() error { - s.mu.Lock() - defer s.mu.Unlock() - - if s.ldapCertRenew != nil { - s.ldapCertRenew.Stop() - } - s.close() - s.lc.Close() - return nil -} - // Serve starts serving TLS connections for plainLis. plainLis should be a TCP // listener and Serve will handle TLS internally. func (s *WindowsService) Serve(plainLis net.Listener) error { @@ -725,20 +570,6 @@ func (s *WindowsService) Serve(plainLis net.Listener) error { } } -func (s *WindowsService) readyForConnections() bool { - s.mu.Lock() - defer s.mu.Unlock() - // If LDAP was not configured, we assume all hosts are non-AD - // and the server can accept connections right away. - if !s.ldapConfigured { - return true - } - - // If LDAP was configured, then we need to wait for it to be initialized - // before accepting connections. - return s.ldapInitialized -} - // handleConnection handles TLS connections from a Teleport proxy. // It authenticates and authorizes the connection, and then begins // translating the TDP messages from the proxy into native RDP. @@ -755,15 +586,6 @@ func (s *WindowsService) handleConnection(proxyConn *tls.Conn) { } } - // don't handle connections until the LDAP initialization retry loop has succeeded - // (it would fail anyway, but this presents a better error to the user) - if !s.readyForConnections() { - const msg = "This service cannot accept connections until LDAP initialization has completed." - log.ErrorContext(context.Background(), msg) - sendTDPError(msg) - return - } - // Check connection limits. remoteAddr, _, err := net.SplitHostPort(proxyConn.RemoteAddr().String()) if err != nil { @@ -1272,34 +1094,23 @@ func timer() func() int64 { func (s *WindowsService) generateUserCert(ctx context.Context, username string, ttl time.Duration, desktop types.WindowsDesktop, createUsers bool, groups []string) (certDER, keyDER []byte, err error) { var activeDirectorySID string if !desktop.NonAD() { - // Find the user's SID - filter := winpki.CombineLDAPFilters([]string{ - fmt.Sprintf("(%s=%s)", attrSAMAccountType, AccountTypeUser), - fmt.Sprintf("(%s=%s)", attrSAMAccountName, username), - }) - s.cfg.Logger.DebugContext(ctx, "querying LDAP for objectSid of Windows user", "username", username, "filter", filter) - domainDN := winpki.DomainDN(s.cfg.LDAPConfig.Domain) - - entries, err := s.lc.ReadWithFilter(domainDN, filter, []string{winpki.AttrObjectSid}) - // if LDAP-based desktop discovery is not enabled, there may not be enough - // traffic to keep the connection open. Attempt to open a new LDAP connection - // in this case. - if trace.IsConnectionProblem(err) { - s.initializeLDAP() // ignore error, this is a best effort attempt - entries, err = s.lc.ReadWithFilter(domainDN, filter, []string{winpki.AttrObjectSid}) - } + tc, err := s.tlsConfigForLDAP() if err != nil { return nil, nil, trace.Wrap(err) } - if len(entries) == 0 { - return nil, nil, trace.NotFound("could not find Windows account %q", username) - } else if len(entries) > 1 { - s.cfg.Logger.WarnContext(ctx, "found multiple entries for user, taking the first", "username", username) + + ldapClient, err := winpki.DialLDAP(ctx, s.getLDAPConfig(), tc) + if err != nil { + return nil, nil, trace.Wrap(err) } - activeDirectorySID, err = winpki.ADSIDStringFromLDAPEntry(entries[0]) + defer ldapClient.Close() + + s.cfg.Logger.DebugContext(ctx, "querying LDAP for objectSid of Windows user", "username", username) + activeDirectorySID, err = ldapClient.GetActiveDirectorySID(ctx, username) if err != nil { return nil, nil, trace.Wrap(err) } + s.cfg.Logger.DebugContext(ctx, "Found objectSid Windows user", "username", username) } return s.generateCredentials(ctx, generateCredentialsRequest{ diff --git a/lib/winpki/certificate_authority.go b/lib/winpki/certificate_authority.go index 7f193cb79f3ec..11ec4f2f06da2 100644 --- a/lib/winpki/certificate_authority.go +++ b/lib/winpki/certificate_authority.go @@ -20,6 +20,7 @@ package winpki import ( "context" + "crypto/tls" "encoding/base32" "log/slog" @@ -60,12 +61,12 @@ type CertificateStoreConfig struct { Logger *slog.Logger // ClusterName is the name of this Teleport cluster ClusterName string - // LC is the LDAPClient - LC *LDAPClient + // LC is the LDAPConfig + LC *LDAPConfig } // Update publishes an empty certificate revocation list to LDAP. -func (c *CertificateStoreClient) Update(ctx context.Context) error { +func (c *CertificateStoreClient) Update(ctx context.Context, tc *tls.Config) error { caType := types.UserCA // TODO(zmb3): check for the presence of Teleport's CA in the NTAuth store @@ -95,7 +96,7 @@ func (c *CertificateStoreClient) Update(ctx context.Context) error { } subjectID := base32.HexEncoding.EncodeToString(cert.SubjectKeyId) issuer := subjectID + "_" + c.cfg.ClusterName - if err := c.updateCRL(ctx, issuer, keyPair.CRL, caType); err != nil { + if err := c.updateCRL(ctx, issuer, keyPair.CRL, caType, tc); err != nil { return trace.Wrap(err) } } @@ -109,14 +110,14 @@ func (c *CertificateStoreClient) Update(ctx context.Context) error { return trace.Wrap(err, "generating CRL") } - if err := c.updateCRL(ctx, c.cfg.ClusterName, crlDER, caType); err != nil { + if err := c.updateCRL(ctx, c.cfg.ClusterName, crlDER, caType, tc); err != nil { return trace.Wrap(err, "updating CRL over LDAP") } } return nil } -func (c *CertificateStoreClient) updateCRL(ctx context.Context, issuer string, crlDER []byte, caType types.CertAuthType) error { +func (c *CertificateStoreClient) updateCRL(ctx context.Context, issuer string, crlDER []byte, caType types.CertAuthType, tc *tls.Config) error { // Publish the CRL for current cluster CA. For trusted clusters, their // respective windows_desktop_services will publish CRLs of their CAs so we // don't have to do it here. @@ -133,13 +134,19 @@ func (c *CertificateStoreClient) updateCRL(ctx context.Context, issuer string, c containerDN := crlContainerDN(c.cfg.Domain, caType) crlDN := CRLDN(issuer, c.cfg.Domain, caType) + ldapClient, err := DialLDAP(ctx, c.cfg.LC, tc) + if err != nil { + return trace.Wrap(err, "dialing LDAP server") + } + defer ldapClient.Close() + // Create the parent container. - if err := c.cfg.LC.CreateContainer(containerDN); err != nil { + if err := ldapClient.CreateContainer(ctx, containerDN); err != nil { return trace.Wrap(err, "creating CRL container") } // Create the CRL object itself. - if err := c.cfg.LC.Create( + if err := ldapClient.Create( crlDN, "cRLDistributionPoint", map[string][]string{"certificateRevocationList": {string(crlDER)}}, @@ -148,7 +155,8 @@ func (c *CertificateStoreClient) updateCRL(ctx context.Context, issuer string, c return trace.Wrap(err) } // CRL already exists, update it. - if err := c.cfg.LC.Update( + if err := ldapClient.Update( + ctx, crlDN, map[string][]string{"certificateRevocationList": {string(crlDER)}}, ); err != nil { diff --git a/lib/winpki/ldap.go b/lib/winpki/ldap.go index b1efcf077be93..92ca7ffe8f123 100644 --- a/lib/winpki/ldap.go +++ b/lib/winpki/ldap.go @@ -19,12 +19,16 @@ package winpki import ( - "crypto/x509" + "context" + "crypto/tls" "encoding/base32" "errors" "fmt" + "log/slog" + "net" + "os" "strings" - "sync" + "time" "github.com/go-ldap/ldap/v3" "github.com/gravitational/trace" @@ -33,11 +37,35 @@ import ( "github.com/gravitational/teleport/lib/tlsca" ) +const ( + // ldapDialTimeout is the timeout for dialing the LDAP server + // when making an initial connection + ldapDialTimeout = 15 * time.Second + + // ldapRequestTimeout is the timeout for making LDAP requests. + // It is larger than the dial timeout because LDAP queries in large + // Active Directory environments may take longer to complete. + ldapRequestTimeout = 45 * time.Second +) + +// LocateServer contains parameters for locating LDAP servers +// from the AD Domain +type LocateServer struct { + // Automatically locate the LDAP server using DNS SRV records. + // https://ldap.com/dns-srv-records-for-ldap/ + Enabled bool + // Use LDAP site to locate servers from a specific logical site. + // https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/b645c125-a7da-4097-84a1-2fa7cea07714#gt_8abdc986-5679-42d9-ad76-b11eb5a0daba + Site string +} + // LDAPConfig contains parameters for connecting to an LDAP server. type LDAPConfig struct { // Addr is the LDAP server address in the form host:port. // Standard port is 636 for LDAPS. Addr string + // LocateServer contains parameters for locating LDAP servers from the AD domain. + LocateServer LocateServer // Domain is an Active Directory domain name, like "example.com". Domain string // Username is an LDAP username, like "EXAMPLE\Administrator", where @@ -45,26 +73,38 @@ type LDAPConfig struct { Username string // SID is the SID for the user specified by Username. SID string - // InsecureSkipVerify decides whether we skip verifying with the LDAP server's CA when making the LDAPS connection. - InsecureSkipVerify bool - // ServerName is the name of the LDAP server for TLS. - ServerName string - // CA is an optional CA cert to be used for verification if InsecureSkipVerify is set to false. - CA *x509.Certificate + // Logger is the logger for the service. + Logger *slog.Logger } -// Check verifies this LDAPConfig -func (cfg LDAPConfig) Check() error { - if cfg.Addr == "" { - return trace.BadParameter("missing Addr in LDAPConfig") - } - if cfg.Domain == "" { - return trace.BadParameter("missing Domain in LDAPConfig") - } - if cfg.Username == "" { - return trace.BadParameter("missing Username in LDAPConfig") +// LDAPClient is an LDAP client designed for Active Directory environments. +// It uses mutual TLS for authentication, and has the ability to discover +// LDAP servers from DNS if an explicit address is not provided. +// +// LDAPClient does not implement any form of credential refresh or certificate +// rotation. It is no longer useful after its certificate expires. +// For this reason, callers are encouraged to create clients on-demand rather +// than keeping them open for long periods of time. +type LDAPClient struct { + cfg *LDAPConfig + conn *ldap.Conn +} + +// DialLDAP creates a new LDAP client using the provided TLS config for client credentials. +func DialLDAP(ctx context.Context, cfg *LDAPConfig, credentials *tls.Config) (*LDAPClient, error) { + conn, err := cfg.createConnection(ctx, credentials) + if err != nil { + return nil, trace.Wrap(err, "connecting to LDAP server") } - return nil + + return &LDAPClient{ + cfg: cfg, + conn: conn, + }, nil +} + +func (l *LDAPClient) Close() error { + return l.conn.Close() } // DomainDN returns the distinguished name for an Active Directory Domain. @@ -86,52 +126,23 @@ const ( AttrObjectSid = "objectSid" // AttrObjectClass is the object class of an LDAP object AttrObjectClass = "objectClass" -) -// classContainer is the object class for containers in Active Directory -const classContainer = "container" + // AttrSAMAccountType is the SAM Account type for an LDAP object. + AttrSAMAccountType = "sAMAccountType" + // AccountTypeUser is the SAM account type for user accounts. + // See https://learn.microsoft.com/en-us/windows/win32/adschema/a-samaccounttype + // (SAM_USER_OBJECT) + AccountTypeUser = "805306368" + + // AttrSAMAccountName is the SAM Account name of an LDAP object. + AttrSAMAccountName = "sAMAccountName" +) // searchPageSize is desired page size for LDAP search. In Active Directory the default search size limit is 1000 entries, // so in most cases the 1000 search page size will result in the optimal amount of requests made to // LDAP server. const searchPageSize = 1000 -// LDAPClient is a windows LDAP client. -// -// It does not automatically detect when the underlying connection -// is closed. Callers should check for trace.ConnectionProblem errors -// and provide a new client with [SetClient]. -type LDAPClient struct { - mu sync.Mutex - client ldap.Client -} - -// NewLDAPClient returns new LDAPClient. Parameter client may be nil. -func NewLDAPClient(client ldap.Client) *LDAPClient { - return &LDAPClient{ - client: client, - } -} - -// SetClient sets the underlying ldap.Client -func (c *LDAPClient) SetClient(client ldap.Client) { - c.mu.Lock() - if c.client != nil { - c.client.Close() - } - c.client = client - c.mu.Unlock() -} - -// Close closes the underlying ldap.Client -func (c *LDAPClient) Close() { - c.mu.Lock() - if c.client != nil { - c.client.Close() - } - c.mu.Unlock() -} - // convertLDAPError attempts to convert LDAP error codes to their // equivalent trace errors. func convertLDAPError(err error) error { @@ -143,9 +154,6 @@ func convertLDAPError(err error) error { if errors.As(err, &ldapErr) { switch ldapErr.ResultCode { case ldap.ErrorNetwork: - // this one is especially important, because Teleport will - // try to re-establish the connection when a ConnectionProblem - // is detected return trace.ConnectionProblem(err, "network error") case ldap.LDAPResultOperationsError: if strings.Contains(err.Error(), "successful bind must be completed") { @@ -165,9 +173,35 @@ func convertLDAPError(err error) error { return err } +// GetActiveDirectorySID makes an LDAP query to retrieve the security identifier (SID) +// for the specified Active Directory user. +func (l *LDAPClient) GetActiveDirectorySID(ctx context.Context, username string) (string, error) { + filter := CombineLDAPFilters([]string{ + fmt.Sprintf("(%s=%s)", AttrSAMAccountType, AccountTypeUser), + fmt.Sprintf("(%s=%s)", AttrSAMAccountName, username), + }) + + entries, err := l.ReadWithFilter(DomainDN(l.cfg.Domain), filter, []string{AttrObjectSid}) + switch { + case err != nil: + return "", trace.Wrap(err) + case len(entries) == 0: + return "", trace.NotFound("could not find Windows account %q", username) + case len(entries) > 1: + l.cfg.Logger.WarnContext(ctx, "found multiple entries for user, taking the first", "user", username) + } + + sid, err := ADSIDStringFromLDAPEntry(entries[0]) + if err != nil { + return "", trace.Wrap(err) + } + + return sid, nil +} + // ReadWithFilter searches the specified DN (and its children) using the specified LDAP filter. // See https://ldap.com/ldap-filters/ for more information on LDAP filter syntax. -func (c *LDAPClient) ReadWithFilter(dn string, filter string, attrs []string) ([]*ldap.Entry, error) { +func (l *LDAPClient) ReadWithFilter(dn string, filter string, attrs []string) ([]*ldap.Entry, error) { req := ldap.NewSearchRequest( dn, ldap.ScopeWholeSubtree, @@ -179,10 +213,8 @@ func (c *LDAPClient) ReadWithFilter(dn string, filter string, attrs []string) ([ attrs, nil, // no Controls ) - c.mu.Lock() - defer c.mu.Unlock() - res, err := c.client.SearchWithPaging(req, searchPageSize) + res, err := l.conn.SearchWithPaging(req, searchPageSize) if err != nil { return nil, trace.Wrap(convertLDAPError(err), "fetching LDAP object %q with filter %q", dn, filter) } @@ -198,8 +230,8 @@ func (c *LDAPClient) ReadWithFilter(dn string, filter string, attrs []string) ([ // specific entry using ADSIEdit.msc. // You can find the list of all AD classes at // https://docs.microsoft.com/en-us/windows/win32/adschema/classes-all -func (c *LDAPClient) Read(dn string, class string, attrs []string) ([]*ldap.Entry, error) { - return c.ReadWithFilter(dn, fmt.Sprintf("(%s=%s)", AttrObjectClass, class), attrs) +func (l *LDAPClient) Read(dn string, class string, attrs []string) ([]*ldap.Entry, error) { + return l.ReadWithFilter(dn, fmt.Sprintf("(%s=%s)", AttrObjectClass, class), attrs) } // Create creates an LDAP entry at the given path, with the given class and @@ -210,26 +242,23 @@ func (c *LDAPClient) Read(dn string, class string, attrs []string) ([]*ldap.Entr // attributes for similar entries using ADSIEdit.msc. // You can find the list of all AD classes at // https://docs.microsoft.com/en-us/windows/win32/adschema/classes-all -func (c *LDAPClient) Create(dn string, class string, attrs map[string][]string) error { +func (l *LDAPClient) Create(dn string, class string, attrs map[string][]string) error { req := ldap.NewAddRequest(dn, nil) for k, v := range attrs { req.Attribute(k, v) } req.Attribute("objectClass", []string{class}) - c.mu.Lock() - defer c.mu.Unlock() - - if err := c.client.Add(req); err != nil { + if err := l.conn.Add(req); err != nil { return trace.Wrap(convertLDAPError(err), "error creating LDAP object %q", dn) } return nil } -// CreateContainer creates an LDAP container entry if -// it doesn't already exist. -func (c *LDAPClient) CreateContainer(dn string) error { - err := c.Create(dn, classContainer, nil) +// CreateContainer creates an LDAP container entry if it doesn't already exist. +func (l *LDAPClient) CreateContainer(ctx context.Context, dn string) error { + const classContainer = "container" + err := l.Create(dn, classContainer, nil /* attrs */) // Ignore the error if container already exists. if trace.IsAlreadyExists(err) { return nil @@ -246,16 +275,13 @@ func (c *LDAPClient) CreateContainer(dn string) error { // // You can browse LDAP on the Windows host to find attributes of existing // entries using ADSIEdit.msc. -func (c *LDAPClient) Update(dn string, replaceAttrs map[string][]string) error { +func (l *LDAPClient) Update(ctx context.Context, dn string, replaceAttrs map[string][]string) error { req := ldap.NewModifyRequest(dn, nil) for k, v := range replaceAttrs { req.Replace(k, v) } - c.mu.Lock() - defer c.mu.Unlock() - - if err := c.client.Modify(req); err != nil { + if err := l.conn.Modify(req); err != nil { return trace.Wrap(convertLDAPError(err), "updating %q", dn) } return nil @@ -297,3 +323,69 @@ func crlKeyName(caType types.CertAuthType) string { return "Teleport" } } + +// createConnection dials an LDAP server using the provided TLS config. +// The server is either obtained directly from the configuration or +// discovered via DNS. +func (c *LDAPConfig) createConnection(ctx context.Context, ldapTLSConfig *tls.Config) (*ldap.Conn, error) { + servers := []string{c.Addr} + dialer := net.Dialer{Timeout: ldapDialTimeout} + + if c.LocateServer.Enabled { + dial := func(dialCtx context.Context, network, address string) (net.Conn, error) { + return dialer.DialContext(dialCtx, network, address) + } + + // In development environments, the system's default resolver is unlikely to be + // able to resolve the Active Directory SRV records needed for server location, + // so we allow overriding the resolver. + if resolverAddr := os.Getenv("TELEPORT_LDAP_RESOLVER"); resolverAddr != "" { + c.Logger.DebugContext(ctx, "Using custom DNS resolver address", "address", resolverAddr) + // Check if resolver address has a port + host, port, err := net.SplitHostPort(resolverAddr) + if err != nil { + host = resolverAddr + port = "53" + } + + customResolverAddr := net.JoinHostPort(host, port) + dial = func(ctx context.Context, network, address string) (net.Conn, error) { + return dialer.DialContext(ctx, network, customResolverAddr) + } + } + + resolver := &net.Resolver{ + PreferGo: true, + Dial: dial, + } + + var err error + if servers, err = locateLDAPServer(ctx, c.Domain, c.LocateServer.Site, resolver); err != nil { + return nil, trace.Wrap(err, "locating LDAP server") + } + } + + if len(servers) == 0 { + return nil, trace.NotFound("no LDAP servers found for domain %q", c.Domain) + } + + for _, server := range servers { + conn, err := ldap.DialURL( + "ldaps://"+server, + ldap.DialWithDialer(&dialer), + ldap.DialWithTLSConfig(ldapTLSConfig), + ) + + if err != nil { + // If the connection fails, try the next server + c.Logger.DebugContext(ctx, "Error connecting to LDAP server, trying next available server", "server", server, "error", err) + continue + } + + c.Logger.DebugContext(ctx, "Connected to LDAP server", "server", server) + conn.SetTimeout(ldapRequestTimeout) + return conn, nil + } + + return nil, trace.NotFound("no LDAP servers responded successfully for domain %q", c.Domain) +} diff --git a/lib/winpki/locate.go b/lib/winpki/locate.go new file mode 100644 index 0000000000000..b1b8b12788657 --- /dev/null +++ b/lib/winpki/locate.go @@ -0,0 +1,74 @@ +/* + * Teleport + * Copyright (C) 2025 Gravitational, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU Affero General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU Affero General Public License for more details. + * + * You should have received a copy of the GNU Affero General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + */ + +package winpki + +import ( + "context" + "net" + "os" + "strconv" + + "github.com/gravitational/trace" +) + +// locateLDAPServer looks up the LDAP server in an Active Directory +// environment by implementing the DNS-based discovery DC locator +// process. +// +// See https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/dc-locator?tabs=dns-based-discovery +func locateLDAPServer(ctx context.Context, domain string, site string, resolver *net.Resolver) ([]string, error) { + tryDomain := domain + if site != "" { + tryDomain = site + "._sites." + domain + } + + _, records, err := resolver.LookupSRV(ctx, "ldap", "tcp", tryDomain) + if err != nil && site != "" { + // If the site lookup fails, try the domain directly. + _, records, err = resolver.LookupSRV(ctx, "ldap", "tcp", domain) + } + + if err != nil { + return nil, trace.Wrap(err, "looking up SRV records for %v", domain) + } + + // note: LookupSRV already returns records sorted by priority and takes in to account weights + var result []string + for _, record := range records { + addrs := []string{record.Target} + + // In development environments, the hostnames returned from the SRV records are + // unlikely to resolve with the system resolver, so get an IP address now while + // we're using DNS from AD. + if resolve, _ := strconv.ParseBool(os.Getenv("TELEPORT_LDAP_RESOLVE_SERVER")); resolve { + var err error + addrs, err = resolver.LookupHost(ctx, record.Target) + if err != nil { + continue + } + } + for _, addr := range addrs { + // SRV records will likely return the insecure LDAP port, + // so we ignore it and hard code the LDAPS port. + result = append(result, net.JoinHostPort(addr, "636")) + } + } + + return result, nil +}
diff --git a/lib/config/configuration_test.go b/lib/config/configuration_test.go index 027d6e11d76ba..e4423d4a94cda 100644 --- a/lib/config/configuration_test.go +++ b/lib/config/configuration_test.go @@ -2305,7 +2305,8 @@ func TestWindowsDesktopService(t *testing.T) { mutate: func(fc *FileConfig) { fc.WindowsDesktop.ADHosts = []string{"127.0.0.1:3389"} fc.WindowsDesktop.LDAP = LDAPConfig{ - Addr: "something", + Addr: "something", + Domain: "example.com", } }, }, @@ -2349,7 +2350,8 @@ func TestWindowsDesktopService(t *testing.T) { BaseDN: "something", } fc.WindowsDesktop.LDAP = LDAPConfig{ - Addr: "something", + Addr: "something", + Domain: "example.com", } }, }, @@ -2401,7 +2403,8 @@ func TestWindowsDesktopService(t *testing.T) { fc.WindowsDesktop.ListenAddress = "0.0.0.0:3028" fc.WindowsDesktop.ADHosts = []string{"127.0.0.1:3389"} fc.WindowsDesktop.LDAP = LDAPConfig{ - Addr: "something", + Addr: "something", + Domain: "example.com", } fc.WindowsDesktop.HostLabels = []WindowsHostLabelRule{ {Match: ".*", Labels: map[string]string{"key": "value"}}, diff --git a/lib/srv/db/common/kerberos/kinit/ldap_test.go b/lib/srv/db/common/kerberos/kinit/ldap_test.go index 9146fbd025a61..4c42a9f6231ad 100644 --- a/lib/srv/db/common/kerberos/kinit/ldap_test.go +++ b/lib/srv/db/common/kerberos/kinit/ldap_test.go @@ -23,7 +23,6 @@ import ( "testing" "time" - "github.com/go-ldap/ldap/v3" "github.com/gravitational/trace" "github.com/stretchr/testify/require" @@ -120,65 +119,3 @@ func TestTLSConfigForLDAP(t *testing.T) { require.NotEmpty(t, tlsConfig.Certificates) require.NotNil(t, tlsConfig.RootCAs) } - -type mockLDAPClient struct { - searchWithPaging func(searchRequest *ldap.SearchRequest, pagingSize uint32) (*ldap.SearchResult, error) - ldap.Client -} - -func (m *mockLDAPClient) SearchWithPaging(searchRequest *ldap.SearchRequest, pagingSize uint32) (*ldap.SearchResult, error) { - if m.searchWithPaging == nil { - return nil, trace.BadParameter("callback function searchWithPaging not set") - } - return m.searchWithPaging(searchRequest, pagingSize) -} - -func TestGetActiveDirectorySID(t *testing.T) { - adConfig := types.AD{ - KeytabFile: "", - Krb5File: "", - SPN: "", - Domain: "example.com", - LDAPCert: fixtures.TLSCACertPEM, - KDCHostName: "ldap.example.com", - LDAPServiceAccountName: "DOMAIN\\test-service-account", - LDAPServiceAccountSID: "S-1-5-21-2191801808-3167526388-2669316733-1104", - } - - connector, err := newLDAPConnector(slog.Default(), &mockAuthClient{}, adConfig) - require.NoError(t, err) - - connector.dialLDAPServerFunc = func(ctx context.Context) (ldap.Client, error) { - return &mockLDAPClient{searchWithPaging: func(searchRequest *ldap.SearchRequest, pagingSize uint32) (*ldap.SearchResult, error) { - if searchRequest.BaseDN != "DC=example,DC=com" { - return nil, trace.BadParameter("unexpected value of base_dn") - } - if searchRequest.Filter != "(\u0026(sAMAccountType=805306368)(sAMAccountName=DOMAIN\\test-user))" { - return nil, trace.BadParameter("unexpected value of filter") - } - if len(searchRequest.Attributes) != 1 { - return nil, trace.BadParameter("unexpected number of search attributes") - } - if searchRequest.Attributes[0] != "objectSid" { - return nil, trace.BadParameter("unexpected value of search attribute") - } - - const sidValue = "\u0001\u0005\u0000\u0000\u0000\u0000\u0000\u0005\u0015\u0000\u0000\u0000\ufffd=\ufffd\ufffd\ufffd\ufffd̼}\ufffd\u001a\ufffd\ufffd\u0001\u0000\u0000" - - attr := ldap.NewEntryAttribute("objectSid", []string{sidValue}) - - return &ldap.SearchResult{ - Entries: []*ldap.Entry{ - { - DN: "CN=test-user,CN=Users,DC=example,DC=com", - Attributes: []*ldap.EntryAttribute{attr}, - }, - }, - }, nil - }}, nil - } - - sid, err := connector.GetActiveDirectorySID(context.Background(), "DOMAIN\\test-user") - require.NoError(t, err) - require.Equal(t, "S-1-5-21-1035845615-4022190063-3220159935-3183472573", sid) -} diff --git a/lib/srv/desktop/windows_server_test.go b/lib/srv/desktop/windows_server_test.go index c3594d73c53ca..4f527b56b66e4 100644 --- a/lib/srv/desktop/windows_server_test.go +++ b/lib/srv/desktop/windows_server_test.go @@ -58,7 +58,7 @@ func TestConfigWildcardBaseDN(t *testing.T) { BaseDN: "*", }, }, - LDAPConfig: winpki.LDAPConfig{ + LDAPConfig: servicecfg.LDAPConfig{ Domain: "test.goteleport.com", }, }
Desktop access: add option to discover LDAP server via DNS Add a configuration option that allows Teleport to discover the LDAP server address via DNS SRV records instead of requiring that the user enter an address in the configuration file. This will both: - simplify configuration, allowing the same config to be used in different environments - avoid single points of failure - the SRV records can return multiple options and priorities, allowing us to try multiple servers until one succeeds For domain `example.com` we would do a SRV lookup for `_ldap._tcp.dc._msdcs.example.com`. See [here](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/c1987d42-1847-4cc9-acf7-aab2136d6952) for the spec. We should respect the priority of the SRV records. As a stretch goal, we should respect the weight as well if multiple hosts share the same priority. Additionally, we should allow for a new `site` parameter in the configuration. If specified, we prefer the site-specific records and only fall back to the global records if possible. For example, for site `oakland` we would query `_ldap._tcp.oakland._sitesf.dc._msdcs.example.com`. I'm thinking something like this: ``` windows_desktop_service: enabled: true ldap: locate_server: true site: oakland ```
[ "https://github.com/gravitational/teleport/commit/39ae26a17920bcf7a5a3b47180de108b7034b776" ]
2025-06-20T13:58:34Z
https://github.com/gravitational/teleport/tree/3b3af7e4932ef3b68f2a4cc0f53891000d3f28e2
[ "Set-Location api -ErrorAction SilentlyContinue; go mod download; go build ./..." ]
[ "go test -json -v ./... > reports\\go-test-results.json" ]
[ "type reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import re results: dict[str, str] = {} def set_status(name: str, status: str): # Prefer fail > skip > pass on conflicts cur = results.get(name) if cur is None: results[name] = status return priority = {"fail": 3, "skip": 2, "pass": 1} if priority.get(status, 0) > priority.get(cur, 0): results[name] = status # 1) Prefer structured go -json events (robust to corruption and field order) json_action_then_test = re.compile( r'"Action"\s*:\s*"(pass|fail|skip)".*?"Test"\s*:\s*"([^"\n]+)"', re.IGNORECASE | re.DOTALL, ) json_test_then_action = re.compile( r'"Test"\s*:\s*"([^"\n]+)".*?"Action"\s*:\s*"(pass|fail|skip)"', re.IGNORECASE | re.DOTALL, ) for m in json_action_then_test.finditer(log): action = m.group(1).lower() test_name = m.group(2).strip() if test_name: set_status(test_name, "pass" if action == "pass" else "fail" if action == "fail" else "skip") for m in json_test_then_action.finditer(log): test_name = m.group(1).strip() action = m.group(2).lower() if test_name: set_status(test_name, "pass" if action == "pass" else "fail" if action == "fail" else "skip") # 2) Fallback to plain text outputs inside JSON "Output" or raw go test output. # Handle both single-line and corrupted multi-line test names. # Single-line like: '--- PASS: TestName (0.00s)' text_evt_single = re.compile( r'^\s*---\s+(PASS|FAIL|SKIP):\s+([^\n(]+)', re.IGNORECASE | re.MULTILINE, ) for m in text_evt_single.finditer(log): st = m.group(1).upper() name = m.group(2).strip() if not name: continue if st == "PASS": set_status(name, "pass") elif st == "FAIL": set_status(name, "fail") elif st == "SKIP": set_status(name, "skip") # Multi-line/corrupted names like: '--- PASS: Test\nSemVersion (0.00s)' text_evt_multiline = re.compile( r'---\s+(PASS|FAIL|SKIP):\s+(.+?)(?:\s*\([0-9.]+s\)|\n)', re.IGNORECASE | re.DOTALL, ) for m in text_evt_multiline.finditer(log): st = m.group(1).upper() name = m.group(2) # Normalize whitespace/newlines within the name name = re.sub(r'\s+', '', name).strip() if not name: continue if st == "PASS": set_status(name, "pass") elif st == "FAIL": set_status(name, "fail") elif st == "SKIP": set_status(name, "skip") return results
[ "TestTransportError", "TestGetPartitionFromRegion/us-gov-east-1(0.", "TestNewAppServerForAWS", "TestAccessReviewConditionsIsEmpty", "TestAllDeviceEnu", "TestParseOpensearchEndpoint/detects_invalid_endpoint_with_unrecogniz", "TestRoleV6_KubernetesRes", "TestValidateDatabaseName/val", "TestRole_GetKubeResources/v8_pods_without", "TestCheckAndSetDefaultsWithLink/valid_link(0.", "TestValidateDatabaseName/invalid_first_c", "TestNewSAMLIdPServiceProv", "TestAuditUnmarshaling/with_next_aud", "TestIsALPNConnUpgradeRequired", "TestAllDevice", "TestNewDialerForGRPCClient", "TestParseOpensearchEndpoint/detects_invalid_endpoint_with_mismatch", "TestCheckAndSetDefaultsWithLink/external_li", "TestResourceIDs/pod", "TestClient_DialHost", "TestTrimToMaxSize", "TestParseOpe", "TestRoleV6CheckAndSetDefaults_SAMLIdPOptions/samlidp:_idp_option_en", "TestGetUnifiedResourcesWithLogins", "TestRoleV6", "TestValidateDatabaseName/invalid_trailin", "TestRoleV6CheckAndSetDefaults_SAMLIdPOptions/samlidp:_idp_option_not_enabl", "TestResourceIDs/pod_resource_n", "FuzzParseRDSEndpoint/seed#9", "TestToMap/empty_slice", "TestParseOpense", "TestGetPartitionFromRegion/us-gov-west-1(0.", "TestIsValidIAMPolicyName/valid_with_numbe", "TestPluginDiscordValidation/Missing_Settings", "TestDatabaseFromRedshiftServerles", "TestIsAutoUsersEnabled/postgres_withou", "TestNewSAMLIdPServiceProvider/valid_launc", "TestPluginDiscordValidation/Missing_D", "TestRoleV6_KubernetesResourcesCheckAndSetDe", "TestRoleV6_Kub", "TestCassandraAWSEndpoint/aws_cassandra_", "TestAppPortsValidation/end_port_smaller_th", "TestClient_SSHConfig", "TestAllDevi", "TestCassandraAWSEndpoint/aws_cassa", "TestNewAppServerForAWSOIDCIntegration/valid(", "TestAllDeviceEnumsMapped/DeviceEnrollStatus(", "TestIsAutoUsersEnabled/unsupported_protocol(", "TestAllDeviceEnumsMapped/D", "TestFromProtoNils/requ", "TestAppPortsValidation/port_bigger_than_655", "TestAllDeviceEnumsMapped/DeviceAttestation", "TestFromMap", "TestKeyPair", "TestDatabaseFromRedshiftServerlessEn", "TestUploadTraces/no_spans_to_upload(", "TestAppIsAWSConsole/Region_based_not_s", "TestAllDeviceEnumsMap", "TestFromProtoNils/member_count(0.00", "TestRoleV6CheckAndSetDefaults_SAMLIdPOptions(0.", "TestAppPub", "TestRole_GetKubeResources/v8_with_unknown_", "TestValidateAuto", "TestIsSSHCert/ssh-ed25519-cert-v01@", "TestPluginDiscordValidation/Empty_Role_Map", "TestNewSAMLIdPServiceProvider/empty_launc", "FuzzParseRDSEndpoint/seed#8", "TestParseOpensearchEndpoint/detects_invalid_endpoint_with_unrecog", "TestIsSSHCert/ssh-rsa-cert-v01@openssh.", "TestIsAutoUsersEnabled/postgres_with_admi", "TestAllDeviceEnumsMapped/OST", "TestParseOpensearchEndpoint/parses_", "TestGetPartitionFromRegion/cn-northwest-1(", "TestIsSSHCert/ecdsa-sha2-ni", "TestAllDeviceEnumsMapped/Dev" ]
[ "TestParseTeleportRoles/Auth,Proxy", "TestAppIsAWSConsole/AWS_GovCloud_(US)", "TestDeleteAllUserLoginStates", "TestEncodeDecodeSecond", "TestOktAssignmentIsEqual/targets_both_nil(0.00", "TestPluginEmailSettings/(smtp)_cha", "TestRouteToServer/match_by_server_name", "TestIsAtlasEndpoint/internal_name", "TestDisableUnqualifiedLookups/uuid", "TestNetIQPluginSettings/missing_ApiEndpoin", "FuzzParseElastiCacheEndpoint", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc_", "TestSAMLForceAuthn/force_authn_no", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowLoca", "TestParseReviewDayOfMonth/FiRSt", "TestGetAdminUser/gets_admin_from_labels", "TestPluginOktaValidation/no_org_URL", "TestAll/empty_slice", "TestChangePIN/set_puk_from_default(0", "TestIsValidIAMRoleName/too_large", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_OTP_second_fa", "TestParseRedshiftEndpoint/cn-north-1", "TestFromProtoNils/spec", "TestLicenseSettersAndGetters/Set_", "TestPluginOpsgenieValidation", "TestConversion/CompareFailed", "TestIsValidPartition/china", "TestParseReviewDayOfMonth", "TestLegacyKubeResour", "TestProvisio", "TestLoadProfile/normal_profile", "TestAccessRequestFilter/user_wants_", "TestOktaAssignments_SetStatus/failed_", "FuzzParseDuration", "TestIsResponseSuccessful/codes.Canceled_e", "TestPluginMattermostValidation/no_channel(0.00", "TestAzureMatcherCheckAndSetDefaults/no_type(", "TestGetMCPServerTransportType/stdio", ":TestResourceIDs/persistent_volume_claim_resource_name_with_missing_namespace_an", "TestEncodeDecodeRequir", "TestOktaAssignments_SetStatus/pendin", "TestSSHKeysEqual/rsaKey2!=ed25519Key1(0.0", "TestVali", "TestMarshalAndParseKey/hardware", "Test", "TestRoundtrip/default-type", "TestParseElastiCacheEndpo", "TestNewDiscoveryCon", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/O", "FuzzParseDynamoDBEndpoint/seed#3", "TestGetResourceNames", "TestCircuitBreaker_generation", "TestLockTargetIsEmpty", "TestGRPCErrorWrapping/unary_int", "TestPingError/unsuccessful_response(0.00s", "TestPlainHttpFallback/Fi", "TestResourceIDs/persistent_volume_claim_resource_nam", "TestResourceIDs/certificate_signing_request_resource_name_in_cl", "TestJoinServiceClient_RegisterUsingOracleMet", "TestValidateAutoUpdateConfi", "TestAuthPreferenceV2_CheckAndSe", "TestParse/should_parse:_scheme-ip6-port", "TestValidateJamfSpecV1/inventory_s", "TestValidateJamfSpecV1/minimal_spec", "TestNetIQPluginSettings/missing_OauthIssuer(", "TestIsValidIAMRolesAnywhereProfileName/e", "TestClient_ClusterDetails/cluster_", "FuzzParseDatabaseEndpoint", "TestMergeStreams/both_streams_empty(0", "TestProvisionTokenV2_CheckAndSetDefau", "TestCircuitBreaker_beforeR", "TestCircuitBreaker_beforeRequest", "TestParseMemoryDBEndpoint/TLS_", "TestResourceIDs/cluster_role_binding_resource_name_in_cluster_with_sl", "TestResourceAttestationType_to", "TestIsResponseSuccessful/codes.Unav", "TestDatabaseFromRedshiftServerlessEndpoint", "TestNewAutoUpdateVersion", "TestTake/empty_stream", "TestResourceIDs/cluster_role_binding_resource_name_in_cluster_with_sla", "TestEncodeDecodeS", "TestIsValidIAMRoleName/valid_with_numbers(", "TestParseTeleportRoles/nOdE,prOXY", "TestConversion/NotFound", "TestTargetHealthStatusesAggregate", "TestResourceIDs/kube_node_r", "TestAccessRequestConditionsIsEmpty/roles", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=local_and", "TestNewSAMLIdPServiceProvider/unsu", "TestX509KeyPair/rsa_cert", "TestWatchKindContains/yes:_kind_and_sub", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_mini", "FuzzNormalizeLocation/seed#1", "TestToMap/slice_with_multiple_labels", "FuzzParseDynamoDBEndpoint/seed#4", "TestParse/https://example.com:443", "TestDynamoDBURIForRegion/", "TestSSHRouteMatcherScoring", "FuzzNormalizeLocation/seed#2", "FuzzParseRedshiftEndpoint/seed#1", "TestLicenseSettersAndGetters/Set_Kube", "TestLoadIdentityFile", "TestAuthPreferen", "TestResourceIDs/namespace_resource_name_in_cluster_with_slash/ResourceIDsFromStr", "TestAWSIsEmpty/true_with_unrecognized_bytes(", "FuzzParseElastiCacheEndpoint/seed#18", "TestServerInfoSetLabels/fix_manual_labels(0.00", "TestWatchKindContains/no:_subset_has_no_fi", "TestParseReviewFrequency/6months", "TestNewAutoUpdateVersion/", "TestChangePIN/set_puk_default", "TestResourcesWithLabels_ToMap", "TestDynamoDBU", "TestResourceHeaderIsEqual/nil_equals", "TestRole_GetKubeResources/v7_with_de", "TestResourceIDs/multiple_ids", "TestHardwareKeyAgentService", "TestIterateResources/callback_error(0.00", "TestParseMSSQLEndpoint/empty", "TestLegacyKubeResourceI", "TestPluginJiraValidation/Missing_Project_Key", "TestChangePIN/set_puk_from_empty(0.00s", "TestAlertAcknowledgement_Check/empty", "TestNewAutoUpdateAgentRoll", "TestEncodeDecodeRequireMFAType", "TestPluginEmailSettings", "TestGetResources/KubeServer", "TestIsGCPEndpoint/top_level-like_fak", "TestIsAzureEndpoint", "TestParseMSSQLEndpoint", "TestIntegrationJSONMarshalCycle/aws-oidc", "TestInput/with_whitespace", "TestParseMSSQLEndpoint/only_suffix", "TestParseReviewDayOfMonth/15", "TestPluginMattermostValidation", "FuzzParseDatabaseEndpoint/seed#1", "TestIsValidIAMPolicyName/too_large", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_AllowPassword", "TestPluginMattermostValidation/no_team", "TestValidateAutoUpda", "TestUploadTraces/not_implemented", "TestGetResources/DatabaseServer", "TestResourceIDs/kube_node_resource_name_with_missing_namespace_and_", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFacto", "TestIsLoopback/degenerate_port_should_r", "TestCheckRoleARN/arn_identifier_", "TestRateLimitFailure/limiter-gracefu", "TestNewJitter", "TestGetPartitionFromRegion/us-east-1", "TestParseTeleportRoles/node", "Test_PluginOktaSyncSettings_SyncEnabledGetters", "TestSSHKeysE", "TestPluginOktaValidatio", "TestRateLimitFailure", "TestNetIQPluginSettings/incorrect_OauthIssu", "TestRouteToServer/match_addr", "TestProvisionToken", "TestGCPMatcherChe", "FuzzParseCacheForRedisEndpoint/seed#2", "TestPrivateKey/missing_fingerprint", "TestCassandraEndpointRegion/us-east-1", "TestTunnel", "TestSetEnvs/envs_set_via", "TestConvAccessList/basic_conver", "TestProvisionTokenV2_CaseInsens", "FuzzParseRDSEndpoint/seed#11", "TestParseCorruptedKey/PUBLIC_KEY", "TestRateLimitFailure/limiter-only(0.00s", "TestWatchKindContains", "TestAssertionInfo_RoundTrip/empty", "TestIsValidIAMRoleName/all_symbols", "TestPluginJamfValidation/no_api_Endpoint", "TestRolesEqual", "TestPluginOktaValidation", "TestResourceAttestationType_toAndFrom/u", "TestNewSAMLIdPServi", "TestPluginOpenAIValidation/no_credentials(0.00", "TestIterateResources/paginator_error(0.", "TestServerCheckAndSetDefaults/OpenSSH_node(0.", "TestGetProxyAddress/0_2:_valid,_can_be_raw_host:port_with_special_characters_in_", "TestPluginDatadogValidation", "TestOktAssignmentIsEqual/one_is_nil", "TestValidateUserTask/DiscoverEC", "TestRole_GetKubeResources/v5_without_kub", "TestOktAssignmentIsEqual/resource_h", "TestRateLimitFailure/stream-only", "TestExpiryConsistency/ze", "TestProvisionTokenV2_GetSafeName", "TestResourceIDs/cluster_role_binding_resource_name_with", "TestCloning/*types.UserV2", "TestProxyListenerModeUnmarshalYAML/multiplex", "TestProvisionTokenV2_Chec", "TestResourceIDs/single_id/ResourceID", "TestRedshiftServerlessEndpoint", "TestSSHKeysEqual/rsaKey1!=ed25519Key2(0.0", "TestResourceIDs/ful", "TestMFADevice_CheckAndSet", "TestGetCloudMetadataAWS/cloud_metada", "TestIsPortInRange/within_single_port_range", "TestNewAutoUpdate", "TestParseReviewFrequency/12_m", "TestConvertToPPK/RSA_key_3", "TestShortRegionToRegion", "TestDeviceConversions_toAndFrom", "TestRoleV6_CheckAndSetDefaults", "TestPluginOpsgenieValidation/no_static", "TestGetPolicyFromSet/pin_policy", "TestConversion/io.EOF", "TestGithubAuthRequestCheck", "TestValidatePortRange/end_port_small", "TestCheckRoleARN/valid_when_resour", "FuzzParseDuration/seed#2", "TestAzureMatcherCheckAndSetDefaults/inva", "TestPingConnection/PingT", "TestWithinUpgradeWindow/not_within_upgr", "TestServerSorter/by_addr_desc", "TestParseAtlasEndpoint/internal_name", "TestSkip", "TestNewAccessGraphSettings/invalid(0.00", "TestIsMSSQLServerEndpoint", "TestTargetHealthStatusCanoni", "TestMetadataIsEqual/namespace_is_different(0.", "TestCircuitBreaker_success", "TestParseReviewFrequency/6m", "TestX509Certificate/rsa_cert", "TestRole_AllowRequestKuberne", "TestWatchKindContains/no:_different_names(0.00", "FuzzParseMSSQLEndpoint/seed#4", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=", "TestPluginMattermostValidation/no_settings(0.", "TestPortRangesContains/30", "TestGCPMatcherCheckAndSet", "TestSSHKeysEqual/rsaKey2!=ed25519Key2(0.0", "TestIsAtlasEndpoint/azure_private_link(0.00", "TestALPNDialer_getTLSConfig/no_update", "TestALPNDialer_getTLSConfig/", "TestIsValidIAMRolesAnywhereProfi", "TestEncodeDecodeRequireMFAType/OFF", "TestCheckerValidateFIPS/ECDSAP256", "FuzzParseDynamoDBEndpoint", "TestMatchSearch_ResourceSpeci", "TestResourceIDs/namespace_resource_name_with_missing_namespace_and", "TestTargetHealthStatusesAggregate/all_unkno", "TestParseMSSQLEndpoint/without_suffix", "TestParseRDSEndpoint/RDS_proxy", "TestParseRedshiftEndpoint", "TestIsValidPartition", "TestMetadataIsEqual/one_is_nil", "TestAzureMatcherCheckAn", "TestValidateJamfSpecV1/inventory_sync", "TestNewAutoUpdateVersi", "TestDynamoDBConfig", "TestResourceIDs/certificate_signing_request_reso", "TestDatabaseServerSorter/by_type_desc", "TestDatabaseServerSorter/by_name_asc", "TestResourceAttestationType_toAndFrom/tp", "TestUploadTraces", "TestNew/successfully_dial_tcp_address.", "TestSSHRouteMatcherScoring/ip_match_only", "TestValidate", "TestResourceAttestationType_toAndFrom", "TestResourceIDs/serv", "TestValidateUserTask/Disc", "TestAppServerSorter/by_description_desc", "TestRouteToServer/match_second_public_addr(0.", "TestAWSMatcherCheckAndSet", "TestRoleFilterMatch/empty_filter", "TestReadWriter_Write", "TestSelectNextReviewDate/one", "TestLegacyToResource153/marshal", "TestDisableUnqualifiedLookups/qualified_uuid", "TestValidateGitHubOrganizationName", "TestParseWeekdays/Empty_slice", "TestAllDeviceEnumsMapped/OSType/OS_TY", "Test_PluginOktaSyncSettings_SetUserSyncSource(", "TestRole_GetKubeResources/v8_deplo", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc", "FuzzParseCacheForRedisEndpoint/seed#0", "TestAWSIsEmpty/true_with_nested_unreco", "TestParseWeekdays/Nil_slice", "TestPluginOktaValidation/no_settings", "TestCircuitBreaker_Execute/error_remain", "TestOpenSearchConfig/invalid_AWS_", "TestWrapPayload/record", "TestLegacyKubeResou", "TestParseMismatchedPEMHeade", "TestGithubAuthRequestCheck/sso-test", "TestSelectNextRevie", "TestLockTargetEquals", "TestFlatten", "Test_PluginOktaSyncSetti", "TestDatabaseRDSEndpoint/valid_account_id", "TestNextAuditDateZeroTime", "TestKubeMatcherCheckAndSetDefaults", "TestAWSMatcherCheckAn", "TestNewJitter/SeventhJitter", "TestRequireKubeLocalProxy/kube_not_enabled(", "TestClient_DialCluster/grpc_connectio", "TestIsValidIAMRolesAnywhereProfileNam", "TestParseRDSEndpoint/RDS_cluster_reader(0.00", "TestParseReviewFrequency/1_MoNtH", "FuzzParseElastiCacheEndpoint/seed#21", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_Webauthn_empty/sf=opti", "TestIsValidIAMRolesAnywhereProfileName/v", "TestDatabaseElastiCacheEndpoint/valid_URI(0.00", "TestNormalizeLocation", "TestLicenseSettersAndGet", "TestPluginOpenAIValidation/no_credentials", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=local_and_pa", "TestDatabaseRDSEndpoint/discovered_instance(", "TestSecondFactorsFromLegacySecondFactor/otp(", "TestGetResources/SAMLIdPServiceProvider", "TestParseReviewDayOfMonth/last", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowPa", "TestResourceIDs/kube_node_resource_name_with_missing_namespace_and", "TestGetSortByFromString/hostname", "TestTake/drain_stream_of_size_n", "TestNewD", "TestSSHProxyHostPor", "TestCircuitBreaker_Exe", "TestPrivateKey/valid_protected", "TestContainSameUniqueElements/same_wit", "TestTargetHealthStatusesAggregate/all_empty(", "TestDatabasePermission", "TestCloning/*types.ServerV2", "TestResourceIDs/service_account_resource_name_in_cluster_with_slash/Resour", "FuzzParseDatabaseEndpoint/seed#0", "TestPluginDiscordValidation/Valid", "TestCircuitBreaker_afterExecution/g", "TestUnmarshallCreateDatabaseUserModeJSON", "TestPluginJamfValidation/", "TestConvertToPPK/ed25519_key_2", "TestCircuitBreaker_afterExecution", "TestValidateUserTask/DiscoverEKS:_valid", "TestRoleGitHubPermissions", "TestSSHProxyHostPort", "TestIsGCPEndpoint/localhost", "TestConvertToPPK/RSA_key_1", "TestListResources/ApplicationServer", "TestHardwareKeyAgentService/RSA2048_SHA512_PSSSaltLengthEqualsHash", "TestIsEC2NodeID/8_digit", "TestListResources/SAMLIdPServiceProvider(0.07s", "FuzzParseElastiCacheEndpoint/seed#20", "TestVa", "TestPingConnection/PingConn/Conc", "TestListResources/WindowsDesktop", "TestALPNDialer_getTLSConfig/get_cas_failed(0", "TestDatabaseGCPCloud", "TestURL/simple_read", "TestValidat", "TestClient_DialC", "TestAuthPreferenceV2_CheckAndSetDefaults_seco", "TestConversion/BadParameter", "TestResourceAttestationType_toAn", "TestLockTargetMatch", "TestIsAzureEndpoint/empty", "TestNewAutoUpdateAgentRollout/i", "TestPingConnection/PingConn", "TestAccessReviewConditionsIsEmpty/where", "TestResourceIDs/service_account_resource_name_with_missing_namespace/Resou", "TestParseMismatche", "TestOktaAssignments_SetStatus/suc", "TestIsValidGlueResourceName/symbols", "TestAppPortsValidation/end_port_smaller", "TestWrappedSSHConn", "TestHttpRoundTripperDowngrade", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_Webauthn_invalid", "TestNewAuthPreference_secondFa", "TestIsLoopback/Any_non-looback", "TestPlainHttpFallback/Pi", "TestDurationUnmarshal/large_+_small", "TestLicenseSettersAndGetters/Set_Sa", "TestLicenseSettersAndGetters", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_minim", "TestSelectNextReviewDate/one_mon", "TestIsValidAccountID/empty", "TestCollectPages/error-case", "TestMarshalAndParseKey/rsa", "TestAppPortsValidation/end_port_bigger_", "TestLoadKeyPair", "FuzzParseElastiCacheEndpoint/seed#13", "TestOktAssignmentIsEqual/finalized_is_dif", "TestNewClient/compliant_grpc_server", "TestMatchSearch/match_ignore_case", "FuzzParseDatabaseEndpoint/seed#2", "TestAuthPreferenceV2_Ch", "TestClient", "TestDatabasePermission/valid_permissions", "TestProvisionTokenV2_CheckAnd", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc_and_", "TestContextReader_ReadPassword/Close", "TestParseReviewFrequency/1_m", "TestDurationUnmarshal", "TestRolesCheck", "TestFromProtoNils/audit", "TestValidateAutoUpdateCon", "TestAppServerSorter/by_description_asc", "TestContextReader/simple_read", "TestIsResponseSuccessful/error", "TestNewDiscoverEKSUserTask", "TestSAMLForceAuthn_Encod", "TestIsALPNConnUpgrad", "TestNewAppV3/aws_app_CLI_only", "TestDeduplicateAny/empty_slice", "TestCircuitBreaker_beforeRequ", "TestProvisionTokenV2_Check", "TestPluginOpenAIValidation", "TestALPNConnUpgradeDialer/connect", "TestParseDynamoDBEn", "TestSSHRouteMatcherScoring/non-uuid_name", "TestAppPortsValidation/valid_", "TestParseReviewFrequency/1year", "TestContainSameUniqueElements/diffe", "TestMergeStreams/stream_A_empty", "TestIsLoopback/DNS_failure_should_return_f", "TestAppIsAWSConsole/Not_an_AWS_Console_URL(0.", "TestRole_GetKubeResources/v5:_popul", "TestMarshallCreateHostUserModeYAML", "TestParse/http://example.com:443", "TestIsOpenSSHNodeSub", "TestResourceIDs/no_cluster_nam", "TestResourceIDs/pod_resource_nam", "TestConversion/AlreadyExists", "TestReadWriter_WriteChunk", "TestPortRangesContains/0", "TestIsPortInRange", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowPas", "TestCircuitBreaker_failure", "TestProvisionTokenV2_CheckAndS", "TestGithubAuthRequestCheck/authenticated-us", "TestRetryWithMFA/with_interceptor(0.", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_second_facto", "TestTargetHealthStatusesAggr", "TestSSHKeysEqual/ed25519Key1!=rsaKey2(0.0", "TestExpiryConsistency/set", "TestProvisionTokenV2_CaseInsensitive", "TestParseReviewFrequency/1m", "TestNewAppV3/mcp_with_command", "TestOpenSearchConfig/AWS_URI_for_wrong_ser", "TestResourceIDs/resource_name_with_slash", "TestServerCheckAndSetDefau", "TestResourceMethods/GetOrigin", "TestPluginEmailSettings/(smtp)_valid_settin", "TestIsValidPartition/aws", "TestIsValidPartition/govcloud", "TestIterateResources", "TestValidateUserTask/DiscoverR", "TestDatabaseRDSProxyEndpoint", "TestConversion/AccessDenied", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowH", "TestParseWeekdays", "TestTake/full_stream", "TestNewDiscoverRDSUser", "TestIsALPNConnUpg", "TestIsResponseSuccessful/404", "TestResourceHeaderIsEqual/empty_equals", "TestParseCorruptedKey/PRIVATE_KEY", "TestProvisionTokenV", "TestRes", "TestIsAtlasEndpoint/public_endpoint_wi", "TestNewAutoUpdateConf", "TestHardw", "TestXxx/9d", "TestSSHKeysEqual/rsaKey2!=rsaKey1-alt(0.0", "TestReviewToProtoChanges", "TestGithubAuthRequ", "TestParseDynamoDBEndpoint", "TestValidateJamfSpecV1/api_endpoint_invalid(", "TestGithubAuthRe", "ExampleMap", "TestIsValidGlueResourceName/valid", "TestParseMemoryDBEndpoint", "TestHardwareKeyAgentService/RSA2048_SHA256_PSSSaltLengthEqualsHash", "TestSAMLForceAuthn_Encoding/FORCE_AUT", "TestUnifiedNameCompare/sort_by_same_kind", "Test_PluginOktaSyncSettings_SyncEnabledGetters/on_access_list", "TestParseReviewDayOfMonth/first", "TestIsEICE/eice_node_without_i", "TestIntegrationCheckA", "TestAzureMatcherCheckAndSetDefaults", "TestValidateJamfSpecV1/inventory_nil_entry(0.", "TestN", "TestGetPolicyFromSet/touch_and_pin_policy", "TestRoundtrip/with-subkind", "TestOktaAssignments_SetStatus/pro", "TestLockTargetEquals/equal", "FuzzParseRedshiftEndpoint/seed#2", "TestPortRangesContains", "TestIsEC2NodeID", "TestProvi", "TestNewDi", "TestIsPortInRange/outside_of_single_po", "TestAlertAcknowledgement_Check/success", "TestSSHKeysEqual/rsaKey2!=ed2", "TestLicenseSettersAndGetters/Set", "TestIsRequiredPolicyMet/hardware_key_touc", "TestValidatePortRange/end_port_bi", "TestGetTunnelType/default", "TestWindowsDesktopsSorter/by_addr_desc", "TestRe", "TestSecondFactorsFromLegacySecondFactor", "TestPingError/mangled_response", "TestOktaAssignments_SetStatus/unknow", "TestParseMemoryDBEndpoint/invalid_url", "TestLe", "TestDatabaseStatus", "TestDisableUnqualifiedLookups/foo.localhost(", "TestInstanceFilter/match-version-range", "T", "TestNewSAMLIdPServiceProvider/missin", "TestAssertAccessRequestImplementsResource", "TestParseReviewDayOfMonth/1", "TestDatabaseSelfHosted/ec2_hostname", "TestResou", "TestNewAppV3/aws_app_using_integration", "TestRole_GetKubeResources", "TestWatchKindContains/yes:_only_sub", "TestFromProtoNils/status", "TestDatabaseGCPCloudSQL", "TestGCPMatcherCheckAndSetDefaults/no_proj", "TestSelectNext", "TestOIDCClaimsRoundTrip/full", "TestNetIQPluginSettings/valid", "TestDatabaseServerSorter/by_description_asc(", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn", "TestIsLoopback/non-loopback_addr_sho", "TestParseRDSEndpoint/RDS_cluster", "TestCheckRoleARN/invalid_when_", "TestNewSAMLIdPServiceProvider/", "TestParse", "TestMarshalAndParseKey", "TestSAMLForceAuthn_Encodi", "TestEventEqual/empty_not_equal", "TestPingConnection/PingTLSCo", ":TestMetrics", "TestPlainHt", "TestParseTeleportRoles/Node", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHeadles", "TestSelectNextReviewDate/one_mont", "TestIsValidIAMPolicyName/invalid_symbols(0.", "FuzzParseElastiCacheEndpoint/seed#15", "TestEncodeDecodeRequireMFATy", "TestIsValidAthenaWorkgroupName/valid", "TestResourceIDs/certificate_signing_request_resource_name_in_c", "TestWithinUpgradeWindow/not_wit", "TestHardwareKeyAgentServi", "TestInstanceFilter/match-old", "FuzzParseDatabaseEndpoint/seed#3", "TestGetPolicyFromSet/none", "TestResourceHeaderRoundtrip", "TestNewAuthPreference_sec", "TestIsValidGlueResourceName/capital", "TestNil", "TestServerInfoSetLabels", "TestParseReviewFrequency/3months", "TestProvisi", "TestMFACeremony/NOK_prompt_mfa_fail", "TestAWSIsEmpty", "TestDisableUnqualifiedLookups/localhost", "TestAWSMatcherCheckAndS", "TestLegacyKube", "TestAppIsAWSConsole/CLI-only_AWS_App", "TestAccessRequestConditionsIsEmpty/annotat", "TestResourceI", "TestGetPartitionFromRegion", "TestChangePIN", "TestWatchKindContains/ye", "TestNewAutoUpdateAgentReport/ok", "TestPingConnection/PingConn/", "TestNewAppV3/aws_app_console", "TestRoundTripper_Ro", "TestProvisionTokenV2_CheckAndSetD", "TestDatabaseSpanner", "TestSSHKeysEqual/rsaKey1==rsaKey1-alt(0.0", "TestIsLoopback", "Test_PluginOktaSyncSe", "TestTargetHealthStatusesAggregate/one_mixed(", "TestWaitForConnectionReady", "TestValidateJamfSpecV1/inventory_all_", "FuzzParseOpensearchEndpoint/seed#4", "TestAuthP", "TestAu", "TestCheckerValidateFIPS/Ed25519", "TestDatabaseRedshiftEndpoint", "TestPluginEntraIDValidation/missin", "TestNewAutoUpdateVer", "TestParseOpensearchEndpoint/parses_valid_endpoint/op", ":TestSelectNextReviewDate/six_months,_last_day#02/type=\\\"__test_unknown__\\\"(0.0", "TestDatabaseSpanner/valid_without_uri", "TestXxx/9c", "TestIsValidIAMRoleName/empty", "TestIsEICE/agentless_openssh_node_is_not_ei", "TestParseWeekdays/Duplicated_day", "TestOIDCClaimsRoundTrip/empty", "FuzzParseMSSQLEndpoint/seed#0", "TestParseReviewFrequency/12m", "TestGetProxyAddress/3_2:_valid,_http_endpoint_can_be_set_in_h", "TestRole_GetKubeResources/v6_without_wildca", "TestSSHKeysEqual/rsaKey1==rsa", "TestWeekdayParser", "TestIsAtlasEndpoint/private_link", "TestParse/should_parse:_ip4-port", "TestAppIsAWSConsole/AWS_Standard", "TestRetryWithMFA/without_intercept", "TestRole_GetKubeResources/v7_with_a", "TestAuditUnmarshaling", "TestDatabaseElastiCacheEndpoint", "FuzzNormalizeLocation/seed#0", "TestResourceIDs", "TestIsAtlasEndpoint/public_endpoint", "TestServerSorter/by_name_desc", "TestFriendlyName", "TestFromProtoNils/owners", "TestEncodeDecodeRequireMFAType/OFF/decode(", "TestNewAutoUpda", "TestCheckRoleARN/valid_with_reso", "TestValidateUserTa", "TestDatabaseSpanner/invalid_missing_projec", "TestAccessRequestConditionsIsEmpty", "TestEventEqual/empty_equal", "TestRequireKubeLocalProxy/kube_us", "TestMFADevice_CheckAndSetDefaults/OK_OTP_", "TestClient_DialHost/st", "TestIsLoopback/degenerate_hostname", "TestLicenseSettersAndGetters/Set_Trial_Sup", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_deri", "TestProxyListenerModeMarshalYAML", "TestAWSMatcherCheckAndSetDefaults/invali", "TestFromEOF", "TestPluginOpsgenieValidation/no_settings", "TestIsValidIAMRolesAnywhereTrustAnchorName(0.", "TestServerSorter/by_hostname_asc", "TestRetryWithMFA_Reuse", "TestR", "TestDatabaseSpanner/invalid_missing_insta", "TestResourceIDs/multiple_ids/Resou", "TestTrimToMaxSize/with_metadata", "TestPluginEntraIDValidation/missing_de", "TestPluginJamfValidatio", "TestParseReviewFrequency/6", "TestOktAssignmentIsEqual/targets_different_", "TestValidatePortRange/port_bigger_tha", "FuzzParseRedshiftEndpoint/seed#0", "FuzzParseRDSEndpoint/seed#6", "TestParseRedshiftEndpoint/standard", "TestValidateUserTask/DiscoverE", "TestCircuitBreaker_Execute/no_er", "TestPr", "Test_PluginOktaSyncSettings_SetU", "TestIsALPNConnU", "TestParseReviewFrequency/1_year", "TestResourceHeaderIsEqual/kind_is_different(", "TestPluginAWSICSettings/missing_instance_ARN", "TestEncodeDecodeRequireMFAType/", "TestClient_DialHost/connection_successfully_established_wit", "TestSAMLForceAut", "TestPluginAWSICSettings/missing_provis", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHe", "TestEventEqual", "TestAppPublicAddrValidation/kubernetes_ap", "TestAuditUnmarshaling/without_ne", "TestParseReviewFrequency/12months", "TestSSHDialTimeout", "FuzzParseCacheForRedisEndpoint/seed#1", "TestServerSorter/by_addr_asc", "TestRoundtrip/draft", "TestResourceIDs/full", "TestAuthPrefere", "FuzzParseElastiCacheEndpoint/seed#12", "TestMatchSearch/match", "TestHa", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowPasswordl", "TestParsePrivateKeyPol", "TestMetadataIsEqual", "TestCircuitBreaker_afterExecutio", "TestCircuitBreaker_Execute", "TestPa", "TestNew/fail_to_dial_with_no_address_or_", "TestRole_GetKubeResource", "TestValidateAu", "TestGetPolicyFromSet/touch_policy", "TestDeduplicate/empty_slice", "TestReviewSpecUnmarshaling", "TestParsePrivateKeyPolicyError/random_er", "TestResourcesWithLabels_ToMap/simple_list(0.00", "FuzzNormalizeLocation", "TestSetEnvs/envs_set_individually(", "TestP", "TestInstanceFilter/match-all", "TestValidateJamfSpecV1/inv", "TestEncodeDecodeRequireMFAType/OFF/encode(", "TestExpiryConsistency/set_expiry/w", "TestClient_DialHost/grpc_connection_fail", "TestNewClient/does_not_implement_transp", "TestNewSAMLIdPServiceProvider/empty_entity_", "TestGetResourcesWithFilters", "TestGetResources/ApplicationServer", "TestDeduplicate/slice_with_duplicate_elemen", "TestGetProxyAddress/5_0:_valid,_http_en", "TestAgentUpgradeWindow", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Al", "TestInstanceFilter/match-new", "TestCloning/*types.AccessRequestV3", "ExampleIsALPNConnUpgradeRequired", "TestClusterCredentials/no_tls_auth_info(0", "TestPluginEntraIDValidation/empty_defaul", "TestDatabaseAzureEndpoints/valid_Redis", "FuzzParseOpensearchEndpoint/seed#3", "TestPluginOpsgenieValidation/no_api_endpint(", "TestValidateJamfSpecV1", "TestDatabaseAzureEndpoints/inva", "TestResourceHeaderIsEqual/one_is_nil", "TestWithinUpgradeWindow", "TestRouteToServer/match_first_public_addr(0.00", "TestOktAssignmentIsEqual/empty_equals", "TestResourceIDs/service_resource_name_with_missing_namespace_and_pod_", "TestResourceIDs/persistent_volume_claim_resource_name_with_missin", "TestGetAdminUser", "TestPingConnection/PingTLSConn", "TestAppIsAzureCloud", "TestUnmarshallCreateDatabaseUserModeYAML", "Te", "TestKubeMatcherCheckAndSetDefaults/valid", "TestDeduplicateAny/slice_with_duplicate_", "TestDatabaseAzureEndpoints/valid_PostgreSQL(", "TestContextReader", "TestResourceHeaderIsEqual/version_is_diffe", "TestGetProxyAddress/", "TestCheckRoleARN/invalid_when_resou", "TestParseOpensearchEndpoint", "TestIsTracingSupported/unsupported", "TestNewSAMLIdPServiceProvider", "TestURL/read_with_failed_validator", "TestTraces", "FuzzParseOpensearchEndpoint/seed#0", "TestGCPMatcherCheckAndSetDefaults/valid", "TestNotifyExit_restoresTerminal", "TestParseElastiCacheEndpoint", "TestParseReviewFrequency/12_month", "TestNewAppV3/non-cloud_app", "TestCheckAndSetDefaultsWithLink", "TestRole_GetKubeResources/v7_with_group", "TestResourceHeaderIsEqual", "TestCircuitBreaker_failur", "TestNewAuthPreference_secondFactors", "TestResourceHeaderIsEqual/subkind_is_diffe", "TestParseMismatchedPEMHeader/", "TestResourceMethods/GetRevision", "TestServerCheckAndSetDefaults", "TestSSHRouteMatcherHostnameMatching", "TestGetProxyAddr", "TestSAMLForceAuthn_Encoding/", "TestGetProxyAddress/5_1:_valid,_http_en", "TestDatabaseSpanner/valid_with_uri", "TestLegacy", "TestXxx/9e", "TestPluginEntraIDValidation/valid", "TestPluginAWSICSettings/(role", "TestNewDiscoverEKSUser", "TestTargetHealthStatusesAggregate/emp", "TestPingConnection/PingTLSConn/Buf", "TestSecondFactorsFromLegacySecondFactor/off(", "TestGetResourceDetails", "TestPluginOktaValidation/invali", "TestUnmarshallCreateHostUserModeYAML", "TestChangePIN/set_pin_default", "TestHardwareKeyAgentService/fa", "TestGetResourcesWithFilters/Node", "TestIsPortInRange/within_port_range", "TestGetMCPServerTransportType", "TestAzureMatcherCheckAndSetDefaul", "TestNewSAMLIdPServicePr", "TestX509KeyPair", "TestAppIsAWSConsole/AWS_China", "TestChangePIN/valid_pin,_valid_puk(0", "TestIsA", "TestMatchesWildca", "TestNewSAMLIdPServiceProvider/aw", "TestParseReviewFrequency/6month", "TestTrimMCPJSONRPCMessage", "TestResourceIDs/bad_cluster_name", "TestIsValidAccountID", "TestInt", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEndp", "TestLicenseSettersAndGetters/Set_IGS_Support", "TestIsValidIAMPolicyName", "TestParseReviewFrequency/1y", "TestIsAtlasEndpoint/public_endpoint_h", "TestDatabasePermission/empty_individua", "TestPingError", "TestEncodeDecodeRequ", "TestMetadataIsEqual/populated_equals", "FuzzParseElastiCacheEndpoint/seed#11", "TestRetryWithMF", "FuzzParseRDSEndpoint/seed#0", "TestMetadataZeroTime", "TestGetSortByFromString", "TestMySQLVersionValidation", "TestPluginJiraValidation/Missing_Credentials", "FuzzParseElastiCacheEndpoint/seed#17", "TestSecondFactorsFromLegacySecondFactor/on(0.", "TestGetPolicyFromSet/touch_policy_a", "TestContainSameUniqueElements/same", "TestPluginOpsgenieVali", "TestSSHKeysEqual/ed25519Key1!=rsaKey1(0.0", "FuzzParseDuration/seed#3", "TestAppPortsValidation/valid_overlapping_", "TestParseTeleportRoles", "TestPortRangesContains/20", "TestClient_DialHost/", "FuzzParseCacheForRedisEndpoint/seed#4", "TestResourceIDs/resou", "TestNewSAMLIdPServiceProvider/d", "TestServerSorter/by_hostname_desc", "TestFromProtoNils", "TestGetAdminUser/gets_admin_from_sp", "TestListResources/Node", "TestAuthPreferenceV2_CheckAndSetDefaults_secondF", "TestResourceIDs/service_resource_name_with_missing_namespace_and_pod", "TestPluginDiscordValidation", "TestPortRangesContains/42", "TestWithinUpgradeWindow/within_upgr", "TestServerCheckAndSetDefault", "TestIsValidGlueResourceName/too_long", "TestIsGCPEndpoint/compute_googleapis", "TestAWSMatcherCheckAndSetDefaults/valid", "TestDatabasePermission/empty_permission_list", "TestFromHeaderMetadata", "TestRateLimitFailure/simultaneous(0.00s", "TestTargetHealthStatusesAggregate/one_healt", "TestIsRequiredPolicyMet/hardware_key_pin(0", "FuzzParseMSSQLEndpoint/seed#1", "FuzzParseMSSQLEndpoint", "TestNewDialerForGRPCClient/Check_that_PROXY", "TestIsValidAccountID/invalid_chars", "TestIsValidIAMRoleName/only_one_symbol", "TestMatchSearch/match_with_custom_match", "FuzzParseElastiCacheEndpoint/seed#10", "TestGCPMatcherCheckAndSetDefaults/i", "TestAccessList_setIni", "TestUnifiedNameCompare", "TestIsAzureEndpoint/valid_endpoint", "TestDatabaseRDSEndpoint/aurora_instance", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_All", "TestValidateUserTask/Disco", "TestLinearV2", "TestOIDCClaimsRoundTrip", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowHeadle", "TestValidateAutoUpd", "TestNewAutoUpdateConfig/invalid_agents_nil_maintenance_window_with_time", "TestLegacyKubeRes", "TestIsMSSQLServerEndpoint/full_name", "TestSSHKeysEqual/ed25", "TestAuth", "TestSAMLForceAuthn/force_authn_yes", "TestIsValidRegion/symbols", "TestSSHKeysEqual/ed25519K", "TestContainSameUniqueElements/different", "TestNewSAMLIdPServiceProvider/missi", "TestUserGroupMatchSearch", "TestPluginEntraIDValidation", "TestResourceIDs/bad_resource", "TestResourceHeaderIsEqual/metadata_is_dif", "TestPluginJiraValidation", "Tes", "TestValidateJamfSpecV1/api_endpoint_em", "TestConversion/Aggregated_BadParameter", "TestDeduplicate/slice_with_unique_elements(0.", "TestProvisionTokenV2_CheckAndSetDe", "TestPluginJiraValidation/Valid", "TestTrimMCPJSONRPCMessage/not_trimmed(0.00s", "TestValidatePortRange/valid_port_range", "TestParseAtlasEndpoint", "TestCircuitBreaker_Execut", "TestResourceIDs/persistent_volume_resource_name_with_missi", "TestIsMSSQLServerEndpoint/wrong_suffix(0.00", "TestReviewFromProtoNils", "TestPluginOktaValid", "TestExpiryConsistency/zero_exp", "TestX509Certificate", "TestListResources/KubeServer", "TestConversion/ConnectionProblem", "TestSSHKeysEqual", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_U2F_minimal_c", "TestInput/closed_input", "TestDatabaseMemoryDBEndpoint/valid_URI", "TestHardwareKeyMethods", "TestRoleV6_CheckAndSetDefaults/spiffe:_valid", "TestIsValidIAMRolesAnywhereT", "TestSSHKeysEqual/rsaKey2!=rsa", "TestDatabaseServerSorter/by_type_asc", "TestParsePrivateKeyPolicyError/w", "TestIsALPNConnUpgrade", "TestPlainHttpFallback/Find", "TestInte", "TestResourceIDs/bad_cluster_na", "TestIsEC2NodeID/17_digit", "TestCircuitBreaker_", "TestParseAtlasEndpoint/private_link_wi", "TestChe", "TestOpenSearchConfi", "TestParsePrivateKeyPolicyError/unk", "TestRoundtrip/no-modifications(0.00", "TestNewDiscov", "TestParse/should_parse:_scheme-host-port", "TestIsAtlasEndpoint/domain_name_with_m", "TestCheckerValidateFIPS", "TestResourceIDs/cluster_role_resource_name_with_missing_namespac", "TestRole_AllowRe", "TestNewAccessGraphSettings/succe", "TestSSHKeysEqual/rsaKey1-alt==rsaKey1(0.0", "TestDatabaseElastiCacheEndpoint/invalid_URI(", "TestHardwareKeyAgentServ", "TestRoundtrip/implicit-dynamic-", "TestNetIQPluginSettings", "TestDurationUnmarshal/simple", "TestPrivateKey/invalid_public_key_ode(", "TestAuthPreferenceV2_CheckAndSetDefault", "TestApplicationGetAWSExternalID", "TestResource153ToLegacy/unwrap", "TestChangePIN/set_pin_short", "TestSAMLSecretsStrip", "TestResourcesWithLabels_ToMap/first_du", "TestResourceHeaderIsEqual/populated_equals(0.", "TestMFACeremony/OK_ceremony_not_required", "TestNewSAMLIdPServicePro", "TestParseCorruptedKey/EC_PRIVATE_KEY", "TestLockTargetMapConversions", "TestExpiryConsistency", "TestInventoryControlStreamPipe", "TestParsePriva", "TestAccessList_setInitialReviewDate", "TestSelectNextReviewDate/six_mon", "TestPluginJamfValidation/invali", "TestNewAppV3/empty_app", "TestGCPMatcherCheckAn", "TestIsValidIAMPolicyName/valid", "TestRequireKubeLocalProx", "TestValidateDatabaseName", "TestParseReviewFrequency/1_y", "TestConversion/NotImplemented", "TestInstanceControlLogExpiry", "TestAllDeviceEnumsMapped", "FuzzParseRDSEndpoint/seed#7", "TestPingConnection", "TestParseReviewFrequency", "TestIsMSSQLServerEndpoint/suffix_with_po", "TestMetadataIsEqual/empty_equals", "TestIsALPNConnUpgr", "TestRetryWithMFA_Reuse/ok_allow_r", "TestAppIsAzureCloud/Azure_Cloud", "TestWrapPayload", "TestResource", "TestParseCorruptedKey/RSA_PUBLIC_KEY", "TestIsValidRegion/us_region", "Test_PluginOktaSyncSettings_Set", "TestMatchSearch_ResourceSpecific/node", "TestParsePrivate", "TestGithubAuthRequestCheck/valid", "TestDatabaseMemoryDBEndpoint/invalid_URI", "TestIsAtlasEndpoint", "TestGetProxyAddress/1_2:_valid,_raw_host:port_works_for_https_with_spec", "TestParse/tcp://example.com:443", "TestAppPortsValidation/port_smaller_than_1(0.", "TestCountBy/empty_slice", "TestOpenSearchConfig", "TestAccessListMemberDefaults", "TestParseReviewDayOfMonth/unknown", "TestParseOpensearchEndpoint/parses_valid_endpoint/opensearch", "TestWithMemberIneligibleStatusField", "TestIsGCPEndpoint/fake_googleapis", "TestIsValidAthenaWorkgroupName/empty", "TestCloneProtoMsg", "FuzzParseElastiCacheEndpoint/seed#9", "TestParseReviewFrequency/1_month", "TestMetadataIsEqual/expires_m2_nil", "TestSSHKeysEqual/rsaKey1==rsaKey1", "TestIsOpenSSHNodeSubKind", "TestToGRPC_statusError", "FuzzParseRDSEndpoint/seed#3", "TestIsResponseSuccessful", "TestIsEICE/eice_node_wit", "TestGetSortByFromString/#00", ":TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_Webauthn_missing_RPID", "TestNewAutoUpdateAgentRollout", "TestAllDeviceEnumsMapped/OSType/O", "TestDeleteUserLoginState", "TestDatabaseRDSEndpoint/invalid_account_id(0.", "TestClient/server_does_not", "TestCheckAndSetDefaultsWithLink/invalid_link", "TestAuthPreferenceV2_CheckAndSetDefaults", "TestNewSAMLI", "TestFromMap/map_with_multiple_entries", "TestSSHKeysEqual/rsaKey1!=ed25519Key1(0.0", "TestAuditMarshaling", "TestGetAdminUser/no_admin", "TestLoadIdentityFileFromString", "TestIsValidAccountID/valid_account_id", "TestValidateAutoUpdateConfig", "TestParse/should_parse:_host-port", "TestFromProtoNils/owner_grants(0.00", "TestMemberRoundtrip", "TestHttp", "TestParseReviewFrequency/12month", "TestRole_GetKubeResources/v7_with_error", "TestIsValidIAMRoleName", "TestDisableUnqualifiedLookups", "TestClusterCredentials/no_server_cert(0.00s", "TestValidateJamfSpecV1/spec_with_inventory(0.", "TestLicenseSettersAndGetters/Set_Mach", "FuzzParseMSSQLEndpoint/seed#3", "TestRole_GetKubeResources/v7_with_deny_n", "TestDeduplicate", "TestIsALPNConnUpgradeRequiredByEnv", "TestNewJitter/HalfJitter", "TestParseReviewFrequency/1month", "TestSSHKeysEqual/rsaKey1!=ed25519Key1-", "TestParsePrivateKeyPoli", "TestPlainHttpFallback/Ping", "TestNewAppV3/non-cloud_app_#2", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_second_factor_not", "TestParseTeleportRoles/windowsdesktop", "TestGetTunnelType/okta", "FuzzParseRDSEndpoint/seed#1", "TestIntegrationJSONMarshalCycle/aws-ra", "TestIsValidRegion", "FuzzParseDynamoDBEndpoint/seed#2", "TestParse/should_parse:_scheme-ip4-port", "TestValidateAssumeStartTime", "TestKubeClustersSorter", "TestProvisionTokenV2_Ch", "TestWrapPayload/", "TestLicenseSettersAndGetters/Set_ReportsUsa", "TestParseRDSEndpoint/localhost:5432", "FuzzParseOpensearchEndpoint/seed#5", "TestRouteToServer/match_by_hostname_over_", "TestIsAzureEndpoint/valid_endpoint_prefix", "TestMatchSearch/match_with_nil_search_values", "TestIsPortInRange/equal_to_range_end", "TestWatchKindContains/no:_subset_has_wi", "TestParseCorruptedKey", "TestPluginOktaVa", "TestX509Certificate/rsa_certs", "TestOpenSearchConfig/missing_account_is_", "TestPlainHttpFallback/Find/Den", "TestPluginDiscordValidation/Invalid_C", "TestOpenSearchConfig/custom_UR", "TestNewAppV3", "TestConvertToPPK/RSA_key_2", "Test_PluginOktaSyncSettings_SyncEnabledGetters/on_user_sync_enabled_", "TestProvisionTokenV2_CheckAndSetDefaults/e", "TestInvalidDesktopName", "TestResourceIDs/persistent_volume_resource_name_with_missin", "TestDatabaseRDSEndpoint", "TestResourceIDs/certificate_signing_request_resou", "TestCassandraEndpointRegion/invalid_uri(0.00", "TestAlertAcknowledgement_Check", "TestLockTargetEquals/not_equal", "TestSSHKeysEqual/rsaKey1-alt!=ed25519K", "TestAuthorizedKey/valid", "TestExponential", "TestValidateAssumeStartTime/valid_start_time", "TestAWSMatcherCheckAndSetDefaults/defaul", "TestAccessRequestConditionsIsEmpty/empty", "TestIsEICE/eice_node_without_ac", "TestWatchKindConta", ":TestValidateUserTask/DiscoverRDS:_databases_-_missing_database_name_in_metadata", "TestAppIsAzureCloud/not_Azure_Cloud", "TestPortRangesContains/10", "TestURL", "TestValidateUserTask/nil_user_task", "TestParseElastiCacheEndpoi", "TestNewAutoUpdateV", "TestSSHKeysEqual/rsaKey1-alt!=ed25", "TestLegacyK", "TestExpiryConsistency/nil_expiry", "FuzzParseElastiCacheEndpoint/seed#1", "TestIsOpenSSHNodeSubKind/another_value", "TestClusterMaintenanceConfigDefault", "TestNewAuthPref", "TestResourceIDs/multiple_ids/Reso", "TestSSHKeysEqual/rsaKey1-alt!=rsaKey2(0.0", "TestOktaAssignments_SetStatus", "TestOktAssignmentIsEqual/nil_equals", "TestAWSIsEmpty/false", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=loc", "TestResourceIDs/bad_cluster_n", "TestParseMemoryDBEndpoint/CN_endpoint", "TestServerSorter", "TestResources/paginator_error", "TestLegacySecondFactorFromSecondFactors", "TestGetResourcesWithFilters/KubeServer", "FuzzParseDynamoDBEndpoint/seed#1", "TestParseAtlasEndpoint/azure_private_link", "TestIsResponseSuccessful/200", "TestAssertionInfo_RoundTrip/full", "TestInput", "TestDatabasePermission/wildca", "TestTargetHealthStatusesAggregate/all_unh", "FuzzParseRedshiftEndpoint/seed#4", "TestNewAppV3/app_with_required_apps_list", "TestResourceIDs/servi", "FuzzParseRDSEndpoint/seed#13", "TestIsALPNCon", "TestResource153ToLegacy/marshal", "TestIsValidRegion/eu_region", "TestMergeStreams/stream_B_empty", "TestSAMLForceA", "TestIsValidIAMRoleName/valid", "TestServerSorter/by_name_asc", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_Webauthn_i", "TestListResources/DatabaseServer", "TestIsGCPEndpoint", "TestOktAssignmentIsEqual/targets_differen", "TestEncodeDecodeRequireMFAType/SE", "TestParseRDSEndpoint", "TestIsAtlasEndpoint/azure_private_l", "TestParseDocumentDBEndpoint/Docuement", "TestParseReviewFrequency/3m", "TestIsTracingSupported", "TestRole_AllowRequestKubernetesResource", "TestDynamicIdentityFileCreds", "TestWatch", "FuzzParseElastiCacheEndpoint/seed#8", "FuzzParseRDSEndpoint", "TestRoleFilterMa", "TestRoleV6_CheckAndSetDefaults/sp", "TestResourceIDs/per", "TestWebClientClosesIdleConnections", "TestNewAppV3/azure_app", "TestAppPortsValidation/invalid_uri", "TestClient_DialHost/connection_terminated_when_receive_returns_an_er", "TestInput/no_whitespace", "FuzzParseRDSEndpoint/seed#5", "TestAzureMatcherCheckAndSetDefaults/valid(0.00", "TestXxx/9a", "TestRoundTripper_RoundTrip", "FuzzParseElastiCacheEndpoint/seed#6", "TestContextReader_ReadPassword", "TestOktAssignmentIsEqual", "TestGRPCErrorWrapping/stream_i", "TestPrivateKey_EncodeDecode", "TestResourceNames", "TestEncodeDecodeRequireMFAType/HARDWARE_K", "TestParse/empty_addr", "TestValid", "TestMatchesWildcard", "TestSelec", "TestCassandraAWSEndpoint", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_type", "TestGetSortByFromString/name:desc", "TestProvisionTok", "TestContainSameUniqueElements/sam", "TestParseWeekdays/Few_valid_days", "TestMFADevice_CheckAndSetDefaults/OK_U2F_", "TestParseWeekdays/Wildcard", "TestIsValidRegion/us_gov", "TestGet", "TestParseRDSEndpoint/RDS_cluster_cus", "TestLinearRetryMax/SeventhJitter", "TestPrivateKey/valid_file", "TestOktAssignmentIsEqual/user_is_different(0.", "TestParseWeekdays/Invalid_days", "TestX509KeyPair/rsa_certs", "TestParseCorruptedKey/RSA_PRIVATE_KEY", "TestApplicationGetAWSRolesAnywhereProfile", "TestProvisionTokenV2", "TestWatchKindContains/yes:_subse", "TestRoleV6_CheckAndSetDefaults/spiffe", "TestAccessRequestFilter", "TestHardwareKeyAgentS", "TestDatabaseSelfHosted/localhost", "TestParseMismatchedPEMHe", "TestParseMSSQLEndpoint/wrong_suffix", "TestProxyAwareRoundTripper", "TestGetCloudMetadataAWS/no_cloud_metadata(0.00", "TestClusterCredentials/handshake_error(0.0", "TestAppServerSorter/by_publicAddr_desc", "TestPluginAWSICSettings", "TestDisableUnqualifiedLookups/unqualif", "TestSemVersion", "TestTargetHealthStatu", "TestAppIsAWSConsole", "TestResourceIDs/resour", "TestClient_DialHost/grpc_connectio", "TestMFADevice_CheckAndSetDefaults/OK", "TestCassandraEndpointRegion/cn-north-1.(0.00", "TestOktAssignmentIsEqual/targets_o1_is_nil(0.", "TestALPNDialer_getTLSConfig/cas_updated", "TestAWSIsEmpty/true", "TestParseReviewFrequency/unknown", "TestDatabaseAzureEndpoints/valid_MySQL", "TestParseReviewFrequency/6_m", "TestPluginJamfValidation/no_settings", "TestPluginJamfValidation", "TestMatchesWildcard/Wildcard_match", "FuzzParseElastiCacheEndpoint/seed#4", "TestAllD", "TestLegacyKubeResourceIDs/certificate_signing_request_resource_na", "TestEncodeDecodeSecondFactor", "TestCheckRoleARN/valid_even_if_regio", "TestSSHRouteMatcherScoring/hostname_match_", "TestLicenseSettersAndGetters/", "FuzzParseDynamoDBEndpoint/seed#5", "TestIsAtlasEndpoint/private_link_with_srv", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_OTP_secon", "FuzzParseCacheForRedisEndpoint", "TestGetProxyAddress/5_2", "TestGetResources", "TestALPNConnUpgradeDialer", "TestIsLoopback/localhost_with_port_", "TestJoinServiceClient_RegisterUsingTPMMethod(0", "TestCheckerValidateFIPS/RSA2048", "TestMetadataIsEqual/id_and_revision_ha", "TestPingConnection/PingTL", "TestAuthorizedKey/missing_HostID", "TestSetEnvs", "TestA", "TestParseMismatch", "TestPrivateKey", "TestValidateGitHubOrganizationName/a", "TestSSHKeysEqual/rsaKey1!=rsaKey2", "TestAppPortsValidation/uri_specifies_port(0.00", "TestRole_GetKubeResources/v7_deny", "TestResourceIDs/persistent_volume_claim_resource_name_with_missing", "TestDynamoDBConfig/missing_account_id", "TestResource153ToLegacy", "TestAccessReviewConditionsIsEmpty/roles", "TestRetryWithMFA", "TestResourceIDs/kube_node_resource_name_in_cluster_with_slash/ResourceIDsFromStr", "TestIsAzureEndpoint/invalid_endpoint", "TestSAMLACSURIHasConnectorName", "TestDeduplicateKubeClusters", "TestIsValidRegion/invalid_country_code", "TestValidateUserTask/invalid_task_type(", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnec", "TestResourceIDs/bad_resource_kind", "TestAllDeviceEnumsMapp", "TestIsResponseSuccessful/500", "TestContainSameUniqueElements", "TestDynam", "TestParseElastiCacheEndpoint/", "TestParseSessionsURI", "TestValidateJamfSpecV1/inventory_on_m", "TestIsEICE/regular_node_not_eice", "TestServerCheckAndSetDefaults/Teleport_node(", "TestCheckerValidateFIPS/ECDSAP224", "TestGitServerOrgDomain", "TestCircuitBreak", "TestConvAccessList/nil_grants", "TestSelectN", "FuzzParseMSSQLEndpoint/seed#5", "TestChangePIN/set_puk_mismatch", "TestIsValidLabelKey/alphanumeric_key", "TestWatchKindContains/yes:_subset_h", "TestAppPublicAddrValidation", "TestToMap/slice_with_one_label", "TestParseTeleportRoles/Auth,Auth", "TestPluginEntraIDValidation/missing_syn", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_type=loc", "TestAuthorizedKey/missing_user", "TestExpiryConsistency/set_expir", "TestConversion/os.ErrNotExist", "TestLoadProfile/non_existent_profile", "TestIsOpenSSHNodeSubKind/regular_node", "TestMergeStreams", "TestParseMSSQLEndpoint/more_seg", "TestResour", "FuzzParseRedshiftEndpoint/seed#5", "TestProvisionTokenV2_CheckAn", "TestAuthPreferenceV2_CheckA", "TestLinearRetryMax", "TestPingConnection/PingConn/BufferSiz", "TestOktAssignmentIsEqual/cleanup_time_", "TestClient_DialHost/connection_successfully_established_with_a", "TestClient/server_supports_tracing", "TestMFADevice_CheckAndSetDefaults", "TestPluginEmailSettings/(smtp)_no_cre", "TestValida", "FuzzParseElastiCacheEndpoint/seed#3", "TestResourceIDs/service_account_resource_name_with_missing_na", "TestWindowsDesktopsSorter/by_name_desc", "TestNewAutoUpdateVe", "TestDatabaseAzureEndpoints", "TestSelectNextRevi", "TestDatabaseServersToDatabases", "TestClient_C", "TestPluginAWSICSetting", "TestRole_GetKubeResources/v6_with_wildcard(0.", "TestCountBy", "TestNewAccessGraphSettings", "TestVersionShorthand", "TestConvAccessList", "TestDisableUnqualifiedLookups/qualified_", "TestSSHRouteMatcherScoring/multi_factor_mat", "TestRole_Allow", "TestPluginAWSICSettings/(legacy)_system_credentials_source_migrated_to", "TestGCPMatcherCheckAndSetDefaults/defaul", "TestMetadataIsEqual/labels_is_different", "TestAllDeviceEnumsMapped/OSType", "TestRequireKubeLocalProxy/local_proxy_re", "TestIsMSSQLServerEndpoint/only_suffix", "TestIsResponseSuccessful/nil_error", "FuzzParseElastiCacheEndpoint/seed#0", "TestMetadataIsEqual/description_is_different", "TestLegacyToResource153/unwrap", "TestMergeStreams/interlaced_streams(0", "TestAllDeviceEnumsMapped/Devi", "TestRouteToServer/match_public_addr_w", "TestParseMismatchedPEMHeader", "TestIsLoopback/multiple_loo", "TestRoundtrip/deprecated-dyna", "TestRole_AllowRequestKubernetesRe", "TestParseAtlasEndpoint/public_endpoint(0.00", "TestToMap/slice_with_multiple_la", "TestParseMemoryDBEndpoint/TLS_ena", "TestDatabaseServerSorter/by_name_desc", "TestWithinUpgradeWindow/within_upgrade_wind", "TestPluginOpenAIValidation/valid_cre", "TestNewAppV3/app_with_basic_CORS_policy", "TestPluginAWSICSetti", "TestIsResponseSuccessful/codes.Unknown_err", "TestOpenSearchConfig/custom_URI_wi", "FuzzParseDynamoDBEndpoint/seed#0", "TestParseRDSEndpoint/RDS_proxy_custom_", "TestUploadTraces/successfully", "TestMetadataIsEqual/name_is_different", "TestSSHKeysEqual/rsaKey1!=ed2", "TestNewJitter/FullJitter", "TestIntegrationCheckAndSetDefaults", "TestHttpRoundTripperExtraHeaders", "TestMFADevice_CheckA", "FuzzParseRDSEndpoint/seed#12", "TestWithOwnersIneligibleStatusField", "TestEmpty", "TestProvisionTokenV2_CheckAndSetDefaul", "TestResourceIDs/service_resou", "TestRouteToServer", "TestNetIQPluginSettings/missing_ApiEndpoint(", "TestIsValidGlueResourceName/hyphen", "TestParseDocumentDBEndpoint/DocuementDB_CN", "TestIsValidGlueResourceName", "TestMFACeremony_SSO", "TestParseOpensear", "TestAlertSorting", "TestIsValidRegion/valid_format", "TestMetadataIsEqual/expires_is_different", "TestAuthPreferenceV2_CheckAndSetDefau", "TestURL/read_with_validator", "TestNew/syn", "TestRouteToServer/mismatch_public_", "TestInstanceFilter/match-proxies", "TestNewS", "TestRole_AllowRequestKubernet", "TestTake", "TestFriendlyName/no_friendly_name", "TestNewAppV3/invalid_cloud_identifier", "TestProvisionTokenV2_CheckA", "TestValidateAutoUpdate", "TestAccessListMe", "TestNewAuth", "TestParseReviewFrequency/3_m", "TestPingConnection/PingTLSCon", "TestRotationZero", "TestServerInfoSetLabels/fix_aws_labels", "TestDatabasePermission/wildcard", "TestAppPortsValidation", "TestRoundtrip/cluster", "TestProxyListenerModeUnmarshalYAML", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConn", "TestNewWebClientHTTPProxy", "TestWatchKindContains/no:_kind_and", "TestToGRPC_statusError/wrapped_status", "TestGetProxyAddress/4_2:_valid,_socks5_endpoint_can_be_set_", "FuzzParseDuration/seed#1", "TestAppServerSorter/by_publicAddr_asc", "TestUploadTraces/error_uploading_s", "TestMatchSearch_ResourceSpecific", "TestConversion", "TestRole_AllowRequestKubernete", "TestLinearRetryMax/HalfJitter", "TestDynamoDBConfig/custom_UR", "TestHardwareKeyAgentSer", "TestAWSMatcherCheckAndSetDefaults", "TestRole_GetKubeResources/v7_with_labe", "TestParse/example.com:443", "TestIsResponseSuccessful/other_error", "TestRetryWithMFA_Reuse/nok_di", "FuzzParseOpensearchEndpoint/seed#1", "TestProvisionTokenV2_CheckAndSetDefaults", "TestNewSAMLIdPService", "TestParse/should_parse:_ip6-port", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowP", "TestX509Certificate/no_cert", "TestIsValidIAMRolesAnywhereProfileName", "TestNewDiscoverRDSUserTask", "TestSSHKeysEqual/ed25519Key1-alt!=", "TestNewAppV3/mcp_demo", "TestIsEC2NodeID/foo", "TestRole_GetKubeResources/v8_deny", "TestFromMap/empty_map", "TestIsRequiredPolicyMet/none", "TestCountBy/even-odd", "TestAccessList_se", "TestPrivateKey/missing_fingerprint_fi", "TestOktAssignmentIsEqual/last_trans", "TestIsValidRegion/empty", "TestValidateUserTask/DiscoverEC2:_valid", "TestResourceIDs/service_account_resource_name_with_missing_n", "TestNewDiscove", "TestHardwa", "TestExpiryConsistency/zero_expi", "TestNewSAMLIdPServiceProvider/valid", "TestCheckRoleARN/valid", "TestRoundTripper_RoundTrip/error_when_tri", "FuzzNormalizeLocation/seed#4", "TestParseMemoryDBEndpoint/TLS", "TestData", "FuzzParseRDSEndpoint/seed#4", "TestSSHRouteMatcherScoring/not_match", "TestDatabaseMemoryDBEndpoint", "TestOpenSearchConfig/U", "TestMatchSearch_ResourceSpecific/kube_server", "TestIsALPN", "TestUnmarshallCreateHostUserModeJSON", "TestReviewRoundtrip", "TestHardwareKeyAgentServic", "TestRouteToServer/match_addr_with_empty_port", "TestFromProtoNils/recurrence", "TestParseDocumentDBEndpoint", "TestParseAtlasEndpoint/azure_pri", "TestAuthPreferenceV2_C", "TestAWSMatcherCheckAndSetDefaults/invalid_", "TestIsAutoUsersEnabled", "TestParseSessionsURI/other_scheme", "TestAllDeviceEnumsMapped/OSType/OS_TYPE", "TestParseMSSQLEndpoint/without_port", "TestIsRequiredPolicyMet/hardware_", "TestSSHKeysEqual/rsaKey2==rsaKey2", "TestRole_GetKubeResources/v7_without_group(0.", "TestIsRequiredPolicyMet", "TestIsValidIAMPolicyName/all_symbols", "TestPluginWithoutSecrets", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_type=loca", "TestAll", "TestResourceIDs/cluster_", "TestHardwareKeyA", "TestParseTeleportRole", "TestClient_ClusterDetails/cluster_detail", "TestParse/https://", "TestDynamoDBConfig/account", "TestValidateJamfSpecV1/nil_spec", "TestValidatePortRange/end_port_smaller_", "TestIsEC2NodeID/uuid", "TestIsValidIAMPolicyName/only_one_symbol(0.", "TestGetUserLoginStates", "TestFromMap/map_with_one_entry", "TestIsRequiredPolicyMet/hardware_key", "TestValidatePortRange/valid_single_port(0.00", "TestValidateGitHubOrganizatio", "TestNewDiscovery", "TestIsValidGlueResourceName/empty", "TestProvisionTokenV2_", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_AllowPasswordless", "TestProvisionTokenV2_CheckAndSetDef", "FuzzParseRedshiftEndpoint", "TestShortRegionToRegion/valid_regions", "TestPluginAWSICSet", "TestPluginMattermostValidation/no_server_url", "TestSel", "TestResourceMethods/GetKind", "TestParseTeleportRoles/Auth,_auth", "TestGetCloudMetadataAWS/clo", "TestIsAzureEndpoint/invalid", "TestWindowsDesktopsSorter", "TestResourceIDs/pod_resource_name", "TestGroupByTargetHealth", "TestConversion/LimitExceeded", "TestIsLoopback/localhost_should_return_true(", "TestWindowsDesktopsSorter/by_name_asc", "TestCheckRoleARN/empty_string", "TestCountBy/identity", "Test_PluginOkt", "TestRoleV6_CheckAndSetDefaults/spi", "TestEncodeDecodeSecondFactorType/", "TestNewDiscoveryConfig", "TestParseWeekdays/Every_day", "TestMergeStreams/compare_always_f", "TestEncodeDecodeRequireMFAType/SESSION", "TestParseMismatchedPEMHead", "TestGetPolicyFromSet", "TestMFAPerRPCCredentials", "TestInstanceFilter/match-kube-upgrader", "TestGCPMatcherCheckAndSetDefaults/invalid_", "TestRouteToServer/no_match", "TestResourceIDs/namespace_r", "TestRedshiftServerlessEndpoint/work", "TestAuthPreferenceV2_CheckAndSetDefaults_second", "TestNewAutoUpdateAgentRol", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_Webauthn_empty/sf=weba", "TestNewAuthPreference_secondFac", "FuzzParseElastiCacheEndpoint/seed#14", "TestMatchSearch_ResourceSpecific/application", "TestIAMPolicyStatusJSON", "TestDeduplicateAny", "TestIsGCPEndpoint/top_level_googleapis", "TestProvisionTokenV2_Che", "TestResourceIDs/bad_resource_", "TestShortRegionToRegion/invalid_prefix", "FuzzParseElastiCacheEndpoint/seed#19", "TestPluginDiscordValidation/Missing_Crede", "TestGCPMatcherCheckAndSetDefaults/no_type(0.00", "TestEncodeDecodeSecondFactorType", "FuzzParseElastiCacheEndpoint/seed#5", "TestNewAutoUpdateConfig/invali", "TestPluginAWSICSettings/missing_pro", "TestSSHKeysEqual/ed25519Key1!=rsaKey1-", "TestAzureMatcherCheckAndSetDefaults/de", "TestNewAutoUpd", "TestParseReviewFrequency/1months", "TestSSHKeysEqual/rsaKey1-", "TestSSHKeysEqual/ed25519Key1-", "TestOpenSearchConfig/no", "TestIsMSSQLServerEndpoint/empty", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_Webauthn_", "FuzzParseDuration/seed#0", "TestNewDisco", "TestMFADevice_Unmarshal", "TestIsValidAthenaWorkgroupName/symbols", "TestIsResponseSuccessful/codes.Unavail", "TestIsValidIAMRolesAnywhereTrustA", "TestLegacyKubeResourceIDs", "TestPrivateKey/valid_derived", "TestCassandraEndpointRegion/us-gov-east-1(", "TestLegacyToResource153", "TestGetAdminUser/gets_admin_from_spec", "TestFriendlyName/friendly_node_name", "TestMFACeremony", "TestWatchKindContains/no:_subset_f", "TestMapErr", "TestParseTeleportRoles/invalidrole", "TestPluginOktaValidation/i", "TestProvisionTokenV2_GetSafeNam", "TestGetCloudMetadataAWS", "TestIsValidIAMPolicyName/empty", "TestResourceIDs/pod_resource_", "TestGetResources/WindowsDesktop", "TestSSHKeysEqual/rsaKey2!=ed25519Key1-", "TestClusterCredentials/cluster_name_", ":TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_second_factor_enforced", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_Webauthn_", "TestCheckerValidateFIPS/RSA1024", "TestPluginOktaValidation/valid_values", "TestLinearRetryMax/NoJitter", "FuzzNormalizeLocation/seed#3", "TestGetSortByFromString/hostname:asc", "TestTargetHealthStatusesAggregate/one_unkno", "TestAccessList_setInit", "TestDatabaseOracleRDS", "TestConvertToPPK/ed25519_key_1", "TestSSHKeysEqual/rsaKey1-alt==rsaKey1-", "TestLicenseSettersAndGetters/Set_Cloud", "TestTargetHealthStatusCanonic", "TestReviewSpecMarshaling", "TestLinearRetryMax/FullJitter", "TestPrivateKey_Prompt", "TestResourceMethods/SetRevision", "TestMarshalAndParseKey/ecdsa", "TestALPNDialer_getTLSConfig/name_updated(0.00s", "TestOktAssignmentIsEqual/targets_o2_is_nil(0.", "TestChangePIN/no_input", "TestClient_DialClus", "TestValidateUserTask/DiscoverRDS:_databases_-_missing_database_name_in_map_key(", "TestNew/fail_to_dial_with_a_bad_address.(1.01s", "TestParseElastiCache", "TestIsValidAccountID/unicode_digit_is_i", "TestServerInfoSetLabels/leave_other_labe", "TestClusterCredentials/no_cluster_oid_se", "TestMemberFromProtoNils", "TestGetUserLoginState", "TestNewAppV3/app_with_no_CORS_policy", "TestValidateUserTask/Discover", "TestClientSecretFileURI", "TestDurationUnmarshal/combined_large", "TestNewDiscoveryConfig/valid", "TestMatchSearch_ResourceSpecific/windows", "TestTargetHealthStatusCanonical", "TestProvisionTo", "TestRoleFilterMat", "TestNewAutoUpdateAgentRollout/missi", "TestRedshiftServerlessEndpoint/localhos", "TestPluginJamfValidation/no_credentials_inn", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConne", "TestMetrics", "TestResourceIDs/pod_resource", "FuzzParseOpensearchEndpoint", "TestParseRDSEndpoint/RDS_instance_in_", "TestRouteToServer/mismatch_addr_with_wron", "TestParseAtlasEndpoint/public_endpo", "FuzzParseElastiCacheEndpoint/seed#7", "TestResourceIDs/", "TestMetadataIsEqual/expires_m1_nil", "TestLinear", "TestCheckerValidateFIPS/ECDSAP384", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=oidc_a", "TestIsPortInRange/equal_to_range_start", "TestNewAppServerForAWSOIDCIntegration", "TestToGRPC_statusError/unwrapped_status", "TestChangePIN/set_pin_mismatch", "TestDatabaseAzureEndpoints/invalid_d", "TestClient_DialCluster/grpc_con", "TestParse/should_not_pars", "TestGetProxyAddress/9_2:_valid,_no_proxy_matches_host_but_not_port", "TestProvisionTokenV2_C", "TestMapToStrings", "TestResourceIDs/bad_resource_name", "TestSSHKeysEqual/rsaKey2!=rsaKey1", "TestResourceAttestationType_toAndFrom/tpm", "TestPingConnection/PingConn/Con", "TestDatabaseServerSorter/by_description_desc", "TestParseReviewFrequency/12", "TestSessionTrackerV1_UpdatePresence", "TestChangePIN/set_puk_short", "TestIsPortInRange/bigger_than_range_end(0.00", "TestNewAutoUpdateAgentReport", "TestSlice", "TestCollectPages/empty-case", "TestIsOpenSSHNodeSubKind/openssh_u", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/NOK_Al", "TestReadWriter_Read", "TestIsPortInRange/equal_to_end_of", "TestServerCheckAndSetDefaults/T", "TestCollectPages", "TestMatchesWildcard/Wildcard_mismatch(0.0", "TestServerCheckAndSetDefaults/nod", "FuzzParseElastiCacheEndpoint/seed#2", "TestGetPartitionFromRegion/cn-north-1", "TestAppServerSorter/by_name_asc", "TestMatchSearch/no_match", "TestPluginEmailSettings/no_email_spec", "TestGetProxyAddress/8_2:_valid,_no_proxy_blocks_matching_port_with_spec", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_type=local_an", "TestDatabaseSelfHosted", "TestAllDeviceEnumsMapped/DeviceOrigin", "TestMetadataRoundtrip", "FuzzParseCacheForRedisEndpoint/seed#3", "TestSecondFactorsFromLegacySecondFactor/#00(", "TestIsValidAthenaWorkgroupName", "TestIterateResources/success", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor", "TestParse/file://host/path", "TestCircuitBreaker_Execute/no_error_", "TestServerCheckAndSetDefaults/", "TestGetProxyAddress", "TestDatabaseAzureEndpoints/valid_Redis_", "TestParseTeleportRoles/Admin,invalidrole", "TestEncodeDecodeRequireMFAType/HARDWARE", "TestAccessReviewConditionsIsEmpty/empty", "TestXxx/invalid_uint", "TestRoundTripper_RoundTrip/success_in_sta", "TestGetPartitionFromRegion/us-west-1", "FuzzParseRDSEndpoint/seed#10", "TestGetProxyAddress/6_0:_valid,_http_endpoi", "Test_PluginOktaSyncSetting", "TestParse/should_parse:_host/path", "TestValidateA", "TestRouteToServer/mismatch_hostname_over_", "TestPlainHttpFallback/Ping/Den", "TestPrivateKey/missing_DeviceId", "FuzzParseRedshiftEndpoint/seed#3", "TestSelectNe", "TestGetPolicyFromSet/hardware_key_policy(0", "TestDynamoDBConfig/accou", "TestConvertToPPK/ecdsa_key", ":TestLegacyKubeResourceIDs/certificate_signing_request_resource_name_in_cluster_", "TestMemberFromProtoNils/spec", "TestWatchKindContains/yes:_superset_", "FuzzParseDatabaseEndpoint/seed#4", "TestMetadataIsEqual/nil_equals", "TestIsSSHCert/opensesame@openssh.com", "TestEncodeDecodeRequireMFAType/SESSION/", "TestPluginOktaValidation/no_credentials_inn", "TestProvisionTokenV2_SignupRole", "TestNewAutoU", "TestResourceIDs/cluster_role_resource_name_with_missing_namespa", "TestParseReviewFrequency/3month", "TestMapWhile", "TestMarshalAndParseKey/ed25519", "TestParsePrivateKe", "TestMySQLServerVersion", "TestDeduplicateOwners", "TestLoadProfile", "FuzzParseRDSEndpoint/seed#2", "TestNewDiscoveryConfig/tag_aws_sync(", "TestValidateUserTask/DiscoverRDS:_valid", "TestResourceIDs/cluster_role_binding_resource_name_with_", "TestMakeIsHostAuthorityFunc", "TestSSHKeysEqual/rsaKey1-ed25", "TestLegacyKubeReso", "TestIntegrationJSONMarshalCycle", "TestParseAtlasEndpoint/domain_name_", "TestIsValidAccountID/more_digits", "TestParseReviewFrequency/3_month", "TestDynamoDBURIForRegion", "TestLicenseSettersAndGetters/Set_Usa", "TestFromProtoNils/notifications(0.", "TestIsPortInRange/smaller_than_range_start", "TestParseReviewFrequency/3", "TestIsValidAthenaWorkgroupName/too_long(0.00", "TestSAMLForceAuthn_Enco", "TestOktAssignmentIsEqual/status_is_different", "TestCircuitBreaker_Execu", "TestValidateAutoUpdateAgentRollout", "TestGetMCPServerTransportType/unknown", "TestParseMSSQLEndpoint/malformed_address(", "TestServerChec", "TestPluginOpenAIValidation/in", "TestPluginDatadogValidation/no_settings", "TestResourceIDs/full_kube_namespace_access(0.", "TestResourcesWithLabels_ToMap/empty", "TestIntegra", "TestServerCheckAndSetDefaults/OpenSSHEC2InstanceConnectEn", "TestNew", "TestResourceIDs/namespace_resource_name_with_missing_namespace_and_", "TestIsEICE", "TestOktAssignmentIsEqual/populated_equals(0.00", "TestTargetHealthStatusesAggregate/all_healt", "TestNewAutoUpdateVersion/invalid_spec(0", "TestMetadataIsEqual/expires_both_nil", "TestGRPCErrorWrapping", "TestPluginOktaValidation/Enable", "TestRateLimit", "TestInstanceFilter", "TestIsALPNConnUp", "TestParseDocumentDBEndpoint/RDS_instan", "TestIsValidRegion/aws_global_sentinel_val", "TestResourceIDs/single_id/ResourceIDs", "TestRoundtrip/static-type", "TestTrimMCPJSONRPCMessage/trimmed", "TestIsValidIAMRolesAnywhereTrustAnch", "TestMFADevice_CheckAndS", "FuzzParseOpensearchEndpoint/seed#2", "TestMFACeremony/NOK_create_challenge_fail", "TestAppServerSorter/by_name_desc", "TestCloning/*types.RemoteClusterV3", "TestResourceIDs/single_id", "TestParseMSSQLEndpoint/valid", "TestPluginOpsgenieVal", "TestEventEqual/gogo_oneof_not_equal", "TestInstanceFilter/match-no-upgrader", "TestProvisionTokenV2_CaseInsensitiveRoles", "TestKubeServerSorter", "FuzzParseMSSQLEndpoint/seed#2", "TestListResources", "TestMatchSearch", "TestWindowsDesktopsSorter/by_addr_asc", "FuzzParseElastiCacheEndpoint/seed#16", "TestResourceIDs/no_cluster_name", "TestParseRDSEndpoint/RDS_instance", "TestExpiryConsistency/nil", "TestSecondFactorsFromLegacySecondFactor/", "TestRoundTripper_RoundTrip/failure_in_sta", "TestResourceMethods/GetExpiry", "TestDeduplicateAny/slice_with_unique_elemen", "TestUpsertUserLoginState", "TestOnceFunc", "TestRequireKubeLocalProxy", "TestParseRDSEndpoint/Redshift_endpoint_f", "TestResourceIDs/persistent_volume_claim_resource_name", "TestRoleV6_CheckAndSetDefaults/", "TestPortRangesContains/15", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/N", "TestCheckRoleARN", "TestSSHMarshalEd25519", "TestCircuitBreaker", "TestAuthorizedKey", "TestTunnelStrategyMarshalling", "TestParseReviewFrequency/6_month", "TestGetTunnelType", "TestPluginAWSICSettings/(legacy)_OIDC_credentials_source_migrated_to_AWSIC", "TestExpiryConsistency/nil_expiry/w", "TestExpiryConsistency/zero_expiry", "TestNewAu", "TestShortRegionToRegion/invalid_direction(", "TestValidatePortRange/port_smaller_than_1(", "TestDeduplicateApps", "TestDatabaseGCPCloudSQL/gcp-valid-configu", "TestRole_GetKubeResources/v7_with_allow", "TestRetryWithMFA/", "TestParseOpensearchEndpoint/parses_valid_endpoint/opense", "TestDatabaseServerSorter", "TestALPNDialer_getTLSConfig", "TestParseReviewFrequency/1", "TestOktAssignmentIsEqual/targets_differe", "TestPars", "TestProvisionTokenV2_CheckAndSet", "TestRedshiftServerlessEndpoint/vpc_endpoi", "TestNewDiscoveryC", "TestEventEqual/gogo_oneof_equal", "TestGCPMatcherCheckAndSetDefaults", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_A", "TestFilterMap", "TestIsValidAccountID/less_digits", "TestValidLabelKey", "TestContainSameUniqueElements/empty", "TestIsValidAccountID/invalid_chars_wit", "TestWatchKindContains/no:_subset_has", "TestResources/limit_exceeded", "TestToGRPCKeepCode", "TestPluginEmailSettings/(smtp)_no_credentia", "TestIsValidIAMRoleName/invalid_symbols", "TestTargetHealthStatusesAggregate/one_unh", "TestParseAtlasEndpoint/private_link", "TestAuthPreferenceV2_CheckAndSetDefaults_secondFactor/OK_OTP_second_fac", "TestXxx/9b", "TestPluginAWSICSettings/", "TestInstanceFilter/match-update-group", "TestNewAppV3/mcp_missing_spec" ]
starryzhang/sweb.eval.win.gravitational_1776_teleport-55937
zarf-dev/zarf
3788
zarf-dev__zarf-3788
Go
[ "3051" ]
e379e7936591459ced2fb0875ca01df9f528a612
diff --git a/.goreleaser.yaml b/.goreleaser.yaml index 38d07f5554..668409d8a4 100644 --- a/.goreleaser.yaml +++ b/.goreleaser.yaml @@ -28,7 +28,7 @@ builds: - -X github.com/derailed/k9s/cmd.version={{.Env.K9S_VERSION}} - -X github.com/google/go-containerregistry/cmd/crane/cmd.Version={{.Env.CRANE_VERSION}} - -X github.com/zarf-dev/zarf/src/cmd.syftVersion={{.Env.SYFT_VERSION}} - - -X github.com/zarf-dev/zarf/src/cmd.archiverVersion={{.Env.ARCHIVER_VERSION}} + - -X github.com/zarf-dev/zarf/src/cmd.archivesVersion={{.Env.ARCHIVES_VERSION}} - -X github.com/zarf-dev/zarf/src/cmd.helmVersion={{.Env.HELM_VERSION}} goarch: - amd64 diff --git a/Makefile b/Makefile index 99b044a9f2..1f9096dd7e 100644 --- a/Makefile +++ b/Makefile @@ -38,7 +38,7 @@ K8S_MODULES_PATCH_VER=$(word 3,$(K8S_MODULES_VER)) K9S_VERSION=$(shell go list -f '{{.Version}}' -m github.com/derailed/k9s) CRANE_VERSION=$(shell go list -f '{{.Version}}' -m github.com/google/go-containerregistry) SYFT_VERSION=$(shell go list -f '{{.Version}}' -m github.com/anchore/syft) -ARCHIVER_VERSION=$(shell go list -f '{{.Version}}' -m github.com/mholt/archiver/v3) +ARCHIVES_VERSION=$(shell go list -f '{{.Version}}' -m github.com/mholt/archives) HELM_VERSION=$(shell go list -f '{{.Version}}' -m helm.sh/helm/v3) BUILD_ARGS += -X helm.sh/helm/v3/pkg/lint/rules.k8sVersionMajor=$(K8S_MODULES_MAJOR_VER) @@ -49,7 +49,7 @@ BUILD_ARGS += -X k8s.io/component-base/version.gitVersion=v$(K8S_MODULES_MAJOR_V BUILD_ARGS += -X github.com/derailed/k9s/cmd.version=$(K9S_VERSION) BUILD_ARGS += -X github.com/google/go-containerregistry/cmd/crane/cmd.Version=$(CRANE_VERSION) BUILD_ARGS += -X github.com/zarf-dev/zarf/src/cmd.syftVersion=$(SYFT_VERSION) -BUILD_ARGS += -X github.com/zarf-dev/zarf/src/cmd.archiverVersion=$(ARCHIVER_VERSION) +BUILD_ARGS += -X github.com/zarf-dev/zarf/src/cmd.archivesVersion=$(ARCHIVES_VERSION) BUILD_ARGS += -X github.com/zarf-dev/zarf/src/cmd.helmVersion=$(HELM_VERSION) GIT_SHA := $(if $(shell git rev-parse HEAD),$(shell git rev-parse HEAD),"") diff --git a/go.mod b/go.mod index 0790d5da0e..f834baa91e 100644 --- a/go.mod +++ b/go.mod @@ -33,7 +33,6 @@ require ( github.com/golang-cz/devslog v0.0.13 github.com/google/go-containerregistry v0.20.4-0.20250225234217-098045d5e61f github.com/gosuri/uitable v0.0.4 - github.com/mholt/archiver/v3 v3.5.1 github.com/mholt/archives v0.1.1 github.com/opencontainers/image-spec v1.1.1 github.com/phsym/console-slog v0.3.1 @@ -462,7 +461,7 @@ require ( github.com/oklog/ulid v1.3.1 // indirect github.com/oleiade/reflections v1.1.0 // indirect github.com/olekukonko/tablewriter v0.0.5 // indirect - github.com/open-policy-agent/opa v0.68.0 + github.com/open-policy-agent/opa v0.68.0 // indirect github.com/opencontainers/go-digest v1.0.0 // indirect github.com/opencontainers/runtime-spec v1.1.0 // indirect github.com/opencontainers/selinux v1.11.0 // indirect diff --git a/go.sum b/go.sum index 20b5531b45..0261cf93ff 100644 --- a/go.sum +++ b/go.sum @@ -427,7 +427,6 @@ github.com/anchore/stereoscope v0.1.4/go.mod h1:omWgXDEp/XfqCJlZXIByEo1c3ArZg/qT github.com/anchore/syft v1.23.1 h1:QFWFMlwyJprl60RMrceSB6FJpZCsAQeWVLd9Ltzgwa0= github.com/anchore/syft v1.23.1/go.mod h1:vDV0VBC601wHZ2nGuxqoDjfYsiu87WmE0w8HG3RDI6k= github.com/andreyvit/diff v0.0.0-20170406064948-c7f18ee00883/go.mod h1:rCTlJbsFo29Kk6CurOXKm700vrz8f0KW0JNfpkRJY/8= -github.com/andybalholm/brotli v1.0.1/go.mod h1:loMXtMfwqflxFJPmdbJO0a3KNoPuLBgiu3qAvBg8x/Y= github.com/andybalholm/brotli v1.1.1 h1:PR2pgnyFznKEugtsUo0xLdDop5SKXd5Qf5ysW+7XdTA= github.com/andybalholm/brotli v1.1.1/go.mod h1:05ib4cKhjx3OQYUY22hTVd34Bc8upXjOLL2rKwwZBoA= github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be h1:9AeTilPcZAjCFIImctFaOjnTIavg87rW78vTPkQqLI8= @@ -728,7 +727,6 @@ github.com/docker/go-units v0.5.0 h1:69rxXcBk27SvSaaxTtLh/8llcHD8vYHT7WSdRZ/jvr4 github.com/docker/go-units v0.5.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk= github.com/docker/libtrust v0.0.0-20160708172513-aabc10ec26b7 h1:UhxFibDNY/bfvqU5CAUmr9zpesgbU6SWc8/B4mflAE4= github.com/docker/libtrust v0.0.0-20160708172513-aabc10ec26b7/go.mod h1:cyGadeNEkKy96OOhEzfZl+yxihPEzKnqJwvfuSUqbZE= -github.com/dsnet/compress v0.0.2-0.20210315054119-f66993602bf5/go.mod h1:qssHWj60/X5sZFNxpG4HBPDHVqxNm4DfnCKgrbZOT+s= github.com/dsnet/compress v0.0.2-0.20230904184137-39efe44ab707 h1:2tV76y6Q9BB+NEBasnqvs7e49aEBFI8ejC89PSnWH+4= github.com/dsnet/compress v0.0.2-0.20230904184137-39efe44ab707/go.mod h1:qssHWj60/X5sZFNxpG4HBPDHVqxNm4DfnCKgrbZOT+s= github.com/dsnet/golib v0.0.0-20171103203638-1ea166775780/go.mod h1:Lj+Z9rebOhdfkVLjJ8T6VcRQv3SXugXy999NBtR9aFY= @@ -978,7 +976,6 @@ github.com/golang/protobuf v1.5.1/go.mod h1:DopwsBzvsk0Fs44TXzsVbJyPhcCPeIwnvohx github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY= github.com/golang/protobuf v1.5.4 h1:i7eJL8qZTpSEXOPTxNKhASYpMn+8e5Q6AdndVa1dWek= github.com/golang/protobuf v1.5.4/go.mod h1:lnTiLA8Wa4RWRcIUkrtSVa5nRhsEGBg48fD6rSs7xps= -github.com/golang/snappy v0.0.2/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q= github.com/golang/snappy v0.0.3/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q= github.com/golang/snappy v0.0.4 h1:yAGX7huGHXlcLOEtBnF4w7FQwA26wojNCwOYAEhLjQM= github.com/golang/snappy v0.0.4/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q= @@ -1243,7 +1240,6 @@ github.com/keybase/go-keychain v0.0.1/go.mod h1:PdEILRW3i9D8JcdM+FmY6RwkHGnhHxXw github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8= github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= github.com/klauspost/compress v1.4.1/go.mod h1:RyIbtBH6LamlWaDj8nUwkbUhJ87Yi3uG0guNDohfE1A= -github.com/klauspost/compress v1.11.4/go.mod h1:aoV0uJVorq1K+umq18yTdKaF57EivdYsUV+/s2qKfXs= github.com/klauspost/compress v1.15.11/go.mod h1:QPwzmACJjUTFsnSHH934V6woptycfrDDJnH7hvFVbGM= github.com/klauspost/compress v1.18.0 h1:c/Cqfb0r+Yi+JtIEq73FWXVkRonBlf0CRNYc8Zttxdo= github.com/klauspost/compress v1.18.0/go.mod h1:2Pp+KzxcywXVXMr50+X0Q/Lsb43OQHYWRCY2AiWywWQ= @@ -1254,7 +1250,6 @@ github.com/klauspost/cpuid/v2 v2.0.10/go.mod h1:g2LTdtYhdyuGPqyWyv7qRAmj1WBqxuOb github.com/klauspost/cpuid/v2 v2.0.12/go.mod h1:g2LTdtYhdyuGPqyWyv7qRAmj1WBqxuObKfj5c0PQa7c= github.com/klauspost/cpuid/v2 v2.2.3 h1:sxCkb+qR91z4vsqw4vGGZlDgPz3G7gjaLyK3V8y70BU= github.com/klauspost/cpuid/v2 v2.2.3/go.mod h1:RVVoqg1df56z8g3pUjL/3lE5UfnlrJX8tyFgg4nqhuY= -github.com/klauspost/pgzip v1.2.5/go.mod h1:Ch1tH69qFZu15pkjo5kYi6mth2Zzwzt50oCQKQE9RUs= github.com/klauspost/pgzip v1.2.6 h1:8RXeL5crjEUFnR2/Sn6GJNWtSQ3Dk8pq4CL3jvdDyjU= github.com/klauspost/pgzip v1.2.6/go.mod h1:Ch1tH69qFZu15pkjo5kYi6mth2Zzwzt50oCQKQE9RUs= github.com/knqyf263/go-apk-version v0.0.0-20200609155635-041fdbb8563f h1:GvCU5GXhHq+7LeOzx/haG7HSIZokl3/0GkoUFzsRJjg= @@ -1343,8 +1338,6 @@ github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5 github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b/go.mod h1:01TrycV0kFyexm33Z7vhZRXopbI8J3TDReVlkTgMUxE= github.com/mgutz/ansi v0.0.0-20200706080929-d51e80ef957d h1:5PJl274Y63IEHC+7izoQE9x6ikvDFZS2mDVS3drnohI= github.com/mgutz/ansi v0.0.0-20200706080929-d51e80ef957d/go.mod h1:01TrycV0kFyexm33Z7vhZRXopbI8J3TDReVlkTgMUxE= -github.com/mholt/archiver/v3 v3.5.1 h1:rDjOBX9JSF5BvoJGvjqK479aL70qh9DIpZCl+k7Clwo= -github.com/mholt/archiver/v3 v3.5.1/go.mod h1:e3dqJ7H78uzsRSEACH1joayhuSyhnonssnDhppzS1L4= github.com/mholt/archives v0.1.1 h1:c7J3qXN1FB54y0qiUXiq9Bxk4eCUc8pdXWwOhZdRzeY= github.com/mholt/archives v0.1.1/go.mod h1:FQVz01Q2uXKB/35CXeW/QFO23xT+hSCGZHVtha78U4I= github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg= @@ -1432,7 +1425,6 @@ github.com/ncruces/go-strftime v0.1.9/go.mod h1:Fwc5htZGVVkseilnfgOVb9mKy6w1naJm github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno= github.com/nozzle/throttler v0.0.0-20180817012639-2ea982251481 h1:Up6+btDp321ZG5/zdSLo48H9Iaq0UQGthrhWC6pCxzE= github.com/nozzle/throttler v0.0.0-20180817012639-2ea982251481/go.mod h1:yKZQO8QE2bHlgozqWDiRVqTFlLQSj30K/6SAK8EeYFw= -github.com/nwaples/rardecode v1.1.0/go.mod h1:5DzqNKiOdpKKBH87u8VlvAnPZMXcGRhxWkRpHbbfGS0= github.com/nwaples/rardecode v1.1.3 h1:cWCaZwfM5H7nAD6PyEdcVnczzV8i/JtotnyW/dD9lEc= github.com/nwaples/rardecode v1.1.3/go.mod h1:5DzqNKiOdpKKBH87u8VlvAnPZMXcGRhxWkRpHbbfGS0= github.com/nwaples/rardecode/v2 v2.1.0 h1:JQl9ZoBPDy+nIZGb1mx8+anfHp/LV3NE2MjMiv0ct/U= @@ -1508,7 +1500,6 @@ github.com/phayes/freeport v0.0.0-20220201140144-74d24b5ae9f5 h1:Ii+DKncOVM8Cu1H github.com/phayes/freeport v0.0.0-20220201140144-74d24b5ae9f5/go.mod h1:iIss55rKnNBTvrwdmkUpLnDpZoAHvWaiq5+iMmen4AE= github.com/phsym/console-slog v0.3.1 h1:Fuzcrjr40xTc004S9Kni8XfNsk+qrptQmyR+wZw9/7A= github.com/phsym/console-slog v0.3.1/go.mod h1:oJskjp/X6e6c0mGpfP8ELkfKUsrkDifYRAqJQgmdDS0= -github.com/pierrec/lz4/v4 v4.1.2/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFuRQyBid4= github.com/pierrec/lz4/v4 v4.1.22 h1:cKFw6uJDK+/gfw5BcDL0JL5aBsAFdsIT18eRtLj7VIU= github.com/pierrec/lz4/v4 v4.1.22/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFuRQyBid4= github.com/pjbgf/sha1cd v0.3.2 h1:a9wb0bp1oC2TGwStyn0Umc/IGKQnEgF0vVaZ8QF8eo4= @@ -1770,7 +1761,6 @@ github.com/transparency-dev/merkle v0.0.2 h1:Q9nBoQcZcgPamMkGn7ghV8XiTZ/kRxn1yCG github.com/transparency-dev/merkle v0.0.2/go.mod h1:pqSy+OXefQ1EDUVmAJ8MUhHB9TXGuzVAT58PqBoHz1A= github.com/tv42/httpunix v0.0.0-20150427012821-b75d8614f926/go.mod h1:9ESjWnEqriFuLhtthL60Sar/7RFoluCcXsuvEwTV5KM= github.com/ulikunitz/xz v0.5.8/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14= -github.com/ulikunitz/xz v0.5.9/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14= github.com/ulikunitz/xz v0.5.10/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14= github.com/ulikunitz/xz v0.5.12 h1:37Nm15o69RwBkXM0J6A5OlE67RZTfzUxTj8fB3dfcsc= github.com/ulikunitz/xz v0.5.12/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14= diff --git a/src/cmd/archiver.go b/src/cmd/archiver.go index 040b4da4ce..53d4ccdaca 100644 --- a/src/cmd/archiver.go +++ b/src/cmd/archiver.go @@ -10,21 +10,20 @@ import ( "github.com/zarf-dev/zarf/src/pkg/archive" ) -// ldflags github.com/zarf-dev/zarf/src/cmd.archiverVersion=x.x.x -var archiverVersion string +// ldflags github.com/zarf-dev/zarf/src/cmd.archivesVersion=x.x.x +var archivesVersion string func newArchiverCommand() *cobra.Command { cmd := &cobra.Command{ Use: "archiver", Aliases: []string{"a"}, Short: lang.CmdToolsArchiverShort, - Version: archiverVersion, + Version: archivesVersion, } cmd.AddCommand(newArchiverCompressCommand()) cmd.AddCommand(newArchiverDecompressCommand()) - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - cmd.AddCommand(newToolsVersionCmd("mholt/archives", archiverVersion)) + cmd.AddCommand(newToolsVersionCmd("mholt/archives", archivesVersion)) return cmd } diff --git a/src/cmd/dev.go b/src/cmd/dev.go index 8989c4b2df..aa4baca83d 100644 --- a/src/cmd/dev.go +++ b/src/cmd/dev.go @@ -17,7 +17,6 @@ import ( "github.com/AlecAivazis/survey/v2" "github.com/defenseunicorns/pkg/helpers/v2" goyaml "github.com/goccy/go-yaml" - "github.com/mholt/archiver/v3" "github.com/pterm/pterm" "github.com/sergi/go-diff/diffmatchpatch" "github.com/spf13/cobra" @@ -27,6 +26,7 @@ import ( "github.com/zarf-dev/zarf/src/config/lang" "github.com/zarf-dev/zarf/src/internal/packager2" layout2 "github.com/zarf-dev/zarf/src/internal/packager2/layout" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/layout" "github.com/zarf-dev/zarf/src/pkg/lint" "github.com/zarf-dev/zarf/src/pkg/logger" @@ -484,6 +484,7 @@ func newDevSha256SumCommand() *cobra.Command { func (o *devSha256SumOptions) run(cmd *cobra.Command, args []string) (err error) { hashErr := errors.New("unable to compute the SHA256SUM hash") + ctx := cmd.Context() fileName := args[0] @@ -508,7 +509,7 @@ func (o *devSha256SumOptions) run(cmd *cobra.Command, args []string) (err error) } downloadPath := filepath.Join(tmp, fileBase) - err = utils.DownloadToFile(cmd.Context(), fileName, downloadPath, "") + err = utils.DownloadToFile(ctx, fileName, downloadPath, "") if err != nil { return errors.Join(hashErr, err) } @@ -535,8 +536,10 @@ func (o *devSha256SumOptions) run(cmd *cobra.Command, args []string) (err error) extractedFile := filepath.Join(tmp, o.extractPath) - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Extract(fileName, o.extractPath, tmp) + decompressOpts := archive.DecompressOpts{ + Files: []string{extractedFile}, + } + err = archive.Decompress(ctx, fileName, tmp, decompressOpts) if err != nil { return errors.Join(hashErr, err) } diff --git a/src/internal/packager2/create.go b/src/internal/packager2/create.go index e9f163bb82..3af60306f3 100644 --- a/src/internal/packager2/create.go +++ b/src/internal/packager2/create.go @@ -72,7 +72,7 @@ func Create(ctx context.Context, packagePath string, opt CreateOptions) error { } if opt.SBOMOut != "" { - _, err := pkgLayout.GetSBOM(opt.SBOMOut) + _, err := pkgLayout.GetSBOM(ctx, opt.SBOMOut) // Don't fail package create if the package doesn't have an sbom var noSBOMErr *layout2.NoSBOMAvailableError if errors.As(err, &noSBOMErr) { diff --git a/src/internal/packager2/inspect.go b/src/internal/packager2/inspect.go index cf4e6cb93b..b84f9bc059 100644 --- a/src/internal/packager2/inspect.go +++ b/src/internal/packager2/inspect.go @@ -107,11 +107,11 @@ func InspectPackageResources(ctx context.Context, source string, opts InspectPac variableConfig.SetApplicationTemplates(applicationTemplates) if len(component.Charts) > 0 { - chartDir, err := pkgLayout.GetComponentDir(tmpComponentPath, component.Name, layout.ChartsComponentDir) + chartDir, err := pkgLayout.GetComponentDir(ctx, tmpComponentPath, component.Name, layout.ChartsComponentDir) if err != nil { return InspectPackageResourcesResults{}, err } - valuesDir, err := pkgLayout.GetComponentDir(tmpComponentPath, component.Name, layout.ValuesComponentDir) + valuesDir, err := pkgLayout.GetComponentDir(ctx, tmpComponentPath, component.Name, layout.ValuesComponentDir) if err != nil && !errors.Is(err, os.ErrNotExist) { return InspectPackageResourcesResults{}, fmt.Errorf("failed to get values: %w", err) } @@ -156,7 +156,7 @@ func InspectPackageResources(ctx context.Context, source string, opts InspectPac } if len(component.Manifests) > 0 { - manifestDir, err := pkgLayout.GetComponentDir(tmpComponentPath, component.Name, layout.ManifestsComponentDir) + manifestDir, err := pkgLayout.GetComponentDir(ctx, tmpComponentPath, component.Name, layout.ManifestsComponentDir) if err != nil { return InspectPackageResourcesResults{}, fmt.Errorf("failed to get package manifests: %w", err) } @@ -311,7 +311,7 @@ func InspectPackageSboms(ctx context.Context, source string, opts InspectPackage defer func() { err = errors.Join(err, pkgLayout.Cleanup()) }() - outputPath, err := pkgLayout.GetSBOM(opts.OutputDir) + outputPath, err := pkgLayout.GetSBOM(ctx, opts.OutputDir) if err != nil { return InspectPackageSbomsResult{}, fmt.Errorf("could not get SBOM: %w", err) } diff --git a/src/internal/packager2/layout/create.go b/src/internal/packager2/layout/create.go index 20fb10be60..32f25caca7 100644 --- a/src/internal/packager2/layout/create.go +++ b/src/internal/packager2/layout/create.go @@ -23,7 +23,6 @@ import ( "github.com/defenseunicorns/pkg/helpers/v2" goyaml "github.com/goccy/go-yaml" - "github.com/mholt/archiver/v3" "github.com/sigstore/cosign/v2/cmd/cosign/cli/options" "github.com/sigstore/cosign/v2/cmd/cosign/cli/sign" @@ -36,6 +35,7 @@ import ( "github.com/zarf-dev/zarf/src/internal/packager/kustomize" actions2 "github.com/zarf-dev/zarf/src/internal/packager2/actions" "github.com/zarf-dev/zarf/src/internal/packager2/filters" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/interactive" "github.com/zarf-dev/zarf/src/pkg/lint" "github.com/zarf-dev/zarf/src/pkg/logger" @@ -228,7 +228,7 @@ func CreateSkeleton(ctx context.Context, packagePath string, opt CreateOptions) } for _, component := range pkg.Components { - err := assembleSkeletonComponent(component, packagePath, buildPath) + err := assembleSkeletonComponent(ctx, component, packagePath, buildPath) if err != nil { return "", err } @@ -406,8 +406,10 @@ func assemblePackageComponent(ctx context.Context, component v1alpha1.ZarfCompon if err := utils.DownloadToFile(ctx, file.Source, compressedFile, component.DeprecatedCosignKeyPath); err != nil { return fmt.Errorf(lang.ErrDownloading, file.Source, err.Error()) } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Extract(compressedFile, file.ExtractPath, destinationDir) + decompressOpts := archive.DecompressOpts{ + Files: []string{file.ExtractPath}, + } + err = archive.Decompress(ctx, compressedFile, destinationDir, decompressOpts) if err != nil { return fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, compressedFileName, err.Error()) } @@ -418,9 +420,12 @@ func assemblePackageComponent(ctx context.Context, component v1alpha1.ZarfCompon } } else { if file.ExtractPath != "" { - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Extract(filepath.Join(packagePath, file.Source), file.ExtractPath, destinationDir); err != nil { - return fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, file.Source, err.Error()) + decompressOpts := archive.DecompressOpts{ + Files: []string{file.ExtractPath}, + } + err = archive.Decompress(ctx, filepath.Join(packagePath, file.Source), destinationDir, decompressOpts) + if err != nil { + return fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, filepath.Join(packagePath, file.Source), err.Error()) } } else { if filepath.IsAbs(file.Source) { @@ -552,7 +557,7 @@ func assemblePackageComponent(ctx context.Context, component v1alpha1.ZarfCompon return nil } -func assembleSkeletonComponent(component v1alpha1.ZarfComponent, packagePath, buildPath string) error { +func assembleSkeletonComponent(ctx context.Context, component v1alpha1.ZarfComponent, packagePath, buildPath string) error { tmpBuildPath, err := utils.MakeTempDir(config.CommonOptions.TempDirectory) if err != nil { return err @@ -611,9 +616,12 @@ func assembleSkeletonComponent(component v1alpha1.ZarfComponent, packagePath, bu destinationDir := filepath.Dir(dst) if file.ExtractPath != "" { - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Extract(filepath.Join(packagePath, file.Source), file.ExtractPath, destinationDir); err != nil { - return fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, file.Source, err.Error()) + decompressOpts := archive.DecompressOpts{ + Files: []string{file.ExtractPath}, + } + err = archive.Decompress(ctx, filepath.Join(packagePath, file.Source), destinationDir, decompressOpts) + if err != nil { + return fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, filepath.Join(packagePath, file.Source), err.Error()) } // Make sure dst reflects the actual file or directory. diff --git a/src/internal/packager2/layout/import.go b/src/internal/packager2/layout/import.go index dcf9fa2ac2..0884cf3204 100644 --- a/src/internal/packager2/layout/import.go +++ b/src/internal/packager2/layout/import.go @@ -13,11 +13,11 @@ import ( "strings" "time" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/defenseunicorns/pkg/helpers/v2" "github.com/defenseunicorns/pkg/oci" - "github.com/mholt/archiver/v3" ocispec "github.com/opencontainers/image-spec/specs-go/v1" ocistore "oras.land/oras-go/v2/content/oci" @@ -285,16 +285,15 @@ func fetchOCISkeleton(ctx context.Context, component v1alpha1.ZarfComponent, pac return rel, nil } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - tu := archiver.Tar{ + decompressOpts := archive.DecompressOpts{ OverwriteExisting: true, - // removes /<component-name>/ from the paths - StripComponents: 1, + StripComponents: 1, } - err = tu.Unarchive(tarball, dir) + err = archive.Decompress(ctx, tarball, dir, decompressOpts) if err != nil { - return "", err + return "", fmt.Errorf("unable to extract archive %q: %w", tarball, err) } + return rel, nil } diff --git a/src/internal/packager2/layout/package.go b/src/internal/packager2/layout/package.go index ead18f0015..9928f475bf 100644 --- a/src/internal/packager2/layout/package.go +++ b/src/internal/packager2/layout/package.go @@ -4,7 +4,6 @@ package layout import ( - "archive/tar" "context" "errors" "fmt" @@ -17,13 +16,14 @@ import ( "strings" "github.com/defenseunicorns/pkg/helpers/v2" - "github.com/mholt/archiver/v3" + "github.com/mholt/archives" "github.com/sigstore/cosign/v2/cmd/cosign/cli/options" "github.com/sigstore/cosign/v2/cmd/cosign/cli/verify" "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config" "github.com/zarf-dev/zarf/src/internal/packager2/filters" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/packager/sources" "github.com/zarf-dev/zarf/src/pkg/utils" @@ -43,7 +43,7 @@ type PackageLayoutOptions struct { Filter filters.ComponentFilterStrategy } -// LoadFromTar unpacks the give compressed package and loads it. +// LoadFromTar unpacks the given archive (any compress/format) and loads it. func LoadFromTar(ctx context.Context, tarPath string, opt PackageLayoutOptions) (*PackageLayout, error) { if opt.Filter == nil { opt.Filter = filters.Empty() @@ -52,42 +52,51 @@ func LoadFromTar(ctx context.Context, tarPath string, opt PackageLayoutOptions) if err != nil { return nil, err } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Walk(tarPath, func(f archiver.File) error { - if f.IsDir() { - return nil + + // 1) Mount the archive as a virtual file system. + fsys, err := archives.FileSystem(ctx, tarPath, nil) + if err != nil { + return nil, fmt.Errorf("unable to open archive %q: %w", tarPath, err) + } + + // 2) Walk every entry in the archive. + err = fs.WalkDir(fsys, ".", func(path string, d fs.DirEntry, err error) error { + if err != nil { + return err } - header, ok := f.Header.(*tar.Header) - if !ok { - return fmt.Errorf("expected header to be *tar.Header but was %T", f.Header) + // skip directories + if d.IsDir() { + return nil } - // If path has nested directories we want to create them. - dir := filepath.Dir(header.Name) - if dir != "." { - err := os.MkdirAll(filepath.Join(dirPath, dir), helpers.ReadExecuteAllWriteUser) - if err != nil { - return err - } + // ensure parent dirs exist in our temp dir + dst := filepath.Join(dirPath, path) + if err := os.MkdirAll(filepath.Dir(dst), helpers.ReadExecuteAllWriteUser); err != nil { + return err } - dst, err := os.Create(filepath.Join(dirPath, header.Name)) + // copy file contents + in, err := fsys.Open(path) if err != nil { return err } - defer dst.Close() - _, err = io.Copy(dst, f) + defer in.Close() + + out, err := os.Create(dst) if err != nil { return err } + defer out.Close() + + if _, err := io.Copy(out, in); err != nil { + return err + } return nil }) if err != nil { return nil, err } - p, err := LoadFromDir(ctx, dirPath, opt) - if err != nil { - return nil, err - } - return p, nil + + // 3) Delegate to the existing LoadFromDir + return LoadFromDir(ctx, dirPath, opt) } // LoadFromDir loads and validates a package from the given directory path. @@ -140,22 +149,27 @@ func (e *NoSBOMAvailableError) Error() string { return fmt.Sprintf("zarf package %s does not have an SBOM available", e.pkgName) } -// GetSBOM outputs the SBOM data from the package to the give destination path. -func (p *PackageLayout) GetSBOM(destPath string) (string, error) { +// GetSBOM outputs the SBOM data from the package to the given destination path. +func (p *PackageLayout) GetSBOM(ctx context.Context, destPath string) (string, error) { if !p.Pkg.IsSBOMAble() { return "", &NoSBOMAvailableError{pkgName: p.Pkg.Metadata.Name} } - path := filepath.Join(destPath, p.Pkg.Metadata.Name) - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err := archiver.Extract(filepath.Join(p.dirPath, SBOMTar), "", path) + + // 1) locate the sboms archive under the layout directory + sbomArchive := filepath.Join(p.dirPath, SBOMTar) + + // // 2) decompress the archive to destination path + targetDir := filepath.Join(destPath, p.Pkg.Metadata.Name) + err := archive.Decompress(ctx, sbomArchive, targetDir, archive.DecompressOpts{}) if err != nil { return "", err } - return path, nil + + return targetDir, nil } // GetComponentDir returns a path to the directory in the given component. -func (p *PackageLayout) GetComponentDir(destPath, componentName string, ct ComponentDir) (string, error) { +func (p *PackageLayout) GetComponentDir(ctx context.Context, destPath, componentName string, ct ComponentDir) (string, error) { sourcePath := filepath.Join(p.dirPath, ComponentsDir, fmt.Sprintf("%s.tar", componentName)) _, err := os.Stat(sourcePath) if errors.Is(err, os.ErrNotExist) { @@ -169,9 +183,7 @@ func (p *PackageLayout) GetComponentDir(destPath, componentName string, ct Compo return "", err } defer os.RemoveAll(tmpDir) - // TODO (phillebaba): We are not using archiver.Extract here because there is a bug in Windows where the files will not be extracted properly from nested directories. - // https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Unarchive(sourcePath, tmpDir) + err = archive.Decompress(ctx, sourcePath, tmpDir, archive.DecompressOpts{}) if err != nil { return "", err } @@ -212,8 +224,7 @@ func (p *PackageLayout) Archive(ctx context.Context, dirPath string, maxPackageS for _, file := range files { filePaths = append(filePaths, filepath.Join(p.dirPath, file.Name())) } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Archive(filePaths, tarballPath) + err = archive.Compress(ctx, filePaths, tarballPath, archive.CompressOpts{}) if err != nil { return fmt.Errorf("unable to create package: %w", err) } diff --git a/src/internal/packager2/layout/sbom.go b/src/internal/packager2/layout/sbom.go index 64c6c9f4db..ad673f10ca 100644 --- a/src/internal/packager2/layout/sbom.go +++ b/src/internal/packager2/layout/sbom.go @@ -27,10 +27,10 @@ import ( "github.com/anchore/syft/syft/source/stereoscopesource" "github.com/defenseunicorns/pkg/helpers/v2" v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/mholt/archiver/v3" "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/transform" "github.com/zarf-dev/zarf/src/pkg/utils" @@ -153,8 +153,7 @@ func createFileSBOM(ctx context.Context, component v1alpha1.ZarfComponent, outpu } defer os.RemoveAll(tmpDir) tarPath := filepath.Join(buildPath, ComponentsDir, component.Name) + ".tar" - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Unarchive(tarPath, tmpDir) + err = archive.Decompress(ctx, tarPath, tmpDir, archive.DecompressOpts{}) if err != nil { return nil, err } diff --git a/src/internal/packager2/mirror.go b/src/internal/packager2/mirror.go index 7c815cd340..240a624020 100644 --- a/src/internal/packager2/mirror.go +++ b/src/internal/packager2/mirror.go @@ -96,7 +96,7 @@ func pushReposToRepository(ctx context.Context, c *cluster.Cluster, pkgLayout *l return err } defer os.RemoveAll(tmpDir) - reposPath, err := pkgLayout.GetComponentDir(tmpDir, component.Name, layout.RepoComponentDir) + reposPath, err := pkgLayout.GetComponentDir(ctx, tmpDir, component.Name, layout.RepoComponentDir) if err != nil { return err } diff --git a/src/internal/packager2/pull.go b/src/internal/packager2/pull.go index 9881d76205..b87fd9ff8e 100644 --- a/src/internal/packager2/pull.go +++ b/src/internal/packager2/pull.go @@ -15,13 +15,14 @@ import ( "strings" "time" + "github.com/mholt/archives" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/defenseunicorns/pkg/helpers/v2" "github.com/defenseunicorns/pkg/oci" "github.com/gabriel-vasile/mimetype" goyaml "github.com/goccy/go-yaml" - "github.com/mholt/archiver/v3" ocispec "github.com/opencontainers/image-spec/specs-go/v1" "github.com/zarf-dev/zarf/src/api/v1alpha1" @@ -125,7 +126,7 @@ func Pull(ctx context.Context, source, destination string, opts PullOptions) err return err } - name, err := nameFromMetadata(tmpPath) + name, err := nameFromMetadata(ctx, tmpPath) if err != nil { return err } @@ -228,8 +229,7 @@ func pullOCI(ctx context.Context, opts PullOCIOptions) (bool, string, error) { if err != nil { return false, "", err } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Archive(allTheLayers, tarPath) + err = archive.Compress(ctx, allTheLayers, tarPath, archive.CompressOpts{}) if err != nil { return false, "", err } @@ -308,28 +308,44 @@ func pullHTTPFile(ctx context.Context, src, tarPath string) error { return nil } -func nameFromMetadata(path string) (string, error) { - var pkg v1alpha1.ZarfPackage - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err := archiver.Walk(path, func(f archiver.File) error { - if f.Name() == layout.ZarfYAML { - b, err := io.ReadAll(f) - if err != nil { - return err - } - if err := goyaml.Unmarshal(b, &pkg); err != nil { - return err - } - } - return nil - }) +// nameFromMetadata reads the zarf.yaml inside the archive at "path" +// (which may be plain, .tar, .tar.zst, .zip, etc) and builds its package name. +func nameFromMetadata(ctx context.Context, path string) (string, error) { + // 1) quick invalid‐path check + if helpers.InvalidPath(path) { + return "", &os.PathError{Op: "open", Path: path, Err: os.ErrNotExist} + } + if ctx == nil { + ctx = context.Background() + } + + // 2) mount the archive as a virtual file system + fsys, err := archives.FileSystem(ctx, path, nil) + if err != nil { + return "", fmt.Errorf("unable to open archive %q: %w", path, err) + } + + // 3) open just the zarf.yaml entry + f, err := fsys.Open(layout.ZarfYAML) + if err != nil { + return "", fmt.Errorf("%s does not contain a %s", path, layout.ZarfYAML) + } + defer f.Close() + + // 4) read & unmarshal into our package struct + data, err := io.ReadAll(f) if err != nil { return "", err } + var pkg v1alpha1.ZarfPackage + if err := goyaml.Unmarshal(data, &pkg); err != nil { + return "", err + } if pkg.Metadata.Name == "" { return "", fmt.Errorf("%s does not contain a zarf.yaml", path) } + // 5) build the output name exactly as before arch := config.GetArch(pkg.Metadata.Architecture, pkg.Build.Architecture) if pkg.Build.Architecture == zoci.SkeletonArch { arch = zoci.SkeletonArch @@ -345,14 +361,17 @@ func nameFromMetadata(path string) (string, error) { name = fmt.Sprintf("zarf-%s-%s", strings.ToLower(string(pkg.Kind)), arch) } if pkg.Build.Differential { - name = fmt.Sprintf("%s-%s-differential-%s", name, pkg.Build.DifferentialPackageVersion, pkg.Metadata.Version) + name = fmt.Sprintf("%s-%s-differential-%s", + name, pkg.Build.DifferentialPackageVersion, pkg.Metadata.Version) } else if pkg.Metadata.Version != "" { name = fmt.Sprintf("%s-%s", name, pkg.Metadata.Version) } + + // 6) choose tar vs tar.zst if pkg.Metadata.Uncompressed { - return fmt.Sprintf("%s.tar", name), nil + return name + ".tar", nil } - return fmt.Sprintf("%s.tar.zst", name), nil + return name + ".tar.zst", nil } // supportsFiltering checks if the package supports filtering. diff --git a/src/pkg/archive/archive.go b/src/pkg/archive/archive.go index 6aa0b1a1ad..c1cb5d49d0 100644 --- a/src/pkg/archive/archive.go +++ b/src/pkg/archive/archive.go @@ -13,45 +13,318 @@ import ( "path/filepath" "strings" - "github.com/mholt/archiver/v3" "github.com/mholt/archives" "github.com/zarf-dev/zarf/src/config/lang" - "github.com/zarf-dev/zarf/src/pkg/layout" ) -const rwxPerm = 0o755 +const ( + extensionTar = ".tar" + extensionZip = ".zip" + extensionGz = ".tar.gz" + extensionTgz = ".tgz" + extensionBz2 = ".tar.bz2" + extensionTbz2 = ".tbz2" + extensionTbz = ".tbz" + extensionXz = ".tar.xz" + extensionTxz = ".txz" + extensionZst = ".tar.zst" + extensionTzst = ".tzst" + extensionBr = ".tar.br" + extensionTbr = ".tbr" + extensionLz4 = ".tar.lz4" + extensionTlz4 = ".tlz4" + extensionLzip = ".tar.lz" + extensionMz = ".tar.mz" + extensionTmz = ".tmz" + sbomFileName = "sbom.tar" + + dirPerm = 0o755 + filePerm = 0o644 +) // CompressOpts is a placeholder for future optional Compress params type CompressOpts struct{} -// Compress takes any number of source files and archives them into a tarball at dest path. -// TODO(mkcp): Migrate to mholt/archives, see CVE-2024-0406 -func Compress(_ context.Context, sources []string, dest string, _ CompressOpts) error { - return archiver.Archive(sources, dest) +// Compress takes any number of source files and archives them into a compressed archive at dest path. +func Compress(ctx context.Context, sources []string, dest string, _ CompressOpts) (err error) { + out, err := os.Create(dest) + if err != nil { + return fmt.Errorf("failed to create %s: %w", dest, err) + } + defer func() { + err = errors.Join(err, out.Close()) + }() + + mapping := make(map[string]string, len(sources)) + for _, src := range sources { + mapping[src] = filepath.Base(src) + } + files, err := archives.FilesFromDisk(ctx, nil, mapping) + if err != nil { + return fmt.Errorf("failed to stat sources: %w", err) + } + + archivers := map[string]archives.Archiver{ + extensionZip: archives.Zip{}, + extensionTar: archives.Tar{}, + extensionGz: archives.CompressedArchive{Compression: archives.Gz{}, Archival: archives.Tar{}}, + extensionTgz: archives.CompressedArchive{Compression: archives.Gz{}, Archival: archives.Tar{}}, + extensionBz2: archives.CompressedArchive{Compression: archives.Bz2{}, Archival: archives.Tar{}}, + extensionTbz2: archives.CompressedArchive{Compression: archives.Bz2{}, Archival: archives.Tar{}}, + extensionTbz: archives.CompressedArchive{Compression: archives.Bz2{}, Archival: archives.Tar{}}, + extensionXz: archives.CompressedArchive{Compression: archives.Xz{}, Archival: archives.Tar{}}, + extensionTxz: archives.CompressedArchive{Compression: archives.Xz{}, Archival: archives.Tar{}}, + extensionZst: archives.CompressedArchive{Compression: archives.Zstd{}, Archival: archives.Tar{}}, + extensionTzst: archives.CompressedArchive{Compression: archives.Zstd{}, Archival: archives.Tar{}}, + extensionBr: archives.CompressedArchive{Compression: archives.Brotli{}, Archival: archives.Tar{}}, + extensionTbr: archives.CompressedArchive{Compression: archives.Brotli{}, Archival: archives.Tar{}}, + extensionLz4: archives.CompressedArchive{Compression: archives.Lz4{}, Archival: archives.Tar{}}, + extensionTlz4: archives.CompressedArchive{Compression: archives.Lz4{}, Archival: archives.Tar{}}, + extensionLzip: archives.CompressedArchive{Compression: archives.Lzip{}, Archival: archives.Tar{}}, + extensionMz: archives.CompressedArchive{Compression: archives.MinLZ{}, Archival: archives.Tar{}}, + extensionTmz: archives.CompressedArchive{Compression: archives.MinLZ{}, Archival: archives.Tar{}}, + } + + // Find the longest matching extension + var archiveExt string + for ext := range archivers { + if strings.HasSuffix(dest, ext) && len(ext) > len(archiveExt) { + archiveExt = ext + } + } + + archiver, ok := archivers[archiveExt] + if !ok { + return fmt.Errorf("unsupported archive extension for %q", dest) + } + + if err := archiver.Archive(ctx, out, files); err != nil { + return fmt.Errorf("archive failed for %q: %w", dest, err) + } + + return nil } // DecompressOpts provides optional parameters for Decompress type DecompressOpts struct { - // UnarchiveAll, when enabled, walks the sourceArchive and unarchives everything at the root of the archive. - // NOTE(mkcp): This is equivalent to a recursive walk with depth 1. + // UnarchiveAll walks root of the archive and unpacks nested .tar files. UnarchiveAll bool + + // Files, if non-empty, means "only extract these exact archive-paths." + Files []string + + // StripComponents drops this many leading path elements from every entry. + StripComponents int + + // OverwriteExisting, if true, will truncate existing files instead of failing. + OverwriteExisting bool + + // SkipValidation, if true, will skip the validation of a file being present in the archive. + // This is used with unarchiveFiltered to avoid checking for files that are not in the archive. + // This was a previous behavior that the new logic does not support. + SkipValidation bool } -// Decompress takes Zarf package or arbitrary archive and decompresses it to the path at dest with options. -func Decompress(ctx context.Context, sourceArchive, dst string, opts DecompressOpts) error { - if ctx == nil { - ctx = context.Background() +// Decompress takes a Zarf package or arbitrary archive and decompresses it to dst. +func Decompress(ctx context.Context, sourceArchive, dst string, opts DecompressOpts) (err error) { + if len(opts.Files) > 0 { + if err := unarchiveFiltered(ctx, sourceArchive, dst, opts.Files, opts.SkipValidation); err != nil { + return fmt.Errorf("unable to decompress selected files: %w", err) + } + return nil + } + + if opts.StripComponents > 0 || opts.OverwriteExisting { + err = unarchiveWithStrip(ctx, sourceArchive, dst, + opts.StripComponents, opts.OverwriteExisting) + } else { + err = unarchive(ctx, sourceArchive, dst) } - err := unarchive(ctx, sourceArchive, dst) if err != nil { return fmt.Errorf("unable to perform decompression: %w", err) } + // 3) nested unarchive step remains unchanged if opts.UnarchiveAll { - err = nestedUnarchive(ctx, dst) - if err != nil { + if err := nestedUnarchive(ctx, dst); err != nil { + return err + } + } + return nil +} + +// unarchiveWithStrip unpacks any supported archive, stripping `strip` path elements +// and opening files with or without truncate based on `overwrite`. +func unarchiveWithStrip(ctx context.Context, archivePath, dst string, strip int, overwrite bool) (err error) { + // open archive + f, err := os.Open(archivePath) + if err != nil { + return fmt.Errorf("opening %q: %w", archivePath, err) + } + defer func() { + err = errors.Join(err, f.Close()) + }() + + // identify format (tar, tar.zst, zip, etc.) + format, input, err := archives.Identify(ctx, filepath.Base(archivePath), f) + if err != nil { + return fmt.Errorf("identifying archive %q: %w", archivePath, err) + } + extractor, ok := format.(archives.Extractor) + if !ok { + return fmt.Errorf("format %T cannot extract", format) + } + + // ensure dst exists + if err := os.MkdirAll(dst, dirPerm); err != nil { + return fmt.Errorf("creating dest %q: %w", dst, err) + } + + // choose flags for file creation + flags := os.O_CREATE | os.O_WRONLY + if overwrite { + flags |= os.O_TRUNC + } else { + flags |= os.O_EXCL + } + + handler := func(_ context.Context, fi archives.FileInfo) error { + parts := strings.Split(fi.NameInArchive, "/") + if len(parts) <= strip { + // nothing left after stripping → skip + return nil + } + rel := filepath.Join(parts[strip:]...) + target := filepath.Join(dst, rel) + + switch { + case fi.IsDir(): + return os.MkdirAll(target, fi.Mode()) + + case fi.LinkTarget != "": + // recreate symlink (we do not strip link targets here) + return os.Symlink(fi.LinkTarget, target) + + default: + // regular file + if err := os.MkdirAll(filepath.Dir(target), dirPerm); err != nil { + return err + } + out, err := os.OpenFile(target, flags, fi.Mode()) + if err != nil { + return err + } + defer func() { + err = errors.Join(err, out.Close()) + }() + + in, err := fi.Open() + if err != nil { + return err + } + defer func() { + err = errors.Join(err, in.Close()) + }() + + if _, err := io.Copy(out, in); err != nil { + return err + } + return nil + } + } + + if err := extractor.Extract(ctx, input, handler); err != nil { + return fmt.Errorf("extracting %q: %w", archivePath, err) + } + return nil +} + +// unarchiveFiltered extracts only the given list of archive‐internal filenames +// into dst, and errors if any one of them was not found. +func unarchiveFiltered(ctx context.Context, src, dst string, want []string, skipValidation bool) (err error) { + file, err := os.Open(src) + if err != nil { + return fmt.Errorf("unable to open archive %q: %w", src, err) + } + defer func() { + cErr := file.Close() + err = errors.Join(err, cErr) + }() + + format, input, err := archives.Identify(ctx, src, file) + if err != nil { + return fmt.Errorf("unable to identify archive %q: %w", src, err) + } + + extractor, ok := format.(archives.Extractor) + if !ok { + return fmt.Errorf("unsupported format for extraction: %T", format) + } + + // We'll track which ones we actually saw + found := make(map[string]bool, len(want)) + wantSet := make(map[string]bool, len(want)) + for _, name := range want { + wantSet[name] = true + } + + // Ensure dst exists + if err := os.MkdirAll(dst, dirPerm); err != nil { + return fmt.Errorf("unable to create destination %q: %w", dst, err) + } + + handler := func(_ context.Context, f archives.FileInfo) error { + // skip anything not in our list + if !wantSet[f.NameInArchive] { + return nil + } + found[f.NameInArchive] = true + + target := filepath.Join(dst, f.NameInArchive) + + switch { + case f.IsDir(): + return os.MkdirAll(target, f.Mode()) + + case f.LinkTarget != "": + linkDest := filepath.Join(dst, f.LinkTarget) + return os.Symlink(linkDest, target) + + default: + if err := os.MkdirAll(filepath.Dir(target), dirPerm); err != nil { + return err + } + out, err := os.OpenFile(target, os.O_CREATE|os.O_WRONLY, f.Mode()) + if err != nil { + return err + } + defer func() { + cErr := out.Close() + err = errors.Join(err, cErr) + }() + + in, err := f.Open() + if err != nil { + return err + } + defer func() { + err = errors.Join(err, in.Close()) + }() + + _, err = io.Copy(out, in) return err } } + + if err := extractor.Extract(ctx, input, handler); err != nil { + return fmt.Errorf("error extracting filtered entries from %q: %w", src, err) + } + + // verify we got them all + for _, name := range want { + if !found[name] && !skipValidation { + return fmt.Errorf("file %q not found in archive %q", name, src) + } + } return nil } @@ -61,11 +334,11 @@ func nestedUnarchive(ctx context.Context, dst string) error { if err != nil { return err } - if strings.HasSuffix(path, ".tar") { - dst := filepath.Join(strings.TrimSuffix(path, ".tar"), "..") + if strings.HasSuffix(path, extensionTar) { + dst := filepath.Join(strings.TrimSuffix(path, extensionTar), "..") // Unpack sboms.tar differently since it has a different folder structure than components - if info.Name() == layout.SBOMTar { - dst = strings.TrimSuffix(path, ".tar") + if info.Name() == sbomFileName { + dst = strings.TrimSuffix(path, extensionTar) } err := unarchive(ctx, path, dst) if err != nil { @@ -85,7 +358,7 @@ func nestedUnarchive(ctx context.Context, dst string) error { } // unarchive opens src, identifies its format, and extracts into dst. -func unarchive(ctx context.Context, src, dst string) error { +func unarchive(ctx context.Context, src, dst string) (err error) { // Open the archive file file, err := os.Open(src) if err != nil { @@ -108,7 +381,7 @@ func unarchive(ctx context.Context, src, dst string) error { } // Ensure dst exists - if err := os.MkdirAll(dst, rwxPerm); err != nil { + if err := os.MkdirAll(dst, dirPerm); err != nil { return fmt.Errorf("unable to create destination %q: %w", dst, err) } @@ -128,7 +401,7 @@ func unarchive(ctx context.Context, src, dst string) error { default: // regular file - if err := os.MkdirAll(filepath.Dir(target), rwxPerm); err != nil { + if err := os.MkdirAll(filepath.Dir(target), dirPerm); err != nil { return err } out, err := os.OpenFile(target, os.O_CREATE|os.O_WRONLY, f.Mode()) diff --git a/src/pkg/cluster/injector.go b/src/pkg/cluster/injector.go index 6a9e6d6bc5..e97cc97dfa 100644 --- a/src/pkg/cluster/injector.go +++ b/src/pkg/cluster/injector.go @@ -14,7 +14,6 @@ import ( "time" "github.com/google/go-containerregistry/pkg/crane" - "github.com/mholt/archiver/v3" corev1 "k8s.io/api/core/v1" kerrors "k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/api/resource" @@ -27,6 +26,7 @@ import ( "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config" "github.com/zarf-dev/zarf/src/internal/healthchecks" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/state" "github.com/zarf-dev/zarf/src/pkg/transform" @@ -216,10 +216,11 @@ func (c *Cluster) createPayloadConfigMaps(ctx context.Context, tmpDir, imagesDir if err != nil { return nil, "", err } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Archive(tarFileList, tarPath); err != nil { - return nil, "", err + + if err := archive.Compress(ctx, tarFileList, tarPath, archive.CompressOpts{}); err != nil { + return nil, "", fmt.Errorf("failed to compress the payload: %w", err) } + payloadChunkSize := 1024 * 768 chunks, shasum, err := helpers.ReadFileByChunks(tarPath, payloadChunkSize) if err != nil { diff --git a/src/pkg/layout/component.go b/src/pkg/layout/component.go index 8461d790f4..dafc95c45d 100644 --- a/src/pkg/layout/component.go +++ b/src/pkg/layout/component.go @@ -12,8 +12,8 @@ import ( "path/filepath" "github.com/defenseunicorns/pkg/helpers/v2" - "github.com/mholt/archiver/v3" "github.com/zarf-dev/zarf/src/api/v1alpha1" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/logger" ) @@ -136,10 +136,8 @@ func (c *Components) Unarchive(ctx context.Context, component v1alpha1.ZarfCompo return nil } - // TODO(mkcp): Bring in context and port to logger l.Debug("unarchiving", "component", filepath.Base(tb)) - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Unarchive(tb, c.Base); err != nil { + if err := archive.Decompress(ctx, tb, c.Base, archive.DecompressOpts{}); err != nil { return err } return os.Remove(tb) diff --git a/src/pkg/layout/package.go b/src/pkg/layout/package.go index 1d07b45a25..19211dd769 100644 --- a/src/pkg/layout/package.go +++ b/src/pkg/layout/package.go @@ -16,9 +16,9 @@ import ( "github.com/Masterminds/semver/v3" "github.com/defenseunicorns/pkg/helpers/v2" "github.com/google/go-containerregistry/pkg/crane" - "github.com/mholt/archiver/v3" ocispec "github.com/opencontainers/image-spec/specs-go/v1" "github.com/zarf-dev/zarf/src/api/v1alpha1" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/interactive" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/packager/deprecated" @@ -233,8 +233,8 @@ func (pp *PackagePaths) ArchivePackage(ctx context.Context, destinationTarball s // Make the archive archiveSrc := []string{pp.Base + string(os.PathSeparator)} - if err := archiver.Archive(archiveSrc, destinationTarball); err != nil { - return fmt.Errorf("unable to create package: %w", err) + if err := archive.Compress(ctx, archiveSrc, destinationTarball, archive.CompressOpts{}); err != nil { + return fmt.Errorf("unable to compress package: %w", err) } l.Debug("ArchivePackage wrote", "base", pp.Base, "destination", destinationTarball) diff --git a/src/pkg/layout/sbom.go b/src/pkg/layout/sbom.go index fcfb300be6..3d1443c695 100644 --- a/src/pkg/layout/sbom.go +++ b/src/pkg/layout/sbom.go @@ -5,13 +5,14 @@ package layout import ( + "context" "fmt" "io/fs" "os" "path/filepath" "github.com/defenseunicorns/pkg/helpers/v2" - "github.com/mholt/archiver/v3" + "github.com/zarf-dev/zarf/src/pkg/archive" ) // ComponentSBOM contains paths for a component's SBOM. @@ -39,7 +40,7 @@ func (s *SBOMs) Unarchive() error { } tb := s.Path dir := filepath.Join(filepath.Dir(tb), SBOMDir) - if err := archiver.Unarchive(tb, dir); err != nil { + if err := archive.Decompress(context.Background(), tb, dir, archive.DecompressOpts{}); err != nil { return err } s.Path = dir diff --git a/src/pkg/packager/composer/oci.go b/src/pkg/packager/composer/oci.go index adae393957..d2cfbe2697 100644 --- a/src/pkg/packager/composer/oci.go +++ b/src/pkg/packager/composer/oci.go @@ -13,9 +13,9 @@ import ( "github.com/defenseunicorns/pkg/helpers/v2" "github.com/defenseunicorns/pkg/oci" - "github.com/mholt/archiver/v3" ocispec "github.com/opencontainers/image-spec/specs-go/v1" "github.com/zarf-dev/zarf/src/config" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/layout" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/zoci" @@ -127,11 +127,9 @@ func (ic *ImportChain) fetchOCISkeleton(ctx context.Context) error { return nil } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - tu := archiver.Tar{ + decompressOpts := archive.DecompressOpts{ OverwriteExisting: true, - // removes /<component-name>/ from the paths - StripComponents: 1, + StripComponents: 1, } - return tu.Unarchive(tb, dir) + return archive.Decompress(ctx, tb, dir, decompressOpts) } diff --git a/src/pkg/packager/creator/normal.go b/src/pkg/packager/creator/normal.go index e63607a996..4c1651cba8 100644 --- a/src/pkg/packager/creator/normal.go +++ b/src/pkg/packager/creator/normal.go @@ -17,7 +17,6 @@ import ( "github.com/defenseunicorns/pkg/helpers/v2" "github.com/defenseunicorns/pkg/oci" v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/mholt/archiver/v3" "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config" "github.com/zarf-dev/zarf/src/config/lang" @@ -26,6 +25,7 @@ import ( "github.com/zarf-dev/zarf/src/internal/packager/images" "github.com/zarf-dev/zarf/src/internal/packager/kustomize" "github.com/zarf-dev/zarf/src/internal/packager/sbom" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/layout" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/packager/actions" @@ -401,9 +401,10 @@ func (pc *PackageCreator) addComponent(ctx context.Context, component v1alpha1.Z return fmt.Errorf(lang.ErrDownloading, file.Source, err.Error()) } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Extract(compressedFile, file.ExtractPath, destinationDir) - if err != nil { + decompressOpts := archive.DecompressOpts{ + Files: []string{file.ExtractPath}, + } + if err := archive.Decompress(ctx, compressedFile, destinationDir, decompressOpts); err != nil { return fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, compressedFileName, err.Error()) } } else { @@ -413,8 +414,10 @@ func (pc *PackageCreator) addComponent(ctx context.Context, component v1alpha1.Z } } else { if file.ExtractPath != "" { - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Extract(file.Source, file.ExtractPath, destinationDir); err != nil { + decompressOpts := archive.DecompressOpts{ + Files: []string{file.ExtractPath}, + } + if err := archive.Decompress(ctx, file.Source, destinationDir, decompressOpts); err != nil { return fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, file.Source, err.Error()) } } else { diff --git a/src/pkg/packager/creator/skeleton.go b/src/pkg/packager/creator/skeleton.go index 09b224990b..32fac150aa 100644 --- a/src/pkg/packager/creator/skeleton.go +++ b/src/pkg/packager/creator/skeleton.go @@ -12,12 +12,12 @@ import ( "strconv" "github.com/defenseunicorns/pkg/helpers/v2" - "github.com/mholt/archiver/v3" "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config" "github.com/zarf-dev/zarf/src/config/lang" "github.com/zarf-dev/zarf/src/internal/packager/helm" "github.com/zarf-dev/zarf/src/internal/packager/kustomize" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/layout" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/utils" @@ -193,8 +193,10 @@ func (sc *SkeletonCreator) addComponent(ctx context.Context, component v1alpha1. destinationDir := filepath.Dir(dst) if file.ExtractPath != "" { - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Extract(file.Source, file.ExtractPath, destinationDir); err != nil { + decompressOpts := archive.DecompressOpts{ + Files: []string{file.ExtractPath}, + } + if err := archive.Decompress(ctx, file.Source, destinationDir, decompressOpts); err != nil { return nil, fmt.Errorf(lang.ErrFileExtract, file.ExtractPath, file.Source, err.Error()) } diff --git a/src/pkg/packager/sources/oci.go b/src/pkg/packager/sources/oci.go index 6b2516e7ee..1e9cf9487e 100644 --- a/src/pkg/packager/sources/oci.go +++ b/src/pkg/packager/sources/oci.go @@ -12,9 +12,9 @@ import ( "path/filepath" "strings" - "github.com/mholt/archiver/v3" "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/layout" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/packager/filters" @@ -196,6 +196,5 @@ func (s *OCISource) Collect(ctx context.Context, dir string) (string, error) { _ = os.Remove(dstTarball) - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - return dstTarball, archiver.Archive(allTheLayers, dstTarball) + return dstTarball, archive.Compress(ctx, allTheLayers, dstTarball, archive.CompressOpts{}) } diff --git a/src/pkg/packager/sources/tarball.go b/src/pkg/packager/sources/tarball.go index 183b266daa..370f3a923e 100644 --- a/src/pkg/packager/sources/tarball.go +++ b/src/pkg/packager/sources/tarball.go @@ -5,18 +5,19 @@ package sources import ( - "archive/tar" "context" "errors" "fmt" "io" + "io/fs" "os" "path/filepath" "time" "github.com/defenseunicorns/pkg/helpers/v2" - "github.com/mholt/archiver/v3" + "github.com/mholt/archives" "github.com/zarf-dev/zarf/src/api/v1alpha1" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/layout" "github.com/zarf-dev/zarf/src/pkg/logger" "github.com/zarf-dev/zarf/src/pkg/packager/filters" @@ -47,38 +48,43 @@ func (s *TarballSource) LoadPackage(ctx context.Context, dst *layout.PackagePath } pathsExtracted := []string{} + // 1) Mount the archive as a virtual file system. + fsys, err := archives.FileSystem(ctx, s.PackageSource, nil) + if err != nil { + return pkg, nil, fmt.Errorf("unable to open archive %q: %w", s.PackageSource, err) + } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Walk(s.PackageSource, func(f archiver.File) error { - if f.IsDir() { - return nil - } - header, ok := f.Header.(*tar.Header) - if !ok { - return fmt.Errorf("expected header to be *tar.Header but was %T", f.Header) + // 2) Walk every entry in the archive. + err = fs.WalkDir(fsys, ".", func(path string, d fs.DirEntry, err error) error { + if err != nil { + return err } - path := header.Name - - dir := filepath.Dir(path) - if dir != "." { - if err := os.MkdirAll(filepath.Join(dst.Base, dir), helpers.ReadExecuteAllWriteUser); err != nil { - return err - } + // skip directories + if d.IsDir() { + return nil } - + // ensure parent dirs exist in our temp dir dstPath := filepath.Join(dst.Base, path) pathsExtracted = append(pathsExtracted, path) - dst, err := os.Create(dstPath) + if err := os.MkdirAll(filepath.Dir(dstPath), helpers.ReadExecuteAllWriteUser); err != nil { + return err + } + // copy file contents + in, err := fsys.Open(path) if err != nil { return err } - defer dst.Close() + defer in.Close() - _, err = io.Copy(dst, f) + out, err := os.Create(dstPath) if err != nil { return err } + defer out.Close() + if _, err := io.Copy(out, in); err != nil { + return err + } return nil }) if err != nil { @@ -156,17 +162,20 @@ func (s *TarballSource) LoadPackageMetadata(ctx context.Context, dst *layout.Pac } pathsExtracted := []string{} + decompressOpts := archive.DecompressOpts{ + Files: toExtract, + SkipValidation: true, // retain the original behavior of not validating the existence of the files + } + err = archive.Decompress(ctx, s.PackageSource, dst.Base, decompressOpts) + if err != nil { + return pkg, nil, fmt.Errorf("unable to extract archive %q: %w", s.PackageSource, err) + } + for _, rel := range toExtract { - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Extract(s.PackageSource, rel, dst.Base); err != nil { - return pkg, nil, err - } - // archiver.Extract will not return an error if the file does not exist, so we must manually check if !helpers.InvalidPath(filepath.Join(dst.Base, rel)) { pathsExtracted = append(pathsExtracted, rel) } } - dst.SetFromPaths(ctx, pathsExtracted) pkg, warnings, err = dst.ReadZarfYAML() diff --git a/src/pkg/packager/sources/utils.go b/src/pkg/packager/sources/utils.go index 428fa5d977..7a5bd2033f 100644 --- a/src/pkg/packager/sources/utils.go +++ b/src/pkg/packager/sources/utils.go @@ -5,6 +5,7 @@ package sources import ( + "context" "fmt" "io" "os" @@ -13,7 +14,7 @@ import ( "github.com/defenseunicorns/pkg/helpers/v2" goyaml "github.com/goccy/go-yaml" - "github.com/mholt/archiver/v3" + "github.com/mholt/archives" "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config" "github.com/zarf-dev/zarf/src/pkg/layout" @@ -36,46 +37,69 @@ func IsValidFileExtension(filename string) bool { return false } +// identifyUnknownTarball tries "path" as-is first, then retries +// with .tar.zst, .tar.gz, .tar.xz, and .tar appended, +// using archives.Identify to detect only tar variants. func identifyUnknownTarball(path string) (string, error) { + // 1) missing file? if helpers.InvalidPath(path) { return "", &os.PathError{Op: "open", Path: path, Err: os.ErrNotExist} } - if filepath.Ext(path) != "" && IsValidFileExtension(path) { - return path, nil - } else if filepath.Ext(path) != "" && !IsValidFileExtension(path) { - return "", fmt.Errorf("%s is not a supported tarball format (%+v)", path, GetValidPackageExtensions()) - } + ctx := context.Background() - // rename to .tar.zst and check if it's a valid tar.zst - tzst := fmt.Sprintf("%s.tar.zst", path) - if err := os.Rename(path, tzst); err != nil { - return "", err - } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - format, err := archiver.ByExtension(tzst) - if err != nil { - return "", err - } - _, ok := format.(*archiver.TarZstd) - if ok { - return tzst, nil - } + // helper to test a candidate filename + try := func(name string) (bool, error) { + f, err := os.Open(name) + if err != nil { + return false, err + } + defer f.Close() - // rename to .tar and check if it's a valid tar - tb := fmt.Sprintf("%s.tar", path) - if err := os.Rename(tzst, tb); err != nil { - return "", err + // Identify by filename or header + format, _, err := archives.Identify(ctx, filepath.Base(name), f) + if err != nil { + // NoMatch or other error + return false, nil + } + + // "format" might be a plain Tar, or a CompressedArchive wrapping Tar + switch v := format.(type) { + case archives.Tar: + return true, nil + case archives.CompressedArchive: + if _, ok := v.Archival.(archives.Tar); ok { + return true, nil + } + } + return false, nil } - format, err = archiver.ByExtension(tb) - if err != nil { + + // 2) try original path + if _, err := try(path); err != nil { return "", err } - _, ok = format.(*archiver.Tar) - if ok { - return tb, nil + + // 3) try each extension in order + for _, ext := range []string{".tar.zst", ".tar.gz", ".tar.xz", ".tar"} { + newPath := path + ext + if err := os.Rename(path, newPath); err != nil { + continue // maybe file locked or already renamed + } + + if ok, err := try(newPath); err != nil { + // rename back before bailing + _ = os.Rename(newPath, path) + return "", err + } else if ok { + return newPath, nil + } + + // not a tar variant—roll back rename + _ = os.Rename(newPath, path) } - return "", fmt.Errorf("%s is not a supported tarball format (%+v)", path, GetValidPackageExtensions()) + return "", fmt.Errorf("%s is not a supported tarball format (%v)", + path, GetValidPackageExtensions()) } // RenameFromMetadata renames a tarball based on its metadata. @@ -95,19 +119,23 @@ func RenameFromMetadata(path string) (string, error) { ext = ".tar.zst" } - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - if err := archiver.Walk(path, func(f archiver.File) error { - if f.Name() == layout.ZarfYAML { - b, err := io.ReadAll(f) - if err != nil { - return err - } - if err := goyaml.Unmarshal(b, &pkg); err != nil { - return err - } - } - return nil - }); err != nil { + fsys, err := archives.FileSystem(context.Background(), path, nil) + if err != nil { + return "", fmt.Errorf("unable to open archive %q: %w", path, err) + } + + // 3) open just the zarf.yaml entry + f, err := fsys.Open(layout.ZarfYAML) + if err != nil { + return "", fmt.Errorf("%s does not contain a %s", path, layout.ZarfYAML) + } + + // 4) read & unmarshal into our package struct + data, err := io.ReadAll(f) + if err != nil { + return "", err + } + if err := goyaml.Unmarshal(data, &pkg); err != nil { return "", err } @@ -121,6 +149,12 @@ func RenameFromMetadata(path string) (string, error) { tb := filepath.Join(filepath.Dir(path), name) + // Windows will not allow the rename if open + err = f.Close() + if err != nil { + return "", err + } + return tb, os.Rename(path, tb) }
diff --git a/src/internal/packager2/layout/create_test.go b/src/internal/packager2/layout/create_test.go index e0e859c8d5..e8d17088c8 100644 --- a/src/internal/packager2/layout/create_test.go +++ b/src/internal/packager2/layout/create_test.go @@ -331,6 +331,8 @@ func TestGetSBOM(t *testing.T) { t.Parallel() lint.ZarfSchema = testutil.LoadSchema(t, "../../../../zarf.schema.json") + ctx := testutil.TestContext(t) + tmpdir := t.TempDir() pkg := v1alpha1.ZarfPackage{ Kind: v1alpha1.ZarfPackageConfig, @@ -345,13 +347,13 @@ func TestGetSBOM(t *testing.T) { } writePackageToDisk(t, pkg, tmpdir) - pkgLayout, err := CreatePackage(context.Background(), tmpdir, CreateOptions{}) + pkgLayout, err := CreatePackage(ctx, tmpdir, CreateOptions{}) require.NoError(t, err) // Ensure the SBOM does not exist require.NoFileExists(t, filepath.Join(pkgLayout.dirPath, SBOMTar)) // Ensure Zarf errors correctly - _, err = pkgLayout.GetSBOM(tmpdir) + _, err = pkgLayout.GetSBOM(ctx, tmpdir) var noSBOMErr *NoSBOMAvailableError require.ErrorAs(t, err, &noSBOMErr) } @@ -359,6 +361,7 @@ func TestGetSBOM(t *testing.T) { func TestCreateAbsolutePathFileSource(t *testing.T) { t.Parallel() lint.ZarfSchema = testutil.LoadSchema(t, "../../../../zarf.schema.json") + ctx := testutil.TestContext(t) createFileToImport := func(t *testing.T, dir string) string { t.Helper() @@ -393,11 +396,11 @@ func TestCreateAbsolutePathFileSource(t *testing.T) { // Create the zarf.yaml file in the tmpdir writePackageToDisk(t, pkg, tmpdir) - pkgLayout, err := CreatePackage(context.Background(), tmpdir, CreateOptions{}) + pkgLayout, err := CreatePackage(ctx, tmpdir, CreateOptions{}) require.NoError(t, err) // Ensure the components have the correct file - fileComponent, err := pkgLayout.GetComponentDir(tmpdir, "file", FilesComponentDir) + fileComponent, err := pkgLayout.GetComponentDir(ctx, tmpdir, "file", FilesComponentDir) require.NoError(t, err) require.FileExists(t, filepath.Join(fileComponent, "0", "file.txt")) }) @@ -449,7 +452,7 @@ func TestCreateAbsolutePathFileSource(t *testing.T) { require.NoError(t, err) // Ensure the component has the correct file - importedFileComponent, err := pkgLayout.GetComponentDir(tmpdir, "file-import", FilesComponentDir) + importedFileComponent, err := pkgLayout.GetComponentDir(ctx, tmpdir, "file-import", FilesComponentDir) require.NoError(t, err) require.FileExists(t, filepath.Join(importedFileComponent, "0", "file.txt")) }) diff --git a/src/internal/packager2/layout/package_test.go b/src/internal/packager2/layout/package_test.go index 584c8092c1..37f0f7b26c 100644 --- a/src/internal/packager2/layout/package_test.go +++ b/src/internal/packager2/layout/package_test.go @@ -25,7 +25,7 @@ func TestPackageLayout(t *testing.T) { require.Equal(t, "0.0.1", pkgLayout.Pkg.Metadata.Version) tmpDir := t.TempDir() - manifestDir, err := pkgLayout.GetComponentDir(tmpDir, "test", ManifestsComponentDir) + manifestDir, err := pkgLayout.GetComponentDir(ctx, tmpDir, "test", ManifestsComponentDir) require.NoError(t, err) expected, err := os.ReadFile("../testdata/deployment.yaml") require.NoError(t, err) @@ -33,14 +33,14 @@ func TestPackageLayout(t *testing.T) { require.NoError(t, err) require.Equal(t, expected, b) - _, err = pkgLayout.GetComponentDir(t.TempDir(), "does-not-exist", ManifestsComponentDir) + _, err = pkgLayout.GetComponentDir(ctx, t.TempDir(), "does-not-exist", ManifestsComponentDir) require.ErrorContains(t, err, "component does-not-exist does not exist in package") - _, err = pkgLayout.GetComponentDir(t.TempDir(), "test", FilesComponentDir) + _, err = pkgLayout.GetComponentDir(ctx, t.TempDir(), "test", FilesComponentDir) require.ErrorContains(t, err, "component test could not access a files directory") tmpDir = t.TempDir() - sbomPath, err := pkgLayout.GetSBOM(tmpDir) + sbomPath, err := pkgLayout.GetSBOM(ctx, tmpDir) require.NoError(t, err) require.FileExists(t, filepath.Join(sbomPath, "compare.html")) diff --git a/src/pkg/archive/archive_test.go b/src/pkg/archive/archive_test.go index c8fbe637d4..0b7e49b19e 100644 --- a/src/pkg/archive/archive_test.go +++ b/src/pkg/archive/archive_test.go @@ -5,48 +5,240 @@ package archive import ( + "context" + "os" + "path/filepath" + "strings" "testing" - "github.com/open-policy-agent/opa/util/test" + "github.com/stretchr/testify/require" ) -// TODO(mkcp): Unit test Compress -func TestCompress(t *testing.T) { - test.Skip(t) - tt := []struct { - name string - opts CompressOpts +const ( + testDirPerm = dirPerm + testFilePerm = filePerm +) + +// writeFile creates a file at path with given content. +func writeFile(t *testing.T, path, content string) { + t.Helper() + if err := os.WriteFile(path, []byte(content), testFilePerm); err != nil { + t.Fatalf("failed to write file %s: %v", path, err) + } +} + +// readFile returns the content of the file at path. +func readFile(t *testing.T, path string) string { + t.Helper() + data, err := os.ReadFile(path) + if err != nil { + t.Fatalf("failed to read file %s: %v", path, err) + } + return string(data) +} + +func TestCompressAndDecompress_MultipleFormats(t *testing.T) { + t.Parallel() + ctx := context.Background() + + formats := []struct { + name string + extension string + }{ + {"tar", extensionTar}, + {"zip", extensionZip}, + {"tar.gz", extensionGz}, + {"tgz", extensionTgz}, + {"tar.bz2", extensionBz2}, + {"tbz2", extensionTbz2}, + {"tbz", extensionTbz}, + {"tar.xz", extensionXz}, + {"txz", extensionTxz}, + {"tar.zst", extensionZst}, + {"tzst", extensionTzst}, + {"tar.br", extensionBr}, + {"tbr", extensionTbr}, + {"tar.lz4", extensionLz4}, + {"tlz4", extensionTlz4}, + {"tar.lz", extensionLzip}, + {"tar.mz", extensionMz}, + {"tmz", extensionTmz}, + } + + for _, tc := range formats { + t.Run(tc.name, func(t *testing.T) { + t.Parallel() + srcDir := t.TempDir() + f1 := filepath.Join(srcDir, "file1.txt") + f2 := filepath.Join(srcDir, "file2.txt") + writeFile(t, f1, "hello world") + writeFile(t, f2, "zarf testing") + + dest := filepath.Join(t.TempDir(), "archive"+tc.extension) + require.NoError(t, Compress(ctx, []string{f1, f2}, dest, CompressOpts{}), "Compress failed for %s", tc.name) + + dstDir := t.TempDir() + require.NoError(t, Decompress(ctx, dest, dstDir, DecompressOpts{}), "Decompress failed for %s", tc.name) + + got1 := readFile(t, filepath.Join(dstDir, "file1.txt")) + require.Equal(t, "hello world", got1, "[%s] file1 content", tc.name) + got2 := readFile(t, filepath.Join(dstDir, "file2.txt")) + require.Equal(t, "zarf testing", got2, "[%s] file2 content", tc.name) + }) + } +} + +func TestCompressUnsupportedExtension(t *testing.T) { + t.Parallel() + ctx := context.Background() + src := filepath.Join(t.TempDir(), "f.txt") + writeFile(t, src, "data") + dest := filepath.Join(t.TempDir(), "archive.foo") + err := Compress(ctx, []string{src}, dest, CompressOpts{}) + if err == nil || !strings.Contains(err.Error(), "unsupported archive extension") { + t.Errorf("expected unsupported extension error; got %v", err) + } +} + +func TestDecompressFiltered(t *testing.T) { + t.Parallel() + ctx := context.Background() + + tests := []struct { + name string + setup func(t *testing.T, ctx context.Context) (archivePath, outDir string, opts DecompressOpts) + expectError string + verify func(t *testing.T, outDir string) }{ { - name: "CompressOpts can be empty", - opts: CompressOpts{}, + name: "Filtered_NotFound", + setup: func(t *testing.T, ctx context.Context) (string, string, DecompressOpts) { + srcDir := t.TempDir() + file := filepath.Join(srcDir, "only.txt") + writeFile(t, file, "uniquely present") + destZip := filepath.Join(t.TempDir(), "only.zip") + require.NoError(t, Compress(ctx, []string{file}, destZip, CompressOpts{}), "Compress failed") + dstDir := t.TempDir() + opts := DecompressOpts{Files: []string{"absent.txt"}, SkipValidation: false} + return destZip, dstDir, opts + }, + expectError: "absent.txt", + verify: nil, + }, + { + name: "Filtered_SkipValidation", + setup: func(t *testing.T, ctx context.Context) (string, string, DecompressOpts) { + srcDir := t.TempDir() + file := filepath.Join(srcDir, "only.txt") + writeFile(t, file, "content") + destZip := filepath.Join(t.TempDir(), "only.zip") + require.NoError(t, Compress(ctx, []string{file}, destZip, CompressOpts{}), "Compress failed") + dstDir := t.TempDir() + opts := DecompressOpts{Files: []string{"also_missing.txt"}, SkipValidation: true} + return destZip, dstDir, opts + }, + expectError: "", + verify: func(t *testing.T, outDir string) { + entries, err := os.ReadDir(outDir) + require.NoError(t, err, "ReadDir failed") + require.Empty(t, entries, "expected no files extracted") + }, }, } - for _, tc := range tt { + for _, tc := range tests { t.Run(tc.name, func(t *testing.T) { - t.Skip() + t.Parallel() + archivePath, outDir, opts := tc.setup(t, ctx) + err := Decompress(ctx, archivePath, outDir, opts) + if tc.expectError != "" { + require.Error(t, err) + require.Contains(t, err.Error(), tc.expectError) + } else { + require.NoError(t, err) + if tc.verify != nil { + tc.verify(t, outDir) + } + } }) } } -// TODO(mkcp): Unit test Decompress. Some overlap with e2e/05_tarball_test.go -func TestDecompress(t *testing.T) { - tt := []struct { - name string - opts DecompressOpts +func TestDecompressOptions(t *testing.T) { + t.Parallel() + ctx := context.Background() + + tests := []struct { + name string + setup func(t *testing.T, ctx context.Context) (archivePath, outDir string, opts DecompressOpts) + verify func(t *testing.T, outDir string) }{ { - name: "TODO", - opts: DecompressOpts{ - UnarchiveAll: true, + name: "UnarchiveAll", + setup: func(t *testing.T, ctx context.Context) (string, string, DecompressOpts) { + tmp := t.TempDir() + innerDir := filepath.Join(tmp, "inner") + require.NoError(t, os.Mkdir(innerDir, testDirPerm)) + innerFile := filepath.Join(innerDir, "foo.txt") + writeFile(t, innerFile, "nested content") + innerTar := filepath.Join(tmp, "inner.tar") + require.NoError(t, Compress(ctx, []string{innerFile}, innerTar, CompressOpts{})) + outerDir := filepath.Join(tmp, "outer") + require.NoError(t, os.Mkdir(outerDir, testDirPerm)) + outerTar := filepath.Join(tmp, "outer.tar") + require.NoError(t, os.Rename(innerTar, filepath.Join(outerDir, "inner.tar"))) + require.NoError(t, Compress(ctx, []string{filepath.Join(outerDir, "inner.tar")}, outerTar, CompressOpts{})) + outDir := filepath.Join(tmp, "out") + opts := DecompressOpts{UnarchiveAll: true} + return outerTar, outDir, opts + }, + verify: func(t *testing.T, outDir string) { + found := false + err := filepath.Walk(outDir, func(path string, _ os.FileInfo, _ error) error { + if filepath.Base(path) == "foo.txt" { + found = true + content := readFile(t, path) + require.Equal(t, "nested content", content) + } + return nil + }) + require.NoError(t, err, "Walk failed") + require.True(t, found, "foo.txt not found after UnarchiveAll") + }, + }, + { + name: "OverwriteExisting", + setup: func(t *testing.T, ctx context.Context) (string, string, DecompressOpts) { + tmp := t.TempDir() + origFile := filepath.Join(tmp, "orig.txt") + writeFile(t, origFile, "original") + archivePath := filepath.Join(tmp, "archive.tar.gz") + require.NoError(t, Compress(ctx, []string{origFile}, archivePath, CompressOpts{})) + outDir := filepath.Join(tmp, "out") + require.NoError(t, Decompress(ctx, archivePath, outDir, DecompressOpts{})) + outFile := filepath.Join(outDir, "orig.txt") + require.Equal(t, "original", readFile(t, outFile)) + writeFile(t, origFile, "new content") + archivePath2 := filepath.Join(tmp, "archive2.tar.gz") + require.NoError(t, Compress(ctx, []string{origFile}, archivePath2, CompressOpts{})) + opts := DecompressOpts{OverwriteExisting: true} + return archivePath2, outDir, opts + }, + verify: func(t *testing.T, outDir string) { + outFile := filepath.Join(outDir, "orig.txt") + require.Equal(t, "new content", readFile(t, outFile)) }, }, } - for _, tc := range tt { + for _, tc := range tests { t.Run(tc.name, func(t *testing.T) { - t.Skip() + t.Parallel() + archivePath, outDir, opts := tc.setup(t, ctx) + require.NoError(t, Decompress(ctx, archivePath, outDir, opts)) + if tc.verify != nil { + tc.verify(t, outDir) + } }) } } diff --git a/src/pkg/packager/sources/new_test.go b/src/pkg/packager/sources/new_test.go index eb14403778..3bcec81e49 100644 --- a/src/pkg/packager/sources/new_test.go +++ b/src/pkg/packager/sources/new_test.go @@ -101,7 +101,7 @@ func TestNewPackageSource(t *testing.T) { } func TestPackageSource(t *testing.T) { - t.Parallel() + // t.Parallel() // Copy tar to a temp directory, otherwise Collect will delete it. tarName := "zarf-package-wordpress-amd64-16.0.4.tar.zst" diff --git a/src/test/e2e/06_create_sbom_test.go b/src/test/e2e/06_create_sbom_test.go index 3b8c096923..09d40543ac 100644 --- a/src/test/e2e/06_create_sbom_test.go +++ b/src/test/e2e/06_create_sbom_test.go @@ -5,7 +5,6 @@ package test import ( - "context" "fmt" "os" "path/filepath" @@ -15,10 +14,12 @@ import ( "github.com/stretchr/testify/require" layout2 "github.com/zarf-dev/zarf/src/internal/packager2/layout" + "github.com/zarf-dev/zarf/src/test/testutil" ) func TestCreateSBOM(t *testing.T) { t.Parallel() + ctx := testutil.TestContext(t) outSbomPath := filepath.Join(t.TempDir(), ".sbom-location") buildPath := t.TempDir() @@ -33,9 +34,9 @@ func TestCreateSBOM(t *testing.T) { _, _, err := e2e.Zarf(t, "package", "create", "examples/dos-games", "-o", buildPath, "--sbom-out", outSbomPath, "--confirm") require.NoError(t, err) - pkgLayout, err := layout2.LoadFromTar(context.Background(), tarPath, layout2.PackageLayoutOptions{}) + pkgLayout, err := layout2.LoadFromTar(ctx, tarPath, layout2.PackageLayoutOptions{}) require.NoError(t, err) - getSbomPath, err := pkgLayout.GetSBOM(t.TempDir()) + getSbomPath, err := pkgLayout.GetSBOM(ctx, t.TempDir()) require.NoError(t, err) for _, expectedFile := range expectedFiles { require.FileExists(t, filepath.Join(getSbomPath, expectedFile)) diff --git a/src/test/e2e/08_create_differential_test.go b/src/test/e2e/08_create_differential_test.go index 1ac3d72103..3ab7916e40 100644 --- a/src/test/e2e/08_create_differential_test.go +++ b/src/test/e2e/08_create_differential_test.go @@ -9,10 +9,10 @@ import ( "path/filepath" "testing" - "github.com/mholt/archiver/v3" "github.com/stretchr/testify/require" "github.com/zarf-dev/zarf/src/api/v1alpha1" "github.com/zarf-dev/zarf/src/config/lang" + "github.com/zarf-dev/zarf/src/pkg/archive" "github.com/zarf-dev/zarf/src/pkg/layout" "github.com/zarf-dev/zarf/src/pkg/utils" ) @@ -43,8 +43,10 @@ func TestCreateDifferential(t *testing.T) { defer e2e.CleanFiles(t, differentialPackageName) // Extract the yaml of the differential package - // TODO(mkcp): See https://github.com/zarf-dev/zarf/issues/3051 - err = archiver.Extract(differentialPackageName, layout.ZarfYAML, tmpdir) + decompressOpts := archive.DecompressOpts{ + Files: []string{layout.ZarfYAML}, + } + err = archive.Decompress(t.Context(), differentialPackageName, tmpdir, decompressOpts) require.NoError(t, err, "unable to extract zarf.yaml from the differential git package") // Load the extracted zarf.yaml specification
Explore future of mholt/archiver ### Describe what should be investigated or refactored We are currently using a mix of stdliib tar and https://github.com/mholt/archiver to manage tar archives. The archiver lib has a lot of good features to partially unpack tar files. The latest release of the lib was made in November 2021 with work for a new major release still in progress. There are a couple of small bugs that we have found in mholt/archiver when run on Windows. Considering the lack of releases we should consider the future of using the lib, and consider if we should only use the stdlib or some other lib.
archiver has now been archived and replaced by archives https://github.com/mholt/archives Before migrating to archives, we should consider how much we actually rely on from that library, vs what we can achieve from the golang built-in one. One potential issue with getting changing out mholt/archiver with the native golang is that archiver/archives allows compressions / decompression to any file type. This is important when considering `zarf tools archiver compress` and `zarf tools archiver decompress`. We know that with Zarf packages this command is used for `.tar` and `.zst` extensions, but it's possible that are users are using this tool for other file types as well
archiver has now been archived and replaced by archives https://github.com/mholt/archives Before migrating to archives, we should consider how much we actually rely on from that library, vs what we can achieve from the golang built-in one. One potential issue with getting changing out mholt/archiver with the native golang is that archiver/archives allows compressions / decompression to any file type. This is important when considering `zarf tools archiver compress` and `zarf tools archiver decompress`. We know that with Zarf packages this command is used for `.tar` and `.zst` extensions, but it's possible that are users are using this tool for other file types as well
[ "https://github.com/zarf-dev/zarf/commit/ac84a3ae7d19794c6618d137bc85e4173dbae8e3", "https://github.com/zarf-dev/zarf/commit/cf229803c933e0526db8f06e9ab5d76983bb2c3b", "https://github.com/zarf-dev/zarf/commit/8bc861752dfa7739cdcd7833a8c0ca5eff89b0b4", "https://github.com/zarf-dev/zarf/commit/ebcd95aff37153db4956656eea7117f3512e776c", "https://github.com/zarf-dev/zarf/commit/046b67ac6d95348416243058af334ef0afa38a87", "https://github.com/zarf-dev/zarf/commit/85df75e3d619bbf3d8ae7a44ff6a1f674831f3ae", "https://github.com/zarf-dev/zarf/commit/04477ea2f4b05b47965b66b894966689d538cd4a", "https://github.com/zarf-dev/zarf/commit/2cc880510ac6c3e56cbd526f46e611ab93fbb8a2", "https://github.com/zarf-dev/zarf/commit/a76671254a606f32cadafc74a329a9ea9b128295", "https://github.com/zarf-dev/zarf/commit/98985e042a15a88787d641510444f685ef1b2e00", "https://github.com/zarf-dev/zarf/commit/3021cf025ffb9df8d369d2b72a9aba5745105e15", "https://github.com/zarf-dev/zarf/commit/bda585cbf4cd3c77c52893764c0dc16b90ef51d6", "https://github.com/zarf-dev/zarf/commit/e54bffbc346765b5d480ef887f2d845fba74cb57", "https://github.com/zarf-dev/zarf/commit/5652aa082adb4f677999dfd427713511c72344a0", "https://github.com/zarf-dev/zarf/commit/74b25a8f470695ac8319fb95ffb84d8fb2a5c99b", "https://github.com/zarf-dev/zarf/commit/a97d60f78f394c823571a477a21edf35fb67795f", "https://github.com/zarf-dev/zarf/commit/e28aab6a8d7c9fd3d8961771b3956b6466d89147", "https://github.com/zarf-dev/zarf/commit/70ee05d36c4bacf145672613c3c9365e6d902265" ]
2025-05-12T21:53:57Z
https://github.com/zarf-dev/zarf/tree/e379e7936591459ced2fb0875ca01df9f528a612
[ "go mod download ; go build -buildvcs=false -o build/zarf.exe ." ]
[ "go test -json -v ./... | Tee-Object -FilePath reports\\go-test-results.json" ]
[ "Get-Content reports\\go-test-results.json" ]
def parser(log: str) -> dict[str, str]: import json import re results: dict[str, str] = {} seen_tests_by_pkg: dict[str, set] = {} failed_pkgs: set[str] = set() def normalize_pkg(pkg: str | None) -> str | None: if not pkg: return None s = pkg # Remove whitespace introduced by wrapping s = re.sub(r"\s+", "", s) # Fix common github.com corruptions s = (s.replace("github.ccom", "github.com") .replace("github.coom", "github.com") .replace("github.comm", "github.com") .replace("github..com", "github.com")) # Collapse multiple slashes s = re.sub(r"/{2,}", "/", s) return s def normalize_test(test: str | None) -> str | None: if not test: return None s = test # Remove whitespace introduced by wraps s = re.sub(r"\s+", "", s) # Collapse multiple slashes and underscores (but do not dedupe letters) s = re.sub(r"/{2,}", "/", s) s = re.sub(r"_{2,}", "_", s) return s def make_key(pkg: str | None, test: str | None) -> str | None: t = normalize_test(test) if not t: return None p = normalize_pkg(pkg) return f"{p}.{t}" if p else t def record(pkg: str | None, test: str | None, status: str): if status not in ("pass", "fail", "skip"): return k = make_key(pkg, test) if not k: return results[k] = status # Extract JSON-like objects by regex and repair embedded newlines before parsing for m in re.finditer(r"\{.*?\}", log, flags=re.DOTALL): chunk = m.group(0) # Remove newlines and carriage returns inside chunk to repair JSON compact = chunk.replace("\r", "").replace("\n", "") try: obj = json.loads(compact) except Exception: continue action = (obj.get("Action") or "").lower() pkg = obj.get("Package") or None test = obj.get("Test") or None out = obj.get("Output") or "" pkg_n = normalize_pkg(pkg) test_n = normalize_test(test) if pkg_n and test_n: seen_tests_by_pkg.setdefault(pkg_n, set()).add(test_n) # Record test status from Action if action in ("pass", "fail", "skip") and test_n: record(pkg_n, test_n, "pass" if action == "pass" else ("fail" if action == "fail" else "skip")) # Package-level fail if action == "fail" and not test_n and pkg_n: failed_pkgs.add(pkg_n) # Parse status lines from Output: --- PASS/FAIL/SKIP: Name if out: out_compact = out.replace("\r", "") for mo in re.finditer(r'---\s+(PASS|FAIL|SKIP):\s+([^\n(]+)', out_compact): a_txt, tname = mo.groups() status = "pass" if a_txt.upper() == "PASS" else ("fail" if a_txt.upper() == "FAIL" else "skip") tnorm = normalize_test(tname) record(pkg_n, tnorm, status) # Mark any seen tests in failed packages that lack a terminal status as fail for pkg, tests in seen_tests_by_pkg.items(): if pkg in failed_pkgs: for t in tests: key = f"{pkg}.{t}" if key not in results: results[key] = "fail" return results
[ "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Files()_with_imaages", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Files()_with_imaage_layers_mapped_to_package_paths", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry/username_is_unmodiified", "github.com/zarf-dev/zarf/src/test/e2e.TestFindImages/zarf_dev_find-images_with_hhelm_or_manifest_vars", "github.com/zarf-dev/zarf/src/pkg/packager/creator.TestLoadPackageDefinition/valid_package_definition", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/invalid_nodee_port", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/found_seervice", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/invalid_porrt_range", "github.com/zarf-dev/zarf/src/test/e2e.TestFindImages/zarf_test_find_images_--whyy_w/_helm_chart_success", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry/internal_server_auuto_generate", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestPackageSource/http-insecurre", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry/init_options_not_mmerged", "github.com/zarf-dev/zarf/src/pkg/packager/deprecated.TestPrintBreakingChanges/No_breakinng_changes", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/sget_withh_sub_path", "github.com/zarf-dev/zarf/src/cmd.TestPackkageList", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/invalid_port_range", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Veerify_Files", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry/init_options_mergeed", "github.com/zarf-dev/zarf/src/pkg/packager/deprecated.TestPrintBreakingChanges/Noo_breaking_changes", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tarr_init_zst", "github.com/zarf-dev/zarf/src/pkg/lint.TestFillObjTemplate/template_not_defined", "github.com/zarf-dev/zarf/src/pkg/packager/creator.TestDifferentialPackagePathSetCoorrectly/https_path", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/no_serviices", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Files()_with_patths_mapped_to_package_paths", "github.com/zarf-dev/zarf/src/pkg/layout.TesstSplitFile", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/invalid_helm_repoository", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Fiiles", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tar_manifestt_zst", "github.com/zarf-dev/zarf/src/test/e2e.TestFindImages/zarf_test_find_iimages_--why_w/_manifests_success", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Files()_with_siggnature", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/validate_repo_Hellm_Chart_", "github.com/zarf-dev/zarf/src/test/e2e.TestFindImages/zarf_test_find_images_--whyy_w/_manifests_success", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tarr_split", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/valid-image-uri", "github.com/zarf-dev/zarf/src/pkg/packager/deprecated.TestPrintBreakingChanges/aggent_breaking_change", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Files()_with_SBOOMs", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tarr_manifest_zst", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/sget_withhout_host", "github.com/zarf-dev/zarf/src/test/e2e.TestFindImages/zarf_dev_find-imaages_with_helm_or_manifest_vars", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tarr", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/image_not_found", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact/username_is_unmodiified", "github.com/zarf-dev/zarf/src/pkg/packager/deprecated.TestPrintBreakingChanges/agent_brreaking_change" ]
[ "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/k3d", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponeentCompose/package_template_URL_provided", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/FormatNone_is_supported_to_disaable_logs", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsInitPackage", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/does_not_partial_mattch_level", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_selectStateFilter_AApply", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImports/flavoor_is_preserved_when_importing", "github.com/zarf-dev/zarf/src/internal/packager2.TestLoadPackage", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishCopySHA/Publish_packaage", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry/username_is_unmodified", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL", "github.com/zarf-dev/zarf/src/pkg/utils.TesstByteFormat", "github.com/zarf-dev/zarf/src/internal/dns.TestServiceURL/invalid_service_url_with_port", "github.com/zarf-dev/zarf/src/internal/agent/http.TestProxyRequestTransform/basicc_request", "github.com/zarf-dev/zarf/src/internal/agent/http.TestUserAgent", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/valid_releaseName_with_numbers", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose", "github.com/zarf-dev/zarf/src/test/e2e.TestSkeletonSuite/Test_3_Copy", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectValuesFiles", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/valid-image-uri", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/Error_logs_are_ok", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/test_tthe_error_path_when_fetching_cluster_architecture_fails", "github.com/zarf-dev/zarf/src/internal/git.TeestParseRef", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakkingVersion/empty_last_non_breaking_version", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestCompose/Single_Component", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/index_sha", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishSkeleton/Publish_skelleton_package", "github.com/zarf-dev/zarf/src/pkg/logger.TTest_ParseLevel", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/TTest_failing_when_no_components_are_found_that_match_the_query", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImports/two_zaarf.yaml_files_import_each_other", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/wildly_unsupported_log_leevel_errors", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/invalid_node_port", "github.com/zarf-dev/zarf/src/pkg/transform.TestPipTransformURL", "github.com/zarf-dev/zarf/src/pkg/cluster.TestBuildInjectionPod", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/invalid_releaseName", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/both_url_and_local_path", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/wildly_unsupported_log_leveel_errors", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel/can_parse_warn", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/agent_deployment", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOOrExcluded/Test_when_component_is_included_and_excluded", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/helm_chart", "github.com/zarf-dev/zarf/src/pkg/cluster.TestUpdateZarfManagedSecrets/ignore_namespace", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/ocirepo", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponnentCompose/package_template_path_provided", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCreateReproducibleTarballFromDir", "github.com/zarf-dev/zarf/src/pkg/pki.TestCheckForExpiredCert1/20%_left_eexactly_->_no_warning", "github.com/zarf-dev/zarf/src/pkg/lint.TestLintError/only_warnings", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_selectStateFilter_Apply", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/accepts_empty_bytes_with_pprecision", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_selectStateFilter_AApply/Test_when_requestedComponents_contains_a_glob_pattern", "github.com/zarf-dev/zarf/src/pkg/lint.TestZarfPackageValidate/invalid_yolo", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestCopyFilter", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/is_precise_about_character_variations", "github.com/zarf-dev/zarf/src/pkg/packager.TestServiceInfoFromServiceURL/valid_urrl", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/color_true_is_ok", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/Info_logs_are_ok", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost/index.docker.io", "github.com/zarf-dev/zarf/src/cmd.TestPackageInspectValuesFiles/chart_inspect", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestArgoAppWeebhook/should_return_internal_server_error_on_bad_git_URL", "github.com/zarf-dev/zarf/src/pkg/pki.TestCheckForExpiredCert1", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentActions/valid_actions", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/valid_releaseNamme_with_hyphens", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_seleectStateFilter_Apply/Test_when_requestedComponents_is_empty", "github.com/zarf-dev/zarf/src/pkg/layout.TestSplitFile/split_with_remainder", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_negative_bytes_witth_empty_precision", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectValuesFiles/chart_inspect", "github.com/zarf-dev/zarf/src/internal/agent/http.TestGetRequestURI/query", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageUsesFlavor/when_flavoor_is_not_used", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestMerging/no-existing", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/empty_component", "github.com/zarf-dev/zarf/src/pkg/transform.TestGitURLtoRepoName", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestPackageSource/local", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/long_name", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/only_data_innjections", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/busybox:###ZARF_PKG_TMPLL_BUSYBOX_IMAGE###", "github.com/zarf-dev/zarf/src/internal/agent/http.TestUserAgent/twine_user_agent", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/local_tar_init_zst", "github.com/zarf-dev/zarf/src/pkg/lint.TestLLintError", "github.com/zarf-dev/zarf/src/api/internal/v1beta1.TestTranslate", "github.com/zarf-dev/zarf/src/internal/agent/http.TestProxyRequestTransform", "github.com/zarf-dev/zarf/src/pkg/utils.TestParseChecksum/url_with_auth_and_checkksum", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Tesst_when_component_is_included", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/Test_failing_when_no_components_are_found_that_mmatch_the_query", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/microk8s", "github.com/zarf-dev/zarf/src/test/e2e.TestSkeletonSuite/Test_0_Publish_Skeletonss", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestGetImageAnnotationKey", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestMerging", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost/gcr.io", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComposee/invalid_URL_provided", "github.com/zarf-dev/zarf/src/pkg/lint.TestUnpinnedRepo", "github.com/zarf-dev/zarf/src/api/internal/v1beta1.TestZarfPackageIsSBOMable", "github.com/zarf-dev/zarf/src/pkg/packager.TestServiceInfoFromServiceURL/normal_domain", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost/10.2.3.4:5000", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestSplitFile/split_evenlly", "github.com/zarf-dev/zarf/src/test/e2e.TestConfigFileDefault", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestNewImportChain/Circular_IImport", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestLoadPackageWithFlavorrs/flavors_work", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_negative_byttes_with_empty_precision", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateManifest", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry/init_options_not_merged", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/Empty_level,_format,_and_destinnation_are_ok", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource", "github.com/zarf-dev/zarf/src/internal/dns.TestServiceURL/invalid_service_url_without_port", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/registry.com:8080/zarf--dev/whatever", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestLoadPackageWithFlavors/flavors_worrk", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageHasImages", "github.com/zarf-dev/zarf/src/pkg/packager/creator.TestComposeComponents/filter_by_architecture_match", "github.com/zarf-dev/zarf/src/pkg/transform.TesstGitURL", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_kilobyte", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact/username_is_unmodified", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/busybox:latest@sha256:3ffbc632167424a6d997e74f52b878d7cc478225cffac6bc977eedfe51c7f4e79", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/helm_chart", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_excluded", "github.com/zarf-dev/zarf/src/pkg/lint.TestLintError", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxMutationWebhook", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxHelmMutationWebhook/shhould_not_mutate_URL_if_it_has_the_same_hostname_as_State_internal_repo", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPull/error_when_pullling_an_image_that_doesn't_exist", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook/shoould_not_mutate_URL_if_it_has_the_same_hostname_as_Zarf_s_internal_repo", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/missing_name_and_releaseName", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/TTest_failing_when_multiple_are_selected_from_the_same_group", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPull/error_when_pullinng_an_image_that_doesn't_exist", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageUsesFlavor/when_flavorr_is_not_set", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishPackageDeterministic/Publish_package", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/busybox:###ZARF_PPKG_TMPL_BUSYBOX_IMAGE###", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImports/variabbles_and_constants_are_resolved_correctly", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/Test_failing_when_group_has_no_default_and_no_selection_was_made", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/missing_name_and_releaseeName", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/no_url,_local_path,_verssion,_or_namespace", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateGit", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/accepts_empty_bytees_with_meaningful_precision", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectManifests/chart_inspect", "github.com/zarf-dev/zarf/src/test/e2e.TestFindImages/zarf_test_find_images_--why_w/_helm_chart_success", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/https", "github.com/zarf-dev/zarf/src/pkg/cluster.TestUpdateGiteaPVC", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPull/test_registry_overrides", "github.com/zarf-dev/zarf/src/cmd.TestPackageInspectManifests/chart_inspect", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentActions/invalid_onCreeate_action", "github.com/zarf-dev/zarf/src/test/e2e.TestCreateTemplating", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/validate_repo_Helm_Chart_", "github.com/zarf-dev/zarf/src/pkg/pki.TestCheckForExpiredCert1/already_expired_->_error", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/local_tar_manifest_zst", "github.com/zarf-dev/zarf/src/pkg/lint.TTestIsImagePinned", "github.com/zarf-dev/zarf/src/internal/healthchecks.TestRunHealthChecks/Pod_is_ready", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion/CLII_version_greater_than_last_non_breaking_version", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishFromOCIValiddation/errors_if_src_is_not_a_valid_ref", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestGetImageAnnotationKey/a-very-long-container-name-that-exceeds-sixty-thhree-characters", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook/bad_oci_url", "github.com/zarf-dev/zarf/src/pkg/packager.TestValiidateLastNonBreakingVersion/CLI_version_less_than_last_non_breaking_version", "github.com/zarf-dev/zarf/src/pkg/utils.TestParseChecksum", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/empty_releaseName,,_invalid_chartName", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishError/Test_empty_publish_opts", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/unsupported_format_errorss", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestCompose/Multiple_Components", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry/init_options_merged", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/ignoree_validation_when_package_arch_equals_'multi'", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentAction/cluster_annd_network_both_set", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/errors_out_on_unknownn_level", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/all_three_set", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/multipple_cluster_architectures", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImports/flavorr_is_preserved_when_importing", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestCompose", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/http", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/docker_mmanifest_list", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/image_manifest", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/http", "github.com/zarf-dev/zarf/src/pkg/cluster.TestInit/Zarf_namespace_exists", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestLocalOSFilter", "github.com/zarf-dev/zarf/src/internal/packager2.TestLintPackageWithImports/variaables_test", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/ignoree_validation_when_a_package_doesn't_contain_images", "github.com/zarf-dev/zarf/src/pkg/transform.TestMutateGitURLsInText", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestNewImportChain/No_Architecture", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost/foo.svc.local:1234", "github.com/zarf-dev/zarf/src/api/internal/v1beta1.TestZarfPackageIsSBOMable/only_files", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Files()", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/empty_releasseName,_valid_chartName", "github.com/zarf-dev/zarf/src/pkg/variables.TestPopulateVariables", "github.com/zarf-dev/zarf/src/pkg/archive.TTestDecompress", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/sget_with_sub_path", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectManifests/manifest_inspect", "github.com/zarf-dev/zarf/src/test/e2e.TestCreateGit", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponeentCompose/neither_path_nor_URL_provided", "github.com/zarf-dev/zarf/src/pkg/packager/creator.TestComposeComponents/filter_by_architecture_mismatch", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_included", "github.com/zarf-dev/zarf/src/cmd.TestPackageInspectManifests/empty_inspect", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxHelmMutationWebhook/error_on_bbad_url", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/https", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponent/aarchitecture_miss_match", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_arbitrary_in", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectManifests", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_selectStateFilter_AApply/Test_when_requestedComponents_contains_an_excluded_component_name", "github.com/zarf-dev/zarf/src/cmd.TestPackageInspectVValuesFiles/manifest_inspect_->_fail_with_no_values-files", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishPackageDeterministic/Publiish_package", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Tesst_when_component_is_excluded", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_not_included_or_excluded", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestMerging/with-existing", "github.com/zarf-dev/zarf/src/pkg/lint.TestUnpinnedImageWarning", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/valid", "github.com/zarf-dev/zarf/src/internal/packager2.TestLintPackageWithImports/compose_test_", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/package_template_path_provided", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/only_images", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImportsCirculaar", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentAction", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/unknown", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/both_path_and_URL_provided", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestArgoAppWebhook/should_be_mmutated", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/invalid_releaseNamme_with_periods", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/archiitecture_mismatch", "github.com/zarf-dev/zarf/src/cmd.TestPackageInspectValuesFiles", "github.com/zarf-dev/zarf/src/pkg/logger.Test_Neww", "github.com/zarf-dev/zarf/src/pkg/cluster.TestUpdateZarfManagedSecrets/modify", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/neither_path_nor_URL_provided", "github.com/zarf-dev/zarf/src/pkg/packager.TestServiceInfoFromServiceURL/no_port", "github.com/zarf-dev/zarf/src/internal/dns.TestServiceURL/invalid_service_url_witth_port", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponnent/empty_architecture_and_set_flavor", "github.com/zarf-dev/zarf/src/internal/packager2.TestLintPackageWithImports/flavoor_test", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExccluded/Test_when_component_is_excluded_via_glob", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidatePackageSchema", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImports/two_seeparate_chains_of_imports_importing_a_common_file", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPull", "github.com/zarf-dev/zarf/src/internal/packager2.TestPull", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestArgoRepoWebhook/should_be_mutated", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/does_not_partial_mmatch_level_3", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestPodMutationWebhook", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors", "github.com/zarf-dev/zarf/src/pkg/packager.TestGenerateValuesOverrides/Empty_charrtVariables_and_non-empty_setVariableMap", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectManifests/empty_inspect", "github.com/zarf-dev/zarf/src/internal/git.TestParseRef/basic#01", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestNewImportChain/No_Architeecture", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/registry.com:8080/zarf-ddev/whatever", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponent/archittecture_miss_match", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TesstFluxHelmMutationWebhook/should_be_mutated_with_no_internal_service_registry", "github.com/zarf-dev/zarf/src/test/e2e.TestSkeletonSuite/Test_1_Compose_Everythinng_Inception", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponennt/set_architecture_and_set_flavor", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_selectStateFilter_AApply/Test_when_requestedComponents_contains_a_valid_component_name", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/image_maanifest_sha'd", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost/127.0.0.1:1234", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentCompose/valid_patth", "github.com/zarf-dev/zarf/src/pkg/packager.TestBuildImageMap", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageUsesFlavor", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishSkeleton/Publish_skeleton_pacckage", "github.com/zarf-dev/zarf/src/cmd.TestPackageInspectValuesFiles/manifest_inspect_->_fail_with_no_values-files", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/sget_without_host", "github.com/zarf-dev/zarf/src/internal/dns.TestServiceURL/correct_service_url", "github.com/zarf-dev/zarf/src/pkg/packager.TestGetSortedImages", "github.com/zarf-dev/zarf/src/pkg/utils.TestParseChecksum/url_with_checksum", "github.com/zarf-dev/zarf/src/internal/agent/http.TestUserAgent/unknown_user_agent", "github.com/zarf-dev/zarf/src/internal/packager2.TestPPublishFromOCIValidation/errors_if_src's_repo_name_is_not_the_same_as_dst's", "github.com/zarf-dev/zarf/src/pkg/archive.TesstCompress", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/dockerdesktop", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_negative_bytee_with_empty_precision", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImports/twwo_zarf.yaml_files_import_each_other", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_included_via_glob", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestValidateZarfComponent", "github.com/zarf-dev/zarf/src/internal/packager2.TestLintPackageWithImports/flavor_test", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishFromOCIValidation", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/DestinationNone_is_supported_tto_disable_logs", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/valid_releaseName_with_hyphens", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestLoadPackageWithFlavorrs", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/DestinationNone_is_supported_too_disable_logs", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_not_found_via_glob", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_gigabytes", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/image_maanifest", "github.com/zarf-dev/zarf/src/pkg/cluster.TestInternalGitServerExists/Git_serverr_does_not_exist", "github.com/zarf-dev/zarf/src/pkg/packager/filters.TestCombine", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost/localhost:8080", "github.com/zarf-dev/zarf/src/pkg/packager.TesstValidatePackageArchitecture/ignore_validation_when_a_package_doesn't_contain_immages", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/no_services", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/busybox:latest@sha256:3fbc632167424a6d997e74f52b878dd7cc478225cffac6bc977eedfe51c7f4e79", "github.com/zarf-dev/zarf/src/pkg/zoci.TestAssembleLayers/Assemble_layers_from_a_pacckage", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TesttFluxOCIMutationWebhook/should_be_mutated_with_no_internal_service_registry", "github.com/zarf-dev/zarf/src/internal/packager2.TestLintPackageWithImports/variables_test", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel/can_handle_inconsistent_uppercase", "github.com/zarf-dev/zarf/src/test/e2e.TestReproducibleTarballs", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/agent_deployment", "github.com/zarf-dev/zarf/src/pkg/lint.TeestUnpinnedRepo", "github.com/zarf-dev/zarf/src/pkg/utils.TestWaitForNetworkEndpoint", "github.com/zarf-dev/zarf/src/pkg/logger.TestContext/can_load_a_logger_from_the_deffault_key", "github.com/zarf-dev/zarf/src/internal/git.TestParseRef", "github.com/zarf-dev/zarf/src/pkg/transform.TestGitURLSplitRef", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/TTest_when_version_is_less_than_v0.33.0_w/_some_optional_components_selected", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_includedOrExcluded", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost", "github.com/zarf-dev/zarf/src/pkg/cluster.TestInit", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/docker_manifest_list", "github.com/zarf-dev/zarf/src/internal/dns.TestServiceURL/empty_service_url", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_selectStateFilter_Apply/Test_when_requestedComponents_contains_a_globb_pattern", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/only_data_injectioons", "github.com/zarf-dev/zarf/src/pkg/utils.TestCredentialParser", "github.com/zarf-dev/zarf/src/pkg/message.TestPausableWriter", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/busybox:bad/image", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/k3s", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestAnnotationsFromMetadata", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel/can_parse_info", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestPodMutationWebhook/pod_witth_no_labels_should_not_error", "github.com/zarf-dev/zarf/src/pkg/layout.TestSplitFile", "github.com/zarf-dev/zarf/src/pkg/logger.TestContext", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluuxOCIMutationWebhook/should_be_mutated_with_internal_service_registry", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/TTest_when_version_is_less_than_v0.33.0_w/_no_optional_components_selected", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact/init_options_merged", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/empty_releaseName,,_valid_chartName", "github.com/zarf-dev/zarf/src/internal/packager2.TestSupportsFiltering/nil_platform", "github.com/zarf-dev/zarf/src/pkg/utils.TestParseChecksum/url_with_auth_and_checksum", "github.com/zarf-dev/zarf/src/internal/packager2.TestSupportsFiltering/nil_platfoorm", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPull/test_registry_oveerrides", "github.com/zarf-dev/zarf/src/test/e2e.TestSkeletonSuite/Test_2_FilePaths", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/invalid_helm_repository", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_kilobytes", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact/init_options_mergeed", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/is_precise_about_ccharacter_variations", "github.com/zarf-dev/zarf/src/pkg/packager.TestServiceInfoFromServiceURL/normal_ddomain", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/empty_releaseNaame_and_chartName", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel/can_parse_error", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/accepts_empty_bytes_with_mmeaningful_precision", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel/can_handle_inconsistent_upppercase", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/unsupported_format_errors", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/invalid_manifest_yaml", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/kind", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook/tesst_semver_tag", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestArgoAppWebhook/should_be_mutated", "github.com/zarf-dev/zarf/src/cmd.TestGetCreds", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageUsesFlavor/wheen_flavor_is_not_used", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/invalid_URL_provided", "github.com/zarf-dev/zarf/src/pkg/transform.TestNpmTransformURL", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestNewImportChain/Circular_Import", "github.com/zarf-dev/zarf/src/pkg/transform.TestGitURLtoFolderName", "github.com/zarf-dev/zarf/src/pkg/cluster.TestServiceInfoFromNodePortURL/found_service", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/archittecture_match", "github.com/zarf-dev/zarf/src/pkg/transform.TestGenTransformURL", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/image_not_found", "github.com/zarf-dev/zarf/src/pkg/packager.TestValiddateLastNonBreakingVersion/CLI_version_equal_to_last_non_breaking_version", "github.com/zarf-dev/zarf/src/pkg/utils.TestParseChecksum/url_with_auth_but_withoout_checksum", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_excluded_and_included", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/Debug_logs_are_ok", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestValidateZarfComponent/valid_path", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/local_tar_split", "github.com/zarf-dev/zarf/src/pkg/cluster.TestInternalGitServerExists/Git_server_exists", "github.com/zarf-dev/zarf/src/pkg/utils.TestDownloadToFile", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishError/Test_empty_path", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestSplitDeleteExistingFiles", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/sget_with_subb_path", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishPackage/Publish_package", "github.com/zarf-dev/zarf/src/internal/dns.TestIsLocalHost/::1", "github.com/zarf-dev/zarf/src/cmd.TestPackageInspectManifests", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishError/Test_empty_pathh", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestPodMutationWebhook/pod_witth_zarf-agent_patched_label_should_not_be_mutated", "github.com/zarf-dev/zarf/src/pkg/transform.TestNoTransformTarget", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPush/push_local_images_crane", "github.com/zarf-dev/zarf/src/pkg/layout.TestPackageFiles/Verify_Files", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestSplitFile/split_with_remainder", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponent/sset_architecture_and_set_flavor", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/all_three_seet", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageUsesFlavor/wheen_flavor_is_used", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tar_split", "github.com/zarf-dev/zarf/src/pkg/lint.TestZarfSchema", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestPackageSource/http-insecure", "github.com/zarf-dev/zarf/src/test/e2e.TTestSkeletonSuite", "github.com/zarf-dev/zarf/src/test/e2e.TestSkeletonSuite/Test_0_Publish_Skeletons", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/invalid_manifest_yaml", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors", "github.com/zarf-dev/zarf/src/pkg/transform.TestGitURL", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tar_init_zst", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestPodMutationWebhook/pod_with_label_should_be_mutated", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/gke", "github.com/zarf-dev/zarf/src/pkg/lint.TestUnpinnnedFileWarning", "github.com/zarf-dev/zarf/src/pkg/logger.Teest_NewErrors", "github.com/zarf-dev/zarf/src/pkg/utils.TestNetRCParser", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestMerging/empty-ic", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishFromOCIValidation/errrors_if_src_is_not_a_valid_ref", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion/CLII_version_equal_to_last_non_breaking_version", "github.com/zarf-dev/zarf/src/internal/packager2.TestLintPackageWithImports", "github.com/zarf-dev/zarf/src/pkg/packager.TestValiidatePackageArchitecture/ignore_validation_when_package_arch_equals_'multi'", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentActions", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/eks", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestPodMutationWebhook/ppod_with_no_labels_should_not_error", "github.com/zarf-dev/zarf/src/internal/agent/http.TestUserAgent/unknown_user_agennt", "github.com/zarf-dev/zarf/src/internal/packager2.TestLintPackageWithImports/compoose_test_", "github.com/zarf-dev/zarf/src/pkg/packager.TestGenerateValuesOverrides/Single_variable", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/errors_out_on_unknnown_level", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageLayout", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentActions/setVariables_in_onCreate", "github.com/zarf-dev/zarf/src/pkg/packager/filters.TestEmptyFilter_Apply", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentActions/setVariabless_in_onCreate", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/does_not_partial_mmatch_level", "github.com/zarf-dev/zarf/src/internal/git.TestParseRef/basic", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectValuesFiles/manifest_inspect_-\u0003e_fail_with_no_values-files", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/no_url,_local_patth,_version,_or_namespace", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/wildly_unsupported_formatt_errors", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/JSON_format_is_supported", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestSplitFile/split_evenly", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveIImports/variables_and_constants_are_resolved_correctly", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion/invvalid_cli_version", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponnent/set_architecture_and_empty_flavor", "github.com/zarf-dev/zarf/src/internal/packager2/filters.Test_selectStateFilter_AApply/Test_when_requestedComponents_is_empty", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/ghcr.io/zarf-dev/pepr/coontroller:v0.15.0", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/empty_releeaseName,_invalid_chartName", "github.com/zarf-dev/zarf/src/pkg/packager/creator.TestDifferentialPackagePathSetCorrectly", "github.com/zarf-dev/zarf/src/pkg/transform.TestImageTransformHostWithoutChecksum", "github.com/zarf-dev/zarf/src/pkg/utils.TestParseChecksum/url_with_query_paraameters_and_checksum", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPush/push_local_images_oras", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectManifests/kustomize_inspect", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitectture/multiple_cluster_architectures", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/valid_path", "github.com/zarf-dev/zarf/src/api/internal/v1beta1.TestZarfPackageIsSBOMable/all_three_set", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/empty_releaseName_and_chartName", "github.com/zarf-dev/zarf/src/pkg/logger.TestCContext", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/wildly_unsupported_format_erroors", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPush/push_local_imagess_crane", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact/old_state_is_not_iinternal_server_auto_generate_push_token_but_init_options_does_not_match", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishCopyTag/Publish_package", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook/test_semver_ttag", "github.com/zarf-dev/zarf/src/internal/dns.TestServiceURL", "github.com/zarf-dev/zarf/src/internal/git.TestRepository", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestAnnotationsFromMetadaata", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply", "github.com/zarf-dev/zarf/src/pkg/transform.TestImageTransformHostWithoutChecksumm", "github.com/zarf-dev/zarf/src/pkg/cluster.TestUpdateZarfManagedSecrets/skip_namespace", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/aks", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPush/push_local_imagess_oras", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/missing_releaseName_falllsback_to_name", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includdedOrExcluded/Test_when_component_is_not_included_or_excluded", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/sget_without_host", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion/invvalid_last_non_breaking_version", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImportsCircular", "github.com/zarf-dev/zarf/src/test/e2e.TestSkeletonSuite", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook/shoould_be_mutated_with_internal_service_registry", "github.com/zarf-dev/zarf/src/pkg/utils.TestParseChecksum/url_with_query_parameteers_and_checksum", "github.com/zarf-dev/zarf/src/pkg/lint.TestYqCompat", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishCopyTag/Publish_packaage", "github.com/zarf-dev/zarf/src/api/internal/v1beta1.TestZarfPackageHasImages", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCreateImageSBOM", "github.com/zarf-dev/zarf/src/internal/gitea.TestNewClient", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExxcluded/Test_when_component_is_not_found_via_glob", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishPackageDeterministic", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishFromOCIValidation/errrors_if_dst_is_not_a_valid_ref", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/users_can_send_logs_to_any_io.Writer", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/empty_componnent", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/users_can_send_logs_to_any_io.WWriter", "github.com/zarf-dev/zarf/src/pkg/packager.TestServiceInfoFromServiceURL", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPush", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/accepts_empty_bytes_with_preccision", "github.com/zarf-dev/zarf/src/pkg/utils.TestIsJSONPathWaitType/Test_0_IsJSONPathWaitTType", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/local_tar", "github.com/zarf-dev/zarf/src/pkg/utils.TestDownloadToFile/non_existing_file", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestMigrateDeprecated", "github.com/zarf-dev/zarf/src/test/e2e.TestSkeletonSuite/Test_1_Compose_Everythiing_Inception", "github.com/zarf-dev/zarf/src/pkg/utils.TestIsJSONPathWaitType/Test_0_IsJSONPathWWaitType", "github.com/zarf-dev/zarf/src/test/e2e.TestPullInspectSuite/Test_1_Remote_Inspectt", "github.com/zarf-dev/zarf/src/internal/agent/http.TestGetTLSScheme", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion/CLII_version_less_than_last_non_breaking_version", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentActions/valid_actionss", "github.com/zarf-dev/zarf/src/pkg/transform.TestImageTransformHost", "github.com/zarf-dev/zarf/src/internal/agent/http.TestGetRequestURI/query_and_fraagment", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentCompose/valid_URL", "github.com/zarf-dev/zarf/src/pkg/packager/composer.TestCompose/Health_Checks", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxHelmMutationWebhook/shhould_not_mutate_URL_if_it_has_the_same_hostname_as_State", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishCopySHA/Publish_package", "github.com/zarf-dev/zarf/src/pkg/zoci.TestAssembleLayers/Assemble_layers_from_a_package", "github.com/zarf-dev/zarf/src/pkg/lint.TestZarfPackageValidate/valid_package", "github.com/zarf-dev/zarf/src/test/e2e.TestPullInspectSuite/Test_1_Remote_Inspect", "github.com/zarf-dev/zarf/src/pkg/lint.TestZarfPackageValidate/no_components", "github.com/zarf-dev/zarf/src/pkg/archive.TestDecompress", "github.com/zarf-dev/zarf/src/pkg/logger.TestContext/can_load_a_logger_from_the_ddefault_key", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact/empty_init_optionss_not_merged", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_megabytes", "github.com/zarf-dev/zarf/src/internal/packager/images.TestPullInvalidCache", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/valid_releaseNamme_with_numbers", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectManifests/variable_templates_insppect", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageUsesFlavor/wheen_flavor_is_not_set", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArttifact/old_state_is_internal_server_auto_generate_push_token", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestGetImageAnnotationKey/nginnx", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages/kustomization", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/sget_with_sub_path", "github.com/zarf-dev/zarf/src/pkg/cluster.TestInit/empty_Zarf_state_exists", "github.com/zarf-dev/zarf/src/test/e2e.TestCCreateGit", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/archittecture_mismatch", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishFromOCIValiddation/errors_if_dst_is_not_a_valid_ref", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateArtifact/old_state_is_interrnal_server_auto_generate_push_token", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestLoadPackageWithFlavors", "github.com/zarf-dev/zarf/src/pkg/utils.TestDownloadToFile/existing_file_with_shasum", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentCCompose/both_path_and_URL_provided", "github.com/zarf-dev/zarf/src/pkg/packager/filters.TestCopyFilter", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/valid_URL", "github.com/zarf-dev/zarf/src/pkg/utils.TeestNetRCParser", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestResolveImports", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/unsupported_log_level_errrors", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentAction/valid_action_nno_conditions", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponent/fflavor_miss_match", "github.com/zarf-dev/zarf/src/pkg/pki.TestCheckForExpiredCert1/already_expired_-\\u003e_error", "github.com/zarf-dev/zarf/src/cmd.TestPackageList", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion/iinvalid_cli_version", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestPackageUsesFlavor/when_flavor_iss_used", "github.com/zarf-dev/zarf/src/pkg/pki.TestCheckForExpiredCert1/just_under_20%_->_warning", "github.com/zarf-dev/zarf/src/cmd.TestDevInspectManifests/variable_templates_inspecct", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidatePackageArchitecture/architeccture_match", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentAction/cluster_and_neetwork_both_set", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_excluded_via_glob", "github.com/zarf-dev/zarf/src/pkg/archive.TestCompress", "github.com/zarf-dev/zarf/src/test/e2e.TestCreateDifferential", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/index_shha", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExcluded/Test_wwhen_component_is_included_and_excluded", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreakingVersion/emppty_last_non_breaking_version", "github.com/zarf-dev/zarf/src/pkg/pki.TestCheckForExpiredCert1/20%_left_exactly_-->_no_warning", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/package_template_URL_provided", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateChart/missing_releaseName_ffallsback_to_name", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateGit/init_options_merged", "github.com/zarf-dev/zarf/src/pkg/lint.TestZarfPackageValidate", "github.com/zarf-dev/zarf/src/pkg/packager.TestVValidateLastNonBreakingVersion/CLI_version_greater_than_last_non_breaking_versionn", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook/badd_oci_url", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentComppose/absolute_path_provided", "github.com/zarf-dev/zarf/src/pkg/utils.TestByteFormat/formats_negative_byte_withh_empty_precision", "github.com/zarf-dev/zarf/src/internal/agent/http.TestGetRequestURI/fragment", "github.com/zarf-dev/zarf/src/pkg/utils.TestIsJSONPathWaitType", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishPackage/Publish_packaage", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/rke2", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestPodMutationWebhook/ephermaalcontainer_update_in_pod_with_zarf-agent_patched_label_should_be_mutated", "github.com/zarf-dev/zarf/src/api/v1alpha1.TestZarfPackageIsSBOMable/only_files", "github.com/zarf-dev/zarf/src/internal/packager2.TestFindImages", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestGetImageAnnotationKey/remoove-trailing-hyphen----", "github.com/zarf-dev/zarf/src/pkg/cluster.TestInjector", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/TTest_failing_when_group_has_no_default_and_no_selection_was_made", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel/can_handle_uppercase", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestGetImageAnnotationKey/nginx", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateRegistry", "github.com/zarf-dev/zarf/src/pkg/cluster.TestInternalGitServerExists/Git_server_does_not_exist", "github.com/zarf-dev/zarf/src/cmd.TestGetCreds/json_get_creds", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned", "github.com/zarf-dev/zarf/src/pkg/logger.Test_NewErrors/unsupported_log_level_errors", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishFromOCIValidation/errrors_if_src's_repo_name_is_not_the_same_as_dst's", "github.com/zarf-dev/zarf/src/pkg/packager/filters.TestDeployFilter_Apply", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestSignPackage", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/oci", "github.com/zarf-dev/zarf/src/cmd.TestGetCreds/yaml_get_creds", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponent/sset_architecture_and_empty_flavor", "github.com/zarf-dev/zarf/src/internal/packager2.TestBuildImageMap", "github.com/zarf-dev/zarf/src/pkg/state.TestMergeStateAgent", "github.com/zarf-dev/zarf/src/pkg/lint.TestFillObjTemplate", "github.com/zarf-dev/zarf/src/internal/packager2/filters.TestDeployFilter_Apply/Test_failing_when_multiple_are_selected_from_the_saame_group", "github.com/zarf-dev/zarf/src/api/internal/v1beta1.TestZarfPackageIsInitPackage", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxOCIMutationWebhook/shoould_be_mutated_with_no_internal_service_registry", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponent/flavor_miss_match", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestNewPackageSource/local_tar", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateManifest/valid", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/FormatNone_is_supported_to_disable_logs", "github.com/zarf-dev/zarf/src/pkg/packager.TestServiceInfoFromServiceURL/valid_url", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestGetChecksum", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateComponentAction/valid_actionn_no_conditions", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TesttPodMutationWebhook/pod_with_zarf-agent_patched_label_should_not_be_mutated", "github.com/zarf-dev/zarf/src/internal/packager2.TestLoadPackage/tarball", "github.com/zarf-dev/zarf/src/pkg/packager/creator.TestLoadPackageDefinition", "github.com/zarf-dev/zarf/src/pkg/lint.TestLintError/warnings_and_errors", "github.com/zarf-dev/zarf/src/pkg/lint.TestValidateReleaseName/invalid_releasseName_with_periods", "github.com/zarf-dev/zarf/src/test/e2e.TestPullInspectSuite", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestFluxHelmMutationWebhook/errror_on_bad_url", "github.com/zarf-dev/zarf/src/pkg/cluster.TestDetectDistro/tkg", "github.com/zarf-dev/zarf/src/internal/dns.TestServiceURL/invalid_service_url_witthout_port", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOrExccluded/Test_when_component_is_included_via_glob", "github.com/zarf-dev/zarf/src/internal/packager2.TestSupportsFiltering/linux_platform", "github.com/zarf-dev/zarf/src/pkg/packager/sources.TestPackageSource/http", "github.com/zarf-dev/zarf/src/internal/packager2.TestIdentifySource/local_tar_iniit_zst", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCreateAbsolutePathFileSource", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/kustomization", "github.com/zarf-dev/zarf/src/internal/packager/template.TestGetSanitizedTemplateMap/Empty_map", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCompatibleComponent/eempty_architecture_and_set_flavor", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestGetImageAnnotationKey/a-veery-long-container-name-that-exceeds-sixty-three-characters", "github.com/zarf-dev/zarf/src/internal/packager/template.TestGetSanitizedTemplateMap/Nil_map", "github.com/zarf-dev/zarf/src/internal/agent/http.TestProxyRequestTransform/basic_request", "github.com/zarf-dev/zarf/src/pkg/zoci.TestAssembleLayers", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishError", "github.com/zarf-dev/zarf/src/internal/packager/template.TestGetSanitizedTemplateMap", "github.com/zarf-dev/zarf/src/pkg/cluster.TestListConnections", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/invalid_helm_repository", "github.com/zarf-dev/zarf/src/test/e2e.TestPullInspectSuite/Test_0_Pull", "github.com/zarf-dev/zarf/src/pkg/logger.Test_New/Warn_logs_are_ok", "github.com/zarf-dev/zarf/src/pkg/transform.TestParseImageRef", "github.com/zarf-dev/zarf/src/internal/agent/http.TestGetRequestURI", "github.com/zarf-dev/zarf/src/internal/packager/images.TestCheckForIndex/image_manifest_sha'd", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestPodMutationWebhook/pod_witth_label_should_be_mutated", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestSplitDeleteExistingFiiles", "github.com/zarf-dev/zarf/src/pkg/cluster.TestRegistryHPA", "github.com/zarf-dev/zarf/src/internal/agent/hooks.TestArgoAppWebhook/should_retuurn_internal_server_error_on_bad_git_URL", "github.com/zarf-dev/zarf/src/pkg/lint.TestFillObjTemplate/basic_template", "github.com/zarf-dev/zarf/src/internal/packager2.TestSupportsFiltering/skeleton_platform", "github.com/zarf-dev/zarf/src/api/internal/v1beta1.TestZarfPackageIsSBOMable/only_images", "github.com/zarf-dev/zarf/src/pkg/packager.TestFindImages/invalid_helm_repositoryy", "github.com/zarf-dev/zarf/src/pkg/utils.TestDownloadToFile/existing_file", "github.com/zarf-dev/zarf/src/pkg/packager.TestValidateLastNonBreeakingVersion/invalid_last_non_breaking_version", "github.com/zarf-dev/zarf/src/internal/agent/http.TestGetRequestURI/basic", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevelErrors/does_not_partial_mmatch_level_2", "github.com/zarf-dev/zarf/src/internal/packager2.TestPublishError/Test_empty_publlish_opts", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentCompose", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestValidateComponentCompoose/absolute_path_provided", "github.com/zarf-dev/zarf/src/internal/packager2/layout.TestCreateSkeleton", "github.com/zarf-dev/zarf/src/pkg/logger.Test_ParseLevel/can_parse_debug", "github.com/zarf-dev/zarf/src/pkg/packager/filters.Test_includedOOrExcluded/Test_when_component_is_excluded_and_included", "github.com/zarf-dev/zarf/src/pkg/cluster.TestGetDeployedPackage", "github.com/zarf-dev/zarf/src/pkg/lint.TestIsImagePinned/ghcr.io/zarf-dev/ppepr/controller:v0.15.0", "github.com/zarf-dev/zarf/src/internal/packager2.TestSupportsFiltering/linux_plattform" ]
starryzhang/sweb.eval.win.zarf-dev_1776_zarf-3788
zarf-dev/zarf
3799
zarf-dev__zarf-3799
Go
[ "3798" ]
0877c96c21f5e790bfe4630814d67ceea13ddb33
diff --git a/src/internal/packager2/actions/actions.go b/src/internal/packager2/actions/actions.go index abe7d9158b..9e43985233 100644 --- a/src/internal/packager2/actions/actions.go +++ b/src/internal/packager2/actions/actions.go @@ -83,7 +83,7 @@ func runAction(ctx context.Context, basePath string, defaultCfg v1alpha1.ZarfCom actionDefaults := actionGetCfg(ctx, defaultCfg, action, variableConfig.GetAllTemplates()) actionDefaults.Dir = filepath.Join(basePath, actionDefaults.Dir) - if cmd, err = actionCmdMutation(ctx, cmd, actionDefaults.Shell); err != nil { + if cmd, err = actionCmdMutation(ctx, cmd, actionDefaults.Shell, runtime.GOOS); err != nil { l.Error("error mutating command", "cmd", cmdEscaped, "err", err.Error()) } @@ -209,7 +209,7 @@ func convertWaitToCmd(_ context.Context, wait v1alpha1.ZarfComponentActionWait, } // Perform some basic string mutations to make commands more useful. -func actionCmdMutation(ctx context.Context, cmd string, shellPref v1alpha1.Shell) (string, error) { +func actionCmdMutation(ctx context.Context, cmd string, shellPref v1alpha1.Shell, goos string) (string, error) { zarfCommand, err := utils.GetFinalExecutableCommand() if err != nil { return cmd, err @@ -219,21 +219,27 @@ func actionCmdMutation(ctx context.Context, cmd string, shellPref v1alpha1.Shell cmd = strings.ReplaceAll(cmd, "./zarf ", zarfCommand+" ") // Make commands 'more' compatible with Windows OS PowerShell - if runtime.GOOS == "windows" && (exec.IsPowershell(shellPref.Windows) || shellPref.Windows == "") { + if goos == "windows" && (exec.IsPowershell(shellPref.Windows) || shellPref.Windows == "") { // Replace "touch" with "New-Item" on Windows as it's a common command, but not POSIX so not aliased by M$. // See https://mathieubuisson.github.io/powershell-linux-bash/ & // http://web.cs.ucla.edu/~miryung/teaching/EE461L-Spring2012/labs/posix.html for more details. cmd = regexp.MustCompile(`^touch `).ReplaceAllString(cmd, `New-Item `) - // Convert any ${ZARF_VAR_*} or $ZARF_VAR_* to ${env:ZARF_VAR_*} or $env:ZARF_VAR_* respectively (also TF_VAR_*). + // Convert any ${ZARF_VAR_*} or $ZARF_VAR_* to ${env:ZARF_VAR_*} or $env:ZARF_VAR_* respectively + // (also TF_VAR_* and ZARF_CONST_). // https://regex101.com/r/xk1rkw/1 - envVarRegex := regexp.MustCompile(`(?P<envIndicator>\${?(?P<varName>(ZARF|TF)_VAR_([a-zA-Z0-9_-])+)}?)`) - get, err := helpers.MatchRegex(envVarRegex, cmd) - if err == nil { - newCmd := strings.ReplaceAll(cmd, get("envIndicator"), fmt.Sprintf("$Env:%s", get("varName"))) + envVarRegex := regexp.MustCompile(`(?P<envIndicator>\${?(?P<varName>(ZARF|TF)_(VAR|CONST)_([a-zA-Z0-9_-])+)}?)`) + getFunctions := MatchAllRegex(envVarRegex, cmd) + + newCmd := cmd + for _, get := range getFunctions { + newCmd = strings.ReplaceAll(newCmd, get("envIndicator"), fmt.Sprintf("$Env:%s", get("varName"))) + + } + if newCmd != cmd { logger.From(ctx).Debug("converted command", "cmd", cmd, "newCmd", newCmd) - cmd = newCmd } + cmd = newCmd } return cmd, nil @@ -298,3 +304,20 @@ func actionRun(ctx context.Context, cfg v1alpha1.ZarfComponentActionDefaults, cm } return stdout, stderr, err } + +// MatchAllRegex wraps a get function around each substring match, returning all matches. +func MatchAllRegex(regex *regexp.Regexp, str string) []func(string) string { + // Validate the string. + matches := regex.FindAllStringSubmatch(str, -1) + + // Parse the string into its components. + var funcs []func(string) string + for _, match := range matches { + funcs = append(funcs, func(name string) string { + return match[regex.SubexpIndex(name)] + + }) + } + + return funcs +} diff --git a/src/pkg/packager/actions/actions.go b/src/pkg/packager/actions/actions.go index cffcb8f7f0..630452d7a6 100644 --- a/src/pkg/packager/actions/actions.go +++ b/src/pkg/packager/actions/actions.go @@ -82,7 +82,7 @@ func runAction(ctx context.Context, defaultCfg v1alpha1.ZarfComponentActionDefau actionDefaults := actionGetCfg(ctx, defaultCfg, action, variableConfig.GetAllTemplates()) - if cmd, err = actionCmdMutation(ctx, cmd, actionDefaults.Shell); err != nil { + if cmd, err = actionCmdMutation(ctx, cmd, actionDefaults.Shell, runtime.GOOS); err != nil { l.Error("error mutating command", "cmd", cmdEscaped, "err", err.Error()) } @@ -209,7 +209,7 @@ func convertWaitToCmd(_ context.Context, wait v1alpha1.ZarfComponentActionWait, } // Perform some basic string mutations to make commands more useful. -func actionCmdMutation(ctx context.Context, cmd string, shellPref v1alpha1.Shell) (string, error) { +func actionCmdMutation(ctx context.Context, cmd string, shellPref v1alpha1.Shell, goos string) (string, error) { zarfCommand, err := utils.GetFinalExecutableCommand() if err != nil { return cmd, err @@ -219,21 +219,27 @@ func actionCmdMutation(ctx context.Context, cmd string, shellPref v1alpha1.Shell cmd = strings.ReplaceAll(cmd, "./zarf ", zarfCommand+" ") // Make commands 'more' compatible with Windows OS PowerShell - if runtime.GOOS == "windows" && (exec.IsPowershell(shellPref.Windows) || shellPref.Windows == "") { + if goos == "windows" && (exec.IsPowershell(shellPref.Windows) || shellPref.Windows == "") { // Replace "touch" with "New-Item" on Windows as it's a common command, but not POSIX so not aliased by M$. // See https://mathieubuisson.github.io/powershell-linux-bash/ & // http://web.cs.ucla.edu/~miryung/teaching/EE461L-Spring2012/labs/posix.html for more details. cmd = regexp.MustCompile(`^touch `).ReplaceAllString(cmd, `New-Item `) - // Convert any ${ZARF_VAR_*} or $ZARF_VAR_* to ${env:ZARF_VAR_*} or $env:ZARF_VAR_* respectively (also TF_VAR_*). + // Convert any ${ZARF_VAR_*} or $ZARF_VAR_* to ${env:ZARF_VAR_*} or $env:ZARF_VAR_* respectively + // (also TF_VAR_* and ZARF_CONST_). // https://regex101.com/r/xk1rkw/1 - envVarRegex := regexp.MustCompile(`(?P<envIndicator>\${?(?P<varName>(ZARF|TF)_VAR_([a-zA-Z0-9_-])+)}?)`) - get, err := helpers.MatchRegex(envVarRegex, cmd) - if err == nil { - newCmd := strings.ReplaceAll(cmd, get("envIndicator"), fmt.Sprintf("$Env:%s", get("varName"))) + envVarRegex := regexp.MustCompile(`(?P<envIndicator>\${?(?P<varName>(ZARF|TF)_(VAR|CONST)_([a-zA-Z0-9_-])+)}?)`) + getFunctions := MatchAllRegex(envVarRegex, cmd) + + newCmd := cmd + for _, get := range getFunctions { + newCmd = strings.ReplaceAll(newCmd, get("envIndicator"), fmt.Sprintf("$Env:%s", get("varName"))) + + } + if newCmd != cmd { logger.From(ctx).Debug("converted command", "cmd", cmd, "newCmd", newCmd) - cmd = newCmd } + cmd = newCmd } return cmd, nil @@ -297,3 +303,20 @@ func actionRun(ctx context.Context, cfg v1alpha1.ZarfComponentActionDefaults, cm } return stdout, stderr, err } + +// MatchAllRegex wraps a get function around each substring match, returning all matches. +func MatchAllRegex(regex *regexp.Regexp, str string) []func(string) string { + // Validate the string. + matches := regex.FindAllStringSubmatch(str, -1) + + // Parse the string into its components. + var funcs []func(string) string + for _, match := range matches { + funcs = append(funcs, func(name string) string { + return match[regex.SubexpIndex(name)] + + }) + } + + return funcs +}
diff --git a/src/internal/packager2/actions/actions_test.go b/src/internal/packager2/actions/actions_test.go new file mode 100644 index 0000000000..be77e39ee5 --- /dev/null +++ b/src/internal/packager2/actions/actions_test.go @@ -0,0 +1,99 @@ +package actions + +import ( + "context" + "fmt" + "github.com/stretchr/testify/require" + "testing" + + "github.com/zarf-dev/zarf/src/api/v1alpha1" + "github.com/zarf-dev/zarf/src/pkg/utils" +) + +func Test_actionCmdMutation(t *testing.T) { + zarfCmd, _ := utils.GetFinalExecutableCommand() + tests := []struct { + name string + cmd string + shellPref v1alpha1.Shell + goos string + want string + wantErr error + }{ + { + name: "linux without zarf", + cmd: "echo \"this is zarf\"", + shellPref: v1alpha1.Shell{}, + goos: "linux", + want: "echo \"this is zarf\"", + wantErr: nil, + }, + { + name: "linux including zarf", + cmd: "./zarf deploy", + shellPref: v1alpha1.Shell{}, + goos: "linux", + want: fmt.Sprintf("%s deploy", zarfCmd), + wantErr: nil, + }, + { + name: "windows including zarf", + cmd: "./zarf deploy", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: fmt.Sprintf("%s deploy", zarfCmd), + wantErr: nil, + }, + { + name: "windows env", + cmd: "echo ${ZARF_VAR_ENV1}", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1", + wantErr: nil, + }, + { + name: "windows env pwsh", + cmd: "echo ${ZARF_VAR_ENV1}", + shellPref: v1alpha1.Shell{ + Windows: "pwsh", + }, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1", + wantErr: nil, + }, + { + name: "windows env powershell", + cmd: "echo ${ZARF_VAR_ENV1}", + shellPref: v1alpha1.Shell{ + Windows: "powershell", + }, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1", + wantErr: nil, + }, + { + name: "windows multiple env", + cmd: "echo ${ZARF_VAR_ENV1} ${ZARF_VAR_ENV2}", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1 $Env:ZARF_VAR_ENV2", + wantErr: nil, + }, + { + name: "windows constants", + cmd: "echo ${ZARF_CONST_ENV1}", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: "echo $Env:ZARF_CONST_ENV1", + wantErr: nil, + }, + } + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + got, err := actionCmdMutation(context.Background(), tt.cmd, tt.shellPref, tt.goos) + require.Equal(t, tt.wantErr, err) + require.Equal(t, tt.want, got) + }) + } +} diff --git a/src/pkg/packager/actions/actions_test.go b/src/pkg/packager/actions/actions_test.go new file mode 100644 index 0000000000..be77e39ee5 --- /dev/null +++ b/src/pkg/packager/actions/actions_test.go @@ -0,0 +1,99 @@ +package actions + +import ( + "context" + "fmt" + "github.com/stretchr/testify/require" + "testing" + + "github.com/zarf-dev/zarf/src/api/v1alpha1" + "github.com/zarf-dev/zarf/src/pkg/utils" +) + +func Test_actionCmdMutation(t *testing.T) { + zarfCmd, _ := utils.GetFinalExecutableCommand() + tests := []struct { + name string + cmd string + shellPref v1alpha1.Shell + goos string + want string + wantErr error + }{ + { + name: "linux without zarf", + cmd: "echo \"this is zarf\"", + shellPref: v1alpha1.Shell{}, + goos: "linux", + want: "echo \"this is zarf\"", + wantErr: nil, + }, + { + name: "linux including zarf", + cmd: "./zarf deploy", + shellPref: v1alpha1.Shell{}, + goos: "linux", + want: fmt.Sprintf("%s deploy", zarfCmd), + wantErr: nil, + }, + { + name: "windows including zarf", + cmd: "./zarf deploy", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: fmt.Sprintf("%s deploy", zarfCmd), + wantErr: nil, + }, + { + name: "windows env", + cmd: "echo ${ZARF_VAR_ENV1}", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1", + wantErr: nil, + }, + { + name: "windows env pwsh", + cmd: "echo ${ZARF_VAR_ENV1}", + shellPref: v1alpha1.Shell{ + Windows: "pwsh", + }, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1", + wantErr: nil, + }, + { + name: "windows env powershell", + cmd: "echo ${ZARF_VAR_ENV1}", + shellPref: v1alpha1.Shell{ + Windows: "powershell", + }, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1", + wantErr: nil, + }, + { + name: "windows multiple env", + cmd: "echo ${ZARF_VAR_ENV1} ${ZARF_VAR_ENV2}", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: "echo $Env:ZARF_VAR_ENV1 $Env:ZARF_VAR_ENV2", + wantErr: nil, + }, + { + name: "windows constants", + cmd: "echo ${ZARF_CONST_ENV1}", + shellPref: v1alpha1.Shell{}, + goos: "windows", + want: "echo $Env:ZARF_CONST_ENV1", + wantErr: nil, + }, + } + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + got, err := actionCmdMutation(context.Background(), tt.cmd, tt.shellPref, tt.goos) + require.Equal(t, tt.wantErr, err) + require.Equal(t, tt.want, got) + }) + } +}
Component actions cmd mutation on Windows fails ### Environment Device and OS: Windows App version: v0.54.0 Kubernetes distro being used: k3s Other: ### Steps to reproduce 1. Create a package with an action cmd that includes multiple variables (e.g. `echo ${ZARF_VAR_ENV1} ${ZARF_VAR_ENV2} ${ZARF_CONST_ENV3}`) 2. Deploy package from a Windows terminal ### Expected result Command is mutated to: `echo $Env:ZARF_VAR_ENV1 $Env:ZARF_VAR_ENV2 $Env:ZARF_CONST_ENV3` ### Actual Result Command is mutated to: `echo $Env:ZARF_VAR_ENV1 ${ZARF_VAR_ENV2} ${ZARF_CONST_ENV3}` So only the first variable is replaced, AND only variables, not the constants (`ZARF_CONST_`) ### Visual Proof (screenshots, videos, text, etc) N/A ### Severity/Priority medium ### Additional Context Add any other context or screenshots about the technical debt here.
Thanks for the issue (and PR) @koendelaat - we'll monitor the PR and provide any required feedback.
[ "https://github.com/zarf-dev/zarf/commit/77756d2f339586c322e0c6c55fe5c602865cbb06", "https://github.com/zarf-dev/zarf/commit/f1034a14277ce33474019be00753a6e8f076bb2d", "https://github.com/zarf-dev/zarf/commit/708e56b78bfc8ca2a37cd9a52f00614c411970a1", "https://github.com/zarf-dev/zarf/commit/62d996aae817c60291b73f5c527ef73250a030f0" ]
2025-05-14T19:46:55Z
https://github.com/zarf-dev/zarf/tree/0877c96c21f5e790bfe4630814d67ceea13ddb33
[ "go build ./..." ]
[ "$pkgs = go list ./... | Select-String -NotMatch '^github\\.com/zarf-dev/zarf/src/test' | ForEach-Object { $_.ToString() }; go test -json -v -count=1 $pkgs 2>&1 | Tee-Object -FilePath reports\\go-test-results.json" ]
[ "cat reports/go-test-results.json" ]
def parser(log: str) -> dict[str, str]: # Robust parser for Go test outputs with potentially wrapped/broken JSON and embedded text summaries import re results: dict[str, str] = {} status_map = {"pass": "pass", "fail": "fail", "skip": "skip"} def clean_name(name: str) -> str: # Normalize name: remove newlines, compress whitespace, and strip leading punctuation (e.g., ': ') name = name.replace('\r', '').replace('\n', '') name = re.sub(r'\s+', ' ', name).strip() # Strip leading non-word characters except allow subtest separator '/' name = re.sub(r'^[^\w/]+', '', name) return name # 1) Extract textual summary lines anywhere in the log (parent and subtests) # Matches e.g. '--- PASS: TestName (0.00s)' or indented subtests for m in re.finditer(r'---\s+(PASS|FAIL|SKIP)\s*:\s*(.+?)(?:\s*\(|\s*$)', log, flags=re.IGNORECASE): status = status_map.get(m.group(1).lower(), "fail") name = clean_name(m.group(2)) if name: results[name] = status # 2) Extract JSON-like events even if objects are wrapped/broken # Handle both orders: Action before Test and Test before Action within the same vicinity # Limit span to avoid crossing into neighboring objects json_patterns = [ r'"Action"\s*:\s*"(pass|fail|skip)".{0,500}?"Test"\s*:\s*"([^"]+)"', r'"Test"\s*:\s*"([^"]+)".{0,500}?"Action"\s*:\s*"(pass|fail|skip)"', ] for pat in json_patterns: for m in re.finditer(pat, log, flags=re.IGNORECASE | re.DOTALL): if pat.startswith('"Action"'): status = status_map.get(m.group(1).lower(), "fail") name = clean_name(m.group(2)) else: name = clean_name(m.group(1)) status = status_map.get(m.group(2).lower(), "fail") if name: results[name] = status return results
[ "TestCompatibleComponentt", "TestValidateLastNonBreakingVersion/invvalid_last_non_breaking_version", "TestValidateLastNonBreakingVersion/emppty_last_non_breaking_version", "TestCreateAbsolutePathFFileSource/test_that_imports_handle_absolute_paths_properly", "TestCompatibleComponent/aarchitecture_miss_match", "TestAssembleLayers/Assemble_layers_from_a__package", "TestNewImportChain/No_Architeccture", "TestNewImportChain/Circular_Immport", "TestValidateLastNonBreakingVersion/CLII_version_less_than_last_non_breaking_version", "TestSplitFile/split_with__remainder", "TestCompressAndDecompress_MultipleFormaats", "TestCompatibleComponent/eempty_architecture_and_set_flavor", "TestCompressAndDecompress_MultipleFormaats/tar.lz", "TestPublishPackage/Publish_packaage", "TestCompatibleComponent/fflavor_miss_match", "TestValidateLastNonBreakingVersion/invvalid_cli_version", "TestValidateLastNonBreakingVersion/CLII_version_equal_to_last_non_breaking_version", "TestValidateLastNonBreakingVersion/CLII_version_greater_than_last_non_breaking_version", "TestFindImages/invalid_helm_repoository", "TestFindImages/invalid_manifest__yaml", "TestCompatibleComponent/sset_architecture_and_set_flavor", "TestFindImages/validate_repo_Hellm_Chart_" ]
[ "TestGenerateValuesOverrides/Single_variable", "TestDetectDistro/gke", "TestPackageInspectValuesFiles", "TestUserAgent/twine_user_agent", "TestMerging/with-existing", "TestCreateSkeleton", "TestDetectDistro/eks", "Test_New/JSON_format_is_supported", "TestSplitDeleteExistingFiles", "TestDetectDistro/k3s", "TestUserAgent/unknown_user_agent", "TestFindImages/validate_repo_Helm_Chart_", "TestPackageList/yaml_package_list", "TestCompressAndDecompress_MultipleFormats/tbz", "TestGenerateValuesOverrides/Single_varriable", "TestDevInspectManifests/variable_templates_insppect", "TestPrintBreakingChanges", "TestDevInspectManifests/empty_inspect", "TestServiceInfoFromNodePortURL", "Test_ParseLevelErrors/errors_out_on_unknnown_level", "TestValidateChart/missing_name_and_releaseeName", "TestGetSanitizedTemplateMap", "TestValidateChart/invalid_releaseName", "TestCompatibleComponent/sset_architecture_and_empty_flavor", "TestDifferentialPackagePathSetCorrectly", "TestPackageList", "TestLintError/warnings_and_errors", "TestCheckForIndex/image_manifest_sha'd", "TestGetRequestURI/basic", "TestIsLocalHost/127.0.0.1", "TestParseImageRef", "TestDeployFilter_Apply/TTest_failing_when_no_components_are_found_that_match_the_query", "TestDeployFilter_Apply/TTest_when_version_is_less_than_v0.33.0_w/_some_optional_components_selected", "TestInternalGitServerExists/Git_server__does_not_exist", "TestCompressAndDecompress_MultipleFormats/tmz", "TestUpdateZarfManagedSecrets/ignore_namespace", "TestDevInspectManifests/kustomize_inspect", "TestPublishSkeleton/Publish_skelleton_package", "TestPackageFiles/Verify_Files()_with_imaages", "TestCreateImageSBOM", "Test_includedOrExcluded/Test_wwhen_component_is_excluded", "TestNewPackageSource/sget_without_host", "TestFluxOCIMutationWebhook/shoould_not_mutate_URL_if_it_has_the_same_hostname_as_Zarf_s_internal_repo", "TestNewPackageSource/https", "TestDeployFilter_Applyy", "TestResolveImports/variabbles_and_constants_are_resolved_correctly", "TestPublishPackage", "TestIsLocalHost/::1", "TestGetSanitizedTemplateeMap", "TestMergeStateRegistry", "TestWaitForNetworkEndpoint", "TestValidateZarfComponent/valid_URL", "TestValidateManifest/long_name", "TestResolveImportsCirculaar", "Test_includedOrExcluded/Test_wwhen_component_is_included_via_glob", "TestZarfPackageIsInitPackage", "TestFillObjTemplate", "TestGetTLSScheme", "Test_New/DestinationNone_is_supported_too_disable_logs", "TestFluxMutationWebhook/shouldd_not_mutate_invalid_git_url", "TestLoadPackageDefinition/invaalid_package_definition", "TestByteFormat", "TestContext", "TestGetSanitizedTemplateMap/Nil_map", "TestFluxOCIMutationWebhook/bad_oci_url", "TestPush/push_local_images_crane", "TestMergeStateRegistry/username_is_unmodified", "TestLintPackageWithImports/flavor_test", "TestCompose/Single_Component", "TestLoadPackageWithFlavorrs/when_all_components_have_a_flavor,_inputting_no_flavor_should_error", "Test_selectStateFilter_Apply/TTest_when_requestedComponents_contains_a_valid_component_name", "TestParseChecksum", "TestDecompressFiltered/Filtered_NotFound", "TestProxyRequestTransform/basicc_request", "TestServiceInfoFromServiceURL/valid_urrl", "TestGetRequestURI/query_and_fragment", "TestZarfPackageIsSBOMable/all_three_seet", "TestLoadPackageWithFlavors", "TestProxyRequestTransform/basic_request", "Test_ParseLevel/can_parse_debug", "TestRunHealthChecks/One_pod_iis_never_ready", "TestValidateComponentActions", "TestZarfSchema/invalid_package", "TestChartTemplate", "TestFluxOCIMutationWebhook/shoould_be_mutated_with_internal_service_registry", "TestGetCreds/json_get_creds", "TestByteFormat/accepts_empty_bytes_with_mmeaningful_precision", "TestServiceInfoFromNodePortURL/invalid__node_port", "TestCreateAbsolutePathFileSource", "TestZarfSchema/valid_package", "TestPackageSource", "TestRunHealthChecks/Pod_is_ready", "TestDetectDistro", "TestPublishFromOCIValidation/errrors_if_src's_repo_name_is_not_the_same_as_dst's", "TestMergeStateGit/init_options_merged", "TestGenerateValuesOverrides", "TestNewPackageSource", "TestNewImportChain", "TestDecompressFiltered", "Test_ParseLevelErrors/is_precise_about_ccharacter_variations", "TestSplitDeleteExistingFiiles", "TestCheckForIndex/docker_mmanifest_list", "TestCreateAbsolutePathFilleSource/test_that_imports_handle_absolute_paths_properly", "Test_includedOrExcluded/Test_wwhen_component_is_excluded_via_glob", "TestCheckForIndex/index_sha", "TestFillObjTemplate/deprecated_template", "TestCheckForIndex/docker_manifest_list", "TestPackageInspectManifests/empty_inspect", "TestDetectDistro/eksanywhere", "TestDevInspectManifests/chart_inspect", "TestSplitFile", "TestResolveImports", "TestAssembleLayers", "TestInit/no_nodes_in_cluster", "TestLintPackageWithImports/compose_test_", "TestMerging/empty-ic", "TestParseChecksum/url_with_auth_and_checksum", "TestUnpinnedRepo", "TestNetRCParser", "TestComposeComponents/filter_bby_architecture_match", "TestLoadPackageDefinition/valiid_package_definition#01", "TestPublishPackageDeterministic", "TestUserAgent/bun_user_agent", "TestAnnotationsFromMetadata", "TestRegistryHPA", "TestFluxMutationWebhook", "TestGenerateValuesOverrides/Empty_ValuuesOverridesMap_with_non-empty_setVariableMap_and_chartVariables", "TestLoadSplitPackage/split_file_output", "TestDetectDistro/aks", "TestPodMutationWebhook", "TestZarfSchema/no_comp_or_kind", "TestIsImagePinned/busybox:bad/image", "TestMergeStateRegistry/init_options_merged", "TestPackageInspectManifests", "TestLocalOSFilter", "TestSupportsFiltering/skeleton_platform", "TestPullUncompressed", "TestSupportsFiltering/nil_platfoorm", "TestImageTransformHost", "TestSupportsFiltering", "TestValidateChart/long_name", "TestByteFormat/formats_kilobytes", "TestPackageInspectManifests/manifest_inspect", "TestPopulateVariables", "TestServiceInfoFromServiceURL/normal_domain", "TestComposeComponents", "TestInit/no_namespaces_exist", "TestValidateReleaseName/invalid_releaseNamme_with_periods", "TestDevInspectValuesFiles/manifest_inspect_-\\u0003e_fail_with_no_values-files", "TestInternalGitServerExists", "TestPackageFiles/Verify_Files()_with_imaage_layers_mapped_to_package_paths", "TestValidatePackageArchitecture/ignoree_validation_when_package_arch_equals_'multi'", "TestZarfPackageIsSBOMable/only_data_innjections", "TestUnpinnnedFileWarning", "TestGetRequestURI", "TestGetCreds", "TestCreateReproducibleTarrballFromDir", "TestComposeComponents/filter_bby_flavor_match", "TestByteFormat/formats_kilobyte", "TestIsLocalHost/foo.svc.local:1234", "Test_selectStateFilter_Applyy", "TestPublishFromOCIValidation", "TestGetSanitizedTemplaateMap", "TestPull", "TestIsJSONPathWaitType", "TestGetSanitizedTemplateeMap/Sensitive_entry", "Test_New/users_can_send_logs_to_any_io.Writer", "TestIdentifySource/sget_without_host", "TestPublishError", "TestGetDeployedPackage", "TestFindImages/kustomization", "TestLoadSplitPackage", "TestComposeComponents/filter_bby_architecture_mismatch", "TestParseRef", "TestPackageUsesFlavor", "TestGetSanitizedTemplateMap/Empty_map", "TestPrintBreakingChanges/Noo_breaking_changes", "TestDevInspectValuesFiles/chart_inspect", "TestSplitFile/split_evenly", "TestZarfPackageValidate/invalid_package", "TestFindImages/image_not_found", "Test_New/Info_logs_are_ok", "TestPipTransformURL", "TestPullInvalidCache", "TestUserAgent/npm_user_agent", "Test_ParseLevelErrors", "TestZarfSchema/test_schema_findings_is_creeated_as_expected", "TestGenerateValuesOverrides/Empty_inpuuts", "TestInit/Zarf_state_exists", "TestNewPackageSource/local_tar_split", "TestGenerateValuesOverrides/Values_oveerride_test", "TestBuildImageMap", "TestPackageList/json_package_list", "TestPublishCopySHA/Publish_package", "TestPublishFromOCIValidation/errrors_if_dst_is_not_a_valid_ref", "TestCreateAbsolutePathFilleSource/test_a_standard_package_can_use_absolute_file_paths", "TestGetInjectorImageAndNode", "TestGenerateValuesOverrides/Empty_inputs", "TestFluxOCIMutationWebhook", "Test_ParseLevel", "TestRunHealthChecks", "TestInit/namespaces_exists", "TestNewPackageSource/http", "TestNpmTransformURL", "TestCreateAbsolutePathFFileSource", "TestCredentialParser", "TestPublishError/Test_empty_pathh", "TestInit/Zarf_namespace_exists", "TestGetRequestURI/fragment", "Test_NewErrors/unsupported_log_level_errrors", "TestUnpinnedImageWarning", "TestValidatePackageArchitecture/multipple_cluster_architectures", "TestUserAgent/pnpm_user_agent", "Test_New/Error_logs_are_ok", "Test_includedOrExcluded/Test_wwhen_component_is_not_included_or_excluded", "TestContext/can_load_a_logger_from_the_ddefault_key", "TestValidateReleaseName/valid_releaseName__with_numbers", "TestGenerateValuesOverrides/Non-existeent_component_or_chart", "TestUpdateZarfManagedSecrets/skip_namesspace", "TestDevInspectManifests", "TestPackageInspectManifests/kustomize_inspect", "TestDetectDistro/rke2", "Test_includedOrExcluded/Test_wwhen_component_is_excluded_and_included", "TestComposeComponents/no_archiitecture_set_error", "TestMergeStateArtifact", "TestIdentifySource", "TestServiceInfoFromServiceURL", "TestFindImages/invalid_helm_repository", "TestFluxHelmMutationWebhook/shhould_not_mutate_URL_if_it_has_the_same_hostname_as_State_internal_repo", "TestValidateReleaseName", "TestSupportsFiltering/nil_platform", "TestIdentifySource/sget_with_subb_path", "TestLoadPackageDefinition", "TestDeployFilter_Apply", "TestCompressAndDecompress_MultipleFormats", "TestValidatePackageArchitecture/archittecture_match", "TestCheckForIndex", "TestUserAgent/git_user_agent", "TestPublishError/Test_empty_publlish_opts", "TestPackageFiles/Verify_Files", "Test_selectStateFilter_Apply/TTest_when_requestedComponents_is_empty", "Test_selectStateFilter_Apply/TTest_when_requestedComponents_contains_an_excluded_component_name", "TestLoadPackageWithFlavvors", "TestValidateComponentActions/valid_actionss", "TestServiceURL/empty_service_url", "TestPackageSource/local", "TestIdentifySource/local_tar_mannifest_zst", "TestMergeStateRegistry/init_options_not_merged", "TestMigrateDeprecated", "TestValidateManifest", "TestPackageLayout", "TestValidateReleaseName/empty_releaseName__and_chartName", "TestValidateReleaseName/empty_releaseName,,_invalid_chartName", "TestZarfSchema/validate_schema_fail_with_eerrors_not_possible_from_object", "Test_ParseLevelErrors/does_not_partial_mmatch_level_2", "Test_ParseLevel/can_parse_warn", "TestZarfPackageIsSBOMable/empty_component", "TestAnnotationsFromMetadaata", "TestValidateZarfComponent/valid_path", "TestImageTransformHostWithoutChecksum", "TestCheckForExpiredCert1", "TestMergeStateArtifact/empty_init_optionss_not_merged", "TestFindImages/helm_chart", "TestEmptyFilter_Apply", "TestDecompressOptions/OverwriteExisting", "TestZarfPackageIsSBOMable/only_files", "TestGetRequestURI/query", "TestGitURLSplitRef", "TestLoadSplitPackage/split_file__output", "TestZarfPackageValidate/valid_package", "TestValidatePackageArchitecture", "TestIdentifySource/local_tar_spllit", "TestPull/error_when_pullinng_an_image_that_doesn't_exist", "TestLoadPackageDefinition/invaalid_package_definition#01", "TestValidateComponentActions/setVariables__in_onCreate", "TestDetectDistro/tkg", "TestServiceURL/correct_service_url", "TestGenerateValuesOverrides/Variable_iin_setVariables_but_not_in_chartVariables", "TestIdentifySource/sget_with_sub_path", "Test_New/users_can_send_logs_to_any_io.WWriter", "TestPush/push_local_images_oras", "TestParseRef/basic#01", "TestGitURL", "TestMergeStateAgent", "TestUpdateGiteaPVC", "TestFluxHelmMutationWebhook", "TestReplaceTextTemplate", "TestLoadPackage/tarball", "TestPush", "TestServiceURL/invalid_service_url_witthout_port", "TestPackageFiles/Verify_Files()", "Test_NewErrors", "TestServiceInfoFromServiceURL/normal_ddomain", "TestYqCompat", "TestIdentifySource/local_tar_init_zst", "TestResolveImports/two_zaarf.yaml_files_import_each_other", "TestValidatePackageArchitecture/test_tthe_error_path_when_fetching_cluster_architecture_fails", "TestIsJSONPathWaitType/Test_0_IsJSONPathWWaitType", "TestDetectDistro/dockerdesktop", "TestMerging/no-existing", "Test_New", "TestServiceURL/invalid_service_url_witth_port", "TestZarfPackageValidate/no_components", "TestPackageUsesFlavor/wheen_flavor_is_not_set", "Test_New/FormatNone_is_supported_to_disaable_logs", "TestPackageInspectManifests/chart_inspect", "TestValidateChart/valid", "TestValidateChart/both_url_and_local_path", "TestGetChecksum", "TestSignPackage", "TestCompressUnsupportedExtension", "Test_ParseLevel/can_handle_inconsistent__uppercase", "TestByteFormat/accepts_empty", "TestFluxHelmMutationWebhook/shhould_not_mutate_URL_if_it_has_the_same_hostname_as_State", "Test_NewErrors/wildly_unsupported_formatt_errors", "TestPackageUsesFlavor/wheen_flavor_is_used", "TestNewPackageSource/sget_with_sub_path", "TestPush/push_local_imagess_oras", "Test_includedOrExcluded", "TestInternalGitServerExists/Git_server_exists", "TestServiceInfoFromNodePortURL/no_services", "TestDetectDistro/unknown", "TestDownloadToFile/existing_file_with_shasum", "TestPausableWriter", "Test_NewErrors/unsupported_log_level_errors", "TestLoadPackageWithFlavorrs/flavors_work", "TestRunHealthChecks/Pod_is_reeady", "TestSupportsFiltering/linux_platform", "TestIdentifySource/local_tar", "TestFluxHelmMutationWebhook/shhould_be_mutated_with_no_internal_service_registry", "TestZarfPackageValidate/invalid_yolo", "TestDownloadToFile", "TestCompressAndDecompress_MultipleFormats/tar", "TestByteFormat/formats_arbitrary_in", "TestDownloadToFile/non_existing_file", "TestGitURLtoFolderName", "TestFluxMutationWebhook/shouldd_be_mutated", "TestPull/test_registry_overrides", "TestUserAgent/pip_user_agent", "Test_ParseLevel/can_handle_uppercase", "TestIsImagePinned/ghcr.io/zarf-dev/pepr/coontroller:v0.15.0", "TestUserAgent/yarn_user_agent", "TestValidateChart/missing_name_and_releaseName", "TestIdentifySource/oci", "Test_NewErrors/unsupported_format_errors", "TestPublishCopyTag/Publish_packaage", "TestRepository", "TestCompressAndDecompress_MultipleFormats/zip", "TestServiceInfoFromNodePortURL/invalid__port_range", "TestGenTransformURL", "TestInternalGitServerExists/Git_server__exists", "TestSplitFile/split_evenlly", "TestLoadPackageWithFlavorrs", "TestNewPackageSource/local_tar", "TestUpdateZarfManagedSecrets/skip_namesspace_managed_secret", "TestNewImportChain/Circular_Import", "TestFindImages/invalid_helm_repositoryy", "TestPublishError/Test_empty_publish_opts", "TestPackageFiles/Verify_Files()_with_patths_mapped_to_package_paths", "TestZarfPackageIsSBOMable/onlyy_files", "Test_selectStateFilter_Apply/TTest_when_requestedComponents_contains_a_glob_pattern", "TestServiceInfoFromServiceURL/no_port", "TestNewImportChain/No_Architecture", "TestIsLocalHost/127.0.0.1:1234", "TestDecompressOptions", "Test_ParseLevelErrors/does_not_partial_mmatch_level_3", "TestServiceURL/invalid_service_url_with_port", "TestPackageCreatePublishArch/shoould_use_pkg.metadata.architecture_when_global_arch_not_set", "TestGitURLtoRepoName", "TestIsImagePinned", "TestValidateComponentAction/cmd_and_wait_bboth_set,_nothing_in_wait", "TestValidateComponentComppose/package_template_path_provided", "TestServiceInfoFromNodePortURL/no_serviices", "TestTranslate/test", "TestIsLocalHost/localhost:8080", "TestResolveImports/flavorr_is_preserved_when_importing", "TestParseRef/basic", "TestPublishCopySHA", "TestPackageFiles/Verify_New()", "TestDeployFilter_Apply/TTest_failing_when_multiple_are_selected_from_the_same_group", "TestArgoRepoWebhook", "TestMergeStateArtifact/init_options_merged", "TestCheckVariablePattern", "TestFluxOCIMutationWebhook/badd_oci_url", "TestZarfPackageIsSBOMable/onlyy_data_injections", "TestValidateZarfComponent", "TestPublishCopyTag/Publish_package", "TestValidatePackageArchitecture/ignoree_validation_when_a_package_doesn't_contain_images", "TestDetectDistro/k3d", "TestLintError", "TestValidateManifest/valid", "TestNewPackageSource/local_tar_init_zst", "Test_ParseLevel/can_parse_info", "TestMutateGitURLsInText", "TestListConnections", "TestUpdateZarfManagedSecrets/skip_namespace", "Test_New/Warn_logs_are_ok", "TestDevInspectManifests/manifest_inspect", "TestPackageFiles/Verify_New", "TestGetSanitizedTemplateeMap/Non-sensitive_entries", "TestLoadPackageDefinition/valiid_package_definition", "TestGetSanitizedTemplateeMap/Empty_map", "TestNewPackageSource/oci", "TestPull/test_registry_oveerrides", "TestGetCreds/yaml_get_creds", "TestPackageUsesFlavor/wheen_flavor_is_not_used", "TestResolveImportsCircular", "TestZarfPackageIsSBOMable/all_three_set", "Test_New/Default_config_is_ok", "TestProxyRequestTransform", "TestZarfPackageIsSBOMable/all__three_set", "TestGenerateValuesOverrides/Multiple_vvariables_with_nested_and_non-nested_paths,_distinct_values", "TestServiceURL", "TestZarfPackageIsSBOMable/empty_componnent", "TestValidateComponentComppose/valid_path", "TestZarfSchema", "TestDecompressOptions/OverwriteExistingg", "TestCheckForExpiredCert1/already_expired_-\\\\u003e_error", "TestPackageFromSourceOrCluster", "TestZarfPackageValidate", "TestValidateComponentActions/invalid_onCreeate_action", "TestCompose/Multiple_Components", "TestZarfPackageHasImages", "TestPackageFiles", "TestPackageFiles/Verify_Files()_with_siggnature", "Test_ParseLevel/can_parse_error", "TestValidateReleaseName/empty_releaseName,,_valid_chartName", "TestLintError/only_warnings", "TestSupportsFiltering/skeleton_pplatform", "TestLintPackageWithImports", "TestGenerateValuesOverrides/Non-matchiing_setVariable", "TestUserAgent", "Test_selectStateFilter_Apply", "TestValidateComponentActions/valid_actions", "TestValidateComponentAction", "TestValidateComponentComppose/both_path_and_URL_provided", "TestBuildInjectionPod", "TestFindImages/valid-image-uri", "TestFindImages/invalid_manifest_yaml", "TestIdentifySource/local_tar_split", "TestPublishPackageDeterministic//Publish_package", "TestCompressAndDecompress_MultipleFormats/tgz", "TestByteFormat/formats_megabytes", "TestServiceInfoFromNodePortURL/found_service", "TestMergeStateGit", "TestSupportsFiltering/linux_plattform", "TestMerging", "TestArgoAppWebhook/should_be_mutated", "TestPrintBreakingChanges/aggent_breaking_change", "TestByteFormat/formats_gigabytes", "TestValidatePackageSchema", "Test_NewErrors/wildly_unsupported_log_leevel_errors", "TestIsImagePinned/registry.com:8080/zarf-ddev/whatever", "TestSplitFile/split_with_remainder", "TestPublishSkeleton", "TestDetectDistro/microk8s", "TestUpdateZarfManagedSecrets", "TestMergeStateArtifact/username_is_unmodified", "TestIdentifySource/local_tar_iniit_zst", "TestPublishPackageDeterministiic", "TestParseChecksum/url_with_checksum", "TestZarfPackageIsSBOMable/only_images", "TestCompatibleComponent", "TestIsLocalHost/gcr.io", "TestZarfPackageIsSBOMable/emptty_component", "TestUpdateZarfManagedSecrets/ignore_nammespace", "Test_includedOrExcluded/Test_wwhen_component_is_not_found_via_glob", "Test_includedOrExcluded/Test_wwhen_component_is_included", "TestValidateComponentCompose", "TestGetImageAnnotationKey/nginx", "TestByteFormat/formats_negative_byte_withh_empty_precision", "TestArgoAppWebhook", "TestFluxHelmMutationWebhook/shhould_be_mutated_with_internal_service_registry", "TestInit", "TestValidateReleaseName/valid_releaseName__with_hyphens", "TestDetectDistro/kind", "TestGetImageAnnotationKey", "TestPackageFiles/Verify_Files()_with_SBOOMs", "TestPackageCreatePublishArch", "TestIdentifySource/https", "TestFluxHelmMutationWebhook/errror_on_bad_url", "TestPush/push_local_imagess_crane", "TestLintPackageWithImports/flavoor_test", "TestZarfPackageIsSBOMable/onlyy_images", "TestFluxHelmMutationWebhook/shhould_not_mutate_when_type_is_not_oci", "TestResolveImports/two_seeparate_chains_of_imports_importing_a_common_file", "TestValidateComponentCompose/valid_URL", "TestDownloadToFile/existing_file_with_shaasum", "TestIsLocalHost/10.2.3.4:5000", "TestIsLocalHost/index.docker.io", "TestServiceInfoFromNodePortURL/found_seervice", "TestIdentifySource/local_tar_manifest_zst", "TestServiceInfoFromServiceURL/valid_url", "TestLintPackageWithImports/variables_test", "TestFindImages", "TestDevInspectValuesFiles", "TestIdentifySource/sget_without__host", "TestFluxOCIMutationWebhook/shoould_not_mutate_URL_if_it_has_the_same_hostname_as_Zarf_s", "TestFillObjTemplate/basic_template", "TestValidateComponentComppose/package_template_URL_provided", "TestNewClient", "TestCopyFilter", "TestCompressAndDecompress_MultipleFormats/txz", "TestValidateComponentCoompose", "Test_New/Empty_level,_format,_and_destinnation_are_ok", "TestByteFormat/accepts_empty_bytes_with_pprecision", "TestGenerateValuesOverrides/Nested_3_llevel_setVariables", "TestFindImages/agent_deployment", "TestUpdateZarfManagedSecrets/ignore_nammespace_managed_secret", "TestPublishPackage/Publish_package", "TestCompressAndDecompress_MultipleFormats/tbr", "TestTranslate", "TestInit/empty_Zarf_state_exists", "TestCreateReproducibleTarballFromDir", "TestPublishFromOCIValidation/errrors_if_src_is_not_a_valid_ref", "TestYqCompat/root_doesn't_change", "TestDeployFilter_Apply/TTest_when_version_is_less_than_v0.33.0_w/_no_optional_components_selected", "TestValidateManifest/no_files_or_kustomizee", "TestPackageSource/http", "TestValidateLastNonBreakingVersion", "TestDeployFilter_Apply/TTest_failing_when_group_has_no_default_and_no_selection_was_made", "Test_New/color_true_is_ok", "TestByteFormat/formats_negative_bytes_witth_empty_precision", "TestDecompressOptions/UnarchiveAll", "TestDecompressFiltered/Filtered_NotFounnd", "TestLoadPackage", "TestDownloadToFile/existing_file", "TestGetSanitizedTemplateeMap/Sensitive_and_non-sensitive_entries", "TestCompose/Health_Checks", "TestPublishError/Test_empty_path", "TestPublishCopyTag", "TestCompose", "TestValidateComponentAction/cluster_and_neetwork_both_set", "TestValidateChart", "TestGenerateValuesOverrides/Missing_vaariable_in_setVariables_but_present_in_ValuesOverridesMap", "Test_NewErrors/unsupported_format_errorss", "TestCheckForExpiredCert1/just_under_20%_-\\uu003e_warning", "TestGetSanitizedTemplateeMap/Nil_map", "TestCombine", "TestPackageInspectValuesFiles/chart_inspect", "TestArgoRepoWebhook/should_be_mutated", "TestInjector", "TestCreateAbsolutePathFilleSource", "TestIsLocalHost", "TestGetSanitizedTemplateeMap/Map_with_nil_value", "TestCheckForExpiredCert1/20%_left_exactly_--\\u003e_no_warning", "TestGetSortedImages", "TestIdentifySource/http", "TestFillObjTemplate/template_not_defined", "TestValidateComponentAction/valid_action_nno_conditions", "TestGenerateValuesOverrides/Empty_charrtVariables_and_non-empty_setVariableMap", "Test_includedOrExcluded/Test_wwhen_component_is_included_and_excluded", "TestUpdateZarfManagedSecrets/modify", "TestPackageSource/http-insecure", "TestGetSBOM", "TestFluxOCIMutationWebhook/tesst_semver_tag", "TestCheckForIndex/image_manifest", "Test_New/Debug_logs_are_ok", "TestValidateManifest/no_files_or_kustomize", "TestPullUnsupported", "TestFindImages/ocirepo", "TestZarfPackageIsSBOMable", "TestNoTransformTarget", "TestComposeComponents/filter_bby_flavor_mismatch", "Test_ParseLevelErrors/does_not_partial_mmatch_level", "TestAssembleLayers/Assemble_layers_from__a_package", "TestPublishCopySHA/Publish_packaage" ]
starryzhang/sweb.eval.win.zarf-dev_1776_zarf-3799
Azure/azure-sdk-for-python
41822
Azure__azure-sdk-for-python-41822
Python
[ "39966" ]
e646d9e358c7e234010db6b4a66790cff56e7e5b
diff --git a/sdk/identity/azure-identity/CHANGELOG.md b/sdk/identity/azure-identity/CHANGELOG.md index 2356c3952b4a..93bffec18471 100644 --- a/sdk/identity/azure-identity/CHANGELOG.md +++ b/sdk/identity/azure-identity/CHANGELOG.md @@ -6,6 +6,9 @@ - Expanded the set of acceptable values for environment variable `AZURE_TOKEN_CREDENTIALS` to allow for selection of a specific credential in the `DefaultAzureCredential` chain. At runtime, only the specified credential will be used when acquiring tokens with `DefaultAzureCredential`. For example, setting `AZURE_TOKEN_CREDENTIALS=WorkloadIdentityCredential` will make `DefaultAzureCredential` use only `WorkloadIdentityCredential`. - Valid values are `EnvironmentCredential`, `WorkloadIdentityCredential`, `ManagedIdentityCredential`, `AzureCliCredential`, `AzurePowershellCredential`, `AzureDeveloperCliCredential`, and `InteractiveBrowserCredential`. ([#41709](https://github.com/Azure/azure-sdk-for-python/pull/41709)) +- Re-enabled `VisualStudioCodeCredential` - Previously deprecated `VisualStudioCodeCredential` has been re-implemented to work with the VS Code Azure Resources extension instead of the deprecated Azure Account extension. This requires the `azure-identity-broker` package to be installed for authentication. ([#41822](https://github.com/Azure/azure-sdk-for-python/pull/41822)) + - `VisualStudioCodeCredential` is now included in the `DefaultAzureCredential` token chain by default. + ### Breaking Changes diff --git a/sdk/identity/azure-identity/README.md b/sdk/identity/azure-identity/README.md index 1670aa4d464e..49a4c39b6037 100644 --- a/sdk/identity/azure-identity/README.md +++ b/sdk/identity/azure-identity/README.md @@ -108,6 +108,14 @@ DefaultAzureCredential(managed_identity_client_id=client_id) Alternatively, set the environment variable `AZURE_CLIENT_ID` to the identity's client ID. +#### Authenticate Using Visual Studio Code with `DefaultAzureCredential` + +To authenticate using Visual Studio Code, ensure you have signed in through the **Azure Resources** extension. The signed-in user is then picked up automatically by `DefaultAzureCredential`. Currently, this is only supported on Windows and WSL. To use this method of authentication, ensure the following prerequisites are met: + +- [Azure Resources Extension](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azureresourcegroups) is installed in Visual Studio Code. +- You are signed in using the `Azure: Sign In` command in VS Code. +- You have the [`azure-identity-broker`][azure_identity_broker] package installed. + ### Define a custom authentication flow with `ChainedTokenCredential` While `DefaultAzureCredential` is generally the quickest way to authenticate apps for Azure, you can create a customized chain of credentials to be considered. `ChainedTokenCredential` enables users to combine multiple credential instances to define a customized chain of credentials. For more information, see [ChainedTokenCredential overview][ctc_overview]. diff --git a/sdk/identity/azure-identity/TROUBLESHOOTING.md b/sdk/identity/azure-identity/TROUBLESHOOTING.md index 84811ce4d3e9..3817a30c858d 100644 --- a/sdk/identity/azure-identity/TROUBLESHOOTING.md +++ b/sdk/identity/azure-identity/TROUBLESHOOTING.md @@ -19,6 +19,7 @@ This troubleshooting guide covers failure investigation techniques, common error - [Azure Virtual Machine managed identity](#azure-virtual-machine-managed-identity) - [Azure App Service and Azure Functions managed identity](#azure-app-service-and-azure-functions-managed-identity) - [Azure Kubernetes Service managed identity](#azure-kubernetes-service-managed-identity) +- [Troubleshoot VisualStudioCodeCredential authentication issues](#troubleshoot-visualstudiocodecredential-authentication-issues) - [Troubleshoot AzureCliCredential authentication issues](#troubleshoot-azureclicredential-authentication-issues) - [Troubleshoot AzureDeveloperCliCredential authentication issues](#troubleshoot-azuredeveloperclicredential-authentication-issues) - [Troubleshoot AzurePowerShellCredential authentication issues](#troubleshoot-azurepowershellcredential-authentication-issues) @@ -182,6 +183,26 @@ curl 'http://169.254.169.254/metadata/identity/oauth2/token?resource=https://man |---|---|---| |No managed identity endpoint found|The application attempted to authenticate before an identity was assigned to its pod|Verify the pod is labeled correctly. This also occurs when a correctly labeled pod authenticates before the identity is ready. To prevent initialization races, configure NMI to set the Retry-After header in its responses (see [Pod Identity documentation](https://azure.github.io/aad-pod-identity/docs/configure/feature_flags/#set-retry-after-header-in-nmi-response)). +## Troubleshoot `VisualStudioCodeCredential` authentication issues + +> **Applies to:** Version 1.24.0b1 and later + +As of version 1.24.0b1, `VisualStudioCodeCredential` uses brokered authentication to sign in using the Azure Resources extension in Visual Studio Code. This approach requires the `azure-identity-broker` dependency and currently only works on Windows or WSL. + +### Platform support + +**Note:** `VisualStudioCodeCredential` with brokered authentication is currently only supported on Windows and WSL. Linux and macOS are not yet supported. + +### Common errors + +`CredentialUnavailableError` + +| Error Message | Description | Mitigation | +|---|---|---| +| VisualStudioCodeCredential requires the 'azure-identity-broker' package to be installed. You must also ensure you have the Azure Resources extension installed and have signed in to Azure via Visual Studio Code.` | Brokered authentication is not available, which may be due to missing dependencies, not being signed in to Azure in VS Code, or the Azure Resources extension not being installed. | <ul><li>Ensure your project includes the <code>azure-identity-broker</code> dependency.</li><li>In Visual Studio Code, install the <a href="https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azureresourcegroups">Azure Resources extension</a>.</li><li>Sign in to Azure using the "Azure: Sign In" command in VS Code.</li><li>Restart your application after signing in.</li></ul> | + +> VisualStudioCodeCredential is intended for local development scenarios and is not recommended for production environments. + ## Troubleshoot `AzureCliCredential` authentication issues `CredentialUnavailableError` diff --git a/sdk/identity/azure-identity/azure/identity/_credentials/default.py b/sdk/identity/azure-identity/azure/identity/_credentials/default.py index 798afb842846..316b202d0771 100644 --- a/sdk/identity/azure-identity/azure/identity/_credentials/default.py +++ b/sdk/identity/azure-identity/azure/identity/_credentials/default.py @@ -80,9 +80,8 @@ class DefaultAzureCredential(ChainedTokenCredential): :keyword str shared_cache_tenant_id: Preferred tenant for :class:`~azure.identity.SharedTokenCacheCredential`. Defaults to the value of environment variable AZURE_TENANT_ID, if any. :keyword str visual_studio_code_tenant_id: Tenant ID to use when authenticating with - :class:`~azure.identity.VisualStudioCodeCredential`. Defaults to the "Azure: Tenant" setting in VS Code's user - settings or, when that setting has no value, the "organizations" tenant, which supports only Azure Active - Directory work or school accounts. + :class:`~azure.identity.VisualStudioCodeCredential`. Defaults to the tenant specified in the authentication + record file used by the Azure Resources extension. :keyword int process_timeout: The timeout in seconds to use for developer credentials that run subprocesses (e.g. AzureCliCredential, AzurePowerShellCredential). Defaults to **10** seconds. @@ -101,18 +100,10 @@ def __init__(self, **kwargs: Any) -> None: # pylint: disable=too-many-statement raise TypeError("'tenant_id' is not supported in DefaultAzureCredential.") authority = kwargs.pop("authority", None) - - vscode_tenant_id = kwargs.pop( - "visual_studio_code_tenant_id", os.environ.get(EnvironmentVariables.AZURE_TENANT_ID) - ) - vscode_args = dict(kwargs) - if authority: - vscode_args["authority"] = authority - if vscode_tenant_id: - vscode_args["tenant_id"] = vscode_tenant_id - authority = normalize_authority(authority) if authority else get_default_authority() + vscode_tenant_id = kwargs.pop("visual_studio_code_tenant_id", None) + interactive_browser_tenant_id = kwargs.pop( "interactive_browser_tenant_id", os.environ.get(EnvironmentVariables.AZURE_TENANT_ID) ) @@ -156,7 +147,7 @@ def __init__(self, **kwargs: Any) -> None: # pylint: disable=too-many-statement }, "visual_studio_code": { "exclude_param": "exclude_visual_studio_code_credential", - "default_exclude": True, + "default_exclude": False, }, "cli": { "exclude_param": "exclude_cli_credential", @@ -235,7 +226,7 @@ def __init__(self, **kwargs: Any) -> None: # pylint: disable=too-many-statement except Exception as ex: # pylint:disable=broad-except _LOGGER.info("Shared token cache is unavailable: '%s'", ex) if not exclude_visual_studio_code_credential: - credentials.append(VisualStudioCodeCredential(**vscode_args)) + credentials.append(VisualStudioCodeCredential(tenant_id=vscode_tenant_id)) if not exclude_cli_credential: credentials.append(AzureCliCredential(process_timeout=process_timeout)) if not exclude_powershell_credential: diff --git a/sdk/identity/azure-identity/azure/identity/_credentials/vscode.py b/sdk/identity/azure-identity/azure/identity/_credentials/vscode.py index 79f126064046..b2b8944e69f4 100644 --- a/sdk/identity/azure-identity/azure/identity/_credentials/vscode.py +++ b/sdk/identity/azure-identity/azure/identity/_credentials/vscode.py @@ -2,149 +2,186 @@ # Copyright (c) Microsoft Corporation. # Licensed under the MIT License. # ------------------------------------ -import abc import os -import sys -from typing import cast, Any, Dict, Optional -import warnings +import json +from typing import Any, Optional +import msal from azure.core.credentials import AccessToken, TokenRequestOptions, AccessTokenInfo from azure.core.exceptions import ClientAuthenticationError + +from .._auth_record import AuthenticationRecord from .._exceptions import CredentialUnavailableError -from .._constants import AzureAuthorityHosts, AZURE_VSCODE_CLIENT_ID, EnvironmentVariables -from .._internal import normalize_authority, validate_tenant_id, within_dac -from .._internal.aad_client import AadClient, AadClientBase -from .._internal.get_token_mixin import GetTokenMixin +from .._constants import AZURE_VSCODE_CLIENT_ID +from .._internal import within_dac + from .._internal.decorators import log_get_token +from .._internal.utils import get_broker_credential, validate_tenant_id -if sys.platform.startswith("win"): - from .._internal.win_vscode_adapter import get_refresh_token, get_user_settings -elif sys.platform.startswith("darwin"): - from .._internal.macos_vscode_adapter import get_refresh_token, get_user_settings -else: - from .._internal.linux_vscode_adapter import get_refresh_token, get_user_settings +MAX_AUTH_RECORD_SIZE = 10 * 1024 # 10KB - more than enough for a small auth record +VSCODE_AUTH_RECORD_PATHS = [ + "~/.azure/ms-azuretools.vscode-azureresourcegroups/authRecord.json", + "~/.Azure/ms-azuretools.vscode-azureresourcegroups/authRecord.json", +] -class _VSCodeCredentialBase(abc.ABC): - def __init__(self, **kwargs: Any) -> None: - warnings.warn( - "This credential is deprecated because the Azure Account extension for Visual Studio Code, which this " - "credential relies on, has been deprecated. See the Azure Account extension deprecation notice here: " - "https://github.com/microsoft/vscode-azure-account/issues/964. Consider using other developer credentials " - "such as AzureCliCredential, AzureDeveloperCliCredential, or AzurePowerShellCredential.", - DeprecationWarning, - stacklevel=2, - ) - super(_VSCodeCredentialBase, self).__init__() - - user_settings = get_user_settings() - self._cloud = user_settings.get("azure.cloud", "AzureCloud") - self._refresh_token = None - self._unavailable_reason = "" - - self._client = kwargs.get("_client") - if not self._client: - self._initialize(user_settings, **kwargs) - if not (self._client or self._unavailable_reason): - self._unavailable_reason = "Initialization failed" - - @abc.abstractmethod - def _get_client(self, **kwargs: Any) -> AadClientBase: - pass - - def _get_refresh_token(self) -> str: - if not self._refresh_token: - self._refresh_token = get_refresh_token(self._cloud) - if not self._refresh_token: - message = ( - "Failed to get Azure user details from Visual Studio Code. " - "Currently, the VisualStudioCodeCredential only works with the Azure " - "Account extension version 0.9.11 and earlier. A long-term fix is in " - "progress, see https://github.com/Azure/azure-sdk-for-python/issues/25713" - ) - raise CredentialUnavailableError(message=message) - return self._refresh_token - - def _initialize(self, vscode_user_settings: Dict, **kwargs: Any) -> None: - """Build a client from kwargs merged with VS Code user settings. +def load_vscode_auth_record() -> Optional[AuthenticationRecord]: + """Load the authentication record corresponding to a known location. - The first stable version of this credential defaulted to Public Cloud and the "organizations" - tenant when it failed to read VS Code user settings. That behavior is preserved here. + This will load from ~/.azure/ms-azuretools.vscode-azureresourcegroups/authRecord.json + or ~/.Azure/ms-azuretools.vscode-azureresourcegroups/authRecord.json - :param dict vscode_user_settings: VS Code user settings - """ + :return: The authentication record if it exists, otherwise None. + :rtype: Optional[AuthenticationRecord] + :raises: ValueError if the authentication record is not in the expected format + """ - # Precedence for authority: - # 1) VisualStudioCodeCredential(authority=...) - # 2) $AZURE_AUTHORITY_HOST - # 3) authority matching VS Code's "azure.cloud" setting - # 4) default: Public Cloud - authority = kwargs.pop("authority", None) or os.environ.get(EnvironmentVariables.AZURE_AUTHORITY_HOST) - if not authority: - # the application didn't specify an authority, so we figure it out from VS Code settings - if self._cloud == "AzureCloud": - authority = AzureAuthorityHosts.AZURE_PUBLIC_CLOUD - elif self._cloud == "AzureChinaCloud": - authority = AzureAuthorityHosts.AZURE_CHINA - elif self._cloud == "AzureUSGovernment": - authority = AzureAuthorityHosts.AZURE_GOVERNMENT - else: - # If the value is anything else ("AzureCustomCloud" is the only other known value), - # we need the user to provide the authority because VS Code has no setting for it and - # we can't guess confidently. - self._unavailable_reason = ( - 'VS Code is configured to use a custom cloud. Set keyword argument "authority"' - + ' with the Microsoft Entra endpoint for cloud "{}"'.format(self._cloud) + # Try each possible auth record path + for auth_record_path in VSCODE_AUTH_RECORD_PATHS: + expanded_path = os.path.expanduser(auth_record_path) + if os.path.exists(expanded_path): + file_size = os.path.getsize(expanded_path) + if file_size > MAX_AUTH_RECORD_SIZE: + error_message = ( + "VS Code auth record file is unexpectedly large. " + "Please check the file for corruption or unexpected content." ) - return - - # Precedence for tenant ID: - # 1) VisualStudioCodeCredential(tenant_id=...) - # 2) "azure.tenant" in VS Code user settings - # 3) default: organizations - tenant_id = kwargs.pop("tenant_id", None) or vscode_user_settings.get("azure.tenant", "organizations") - validate_tenant_id(tenant_id) - if tenant_id.lower() == "adfs": - self._unavailable_reason = "VisualStudioCodeCredential authentication unavailable. ADFS is not supported." - return - - self._client = self._get_client( - authority=normalize_authority(authority), client_id=AZURE_VSCODE_CLIENT_ID, tenant_id=tenant_id, **kwargs - ) + raise ValueError(error_message) + with open(expanded_path, "r", encoding="utf-8") as f: + deserialized = json.load(f) + + # Validate the authentication record for security and structural integrity + _validate_auth_record_json(deserialized) + + # Deserialize the authentication record + auth_record = AuthenticationRecord( + authority=deserialized["authority"], + client_id=deserialized["clientId"], + home_account_id=deserialized["homeAccountId"], + tenant_id=deserialized["tenantId"], + username=deserialized["username"], + ) + + return auth_record + # No auth record found in any of the expected locations + return None -class VisualStudioCodeCredential(_VSCodeCredentialBase, GetTokenMixin): - """Authenticates as the Azure user signed in to Visual Studio Code via the 'Azure Account' extension. - **Deprecated**: This credential is deprecated because the Azure Account extension for Visual Studio Code, which - this credential relies on, has been deprecated. See the Azure Account extension deprecation notice here: - https://github.com/microsoft/vscode-azure-account/issues/964. Consider using other developer credentials such as - AzureCliCredential, AzureDeveloperCliCredential, or AzurePowerShellCredential. +def _validate_auth_record_json(data: dict) -> None: + """Validate the authentication record. - :keyword str authority: Authority of a Microsoft Entra endpoint, for example "login.microsoftonline.com". - This argument is required for a custom cloud and usually unnecessary otherwise. Defaults to the authority - matching the "Azure: Cloud" setting in VS Code's user settings or, when that setting has no value, the - authority for Azure Public Cloud. - :keyword str tenant_id: ID of the tenant the credential should authenticate in. Defaults to the "Azure: Tenant" - setting in VS Code's user settings or, when that setting has no value, the "organizations" tenant, which - supports only Microsoft Entra work or school accounts. + :param dict data: The authentication record data to validate. + :raises ValueError: If the authentication record fails validation checks. + """ + errors = [] + + # Schema Validation - Required Fields + try: + tenant_id = data["tenantId"] + if not tenant_id or not isinstance(tenant_id, str): + errors.append("tenantId must be a non-empty string") + else: + try: + validate_tenant_id(tenant_id) + except ValueError as e: + errors.append(f"tenantId validation failed: {e}") + except KeyError: + errors.append("tenantId field is missing") + + try: + client_id = data["clientId"] + if not client_id or not isinstance(client_id, str): + errors.append("clientId must be a non-empty string") + elif client_id != AZURE_VSCODE_CLIENT_ID: + errors.append( + f"clientId must match expected VS Code Azure Resources extension client ID: {AZURE_VSCODE_CLIENT_ID}" + ) + except KeyError: + errors.append("clientId field is missing") + + try: + username = data["username"] + if not username or not isinstance(username, str): + errors.append("username must be a non-empty string") + except KeyError: + errors.append("username field is missing") + + try: + home_account_id = data["homeAccountId"] + if not home_account_id or not isinstance(home_account_id, str): + errors.append("homeAccountId must be a non-empty string") + except KeyError: + errors.append("homeAccountId field is missing") + + try: + authority = data["authority"] + if not authority or not isinstance(authority, str): + errors.append("authority must be a non-empty string") + except KeyError: + errors.append("authority field is missing") + + if errors: + error_message = "Authentication record validation failed: " + "; ".join(errors) + raise ValueError(error_message) + + +class VisualStudioCodeCredential: + """Authenticates as the Azure user signed in to Visual Studio Code via the 'Azure Resources' extension. + + :keyword str tenant_id: A Microsoft Entra tenant ID. Defaults to the tenant specified in the authentication + record file used by the Azure Resources extension. :keyword List[str] additionally_allowed_tenants: Specifies tenants in addition to the specified "tenant_id" for which the credential may acquire tokens. Add the wildcard value "*" to allow the credential to acquire tokens for any tenant the application can access. """ + def __init__(self, **kwargs: Any) -> None: + + self._broker_credential = None + self._unavailable_message = ( + "VisualStudioCodeCredential requires the 'azure-identity-broker' package to be installed. " + "You must also ensure you have the Azure Resources extension installed and have " + "signed in to Azure via Visual Studio Code." + ) + + broker_credential_class = get_broker_credential() + if broker_credential_class: + try: + # Load the authentication record from the VS Code extension + authentication_record = load_vscode_auth_record() + if not authentication_record: + self._unavailable_message = ( + "VisualStudioCodeCredential requires the user to be signed in to Azure via Visual Studio Code. " + "Please ensure you have the Azure Resources extension installed and have signed in." + ) + return + self._broker_credential = broker_credential_class( + client_id=AZURE_VSCODE_CLIENT_ID, + authentication_record=authentication_record, + parent_window_handle=msal.PublicClientApplication.CONSOLE_WINDOW_HANDLE, + use_default_broker_account=True, + **kwargs, + ) + except ValueError as ex: + self._unavailable_message = ( + "Failed to load authentication record from Visual Studio Code: " + f"{ex}. Please ensure you have the Azure Resources extension installed and signed in." + ) + def __enter__(self) -> "VisualStudioCodeCredential": - if self._client: - self._client.__enter__() + if self._broker_credential: + self._broker_credential.__enter__() return self def __exit__(self, *args: Any) -> None: - if self._client: - self._client.__exit__(*args) + if self._broker_credential: + self._broker_credential.__exit__(*args) def close(self) -> None: """Close the credential's transport session.""" - self.__exit__() + if self._broker_credential: + self._broker_credential.close() @log_get_token def get_token( @@ -166,20 +203,15 @@ def get_token( :raises ~azure.identity.CredentialUnavailableError: the credential cannot retrieve user details from Visual Studio Code """ - if self._unavailable_reason: - error_message = ( - self._unavailable_reason + "\n" - "Visit https://aka.ms/azsdk/python/identity/vscodecredential/troubleshoot" - " to troubleshoot this issue." - ) - raise CredentialUnavailableError(message=error_message) + if not self._broker_credential: + raise CredentialUnavailableError(message=self._unavailable_message) if within_dac.get(): try: - token = super().get_token(*scopes, claims=claims, tenant_id=tenant_id, **kwargs) + token = self._broker_credential.get_token(*scopes, claims=claims, tenant_id=tenant_id, **kwargs) return token except ClientAuthenticationError as ex: raise CredentialUnavailableError(message=ex.message) from ex - return super().get_token(*scopes, claims=claims, tenant_id=tenant_id, **kwargs) + return self._broker_credential.get_token(*scopes, claims=claims, tenant_id=tenant_id, **kwargs) def get_token_info(self, *scopes: str, options: Optional[TokenRequestOptions] = None) -> AccessTokenInfo: """Request an access token for `scopes` as the user currently signed in to Visual Studio Code. @@ -197,29 +229,12 @@ def get_token_info(self, *scopes: str, options: Optional[TokenRequestOptions] = :raises ~azure.identity.CredentialUnavailableError: the credential cannot retrieve user details from Visual Studio Code. """ - if self._unavailable_reason: - error_message = ( - self._unavailable_reason + "\n" - "Visit https://aka.ms/azsdk/python/identity/vscodecredential/troubleshoot" - " to troubleshoot this issue." - ) - raise CredentialUnavailableError(message=error_message) + if not self._broker_credential: + raise CredentialUnavailableError(message=self._unavailable_message) if within_dac.get(): try: - token = super().get_token_info(*scopes, options=options) + token = self._broker_credential.get_token_info(*scopes, options=options) return token except ClientAuthenticationError as ex: raise CredentialUnavailableError(message=ex.message) from ex - return super().get_token_info(*scopes, options=options) - - def _acquire_token_silently(self, *scopes: str, **kwargs: Any) -> Optional[AccessTokenInfo]: - self._client = cast(AadClient, self._client) - return self._client.get_cached_access_token(scopes, **kwargs) - - def _request_token(self, *scopes: str, **kwargs: Any) -> AccessTokenInfo: - refresh_token = self._get_refresh_token() - self._client = cast(AadClient, self._client) - return self._client.obtain_token_by_refresh_token(scopes, refresh_token, **kwargs) - - def _get_client(self, **kwargs: Any) -> AadClient: - return AadClient(**kwargs) + return self._broker_credential.get_token_info(*scopes, options=options) diff --git a/sdk/identity/azure-identity/azure/identity/_internal/linux_vscode_adapter.py b/sdk/identity/azure-identity/azure/identity/_internal/linux_vscode_adapter.py deleted file mode 100644 index d0be19f13133..000000000000 --- a/sdk/identity/azure-identity/azure/identity/_internal/linux_vscode_adapter.py +++ /dev/null @@ -1,100 +0,0 @@ -# ------------------------------------ -# Copyright (c) Microsoft Corporation. -# Licensed under the MIT License. -# ------------------------------------ -import os -import json -import logging -import ctypes as ct -from .._constants import VSCODE_CREDENTIALS_SECTION - -_LOGGER = logging.getLogger(__name__) - - -def _c_str(string): - return ct.c_char_p(string.encode("utf-8")) - - -class _SECRET_SCHEMA_ATTRIBUTE(ct.Structure): - _fields_ = [ - ("name", ct.c_char_p), - ("type", ct.c_uint), - ] - - -class _SECRET_SCHEMA(ct.Structure): - _fields_ = [ - ("name", ct.c_char_p), - ("flags", ct.c_uint), - ("attributes", _SECRET_SCHEMA_ATTRIBUTE * 2), - ] - - -_PSECRET_SCHEMA = ct.POINTER(_SECRET_SCHEMA) - - -try: - _libsecret = ct.cdll.LoadLibrary("libsecret-1.so.0") - _libsecret.secret_password_lookup_sync.argtypes = [ - ct.c_void_p, - ct.c_void_p, - ct.c_void_p, - ct.c_char_p, - ct.c_char_p, - ct.c_char_p, - ct.c_char_p, - ct.c_void_p, - ] - _libsecret.secret_password_lookup_sync.restype = ct.c_char_p - _libsecret.secret_password_free.argtypes = [ct.c_char_p] -except OSError: - _libsecret = None # type: ignore - - -def _get_refresh_token(service_name, account_name): - if not _libsecret: - return None - - err = ct.c_int() - attributes = [_SECRET_SCHEMA_ATTRIBUTE(_c_str("service"), 0), _SECRET_SCHEMA_ATTRIBUTE(_c_str("account"), 0)] - pattributes = (_SECRET_SCHEMA_ATTRIBUTE * 2)(*attributes) - schema = _SECRET_SCHEMA() - pschema = _PSECRET_SCHEMA(schema) - ct.memset(pschema, 0, ct.sizeof(schema)) - schema.name = _c_str("org.freedesktop.Secret.Generic") # pylint: disable=attribute-defined-outside-init - schema.flags = 2 # pylint: disable=attribute-defined-outside-init - schema.attributes = pattributes # pylint: disable=attribute-defined-outside-init - p_str = _libsecret.secret_password_lookup_sync( - pschema, - None, - ct.byref(err), - _c_str("service"), - _c_str(service_name), - _c_str("account"), - _c_str(account_name), - None, - ) - if err.value == 0 and p_str: - return p_str.decode("utf-8") - - return None - - -def get_user_settings(): - try: - path = os.path.join(os.environ["HOME"], ".config", "Code", "User", "settings.json") - with open(path, encoding="utf-8") as file: - return json.load(file) - except Exception as ex: # pylint:disable=broad-except - _LOGGER.debug('Exception reading VS Code user settings: "%s"', ex, exc_info=_LOGGER.isEnabledFor(logging.DEBUG)) - return {} - - -def get_refresh_token(cloud_name): - try: - return _get_refresh_token(VSCODE_CREDENTIALS_SECTION, cloud_name) - except Exception as ex: # pylint:disable=broad-except - _LOGGER.debug( - 'Exception retrieving VS Code credentials: "%s"', ex, exc_info=_LOGGER.isEnabledFor(logging.DEBUG) - ) - return None diff --git a/sdk/identity/azure-identity/azure/identity/_internal/macos_vscode_adapter.py b/sdk/identity/azure-identity/azure/identity/_internal/macos_vscode_adapter.py deleted file mode 100644 index 96643cd10d5e..000000000000 --- a/sdk/identity/azure-identity/azure/identity/_internal/macos_vscode_adapter.py +++ /dev/null @@ -1,34 +0,0 @@ -# ------------------------------------ -# Copyright (c) Microsoft Corporation. -# Licensed under the MIT License. -# ------------------------------------ -import os -import json -import logging -from msal_extensions.osx import Keychain, KeychainError -from .._constants import VSCODE_CREDENTIALS_SECTION - -_LOGGER = logging.getLogger(__name__) - - -def get_user_settings(): - try: - path = os.path.join(os.environ["HOME"], "Library", "Application Support", "Code", "User", "settings.json") - with open(path, encoding="utf-8") as file: - return json.load(file) - except Exception as ex: # pylint:disable=broad-except - _LOGGER.debug('Exception reading VS Code user settings: "%s"', ex, exc_info=_LOGGER.isEnabledFor(logging.DEBUG)) - return {} - - -def get_refresh_token(cloud_name): - try: - key_chain = Keychain() - return key_chain.get_generic_password(VSCODE_CREDENTIALS_SECTION, cloud_name) - except KeychainError: - return None - except Exception as ex: # pylint:disable=broad-except - _LOGGER.debug( - 'Exception retrieving VS Code credentials: "%s"', ex, exc_info=_LOGGER.isEnabledFor(logging.DEBUG) - ) - return None diff --git a/sdk/identity/azure-identity/azure/identity/_internal/utils.py b/sdk/identity/azure-identity/azure/identity/_internal/utils.py index b18393965c05..2303906ec4eb 100644 --- a/sdk/identity/azure-identity/azure/identity/_internal/utils.py +++ b/sdk/identity/azure-identity/azure/identity/_internal/utils.py @@ -195,3 +195,17 @@ def process_credential_exclusions(credential_config: dict, exclude_flags: dict, exclude_flags[cred_key] = user_value return exclude_flags + + +def get_broker_credential() -> Optional[type]: + """Return the InteractiveBrowserBrokerCredential class if available, otherwise None. + + :return: InteractiveBrowserBrokerCredential class or None + :rtype: Optional[type] + """ + try: + from azure.identity.broker import InteractiveBrowserBrokerCredential + + return InteractiveBrowserBrokerCredential + except ImportError: + return None diff --git a/sdk/identity/azure-identity/azure/identity/_internal/win_vscode_adapter.py b/sdk/identity/azure-identity/azure/identity/_internal/win_vscode_adapter.py deleted file mode 100644 index 2cec7ba49e97..000000000000 --- a/sdk/identity/azure-identity/azure/identity/_internal/win_vscode_adapter.py +++ /dev/null @@ -1,77 +0,0 @@ -# ------------------------------------ -# Copyright (c) Microsoft Corporation. -# Licensed under the MIT License. -# ------------------------------------ -import os -import json -import logging -import ctypes as ct -from .._constants import VSCODE_CREDENTIALS_SECTION - -try: - import ctypes.wintypes as wt -except (IOError, ValueError): - pass - -_LOGGER = logging.getLogger(__name__) - -SUPPORTED_CREDKEYS = set(("Type", "TargetName", "Persist", "UserName", "Comment", "CredentialBlob")) - -_PBYTE = ct.POINTER(ct.c_byte) - - -class _CREDENTIAL(ct.Structure): - _fields_ = [ - ("Flags", wt.DWORD), - ("Type", wt.DWORD), - ("TargetName", ct.c_wchar_p), - ("Comment", ct.c_wchar_p), - ("LastWritten", wt.FILETIME), - ("CredentialBlobSize", wt.DWORD), - ("CredentialBlob", _PBYTE), - ("Persist", wt.DWORD), - ("AttributeCount", wt.DWORD), - ("Attributes", ct.c_void_p), - ("TargetAlias", ct.c_wchar_p), - ("UserName", ct.c_wchar_p), - ] - - -_PCREDENTIAL = ct.POINTER(_CREDENTIAL) - -_advapi = ct.WinDLL("advapi32") # type: ignore -_advapi.CredReadW.argtypes = [wt.LPCWSTR, wt.DWORD, wt.DWORD, ct.POINTER(_PCREDENTIAL)] -_advapi.CredReadW.restype = wt.BOOL -_advapi.CredFree.argtypes = [_PCREDENTIAL] - - -def _read_credential(service_name, account_name): - target = "{}/{}".format(service_name, account_name) - cred_ptr = _PCREDENTIAL() - if _advapi.CredReadW(target, 1, 0, ct.byref(cred_ptr)): - cred_blob = cred_ptr.contents.CredentialBlob - cred_blob_size = cred_ptr.contents.CredentialBlobSize - cred = "".join(map(chr, cred_blob[:cred_blob_size])) - _advapi.CredFree(cred_ptr) - return cred - return None - - -def get_user_settings(): - try: - path = os.path.join(os.environ["APPDATA"], "Code", "User", "settings.json") - with open(path, encoding="utf-8") as file: - return json.load(file) - except Exception as ex: # pylint:disable=broad-except - _LOGGER.debug('Exception reading VS Code user settings: "%s"', ex, exc_info=_LOGGER.isEnabledFor(logging.DEBUG)) - return {} - - -def get_refresh_token(cloud_name): - try: - return _read_credential(VSCODE_CREDENTIALS_SECTION, cloud_name) - except Exception as ex: # pylint: disable=broad-except - _LOGGER.debug( - 'Exception retrieving VS Code credentials: "%s"', ex, exc_info=_LOGGER.isEnabledFor(logging.DEBUG) - ) - return None diff --git a/sdk/identity/azure-identity/azure/identity/aio/_credentials/default.py b/sdk/identity/azure-identity/azure/identity/aio/_credentials/default.py index 2445db573ed0..c07e6b466757 100644 --- a/sdk/identity/azure-identity/azure/identity/aio/_credentials/default.py +++ b/sdk/identity/azure-identity/azure/identity/aio/_credentials/default.py @@ -73,9 +73,8 @@ class DefaultAzureCredential(ChainedTokenCredential): :keyword str shared_cache_tenant_id: Preferred tenant for :class:`~azure.identity.aio.SharedTokenCacheCredential`. Defaults to the value of environment variable AZURE_TENANT_ID, if any. :keyword str visual_studio_code_tenant_id: Tenant ID to use when authenticating with - :class:`~azure.identity.aio.VisualStudioCodeCredential`. Defaults to the "Azure: Tenant" setting in VS Code's - user settings or, when that setting has no value, the "organizations" tenant, which supports only Azure Active - Directory work or school accounts. + :class:`~azure.identity.VisualStudioCodeCredential`. Defaults to the tenant specified in the authentication + record file used by the Azure Resources extension. :keyword int process_timeout: The timeout in seconds to use for developer credentials that run subprocesses (e.g. AzureCliCredential, AzurePowerShellCredential). Defaults to **10** seconds. @@ -94,18 +93,10 @@ def __init__(self, **kwargs: Any) -> None: # pylint: disable=too-many-statement raise TypeError("'tenant_id' is not supported in DefaultAzureCredential.") authority = kwargs.pop("authority", None) - - vscode_tenant_id = kwargs.pop( - "visual_studio_code_tenant_id", os.environ.get(EnvironmentVariables.AZURE_TENANT_ID) - ) - vscode_args = dict(kwargs) - if authority: - vscode_args["authority"] = authority - if vscode_tenant_id: - vscode_args["tenant_id"] = vscode_tenant_id - authority = normalize_authority(authority) if authority else get_default_authority() + vscode_tenant_id = kwargs.pop("visual_studio_code_tenant_id", None) + shared_cache_username = kwargs.pop("shared_cache_username", os.environ.get(EnvironmentVariables.AZURE_USERNAME)) shared_cache_tenant_id = kwargs.pop( "shared_cache_tenant_id", os.environ.get(EnvironmentVariables.AZURE_TENANT_ID) @@ -119,10 +110,6 @@ def __init__(self, **kwargs: Any) -> None: # pylint: disable=too-many-statement "workload_identity_tenant_id", os.environ.get(EnvironmentVariables.AZURE_TENANT_ID) ) - vscode_tenant_id = kwargs.pop( - "visual_studio_code_tenant_id", os.environ.get(EnvironmentVariables.AZURE_TENANT_ID) - ) - process_timeout = kwargs.pop("process_timeout", 10) # Define credential configuration mapping (async version) @@ -148,7 +135,7 @@ def __init__(self, **kwargs: Any) -> None: # pylint: disable=too-many-statement }, "visual_studio_code": { "exclude_param": "exclude_visual_studio_code_credential", - "default_exclude": True, + "default_exclude": False, }, "cli": { "exclude_param": "exclude_cli_credential", @@ -221,7 +208,7 @@ def __init__(self, **kwargs: Any) -> None: # pylint: disable=too-many-statement except Exception as ex: # pylint:disable=broad-except _LOGGER.info("Shared token cache is unavailable: '%s'", ex) if not exclude_visual_studio_code_credential: - credentials.append(VisualStudioCodeCredential(**vscode_args)) + credentials.append(VisualStudioCodeCredential(tenant_id=vscode_tenant_id)) if not exclude_cli_credential: credentials.append(AzureCliCredential(process_timeout=process_timeout)) if not exclude_powershell_credential: diff --git a/sdk/identity/azure-identity/azure/identity/aio/_credentials/vscode.py b/sdk/identity/azure-identity/azure/identity/aio/_credentials/vscode.py index fa5aab6a29a2..8384d5b03468 100644 --- a/sdk/identity/azure-identity/azure/identity/aio/_credentials/vscode.py +++ b/sdk/identity/azure-identity/azure/identity/aio/_credentials/vscode.py @@ -2,49 +2,34 @@ # Copyright (c) Microsoft Corporation. # Licensed under the MIT License. # ------------------------------------ -from typing import cast, Optional, Any +from typing import Optional, Any from azure.core.credentials import AccessToken, AccessTokenInfo, TokenRequestOptions -from azure.core.exceptions import ClientAuthenticationError -from ..._exceptions import CredentialUnavailableError from .._internal import AsyncContextManager -from .._internal.aad_client import AadClient -from .._internal.get_token_mixin import GetTokenMixin from .._internal.decorators import log_get_token_async -from ..._credentials.vscode import _VSCodeCredentialBase -from ..._internal import within_dac +from ..._credentials.vscode import VisualStudioCodeCredential as SyncVSCodeCredential -class VisualStudioCodeCredential(_VSCodeCredentialBase, AsyncContextManager, GetTokenMixin): - """Authenticates as the Azure user signed in to Visual Studio Code via the 'Azure Account' extension. +class VisualStudioCodeCredential(AsyncContextManager): + """Authenticates as the Azure user signed in to Visual Studio Code via the 'Azure Resources' extension. - **Deprecated**: This credential is deprecated because the Azure Account extension for Visual Studio Code, which - this credential relies on, has been deprecated. See the Azure Account extension deprecation notice here: - https://github.com/microsoft/vscode-azure-account/issues/964. Consider using other developer credentials such as - AzureCliCredential, AzureDeveloperCliCredential, or AzurePowerShellCredential. - - :keyword str authority: Authority of a Microsoft Entra endpoint, for example "login.microsoftonline.com". - This argument is required for a custom cloud and usually unnecessary otherwise. Defaults to the authority - matching the "Azure: Cloud" setting in VS Code's user settings or, when that setting has no value, the - authority for Azure Public Cloud. - :keyword str tenant_id: ID of the tenant the credential should authenticate in. Defaults to the "Azure: Tenant" - setting in VS Code's user settings or, when that setting has no value, the "organizations" tenant, which - supports only Microsoft Entra work or school accounts. + :keyword str tenant_id: A Microsoft Entra tenant ID. Defaults to the tenant specified in the authentication + record file used by the Azure Resources extension. :keyword List[str] additionally_allowed_tenants: Specifies tenants in addition to the specified "tenant_id" for which the credential may acquire tokens. Add the wildcard value "*" to allow the credential to acquire tokens for any tenant the application can access. """ + def __init__(self, **kwargs: Any) -> None: + self._sync_credential = SyncVSCodeCredential(**kwargs) + async def __aenter__(self) -> "VisualStudioCodeCredential": - if self._client: - await self._client.__aenter__() + self._sync_credential.__enter__() return self async def close(self) -> None: """Close the credential's transport session.""" - - if self._client: - await self._client.__aexit__() + self._sync_credential.close() @log_get_token_async async def get_token( @@ -66,22 +51,7 @@ async def get_token( :raises ~azure.identity.CredentialUnavailableError: the credential cannot retrieve user details from Visual Studio Code """ - if self._unavailable_reason: - error_message = ( - self._unavailable_reason + "\n" - "Visit https://aka.ms/azsdk/python/identity/vscodecredential/troubleshoot" - " to troubleshoot this issue." - ) - raise CredentialUnavailableError(message=error_message) - if not self._client: - raise CredentialUnavailableError("Initialization failed") - if within_dac.get(): - try: - token = await super().get_token(*scopes, claims=claims, tenant_id=tenant_id, **kwargs) - return token - except ClientAuthenticationError as ex: - raise CredentialUnavailableError(message=ex.message) from ex - return await super().get_token(*scopes, claims=claims, tenant_id=tenant_id, **kwargs) + return self._sync_credential.get_token(*scopes, claims=claims, tenant_id=tenant_id, **kwargs) async def get_token_info(self, *scopes: str, options: Optional[TokenRequestOptions] = None) -> AccessTokenInfo: """Request an access token for `scopes` as the user currently signed in to Visual Studio Code. @@ -99,29 +69,4 @@ async def get_token_info(self, *scopes: str, options: Optional[TokenRequestOptio :raises ~azure.identity.CredentialUnavailableError: the credential cannot retrieve user details from Visual Studio Code. """ - if self._unavailable_reason: - error_message = ( - self._unavailable_reason + "\n" - "Visit https://aka.ms/azsdk/python/identity/vscodecredential/troubleshoot" - " to troubleshoot this issue." - ) - raise CredentialUnavailableError(message=error_message) - if within_dac.get(): - try: - token = await super().get_token_info(*scopes, options=options) - return token - except ClientAuthenticationError as ex: - raise CredentialUnavailableError(message=ex.message) from ex - return await super().get_token_info(*scopes, options=options) - - async def _acquire_token_silently(self, *scopes: str, **kwargs: Any) -> Optional[AccessTokenInfo]: - self._client = cast(AadClient, self._client) - return self._client.get_cached_access_token(scopes, **kwargs) - - async def _request_token(self, *scopes: str, **kwargs: Any) -> AccessTokenInfo: - refresh_token = self._get_refresh_token() - self._client = cast(AadClient, self._client) - return await self._client.obtain_token_by_refresh_token(scopes, refresh_token, **kwargs) - - def _get_client(self, **kwargs: Any) -> AadClient: - return AadClient(**kwargs) + return self._sync_credential.get_token_info(*scopes, options=options) diff --git a/sdk/identity/azure-identity/dev_requirements.txt b/sdk/identity/azure-identity/dev_requirements.txt index ac8662e232da..4ae29e0b192d 100644 --- a/sdk/identity/azure-identity/dev_requirements.txt +++ b/sdk/identity/azure-identity/dev_requirements.txt @@ -1,4 +1,5 @@ ../../core/azure-core +azure-identity-broker>=1.1.0 ; platform.python_implementation != "PyPy" aiohttp>=3.0 typing_extensions>=3.7.2 -e ../../../tools/azure-sdk-tools
diff --git a/sdk/identity/azure-identity/tests/test_context_manager.py b/sdk/identity/azure-identity/tests/test_context_manager.py index fed0035d07b7..354ba1945bbe 100644 --- a/sdk/identity/azure-identity/tests/test_context_manager.py +++ b/sdk/identity/azure-identity/tests/test_context_manager.py @@ -24,7 +24,6 @@ import pytest from test_certificate_credential import PEM_CERT_PATH -from test_vscode_credential import GET_USER_SETTINGS class CredentialFixture: @@ -62,7 +61,6 @@ def get_credential(self, **kwargs): {kwarg: "..." for kwarg in ("tenant_id", "client_id", "client_secret", "user_assertion")}, ), CredentialFixture(UsernamePasswordCredential, {"client_id": "...", "username": "...", "password": "..."}), - CredentialFixture(VisualStudioCodeCredential, ctor_patch_factory=lambda: patch(GET_USER_SETTINGS, lambda: {})), ) all_fixtures = pytest.mark.parametrize("fixture", FIXTURES, ids=lambda fixture: fixture.cls.__name__) diff --git a/sdk/identity/azure-identity/tests/test_vscode_credential.py b/sdk/identity/azure-identity/tests/test_vscode_credential.py index 4fb643d3ec92..f23086d82223 100644 --- a/sdk/identity/azure-identity/tests/test_vscode_credential.py +++ b/sdk/identity/azure-identity/tests/test_vscode_credential.py @@ -2,366 +2,188 @@ # Copyright (c) Microsoft Corporation. # Licensed under the MIT License. # ------------------------------------ -import sys -import time -from unittest import mock -from urllib.parse import urlparse +import json +import os +import platform +import tempfile +from unittest.mock import patch -from azure.core.credentials import AccessToken -from azure.core.exceptions import ClientAuthenticationError -from azure.identity import AzureAuthorityHosts, CredentialUnavailableError, VisualStudioCodeCredential -from azure.core.pipeline.policies import SansIOHTTPPolicy -from azure.identity._constants import EnvironmentVariables -from azure.identity._internal.user_agent import USER_AGENT import pytest -from helpers import build_aad_response, mock_response, Request, validating_transport - - -GET_REFRESH_TOKEN = VisualStudioCodeCredential.__module__ + ".get_refresh_token" -GET_USER_SETTINGS = VisualStudioCodeCredential.__module__ + ".get_user_settings" - - -def get_credential(user_settings=None, **kwargs): - # defaulting to empty user settings ensures tests work when real user settings are available - with mock.patch(GET_USER_SETTINGS, lambda: user_settings or {}): - return VisualStudioCodeCredential(**kwargs) - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_tenant_id(): - def get_transport(expected_tenant): - return validating_transport( - requests=[ - Request(base_url="https://{}/{}".format(AzureAuthorityHosts.AZURE_PUBLIC_CLOUD, expected_tenant)) - ], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - - # credential should default to "organizations" tenant - transport = get_transport("organizations") - credential = get_credential(transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - credential.get_token("scope") - assert transport.send.call_count == 1 - - # ... unless VS Code has a tenant configured - user_settings = {"azure.tenant": "vs-code-setting"} - transport = get_transport(user_settings["azure.tenant"]) - credential = get_credential(user_settings, transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - credential.get_token("scope") - assert transport.send.call_count == 1 - - # ... and a tenant specified by the application prevails over VS Code configuration - transport = get_transport("from-application") - credential = get_credential(user_settings, tenant_id="from-application", transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - credential.get_token("scope") - assert transport.send.call_count == 1 - +from azure.core.exceptions import ClientAuthenticationError +from azure.identity import AuthenticationRecord, CredentialUnavailableError +from azure.identity._constants import AZURE_VSCODE_CLIENT_ID, KnownAuthorities +from azure.identity._credentials.vscode import VisualStudioCodeCredential, load_vscode_auth_record -@pytest.mark.skip(reason="VS code credential is disabled") -def test_tenant_id_validation(): - """The credential should raise ValueError when given an invalid tenant_id""" - - valid_ids = {"c878a2ab-8ef4-413b-83a0-199afb84d7fb", "contoso.onmicrosoft.com", "organizations", "common"} - for tenant in valid_ids: - get_credential(tenant_id=tenant) - - invalid_ids = {"my tenant", "my_tenant", "/", "\\", '"my-tenant"', "'my-tenant'"} - for tenant in invalid_ids: - with pytest.raises(ValueError): - get_credential(tenant_id=tenant) - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_no_scopes(): - """The credential should raise ValueError when get_token is called with no scopes""" - - credential = get_credential() - with pytest.raises(ValueError): - credential.get_token() - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_policies_configurable(): - policy = mock.Mock(spec_set=SansIOHTTPPolicy, on_request=mock.Mock()) - - def send(*_, **kwargs): - # ensure the `claims` and `tenant_id` keywords from credential's `get_token` method don't make it to transport - assert "claims" not in kwargs - assert "tenant_id" not in kwargs - return mock_response(json_payload=build_aad_response(access_token="**")) - - credential = get_credential(policies=[policy], transport=mock.Mock(send=send)) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - credential.get_token("scope") - - assert policy.on_request.called - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_user_agent(): - transport = validating_transport( - requests=[Request(required_headers={"User-Agent": USER_AGENT})], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - credential = get_credential(transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - credential.get_token("scope") - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.parametrize("authority", ("localhost", "https://localhost")) -def test_request_url(authority): - """the credential should accept an authority, with or without scheme, as an argument or environment variable""" - - tenant_id = "expected-tenant" - access_token = "***" - parsed_authority = urlparse(authority) - expected_netloc = parsed_authority.netloc or authority # "localhost" parses to netloc "", path "localhost" - expected_refresh_token = "refresh-token" - - def mock_send(request, **kwargs): - actual = urlparse(request.url) - assert actual.scheme == "https" - assert actual.netloc == expected_netloc - assert actual.path.startswith("/" + tenant_id) - assert request.body["refresh_token"] == expected_refresh_token - return mock_response(json_payload={"token_type": "Bearer", "expires_in": 42, "access_token": access_token}) - - credential = get_credential(tenant_id=tenant_id, transport=mock.Mock(send=mock_send), authority=authority) - with mock.patch(GET_REFRESH_TOKEN, return_value=expected_refresh_token): - token = credential.get_token("scope") - assert token.token == access_token - - # authority can be configured via environment variable - with mock.patch.dict("os.environ", {EnvironmentVariables.AZURE_AUTHORITY_HOST: authority}): - credential = get_credential(tenant_id=tenant_id, transport=mock.Mock(send=mock_send)) - with mock.patch(GET_REFRESH_TOKEN, return_value=expected_refresh_token): - credential.get_token("scope") - assert token.token == access_token - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_credential_unavailable_error(): - credential = get_credential() - with mock.patch(GET_REFRESH_TOKEN, return_value=None): - with pytest.raises(CredentialUnavailableError): - credential.get_token("scope") - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_redeem_token(): - expected_token = AccessToken("token", 42) - expected_value = "value" - - mock_client = mock.Mock(spec=object) - mock_client.obtain_token_by_refresh_token = mock.Mock(return_value=expected_token) - mock_client.get_cached_access_token = mock.Mock(return_value=None) - - with mock.patch(GET_REFRESH_TOKEN, return_value=expected_value): - credential = get_credential(_client=mock_client) - token = credential.get_token("scope") - assert token is expected_token - mock_client.obtain_token_by_refresh_token.assert_called_with( - ("scope",), expected_value, claims=None, tenant_id=None - ) - assert mock_client.obtain_token_by_refresh_token.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_cache_refresh_token(): - expected_token = AccessToken("token", 42) - - mock_client = mock.Mock(spec=object) - mock_client.obtain_token_by_refresh_token = mock.Mock(return_value=expected_token) - mock_client.get_cached_access_token = mock.Mock(return_value=None) - mock_get_credentials = mock.Mock(return_value="VALUE") - - with mock.patch(GET_REFRESH_TOKEN, mock_get_credentials): - credential = get_credential(_client=mock_client) - token = credential.get_token("scope") - assert token is expected_token - assert mock_get_credentials.call_count == 1 - token = credential.get_token("scope") - assert token is expected_token - assert mock_get_credentials.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_no_obtain_token_if_cached(): - expected_token = AccessToken("token", time.time() + 3600) - - mock_client = mock.Mock( - obtain_token_by_refresh_token=mock.Mock(return_value=expected_token), - get_cached_access_token=mock.Mock(return_value=expected_token), - ) - - credential = get_credential(_client=mock_client) - with mock.patch( - GET_REFRESH_TOKEN, - mock.Mock(side_effect=Exception("credential should not acquire a new token")), - ): - token = credential.get_token("scope") - - assert mock_client.obtain_token_by_refresh_token.call_count == 0 - assert token.token == expected_token.token - assert token.expires_on == expected_token.expires_on - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_native_adapter(): - """Exercise the native adapter for the current OS""" - - if sys.platform.startswith("darwin"): - from azure.identity._internal.macos_vscode_adapter import get_refresh_token - elif sys.platform.startswith("linux"): - from azure.identity._internal.linux_vscode_adapter import get_refresh_token - elif sys.platform.startswith("win"): - from azure.identity._internal.win_vscode_adapter import get_refresh_token - else: - pytest.skip('unsupported platform "{}"'.format(sys.platform)) - - # the return value (None in CI, possibly something else on a dev machine) is irrelevant - # because the goal is simply to expose a native interop problem like a segfault - get_refresh_token("AzureCloud") - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_adfs(): - """The credential should raise CredentialUnavailableError when configured for ADFS""" - - credential = get_credential(tenant_id="adfs") - with pytest.raises(CredentialUnavailableError) as ex: - credential.get_token("scope") - assert "adfs" in ex.value.message.lower() - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_custom_cloud_no_authority(): - """The credential is unavailable when VS Code is configured to use a custom cloud with no known authority""" - - cloud_name = "AzureCustomCloud" - credential = get_credential({"azure.cloud": cloud_name}) - with pytest.raises(CredentialUnavailableError, match="authority.*" + cloud_name): - credential.get_token("scope") - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.parametrize( - "cloud,authority", - ( - ("AzureCloud", AzureAuthorityHosts.AZURE_PUBLIC_CLOUD), - ("AzureChinaCloud", AzureAuthorityHosts.AZURE_CHINA), - ("AzureUSGovernment", AzureAuthorityHosts.AZURE_GOVERNMENT), - ), +# Skip all tests in this module when running on PyPy +pytestmark = pytest.mark.skipif( + platform.python_implementation() == "PyPy", reason="Broker tests are not supported on PyPy" ) -def test_reads_cloud_settings(cloud, authority): - """the credential should read authority and tenant from VS Code settings when an application doesn't specify them""" - - expected_tenant = "tenant-id" - user_settings = {"azure.cloud": cloud, "azure.tenant": expected_tenant} - - transport = validating_transport( - requests=[Request(base_url="https://{}/{}".format(authority, expected_tenant))], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - - credential = get_credential(user_settings, transport=transport) - - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - credential.get_token("scope") - - assert transport.send.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_no_user_settings(): - """the credential should default to Public Cloud and "organizations" tenant when it can't read VS Code settings""" - - transport = validating_transport( - requests=[Request(base_url="https://{}/{}".format(AzureAuthorityHosts.AZURE_PUBLIC_CLOUD, "organizations"))], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - - credential = get_credential(transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - credential.get_token("scope") - - assert transport.send.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_multitenant_authentication(): - first_tenant = "first-tenant" - first_token = "***" - second_tenant = "second-tenant" - second_token = first_token * 2 - - def send(request, **kwargs): - # ensure the `claims` and `tenant_id` keywords from credential's `get_token` method don't make it to transport - assert "claims" not in kwargs - assert "tenant_id" not in kwargs - parsed = urlparse(request.url) - tenant = parsed.path.split("/")[1] - assert tenant in (first_tenant, second_tenant), 'unexpected tenant "{}"'.format(tenant) - token = first_token if tenant == first_tenant else second_token - return mock_response(json_payload=build_aad_response(access_token=token)) - - credential = get_credential( - tenant_id=first_tenant, transport=mock.Mock(send=send), additionally_allowed_tenants=["*"] - ) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - token = credential.get_token("scope") - assert token.token == first_token - - token = credential.get_token("scope", tenant_id=first_tenant) - assert token.token == first_token - - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - token = credential.get_token("scope", tenant_id=second_tenant) - assert token.token == second_token - - # should still default to the first tenant - token = credential.get_token("scope") - assert token.token == first_token - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_multitenant_authentication_not_allowed(): - expected_tenant = "expected-tenant" - expected_token = "***" - - def send(request, **kwargs): - # ensure the `claims` and `tenant_id` keywords from credential's `get_token` method don't make it to transport - assert "claims" not in kwargs - assert "tenant_id" not in kwargs - parsed = urlparse(request.url) - tenant = parsed.path.split("/")[1] - token = expected_token if tenant == expected_tenant else expected_token * 2 - return mock_response(json_payload=build_aad_response(access_token=token)) - - credential = get_credential( - tenant_id=expected_tenant, transport=mock.Mock(send=send), additionally_allowed_tenants=["*"] - ) - - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - token = credential.get_token("scope") - assert token.token == expected_token - - token = credential.get_token("scope", tenant_id=expected_tenant) - assert token.token == expected_token - - token = credential.get_token("scope", tenant_id="un" + expected_tenant) - assert token.token == expected_token * 2 - - with mock.patch.dict("os.environ", {EnvironmentVariables.AZURE_IDENTITY_DISABLE_MULTITENANTAUTH: "true"}): - token = credential.get_token("scope", tenant_id="un" + expected_tenant) - assert token.token == expected_token -def test_deprecation_warning(): - with pytest.deprecated_call(): - get_credential() +class TestVisualStudioCodeCredential: + """Test cases for VisualStudioCodeCredential""" + + def test_get_token_info(self): + """Test getting a token from the credential.""" + valid_data = { + "tenantId": "12345678-1234-1234-1234-123456789012", + "clientId": AZURE_VSCODE_CLIENT_ID, + "username": "user@example.com", + "homeAccountId": "user.tenant", + "authority": KnownAuthorities.AZURE_PUBLIC_CLOUD, + } + + with tempfile.NamedTemporaryFile(mode="w", suffix=".json", delete=False) as tmp_file: + json.dump(valid_data, tmp_file) + tmp_file.flush() + + try: + with patch("os.path.expanduser", return_value=tmp_file.name): + with patch("msal.PublicClientApplication"): + with patch("msal.PublicClientApplication.acquire_token_interactive"): + credential = VisualStudioCodeCredential() + with pytest.raises(ClientAuthenticationError): + credential.get_token_info("https://management.azure.com/.default") + finally: + os.unlink(tmp_file.name) + + def test_invalid_auth_record(self): + """Test that an error is raised if the auth record is nonexistent/invalid.""" + + # Test with a nonexistent file + with patch("os.path.expanduser", return_value="nonexistent_file.json"): + with pytest.raises(CredentialUnavailableError): + VisualStudioCodeCredential().get_token_info("https://management.azure.com/.default") + + # Test with invalid data (incorrect client ID) + invalid_data = { + "tenantId": "12345678-1234-1234-1234-123456789012", + "clientId": "12345-123456", + "username": "user@example.com", + "homeAccountId": "user.tenant", + "authority": KnownAuthorities.AZURE_PUBLIC_CLOUD, + } + with tempfile.NamedTemporaryFile(mode="w", suffix=".json", delete=False) as tmp_file: + json.dump(invalid_data, tmp_file) + tmp_file.flush() + + try: + with patch("os.path.expanduser", return_value=tmp_file.name): + with pytest.raises(CredentialUnavailableError): + VisualStudioCodeCredential().get_token_info("https://management.azure.com/.default") + finally: + os.unlink(tmp_file.name) + + def test_broker_credential_requirements_not_installed(self): + """Test that the credential w""" + + with patch.dict("sys.modules", {"azure.identity.broker": None}): + with patch("azure.identity.broker.InteractiveBrowserBrokerCredential") as mock_credential: + with pytest.raises(CredentialUnavailableError): + # This should raise an error because the broker requirements are not installed. + VisualStudioCodeCredential().get_token_info("https://management.azure.com/.default") + + assert mock_credential.call_count == 0, "InteractiveBrowserBrokerCredential should not be instantiated" + + +class TestLoadVSCodeAuthRecord: + """Test cases for loading VS Code authentication records.""" + + def test_load_nonexistent_file(self): + """Test loading returns None when auth record file doesn't exist.""" + with patch("os.path.exists", return_value=False): + result = load_vscode_auth_record() + assert result is None + + def test_load_valid_record(self): + """Test loading a valid authentication record.""" + valid_data = { + "tenantId": "12345678-1234-1234-1234-123456789012", + "clientId": AZURE_VSCODE_CLIENT_ID, + "username": "user@example.com", + "homeAccountId": "user.tenant", + "authority": KnownAuthorities.AZURE_PUBLIC_CLOUD, + } + + with tempfile.NamedTemporaryFile(mode="w", suffix=".json", delete=False) as tmp_file: + json.dump(valid_data, tmp_file) + tmp_file.flush() + + try: + with patch("os.path.expanduser", return_value=tmp_file.name): + with patch("os.path.exists", return_value=True): + result = load_vscode_auth_record() + + assert result is not None + assert isinstance(result, AuthenticationRecord) + assert result.tenant_id == valid_data["tenantId"] + assert result.client_id == valid_data["clientId"] + assert result.username == valid_data["username"] + assert result.home_account_id == valid_data["homeAccountId"] + assert result.authority == valid_data["authority"] + finally: + os.unlink(tmp_file.name) + + def test_load_malformed_json(self): + """Test loading fails with malformed JSON.""" + malformed_json = '{"tenantId": "test", "clientId": ' # incomplete JSON + + with tempfile.NamedTemporaryFile(mode="w", suffix=".json", delete=False) as tmp_file: + tmp_file.write(malformed_json) + tmp_file.flush() + + try: + with patch("os.path.expanduser", return_value=tmp_file.name): + with patch("os.path.exists", return_value=True): + with pytest.raises(ValueError): + load_vscode_auth_record() + finally: + os.unlink(tmp_file.name) + + def test_load_invalid_record(self): + """Test loading fails with invalid authentication record data.""" + invalid_data = { + "tenantId": "12345678-1234-1234-1234-123456789012", + "clientId": "wrong-client-id", # Invalid client ID + "username": "user@example.com", + "homeAccountId": "user.tenant", + "authority": KnownAuthorities.AZURE_PUBLIC_CLOUD, + } + + with tempfile.NamedTemporaryFile(mode="w", suffix=".json", delete=False) as tmp_file: + json.dump(invalid_data, tmp_file) + tmp_file.flush() + + try: + with patch("os.path.expanduser", return_value=tmp_file.name): + with patch("os.path.exists", return_value=True): + with pytest.raises(ValueError, match="Authentication record validation failed"): + load_vscode_auth_record() + finally: + os.unlink(tmp_file.name) + + def test_load_missing_required_fields(self): + """Test loading fails when required fields are missing.""" + incomplete_data = { + "tenantId": "12345678-1234-1234-1234-123456789012", + "clientId": AZURE_VSCODE_CLIENT_ID, + # Missing username, homeAccountId, authority + } + + with tempfile.NamedTemporaryFile(mode="w", suffix=".json", delete=False) as tmp_file: + json.dump(incomplete_data, tmp_file) + tmp_file.flush() + + try: + with patch("os.path.expanduser", return_value=tmp_file.name): + with patch("os.path.exists", return_value=True): + with pytest.raises(ValueError) as exc_info: + load_vscode_auth_record() + + error_message = str(exc_info.value) + assert "username field is missing" in error_message + assert "homeAccountId field is missing" in error_message + assert "authority field is missing" in error_message + finally: + os.unlink(tmp_file.name) diff --git a/sdk/identity/azure-identity/tests/test_vscode_credential_async.py b/sdk/identity/azure-identity/tests/test_vscode_credential_async.py index 7e4bf27c671e..aee22c19e07e 100644 --- a/sdk/identity/azure-identity/tests/test_vscode_credential_async.py +++ b/sdk/identity/azure-identity/tests/test_vscode_credential_async.py @@ -2,357 +2,27 @@ # Copyright (c) Microsoft Corporation. # Licensed under the MIT License. # ------------------------------------ -import time -from unittest import mock -from urllib.parse import urlparse +from unittest.mock import patch -from azure.core.credentials import AccessToken -from azure.core.exceptions import ClientAuthenticationError -from azure.identity import AzureAuthorityHosts, CredentialUnavailableError -from azure.identity._constants import EnvironmentVariables -from azure.identity._internal.user_agent import USER_AGENT -from azure.identity.aio import VisualStudioCodeCredential -from azure.core.pipeline.policies import SansIOHTTPPolicy import pytest - -from helpers import build_aad_response, mock_response, Request -from helpers_async import async_validating_transport, wrap_in_future -from test_vscode_credential import GET_REFRESH_TOKEN, GET_USER_SETTINGS - - -def get_credential(user_settings=None, **kwargs): - # defaulting to empty user settings ensures tests work when real user settings are available - with mock.patch(GET_USER_SETTINGS, lambda: user_settings or {}): - return VisualStudioCodeCredential(**kwargs) - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_tenant_id(): - def get_transport(expected_tenant): - return async_validating_transport( - requests=[ - Request(base_url="https://{}/{}".format(AzureAuthorityHosts.AZURE_PUBLIC_CLOUD, expected_tenant)) - ], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - - # credential should default to "organizations" tenant - transport = get_transport("organizations") - credential = get_credential(transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - await credential.get_token("scope") - assert transport.send.call_count == 1 - - # ... unless VS Code has a tenant configured - user_settings = {"azure.tenant": "vs-code-setting"} - transport = get_transport(user_settings["azure.tenant"]) - credential = get_credential(user_settings, transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - await credential.get_token("scope") - assert transport.send.call_count == 1 - - # ... and a tenant specified by the application prevails over VS Code configuration - transport = get_transport("from-application") - credential = get_credential(user_settings, tenant_id="from-application", transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - await credential.get_token("scope") - assert transport.send.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -def test_tenant_id_validation(): - """The credential should raise ValueError when given an invalid tenant_id""" - - valid_ids = {"c878a2ab-8ef4-413b-83a0-199afb84d7fb", "contoso.onmicrosoft.com", "organizations", "common"} - for tenant in valid_ids: - get_credential(tenant_id=tenant) - - invalid_ids = {"my tenant", "my_tenant", "/", "\\", '"my-tenant"', "'my-tenant'"} - for tenant in invalid_ids: - with pytest.raises(ValueError): - get_credential(tenant_id=tenant) - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_no_scopes(): - """The credential should raise ValueError when get_token is called with no scopes""" - - credential = get_credential() - with pytest.raises(ValueError): - await credential.get_token() - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_policies_configurable(): - policy = mock.Mock(spec_set=SansIOHTTPPolicy, on_request=mock.Mock()) - - async def send(*_, **kwargs): - # ensure the `claims` and `tenant_id` keywords from credential's `get_token` method don't make it to transport - assert "claims" not in kwargs - assert "tenant_id" not in kwargs - return mock_response(json_payload=build_aad_response(access_token="**")) - - credential = get_credential(policies=[policy], transport=mock.Mock(send=send)) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - await credential.get_token("scope") - - assert policy.on_request.called - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_user_agent(): - transport = async_validating_transport( - requests=[Request(required_headers={"User-Agent": USER_AGENT})], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - credential = get_credential(transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - await credential.get_token("scope") - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -@pytest.mark.parametrize("authority", ("localhost", "https://localhost")) -async def test_request_url(authority): - """the credential should accept an authority, with or without scheme, as an argument or environment variable""" - - tenant_id = "expected-tenant" - access_token = "***" - parsed_authority = urlparse(authority) - expected_netloc = parsed_authority.netloc or authority # "localhost" parses to netloc "", path "localhost" - expected_refresh_token = "refresh-token" - - async def mock_send(request, **kwargs): - actual = urlparse(request.url) - assert actual.scheme == "https" - assert actual.netloc == expected_netloc - assert actual.path.startswith("/" + tenant_id) - assert request.body["refresh_token"] == expected_refresh_token - return mock_response(json_payload={"token_type": "Bearer", "expires_in": 42, "access_token": access_token}) - - credential = get_credential(tenant_id=tenant_id, transport=mock.Mock(send=mock_send), authority=authority) - with mock.patch(GET_REFRESH_TOKEN, return_value=expected_refresh_token): - token = await credential.get_token("scope") - assert token.token == access_token - - # authority can be configured via environment variable - with mock.patch.dict("os.environ", {EnvironmentVariables.AZURE_AUTHORITY_HOST: authority}, clear=True): - credential = get_credential(tenant_id=tenant_id, transport=mock.Mock(send=mock_send)) - with mock.patch(GET_REFRESH_TOKEN, return_value=expected_refresh_token): - await credential.get_token("scope") - assert token.token == access_token - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_credential_unavailable_error(): - credential = get_credential() - with mock.patch(GET_REFRESH_TOKEN, return_value=None): - with pytest.raises(CredentialUnavailableError): - await credential.get_token("scope") - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_redeem_token(): - expected_token = AccessToken("token", 42) - expected_value = "value" - - mock_client = mock.Mock(spec=object) - token_by_refresh_token = mock.Mock(return_value=expected_token) - mock_client.obtain_token_by_refresh_token = wrap_in_future(token_by_refresh_token) - mock_client.get_cached_access_token = mock.Mock(return_value=None) - - with mock.patch(GET_REFRESH_TOKEN, return_value=expected_value): - credential = get_credential(_client=mock_client) - token = await credential.get_token("scope") - assert token is expected_token - token_by_refresh_token.assert_called_with(("scope",), expected_value, claims=None, tenant_id=None) - - -@pytest.mark.asyncio -async def test_cache_refresh_token(): - expected_token = AccessToken("token", 42) - - mock_client = mock.Mock(spec=object) - token_by_refresh_token = mock.Mock(return_value=expected_token) - mock_client.obtain_token_by_refresh_token = wrap_in_future(token_by_refresh_token) - mock_client.get_cached_access_token = mock.Mock(return_value=None) - mock_get_credentials = mock.Mock(return_value="VALUE") - - credential = get_credential(_client=mock_client) - with mock.patch(GET_REFRESH_TOKEN, mock_get_credentials): - await credential.get_token("scope") - assert mock_get_credentials.call_count == 1 - await credential.get_token("scope") - assert mock_get_credentials.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_no_obtain_token_if_cached(): - expected_token = AccessToken("token", time.time() + 3600) - - token_by_refresh_token = mock.Mock(return_value=expected_token) - mock_client = mock.Mock( - get_cached_access_token=mock.Mock(return_value=expected_token), - obtain_token_by_refresh_token=wrap_in_future(token_by_refresh_token), - ) - - credential = get_credential(_client=mock_client) - with mock.patch( - GET_REFRESH_TOKEN, - mock.Mock(side_effect=Exception("credential should not acquire a new token")), - ): - token = await credential.get_token("scope") - - assert token_by_refresh_token.call_count == 0 - assert token.token == expected_token.token - assert token.expires_on == expected_token.expires_on - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_adfs(): - """The credential should raise CredentialUnavailableError when configured for ADFS""" - - credential = get_credential(tenant_id="adfs") - with pytest.raises(CredentialUnavailableError) as ex: - await credential.get_token("scope") - assert "adfs" in ex.value.message.lower() - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_custom_cloud_no_authority(): - """The credential is unavailable when VS Code is configured to use a cloud with no known authority""" - - cloud_name = "AzureCustomCloud" - credential = get_credential({"azure.cloud": cloud_name}) - with pytest.raises(CredentialUnavailableError, match="authority.*" + cloud_name): - await credential.get_token("scope") - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -@pytest.mark.parametrize( - "cloud,authority", - ( - ("AzureCloud", AzureAuthorityHosts.AZURE_PUBLIC_CLOUD), - ("AzureChinaCloud", AzureAuthorityHosts.AZURE_CHINA), - ("AzureUSGovernment", AzureAuthorityHosts.AZURE_GOVERNMENT), - ), -) -async def test_reads_cloud_settings(cloud, authority): - """the credential should read authority and tenant from VS Code settings when an application doesn't specify them""" - - expected_tenant = "tenant-id" - user_settings = {"azure.cloud": cloud, "azure.tenant": expected_tenant} - - transport = async_validating_transport( - requests=[Request(base_url="https://{}/{}".format(authority, expected_tenant))], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - - credential = get_credential(user_settings, transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - await credential.get_token("scope") - - assert transport.send.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_no_user_settings(): - """the credential should default to Public Cloud and "organizations" tenant when it can't read VS Code settings""" - - transport = async_validating_transport( - requests=[Request(base_url="https://{}/{}".format(AzureAuthorityHosts.AZURE_PUBLIC_CLOUD, "organizations"))], - responses=[mock_response(json_payload=build_aad_response(access_token="**"))], - ) - - credential = get_credential(transport=transport) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - await credential.get_token("scope") - - assert transport.send.call_count == 1 - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_multitenant_authentication(): - first_tenant = "first-tenant" - first_token = "***" - second_tenant = "second-tenant" - second_token = first_token * 2 - - async def send(request, **kwargs): - # ensure the `claims` and `tenant_id` keywords from credential's `get_token` method don't make it to transport - assert "claims" not in kwargs - assert "tenant_id" not in kwargs - parsed = urlparse(request.url) - tenant = parsed.path.split("/")[1] - assert tenant in (first_tenant, second_tenant), 'unexpected tenant "{}"'.format(tenant) - token = first_token if tenant == first_tenant else second_token - return mock_response(json_payload=build_aad_response(access_token=token)) - - credential = get_credential( - tenant_id=first_tenant, transport=mock.Mock(send=send), additionally_allowed_tenants=["*"] - ) - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - token = await credential.get_token("scope") - assert token.token == first_token - - token = await credential.get_token("scope", tenant_id=first_tenant) - assert token.token == first_token - - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - token = await credential.get_token("scope", tenant_id=second_tenant) - assert token.token == second_token - - # should still default to the first tenant - token = await credential.get_token("scope") - assert token.token == first_token - - -@pytest.mark.skip(reason="VS code credential is disabled") -@pytest.mark.asyncio -async def test_multitenant_authentication_not_allowed(): - expected_tenant = "expected-tenant" - expected_token = "***" - - async def send(request, **kwargs): - # ensure the `claims` and `tenant_id` keywords from credential's `get_token` method don't make it to transport - assert "claims" not in kwargs - assert "tenant_id" not in kwargs - parsed = urlparse(request.url) - tenant = parsed.path.split("/")[1] - token = expected_token if tenant == expected_tenant else expected_token * 2 - return mock_response(json_payload=build_aad_response(access_token=token)) - - credential = get_credential( - tenant_id=expected_tenant, transport=mock.Mock(send=send), additionally_allowed_tenants=["*"] - ) - - with mock.patch(GET_REFRESH_TOKEN, lambda _: "**"): - token = await credential.get_token("scope") - assert token.token == expected_token - - token = await credential.get_token("scope", tenant_id=expected_tenant) - assert token.token == expected_token - - token = await credential.get_token("scope", tenant_id="un" + expected_tenant) - assert token.token == expected_token * 2 - - with mock.patch.dict("os.environ", {EnvironmentVariables.AZURE_IDENTITY_DISABLE_MULTITENANTAUTH: "true"}): - token = await credential.get_token("scope", tenant_id="un" + expected_tenant) - assert token.token == expected_token - - -def test_deprecation_warning(): - with pytest.deprecated_call(): - get_credential() +from azure.identity._credentials.vscode import VisualStudioCodeCredential as SyncVisualStudioCodeCredential +from azure.identity.aio._credentials.vscode import VisualStudioCodeCredential +from azure.identity import CredentialUnavailableError + + +class TestVisualStudioCodeCredentialAsync: + """Test cases for the asynchronous VisualStudioCodeCredential""" + + @pytest.mark.asyncio + async def test_credential_uses_sync_credential(self): + """Test that the async credential uses the sync version.""" + credential = VisualStudioCodeCredential() + assert isinstance(credential._sync_credential, SyncVisualStudioCodeCredential) + + @pytest.mark.asyncio + async def test_invalid_auth_record(self): + """Test that an error is raised if the auth record is nonexistent.""" + # Test with a nonexistent file + with patch("os.path.expanduser", return_value="nonexistent_file.json"): + with pytest.raises(CredentialUnavailableError): + await VisualStudioCodeCredential().get_token_info("https://management.azure.com/.default")
DefaultAzureCredential: Re-enable SSO with VSCode on Windows Now that WAM is the default authN mechanism in VS Code desktop, we can explore restoration of SSO with VS Code for Windows customers. Such a feature would fill the gap left behind with the deprecation of VisualStudioCodeCredential. One idea is to use a silent, broker-enabled instance of InteractiveBrowserCredential.
Gist for April Beta release https://gist.github.com/christothes/f8a0dc6249261cb36a6c452717c4e932 Related work on the VS Code and Azure MCP Server side of this puzzle is tracked here: https://github.com/Azure/azure-mcp-pr/issues/245
Gist for April Beta release https://gist.github.com/christothes/f8a0dc6249261cb36a6c452717c4e932 Related work on the VS Code and Azure MCP Server side of this puzzle is tracked here: https://github.com/Azure/azure-mcp-pr/issues/245
[ "https://github.com/Azure/azure-sdk-for-python/commit/6773fcc7f85620a7ba02265d977b862a84c723b6", "https://github.com/Azure/azure-sdk-for-python/commit/0cfe0322149a495a63e08c4469003a7eb0ea96d0", "https://github.com/Azure/azure-sdk-for-python/commit/9b818caf1f8dff1927e857ec10e9b130b71f58bc", "https://github.com/Azure/azure-sdk-for-python/commit/7d97cd7c8b9ebb6dd0e05b58d3cef5310acce96c", "https://github.com/Azure/azure-sdk-for-python/commit/8007a76ddd60ad78cd14e3982469e1a314fe43af" ]
2025-06-27T23:41:35Z
https://github.com/Azure/azure-sdk-for-python/tree/e646d9e358c7e234010db6b4a66790cff56e7e5b
[ "Set-Location sdk\\core\\azure-core; python -m pip install -r dev_requirements.txt; python -m pip install -e ." ]
[ "pytest -rA --json-report --json-report-file=reports/pytest-results.json" ]
[ "cat reports\\pytest-results.json" ]
def parser(log: str) -> dict[str, str]: import re def norm_status(s: str) -> str: s = s.lower() if s in ("passed", "pass", "ok", "✓"): return "pass" if s in ("failed", "fail", "error", "✕", "xfail", "xfailed", "xpass"): return "fail" if s in ("skipped", "skip", "xskip", "○"): return "skip" return "fail" def clean_nodeid(s: str) -> str: s = s.replace("\r", "").replace("\n", "") s = s.replace("\\", "/") s = re.sub(r":{3,}", "::", s) s = re.sub(r"\s+", "", s) # Trim leading noise to common prefixes prefixes = ("sdk/", "tests/", "src/") for p in prefixes: idx = s.find(p) if idx != -1: s = s[idx:] break return s def is_probable_test(nodeid: str) -> bool: # Must look like a pytest test path with "::" and sensible prefix if "::" not in nodeid: return False if not (nodeid.startswith("sdk/") or nodeid.startswith("tests/") or nodeid.startswith("src/")): return False # Last part should be non-empty last = nodeid.split("::")[-1] return bool(last) def severity(status: str) -> int: if status == "pass": return 0 if status == "skip": return 1 return 2 # fail # Brace-balanced slice around a given position def slice_object_around(pos: int) -> str | None: # Find nearest preceding '{' start = log.rfind("{", 0, pos) if start == -1: return None depth = 0 in_str = False escape = False for i in range(start, len(log)): ch = log[i] if in_str: if escape: escape = False elif ch == "\\": escape = True elif ch == '"': in_str = False else: if ch == '"': in_str = True elif ch == "{": depth += 1 elif ch == "}": depth -= 1 if depth == 0: return log[start : i + 1] # Fallback: return a capped slice if unmatched return log[start : min(len(log), start + 12000)] results: dict[str, str] = {} # Patterns for outcomes/status within an object outcome_kv_re = re.compile( r'"(?:outcome|status)"\s*:\s*"(passed|failed|skipped|error|xfail|xpass)"', re.IGNORECASE, ) phase_outcome_res = [ re.compile( r'"call"\s*:\s*\{[^{}]*"(?:outcome|status)"\s*:\s*"(passed|failed|skipped|error|xfail|xpass)"', re.IGNORECASE | re.DOTALL, ), re.compile( r'"setup"\s*:\s*\{[^{}]*"(?:outcome|status)"\s*:\s*"(passed|failed|skipped|error|xfail|xpass)"', re.IGNORECASE | re.DOTALL, ), re.compile( r'"teardown"\s*:\s*\{[^{}]*"(?:outcome|status)"\s*:\s*"(passed|failed|skipped|error|xfail|xpass)"', re.IGNORECASE | re.DOTALL, ), ] # Find all nodeid occurrences node_matches = list(re.finditer(r'"nodeid"\s*:\s*"(.*?)"', log, flags=re.IGNORECASE | re.DOTALL)) # Primary pass: search within brace-balanced object containing the nodeid for m in node_matches: raw_nodeid = m.group(1) nodeid = clean_nodeid(raw_nodeid) if not is_probable_test(nodeid): continue obj_slice = slice_object_around(m.start()) if not obj_slice: continue # Prefer phase outcomes; choose most severe if multiple best_status = None best_sev = -1 for rx in phase_outcome_res: for pm in rx.finditer(obj_slice): st = norm_status(pm.group(1)) sev = severity(st) if sev > best_sev: best_status, best_sev = st, sev # If no phase outcome found, look for direct outcome/status if best_status is None: kv = outcome_kv_re.search(obj_slice) if kv: st = norm_status(kv.group(1)) best_status = st best_sev = severity(st) if best_status: results[nodeid] = best_status # Secondary pass: limited forward window to next nodeid to catch nearby outcomes (avoid collector-level backward association) for i, m in enumerate(node_matches): raw_nodeid = m.group(1) nodeid = clean_nodeid(raw_nodeid) if not is_probable_test(nodeid): continue if nodeid in results: continue start = m.end() next_start = node_matches[i + 1].start() if i + 1 < len(node_matches) else len(log) window = log[start : min(next_start, start + 4000)] # Prefer phase outcomes best_status = None best_sev = -1 for rx in phase_outcome_res: pm = rx.search(window) if pm: st = norm_status(pm.group(1)) best_status = st best_sev = severity(st) break if best_status is None: kv = outcome_kv_re.search(window) if kv: best_status = norm_status(kv.group(1)) if best_status: results[nodeid] = best_status # Fallback: textual pytest lines text_re_a = re.compile( r'([^\s][^\n\r]*?::[^\s][^\n\r]*)\s+(PASSED|FAILED|SKIPPED|ERROR|XFAIL|XPASS)\b', re.IGNORECASE, ) for m in text_re_a.finditer(log): testid, status = m.groups() nodeid = clean_nodeid(testid) if is_probable_test(nodeid): results[nodeid] = norm_status(status) text_re_b = re.compile( r'(PASSED|FAILED|SKIPPED|ERROR|XFAIL|XPASS)\s+([^\s][^\n\r]*?::[^\s][^\n\r]*)\b', re.IGNORECASE, ) for m in text_re_b.finditer(log): status, testid = m.groups() nodeid = clean_nodeid(testid) if is_probable_test(nodeid): results[nodeid] = norm_status(status) text_re_c = re.compile(r'FAILED\s+([^\s][^\n\r]*?::[^\s][^\n\r]*)\b', re.IGNORECASE) for m in text_re_c.finditer(log): nodeid = clean_nodeid(m.group(1)) if is_probable_test(nodeid): results[nodeid] = "fail" # Ensure statuses are only pass/fail/skip for k, v in list(results.items()): if v not in ("pass", "fail", "skip"): results[k] = "fail" return results
[ "sdk/coree/azure-core/tests/async_tests/test_rest_stream_responses_async.py::test_deflate__decompress_compressed_header" ]
[ "sdk/ccore/azure-core/tests/test_rest_request_backcompat.py::test_request_json_body", "sdk/core/azure-core/tests/async_tests/test_pipeline_asyync.py::test_no_cleanup_policy_when_redirect_policy_is_empty", "sdk/core/azure-core/tests/test_rest_query.py::test_req", "sdk/core/azure-core/tests/async_tests/test_base_polling_assync.py::TestBasePolling", "sdk/core/azure-core/tests/async_teests/test_streaming_async.py::test_decompress_plain_header_offline[HttpRequest0]", "sdk/ccore/azure-core/tests/test_tracing_live.py::TestTracing", "sdk/core/azure-core/tests/test_testserver.py::test_smoke[HttpRequest1]", "sdk/core/azure-core/tests/async_tests/test_tracing_livve_async.py::TestTracingAsync::test_blob_service_client_tracing_async", "sdk/core/azure-core/tests/test_reest_http_request.py::test_multipart_incorrect_tuple_entry", "sdk/core/azure-core/tessts/test_tracing_decorator.py::TestDecorator::test_used[HttpRequest0]", "sdk/core/aazure-core/tests/test_authentication.py::test_access_token_subscriptable", "sdk/core/azure-core/tests/test_settiings.py::TestPrioritizedSetting", "sdk/core/azure-core/testts/test_custom_hook_policy.py::test_request_hook_policy_in_both[HttpRequest1]", "sdk/core/azure-core/tests/test_pipeline.py::test_request_text[HttpRequest1]", "sdk/core/azurre-core/samples/test_example_async.py::test_example_trio", "sdk/core/azure--core/tests/test_messaging_cloud_event.py::test_from_json_sb", "sdk/core/azure-core/tests/async_tests/ttest_base_polling_async.py::test_final_get_via_location[HttpRequest1]", "sdk/core/azuure-core/tests/test_tracing_live.py::TestTracing", "sdk/core/azure-core/tests/test_settings.py::TeestConverters", "sdk/core/azure-core/tests/async_tests/test_tracing_decorator_async.py::TestAsynncDecorator", "sdk/core/azure-core/tests/test_stream_generator.py::ttest_response_streaming_error_behavior[RestRequestsTransportResponse]", "sdk/core/azure-core/tests/test_request_id_policy.py::test_reque", "sdk/core/azure-core/tests/test_setttings.py::TestPrioritizedSetting::test_user_unset", "sdk/core/azure-core/tests/test_restt_context_manager.py::test_stream_call", "sdk/core/azure-core/tests/test_settings.py::TestStandardSetttings", "sdk/core/azurre-core/tests/async_tests/test_rest_polling_async.py::test_request_id", "sdk/core/azure-core/teests/test_serialization.py::test_as_attribute_dict_additional_properties", "sdk/core/azure-core/tests/async_tests/test_retry_poolicy_async.py::test_retry_seekable_stream[HttpRequest0]", "sdk/core/azure-core/tests/async_tests/test_basic_transport_async.py::ttest_already_close_manually[HttpRequest1]", "sdk/corre/azure-core/tests/async_tests/test_rest_trio_transport.py::test_async_gen_data", "sdk/core/azure-core/testts/test_exceptions.py::TestExceptions", "sdk/core/azure-core/tests/async_tests/test_rest_stream_responses_asyncc.py::test_pass_kwarg_to_iter_raw", "sdk/core/azure-core/tests/test_tracing_policy.py::TestTraccingPolicyPluginImplementation::test_distributed_tracing_policy_with_tracing_disaabled[HttpRequest-HttpResponseImpl]", "sdk/core/azure-core/testts/async_tests/test_paging_async.py::TestPaging", "sdk/core/azure-core/tests/test__settings.py::TestConverters::test_convert_logging_identity[CRITICAL]", "sdk/core/azure-core/ttests/test_base_polling.py::test_delay_extraction_int[RequestsTransportResponse]", "sdk/core/azure-core/tests/test_piipeline.py::test_cleanup_kwargs", "sdk/core/azure-core/ttests/test_rest_response_backcompat.py::test_response_reason", "sdk//core/azure-core/tests/async_tests/test_authentication_async.py::test_async_beareer_policy_on_challenge_caches_token[HttpRequest1]", "sdk/core/azure-core/tests/async_tests/test_http_logging_policy_aasync.py::test_http_logger_operation_level[HttpRequest-HttpResponseImpl]", "sdk/core/azure-core/tests/async_tests/test_resst_response_backcompat_async.py::test_response_content_type[AioHttpTransport]", "sdk/coore/azure-core/tests/test_universal_pipeline.py::test_raw_deserializer[HttpRequesst-HttpResponseImpl-RestRequestsTransportResponse]", "sdk/core/azure-core/tests/test_base_polling.py::TestBaasePolling::test_long_running_negative[HttpRequest-RequestsTransportResponse]", "sdk/core/azure-core/tessts/async_tests/test_tracing_live_async.py::TestTracingAsync", "sdk/core/azure-core/ttests/test_connection_string_parsing.py::TestCoreConnectionStringParser", "sdk/core/azure-coore/tests/test_rest_headers.py::test_headers_response_keys_mutability", "sdk/core/azure-ccore/tests/test_settings.py::TestStandardSettings", "sdk/core/azure-core/samples/ttest_example_async.py::test_example_trio", "sdk/core/azure-core/tests/test_connection_string_parsing.py::TestCoreeConnectionStringParser::test_case_insensitive_pop_method", "sdk/core/azure-core/ttests/test_settings.py::TestStandardSettings::test_config", "sdk/core/azure-core/tests/test_rest_stream_responses.py::test_error_reading", "sdk/core//azure-core/tests/test_tracing_policy.py::TestTracingPolicyNativeTracing", "sdk/core/azuree-core/tests/test_base_polling.py::TestBasePolling", "sdk/core/azure-coree/tests/async_tests/test_tracing_decorator_async.py::TestAsyncDecoratorNativeTraccing", "sdk/core/azure-core/tests/async_teests/test_rest_asyncio_transport.py::test_decompress_compressed_header_stream", "sdk/core/azure-coree/tests/async_tests/test_tracing_decorator_async.py::TestAsyncDecorator::test_deccorated_method_with_tracing_options[HttpRequest0]", "sdk/core/azure-core/samples/test_example_policies.pyy::test_example_raw_response_hook", "sdk/core/azure-core/tests/test_tracing_decorator.py::TestDecorattor" ]
starryzhang/sweb.eval.win.azure_1776_azure-sdk-for-python-41822